Uber to pay hackers who find its computer flaws

Sunday Magazine
By Reuters | Apr 03, 2016

Uber, the high-flying transportation firm, is releasing a technical map of its computer and communications systems and inviting hackers to find weaknesses in exchange for cash bounties.

While so-called “bug bounties” are not new, Uber’s move shows how mainstream companies are increasingly relying on independent computer researchers to help them bolster their systems.

It also indicates growing acceptance of the idea that making computer code public can make systems more secure, a philosophy that has long been advocated by the open-source software movement.

Uber’s “Treasure Map” details the ride-hailing company’s software infrastructure, identifies what sorts of data might be exposed inadvertently and suggests what types of flaws are the most likely to be found.

“We are wrapping up a lot of information and posting that to level the playing field so that it could be as easy for outside researchers to find flaws as us,” said Collin Greene, manager of security engineering at Uber.

Companies rarely say much about their proprietary programming, except to enable third parties to make compatible software.

“That’s a level of confidence that you have not seen too many closed-source software companies take in the past, and I’ am really hopeful that others will follow suit,” said Alex Rice, chief technology officer at HackerOne, which is managing Uber’s bounty programme. HackerOne, a San Francisco rival called Bugcrowd and other startups have helped accelerate efforts to tap the independent security community to identify serious programming mistakes before criminals or spies do. They can serve as intermediaries between researchers and companies, and sometimes vet their findings. A decade ago, hackers pointing out problems feared arrest but they can now earn modest sums from platforms like HackerOne.

Firms such as Uber, looking to bolster their defenses, do not pay as much as criminals and military contractors who are looking for tools to carry out offensive attacks, but they offer options to those who would prefer to act as “white hats.”

Bugcrowd Chief Executive Officer Casey Ellis said he has seen a surge in corporate clients asking for private bounty programs that are open to selected researchers.

“That increases the amount of trust you are giving to the researchers,” Ellis said. “We run trusted programmes where people get pre-release versions of Internet of Things devices or access to source code.”

Share this story
Kenya Lionesses to renew rivalry with Uganda Lady Cranes
The Kenya Lionesses will begin their 2026 Rugby Africa Women’s Cup Performance Division campaign with a tough regional derby against Uganda Lady Cranes on Saturday 
Shujaa hand Mola maiden call-up for World SVNS legs
Kenya Sevens coach Kelvin Wambua on Friday named the squad that will represent the country in the upcoming World SVNS Championship legs in Valladolid and Bordeaux
Allan Thigo was not only a good player but a great leader
Thigo, who hailed from Kano plains in Kisumu had moved and set up home in Bungoma where he was enjoying his retirement, occasionally coming out to grace football events.
Maguire, Palmer and Foden left out of England World Cup squad
Cole Palmer and Phil Foden were among several high-profile players left out of Thomas Tuchel's World Cup squad announced on Friday.
Pep Guardiola: Catalan genius who changed football
Pep Guardiola leaves Manchester City with an unparalleled managerial legacy, having reshaped English football over a decade of relentless success.
.
RECOMMENDED NEWS