{"id":206849,"date":"2017-07-21T11:52:35","date_gmt":"2017-07-21T15:52:35","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-network-will-pay-you-to-hack-it-through-new-bug-bounty-program-zdnet\/"},"modified":"2017-07-21T11:52:35","modified_gmt":"2017-07-21T15:52:35","slug":"tor-network-will-pay-you-to-hack-it-through-new-bug-bounty-program-zdnet","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/tor-network-will-pay-you-to-hack-it-through-new-bug-bounty-program-zdnet\/","title":{"rendered":"Tor network will pay you to hack it through new bug bounty program &#8230; &#8211; ZDNet"},"content":{"rendered":"<p><p>Tor  <\/p>\n<p>    The Tor Project has joined with HackerOne to launch a public    bug bounty program aimed at finding vulnerabilities which could    compromise the anti-surveillance network.  <\/p>\n<p>    The Tor    network is a system of nodes and relays used to mask online    activity, as well as access areas of the Internet not indexed    by so-called \"clear web\" search engines.  <\/p>\n<p>    While sometimes associated with Dark web illegal trading and    nefarious goods, Tor is also a key tool for activists, privacy    enthusiasts, and journalists looking to keep their online    activities private.  <\/p>\n<p>    Cybercriminals and governments alike are constantly poking the    system to find vulnerabilities to exploit for surveillance    purposes.  <\/p>\n<p>    This year, the FBI used a \"non-public' vulnerability to unmask    individuals connected to child pornography, but as the agency    refused to reveal how this was achieved, the     case was dropped.  <\/p>\n<p>    Tor is not 100 percent safe from compromise; no system is.    However, to close the net on any bugs which may be used in    similar ways in the future -- no matter the cause -- Tor is    asking researchers to scour the network for any weak links.  <\/p>\n<p>    \"Millions of people around the world depend on Tor to browse    the internet privately and securely every day, so our security    is critical,\" The Tor team says. \"Bugs in our code pose one of    the biggest threats to our users' safety; they allow skilled    attackers to bypass Tor's protections and compromise the safety    of Tor users.\"  <\/p>\n<p>    On Thursday, Tor launched a public bug bounty    program under the moniker #HackTor. Hosted on the HackerOne    platform, the scheme is specifically targeting security flaws    in the Tor network daemon and Tor browser used to access the    network.  <\/p>\n<p>    In particular, Tor would like to see reports of any remote code    execution flaws, local privilege escalation, unauthorized    access of user data, or attacks that cause the leakage of    crypto material of relays or clients.  <\/p>\n<p>    Depending on the severity of the issue, researchers can expect    to earn up to $4,000 per report.  <\/p>\n<p>    The public bug bounty follows in the steps of a private program    launched in January 2016 which resulted in three    denial-of-service flaws and four edge-case memory corruption    bugs being discovered, fixed, and rewarded.  <\/p>\n<p>    See also:     The 10 step guide to using Tor to protect your    privacy  <\/p>\n<p>    Tor Browser chief Georg Koppen     told HackerOne that the decision to go public was made once    the private system allowed the Tor team to better organize    their workflow.  <\/p>\n<p>    \"We want to expand relationships with the research community    and make our software more secure in the process,\" Koppen says.    \"Reported bugs will help us to address issues before they can    potentially become a threat to our network of users.\"  <\/p>\n<p>    \"I can easily see expanding the program's scope beyond Tor and    Tor Browser to cover other parts of our software ecosystem or    even infrastructure as well,\" he added.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.zdnet.com\/article\/tor-network-wants-you-to-hack-it\/\" title=\"Tor network will pay you to hack it through new bug bounty program ... - ZDNet\">Tor network will pay you to hack it through new bug bounty program ... - ZDNet<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Tor The Tor Project has joined with HackerOne to launch a public bug bounty program aimed at finding vulnerabilities which could compromise the anti-surveillance network. The Tor network is a system of nodes and relays used to mask online activity, as well as access areas of the Internet not indexed by so-called \"clear web\" search engines <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/tor-network-will-pay-you-to-hack-it-through-new-bug-bounty-program-zdnet\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-206849","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/206849"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=206849"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/206849\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=206849"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=206849"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=206849"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}