Tor launches invite-only exploit bug bounty

HackerOne to open to noisy rabble later this year.

Tor will this year investigate an exploit bug bounty paying researchers cash for flaws, lead developer Mike Perry says.

The HackerOne invite-only scheme is expected to be opened to the public after Tor finds its feet handling disclosures.

Bug bounties are a booming initiative under which tens of thousands of dollars are being handed out to hackers for quietly reporting dangerous holes in some of the world's most popular platforms.

Invite-only bounties are opened only to accomplished researchers who submit less false-positives and higher-quality reports than those competing in public bounties.

"We will be doing exploit bounties … starting out invite only so we can get used to the flow, and then scale up to public later in the year," Perry told the Chaos Communications Congress in Hamburg last month.

"It will provide incentive to people to look for vulnerabilities, for bugs in code, that are specific to our applications."

Perry announced the initiative would be part of a list of Tor Project goals for the year ahead which includes convincing Mozilla to adopt its threat model, multi-process and application-level sandboxing, and Mac OS signing.

The developer spoke alongside Tor Project boss Roger Dingledine, executive director Shari Steele, and privacy wonks Jacob Appelbaum and Alison Macrina in a hour-long update on the Project's 2015 achievements.

They say use of the Tor network is booming in Russia and across the subcontinent.

Notable achievements include working with 'the enemy' Facebook to introduce Tor for its popular chat client, and the release of Tor Messenger. ®

Youtube Video

Similar topics

Other stories you might like

  • CISA and friends raise alarm on critical flaws in industrial equipment, infrastructure
    Nearly 60 holes found affecting 'more than 30,000' machines worldwide

    Updated Fifty-six vulnerabilities – some deemed critical – have been found in industrial operational technology (OT) systems from ten global manufacturers including Honeywell, Ericsson, Motorola, and Siemens, putting more than 30,000 devices worldwide at risk, according to private security researchers. 

    Some of these vulnerabilities received CVSS severity scores as high as 9.8 out of 10. That is particularly bad, considering these devices are used in critical infrastructure across the oil and gas, chemical, nuclear, power generation and distribution, manufacturing, water treatment and distribution, mining and building and automation industries. 

    The most serious security flaws include remote code execution (RCE) and firmware vulnerabilities. If exploited, these holes could potentially allow miscreants to shut down electrical and water systems, disrupt the food supply, change the ratio of ingredients to result in toxic mixtures, and … OK, you get the idea.

    Continue reading
  • 1Password's Insights tool to help admins monitor users' security practices
    Find the clown who chose 'password' as a password and make things right

    1Password, the Toronto-based maker of the identically named password manager, is adding a security analysis and advice tool called Insights from 1Password to its business-oriented product.

    Available to 1Password Business customers, Insights takes the form of a menu addition to the right-hand column of the application window. Clicking on the "Insights" option presents a dashboard for checking on data breaches, password health, and team usage of 1Password throughout an organization.

    "We designed Insights from 1Password to give IT and security admins broader visibility into potential security risks so businesses improve their understanding of the threats posed by employee behavior, and have clear steps to mitigate those issues," said Jeff Shiner, CEO of 1Password, in a statement.

    Continue reading
  • Inside the RSAC expo: Buzzword bingo and the bear in the room
    We mingle with the vendors so you don't have to

    RSA Conference Your humble vulture never liked conference expos – even before finding myself on the show floor during a global pandemic. Expo halls are a necessary evil that are predominatly visited to find gifts to bring home to the kids. 

    Do organizations really choose security vendors based on a booth? The whole expo hall idea seems like an outdated business model – for the vendors, anyway. Although the same argument could be made for conferences in general.

    For the most part, all of the executives and security researchers set up shop offsite – either in swanky hotels and shared office space (for the big-wigs) or at charming outdoor chess tables in Yerba Buena Gardens. Many of them said they avoided the expo altogether.

    Continue reading

Biting the hand that feeds IT © 1998–2022