[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <3260D23E5064D448905BBB5383B7346E4A56394D@slartibartfast.home.jalojash.org>
Date: Tue, 24 Apr 2012 21:02:05 +0000
From: Jim Harrison <Jim@...tools.org>
To: Ramon de C Valle <rcvalle@...hat.com>, Michal Zalewski
<lcamtuf@...edump.cx>
Cc: dailydave <dailydave@...ts.immunityinc.com>,
"websecurity@...ts.webappsec.org" <websecurity@...ts.webappsec.org>,
full-disclosure <full-disclosure@...ts.grok.org.uk>,
bugtraq <bugtraq@...urityfocus.com>
Subject: Re: We're now paying up to $20,
000 for web vulns in our services
Exactly so.
I'm not so naive as to believe that monetary motivation turns EvilBob into GoodBob, but neither do I want to make EvilBob's job that much easier by increasing the number of concurrent attackers (good or bad) through rewards.
-----Original Message-----
From: Ramon de C Valle [mailto:rcvalle@...hat.com]
Sent: Tuesday, April 24, 2012 12:13 PM
To: Michal Zalewski
Cc: dailydave; websecurity@...ts.webappsec.org; full-disclosure; bugtraq; Jim Harrison
Subject: Re: [Full-disclosure] We're now paying up to $20, 000 for web vulns in our services
> > IMHO, anyone who willingly, knowingly places customer data at risk
> > by inviting attacks on their production systems is playing a very
> > dangerous game. There is no guarantee that a vuln discovered by a
> > truly honest researcher couldn't become a weapon for the dishonest
> > "researcher" through secondary discovery
>
> I'm not sure I follow. Are you saying that the dishonest researcher
> will not try to find vulnerabilities if there is no reward program for
> the honest ones?
He made a good example of a Slippery Slope.
--
Ramon de C Valle / Red Hat Product Security Team
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists