
Mission Critical
Hacked
00:00
Negotiation in a Bug Bounty
A bug bounty usually just works like this. The company whose software is talking about publishes a set of rules, a set of limits and boundaries for what people can look for. And they establish a very clear list of rewards for the type of bugs that people find. This is really like, I don't think anyone can call this a bug bounty in good faith. It's clearly, you know, this was a cyber attack. But yeah, this is what happened here.
Transcript
Play full episode