I would agree, take the case of I believe it was  United airlines.  Someone 
found a vulnerability in their systems and received a million frequent flyer 
miles in return.  A lot of times people get jobs out of these discoveries and 
are placed in some sort of security consulting position.


> On Aug 13, 2015, at 4:06 PM, Littlefield, Tyler <ty...@tysdomain.com> wrote:
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Generally they do actually pay people who find security problems or
> payment can be worked out. But finding exploits isn't as easy as
> tweaking a setting here or there, it takes a lot of work. Usually when
> you do it there's other reasons behind it--being the one to find an
> exploit gains you a lot of reputation. Others do it to sell the
> exploit as a zero-day vuln, which is illegal.
> On 8/13/2015 2:52 PM, Shaf wrote:
>> That's good for you. A wealthy company such as Apple should pay
>> those who find security holes and report to them.
>> 
>> On 8/13/2015 7:36 PM, Littlefield, Tyler wrote:
>>> Hello: A lot of companies do have bounties like this. For
>>> example, the company I worked for works on Drupal. There was a
>>> bounty offered through the association. I report stuff like this
>>> I find when it is a problem, not because I want to get paid but
>>> because that's the only way to fix things. I do it because it's
>>> the right thing to do and it helps other people. Any security
>>> holes that can be fixed, regardless of whether or not I get paid
>>> helps me (as I'm obviously using the product) and it helps others
>>> as well.
>>> 
>>> Thanks, On 8/13/2015 2:27 PM, Shaf wrote:
>>>> Why should I tell Apple of exploits if they don't pay me?? They
>>>> should introduce a bug bounty program. Otherwise I have no 
>>>> interest in keeping their bugs confidential.
>>> 
>>> 
>>>> On 8/13/2015 7:10 PM, 'Chris Blouch' via MacVisionaries wrote:
>>>>> With the complexity of OSX and iOS I think if somebody
>>>>> figures out the right combination of tweaks to bypass
>>>>> security they should tell Apple right away and hold off a bit
>>>>> before telling the world. At least give them a chance to fix
>>>>> it before giving a free hand up to the bad guys. Of course
>>>>> that lead time needs to be kinda short as the vulnerability
>>>>> needs to be fixed before some bad folks find it and/or
>>>>> continue to use it. With Apple's automatic updates it can
>>>>> also be a while before a reasonable chunk of the population
>>>>> has installed the patch. So I'd guess 90 days would be pretty
>>>>> reasonable. If a patch hasn't been released by then then it's
>>>>> time to put public pressure on Apple.
>>>>> 
>>>>> That said, the oasis of pulchritude hasn't entirely dried up.
>>>>> Yes, there are issues and the popularity of the platform has
>>>>> attracted unwanted attention from certain quarters but at 
>>>>> least there seems to be a reasonably good attempt to put
>>>>> locks on all the doors. They just sometimes forget and leave
>>>>> a window open.
>>>>> 
>>>>> CB
>>>>> 
>>>>> On 8/13/15 1:21 PM, Sabahattin Gucukoglu wrote:
>>>>>> I don’t agree with the author.  Of course, this is 
>>>>>> MacWorld—some amount of Apple butt-kissing is to be 
>>>>>> expected—but I find his attitude very worrying.
>>>>>> 
>>>>>> First, “Responsible disclosure” vs “Full disclosure” is a 
>>>>>> choice of researchers, and privileged authors of the press
>>>>>> shouldn’t be using their personal ethical judgements
>>>>>> about it to suppress public information about flaws simply
>>>>>> on that basis.  That alone is reason enough to simply
>>>>>> distrust any further writings of the author.  I am
>>>>>> personally of the opinion that we are well past the
>>>>>> usefulness of “Responsible disclosure” as a strategy;
>>>>>> giving companies rope, but not quite enough to hang
>>>>>> themselves with, isn’t moving security forward any faster.
>>>>>> 
>>>>>> Second, and more important, a privilege escalation 
>>>>>> vulnerability isn’t a problem for advanced users, who 
>>>>>> already know what Glen is suggesting, i.e. don’t run dodgy 
>>>>>> software. It is precisely those people who have been
>>>>>> trained, per the standard advice, not to type in their
>>>>>> passwords when they are suspicious who will be most hit by
>>>>>> the root bypass. Obviously, better advice would be “Just
>>>>>> don’t trust anyone”, but that’s not how the world works,
>>>>>> sadly.  I think it’s time for us to acknowledge that the
>>>>>> Mac, once a peaceful neighbourhood with only the occasional
>>>>>> bit of easily-preventable rogue badness that you could get
>>>>>> rid of by just clicking “No” or “Cancel” or whatever, is
>>>>>> now increasingly occupied by bad software that is 
>>>>>> well-advertised, easily installed and hard to recognise by
>>>>>> a lot of inexperienced people, and anybody giving a Mac to
>>>>>> somebody to keep them (the recipient) quiet and out of
>>>>>> their (the donor’s) hair now needs to hold Apple’s once
>>>>>> glorious patch turnaround times to account.  This is
>>>>>> *especially* true if the donor has delivered the Mac with a
>>>>>> limited user account and all necessary software already
>>>>>> installed or only accessible from the Mac App Store,
>>>>>> because as soon as Flash becomes the vector, we’re all
>>>>>> finished.
>>>>>> 
>>>>>> Microsoft have learned their security lessons the hard and
>>>>>> painful way, and now it’s Apple’s turn.  Please don’t give
>>>>>> apologists fodder for their absurd denials.
>>>>>> 
>>>>> 
>>> 
>>> 
>>> 
>>> 
>> 
> 
> 
> - -- 
> Take care,
> Ty
> twitter: @sorressean
> web:http://tysdomain.com
> pubkey: http://tysdomain.com/files/pubkey.asc
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v2
> 
> iQEcBAEBAgAGBQJVzPjVAAoJEAdP60+BYxejsEsH/RQD/njOgH+4PwMAgwW432Tr
> 9JJcxHRZPpf4rA7EZQFJHJ9kkogNun7Zw2H9sK7Va3mwCaOWlSVuXlMBjg5PZCAE
> iXT7QL2mSKQPHjSAdteO5g7SWIQmJ8VDONTX+WBeyWHDjJx2L2IWS9fPPuHyEJoX
> JlUuioXikrBbqYXISN+jBzvLK3g5JwnDkXUIWiN4B+ZHe2+d08sGJQwXTg/i46W8
> PL/VcHYA1SC86usWvXY4khTOQLUFCDC/Q6Q01qg1x/K41ib61v2a9+uVeg9HMQ9z
> OTwpYLZ00M4dCkc/SMFOgMlbcJz8ydmC654xAqjixmU94flfK3A3YAtOQeWLQKg=
> =7lHy
> -----END PGP SIGNATURE-----
> 
> -- 
> You received this message because you are subscribed to the Google Groups 
> "MacVisionaries" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to macvisionaries+unsubscr...@googlegroups.com.
> To post to this group, send email to macvisionaries@googlegroups.com.
> Visit this group at http://groups.google.com/group/macvisionaries.
> For more options, visit https://groups.google.com/d/optout.

-- 
You received this message because you are subscribed to the Google Groups 
"MacVisionaries" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to macvisionaries+unsubscr...@googlegroups.com.
To post to this group, send email to macvisionaries@googlegroups.com.
Visit this group at http://groups.google.com/group/macvisionaries.
For more options, visit https://groups.google.com/d/optout.

Reply via email to