Sign Up! To view all forums and unlock additional cool features
Welcome to the #1 Dodge, Jeep and RAM Forum dedicated to FCA owners and enthusiasts. Register for an account, it's free and it's easy, so don't hesitate to join the SRT Forum today!
It doesn't pay. I was a bug bounty finder for Dodge's bugcrowd program. They were paying shit for the vulnerabilities found. Not to mention they tried to sue me once. People sell these vulnerabilities/hacks on the markets and get paid what they rightfully deserve.
It doesn't pay. I was a bug bounty finder for Dodge's bugcrowd program. They were paying shit for the vulnerabilities found. Not to mention they tried to sue me once. People sell these vulnerabilities/hacks on the markets and get paid what they rightfully deserve.
Hmm, article says they have to pull the front bumper to do it. Why would anyone go to that much trouble for a low level car when there are soooo many easy pickings around ?
Which btw now there’s protection and if you discover a vulnerability and notify a company they can’t turn around and file criminal charges. That is unless you extract files and what not. White hat stuff is very grey
Hmm, article says they have to pull the front bumper to do it. Why would anyone go to that much trouble for a low level car when there are soooo many easy pickings around ?
I didn’t read it. Was it criminals or security researchers? Big difference, cybersecurity researchers typically have physical (legal) access to something they are trying to find a vulnerability in so that they can report their findings to the company, typically as part of a bug bounty program like fuman said (meaning you get paid for discovering/disclosing the vulnerability). Some companies don’t pay up, and typically you can release your findings after a certain amount of time wether they patch it or not.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.