←back to thread

406 points vk6 | 1 comments | | HN request time: 0.197s | source
Show context
Etheryte ◴[] No.41867389[source]
Given the severity, I can't help but feel that this is underpaid at the scale Google is at. Chrome is so ubiquitous and vulnerabilities like these could hit hard. Last thing they need to do is to send the signal that it's better to sell these on the black market.
replies(9): >>41867499 #>>41867548 #>>41867653 #>>41867666 #>>41867873 #>>41868146 #>>41868628 #>>41868995 #>>41869073 #
edent ◴[] No.41868146[source]
> sell these on the black market.

How? I always see this mentioned but it seem impractical to me. I've discovered bugs which have paid out a few thousand dollars - big corporates have well publicised schemes, but I've no idea how I would go about selling it to a criminal.

Even if I did know where to find them - how would I trust them? Can I tell they're not really the police doing a sting?

If they paid me, how would I explain my new wealth to the tax authorities?

Once the criminal knows they've paid me, what's to stop them blackmailing me? Or otherwise threatening me?

Oh, and I won't be able to publish a kudos-raising blog post about it.

How much would a criminal have to pay me to take on that level of risk?

Should Google pay out more for this? Probably. Is the average security researcher really going to take the risk of dealing with criminals in the hope that they pay a bit more? Unlikely.

replies(3): >>41868584 #>>41868608 #>>41869106 #
1. scotty79 ◴[] No.41868608[source]
I think maintaining anonimity is the key. Ensuring getting paid is the next thing. I'm not sure how you can achieve this in practice.