4.8 • 45 Ratings
🗓️ 27 October 2016
⏱️ 23 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Welcome to the Tech Policy Podcast. I'm Evan Swarchabber. On today's show, Bug Bounties, we know that hacking can land you in jail, but could it also land you a fat paycheck? Joining me to discuss this is Katie Masaurus, founder and CEO of Luda Security. Katie, thanks so much for joining the show. Thank you so much for having me. |
| 0:21.4 | So let's start off by defining the title of today's episode. What is a bug bounty? |
| 0:26.0 | Well, a bug bounty is paying hackers in exchange for vulnerability information. |
| 0:30.5 | So it's essentially a bounty on the head of each bug. |
| 0:34.4 | And the bug being a virus or someone trying to hack in? |
| 0:38.0 | It's usually a flaw in some code, maybe a flaw in a website. |
| 0:41.9 | It's a weakness that can be used to exploit and take information that doesn't belong to you. |
| 0:47.8 | So we've seen bug bounty programs in both the public and private sector. |
| 0:51.3 | So let's start with the private sector. |
| 0:52.7 | You used to work at Microsoft and you played an instrumental role or maybe the role in setting up the company's first |
| 0:59.8 | program. So what does that look like for a giant global tech company like Microsoft? How did they |
| 1:06.0 | do something like this to encourage people to find vulnerabilities, disclose them, and then get paid. |
| 1:11.6 | Well, Microsoft itself was not the first to offer a bug bounty program. |
| 1:16.6 | The first was actually Netscape back in the mid-90s. |
| 1:19.6 | And they offered... |
| 1:20.6 | Netscape. |
| 1:21.6 | Yeah. |
| 1:22.6 | That is a name you don't hear all the time. |
| 1:23.6 | That's right. |
| 1:24.6 | Taking you to the way back machine of the internet. |
| 1:26.6 | But it was $500 per security bug. |
| 1:29.4 | And nothing really new came up in the bug bounty under the bug bounty sun for a number of years until about 2010 when Google started offering bug bounties. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from TechFreedom, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of TechFreedom and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.