| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <CALx_OUC1ofYfO09RNnnGbUz2dsNZC3ccHM0LqOTY+Ua2PKRbKg@mail.gmail.com> Date: Tue, 24 Apr 2012 08:13:01 -0700 From: Michal Zalewski <lcamtuf@...edump.cx> To: Jim Harrison <Jim@...tools.org> Cc: dailydave <dailydave@...ts.immunityinc.com>, "websecurity@...ts.webappsec.org" <websecurity@...ts.webappsec.org>, full-disclosure <full-disclosure@...ts.grok.org.uk>, bugtraq <bugtraq@...urityfocus.com> Subject: Re: We're now paying up to $20, 000 for web vulns in our services > IMHO, anyone who willingly, knowingly places customer data at risk by inviting attacks on their production systems is playing a very dangerous game. There is no guarantee that a vuln discovered by a truly honest researcher couldn't become a weapon for the dishonest "researcher" through secondary discovery I'm not sure I follow. Are you saying that the dishonest researcher will not try to find vulnerabilities if there is no reward program for the honest ones? /mz _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists