Click Here cover image

101. Bug bounties with Chinese characteristics

Click Here

00:00

China's Manipulation of Vulnerability Databases

This chapter discusses how China hides vulnerabilities and manipulates its vulnerability databases, causing difficulties for foreign researchers. It highlights China's isolationist approach and its targeting of critical national infrastructure. The chapter also explores the impact of China's regulations on vulnerability competitions and bug bounties.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app