lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 24 Apr 2012 21:02:05 +0000
From: Jim Harrison <>
To: Ramon de C Valle <>, Michal Zalewski
Cc: dailydave <>,
	"" <>,
	full-disclosure <>,
	bugtraq <>
Subject: Re: We're now paying up to $20,
 000 for web vulns in our services

Exactly so.
I'm not so naive as to believe that monetary motivation turns EvilBob into GoodBob, but neither do I want to make EvilBob's job that much easier by increasing the number of concurrent attackers (good or bad) through rewards.

-----Original Message-----
From: Ramon de C Valle [] 
Sent: Tuesday, April 24, 2012 12:13 PM
To: Michal Zalewski
Cc: dailydave;; full-disclosure; bugtraq; Jim Harrison
Subject: Re: [Full-disclosure] We're now paying up to $20, 000 for web vulns in our services

> > IMHO, anyone who willingly, knowingly places customer data at risk 
> > by inviting attacks on their production systems is playing a very 
> > dangerous game. There is no guarantee that a vuln discovered by a 
> > truly honest researcher couldn't become a weapon for the dishonest 
> > "researcher" through secondary discovery
> I'm not sure I follow. Are you saying that the dishonest researcher 
> will not try to find vulnerabilities if there is no reward program for 
> the honest ones?

He made a good example of a Slippery Slope.

Ramon de C Valle / Red Hat Product Security Team

Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -

Powered by blists - more mailing lists