By Susanne Posel
Occupy Corporatism
Thanks to HackerOne , rewards will be given to hackers who can identify software vulnerabilities for programmers to overcome.
Microsoft and Google have come together to fund this project.
These “bug bounties” will not be tied to a specific technology. Criteria for a bounty exposing cheese holes in software include the widespread and severity of the compromise.
First a hacker must crack Chrome, Internet Explorer 10 EPM, Adobe Reader, and Adobe Flash.
Programs of interest include:
• Open SSL
• Ruby
• Apache
Google’s bounty program has been running for several years and paid out an estimated $2 million to hackers under the Chromium and Google Web Vulnerability Reward Programs (CGW-VRP).
Microsoft has their own bounty program that has poured out $128,000 to hackers for uncovering issues with Windows 8.1.
Facebook has invested $1.5 million for research into bounties and have hired full-time employees to ensure bugs are exposed and security is maintained.
While hackers are getting jobs, Apple released their 2013 Report on Government Information Requests (RGIR) that indicated: “Apple’s main business is not about collecting information.”
The report stated: ““We feel strongly that the government should lift the gag order and permit companies to disclose complete and accurate numbers regarding FISA requests and National Security Letters. We will continue to aggressively pursue our ability to be more transparent.”
Employees at Google are speaking out about the relationship between the corporation, the National Security Agency (NSA) and British Intelligence (BI).
Reports about how Google and Yahoo were working with an “unnamed telecommunication provider” concerning overseas cables to redirect traffic.
An anonymous person named Hearn claims: “We designed this system to keep criminals out. There’s no ambiguity here. Bypassing that system is illegal for a good reason.”
Hearn described this operation as a “giant fuck you to the people who made these slides.”
This was a slap meant for “illustrations in the leaked documents that depicted how the NSA was able to access the data.”
Eric Schmidt, executive chairman of Google, said that the NSA’s surveillance of private cable is “really outrageous”.
Meanwhile the Central Intelligence Agency (CIA) has been purchasing phone records from suspected terrorists from AT&T.
Mark Siegel, spokesman for AT&T said: “We do not comment on questions concerning national security.”
This “voluntary business arrangement” gave the CIA access to phone numbers of overseas “terrorist suspects”; as well as searchable data on massive information stores to identify the person of interest.
Unlimited access to foreign and domestic databases was not reserved with only AT&T customers. Call logs complied of customers from other cell phone service providers were part of this data exchange.

READ  2015: Guess Who Wasn't Invited to the CIA’s Hacker Jamboree?

Sources: Occupy Corporatism

Leave a Reply