meta_pixel
Tapesearch Logo
Log in
Malicious Life

Why aren't there more bug bounty programs?

Malicious Life

Malicious Life

Technology

4.81K Ratings

🗓️ 8 August 2023

⏱️ 34 minutes

🧾️ Download transcript

Summary

On the face of it, there's an obvious economic incentive for both vendors and security researchers to collaborate on disclosing vulnerabilities safely and privately. Yet bug bounty programs have gained prominence only in the past decade or so, and even today only a relatively small portion of vendors have such programs at place. Why is that?





Advertising Inquiries: https://redcircle.com/brands

Transcript

Click on a timestamp to play from that location

0:00.0

Hi, I'm Ryan Levy.

0:01.0

Hi, I'm Raya Levi.

0:09.0

Hi, I'm Ryan Levy.

0:11.0

Welcome to Cyber Reasons Malicious Life. The term Strissened effect is named after Barbara Strissant, the famed Singer and Actress.

0:35.0

In 2003, Stryson sued a photographer for $50 million in an attempt to force him to remove from the web an aerial photo of her mallebou mention.

0:46.0

This ultimately turned out to be a very poor decision.

0:50.0

The picture in question was one of 12,000 photos taken as part of a project documenting California's coastline and had things taken a different turn?

1:01.0

It's highly likely that only a handful of people would have even taken a second look at it.

1:07.9

But ironically, the attention brought on by the lawsuit, garnered it millions of views, and made it famous to the point where it is now displayed in Wikipedia.

1:18.0

In a sense, Barbara Stuyson was a bit unlucky.

1:22.0

Had the silly affair happened only two years later, we would probably

1:27.2

end up calling it the Sisko effect. The Black Hat Conference, which takes place every year in Las Vegas, was conceived

1:40.1

as, and to a large degree still is, an industry-centric event.

1:45.0

To be sure, Blackhead had its share of the usual shenanigans one might expect

1:50.0

when bringing together thousands of security researchers such as Wi-Fi hijacking and

1:55.4

alike, but compared to Defcon, its older and more hacker-oriented sibling, Black Hat has a more corporate feel to it, with much less excitement and drama.

2:08.0

But Black Hat 2005 was different.

2:13.8

It started Tuesday morning on the very first day of the conference when early attendees received

2:19.9

the conference's proceedings booklet and noticed that some 30 pages were missing from it.

2:26.5

And not just missing, the pages were very obviously ripped from the booklet

2:32.2

as if someone decided to hastily remove them from the conferences program at the very last minute.

2:39.0

Rumors started circulating among the conference's visitors.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from Malicious Life, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of Malicious Life and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.