- Be civil and nice.
- Try not to excessively repost, as a rule of thumb, wait at least 2 months to do it if you have to.
- 0 users online
- 2 users / day
- 13 users / week
- 42 users / month
- 213 users / 6 months
- 10 subscribers
- 1.82K Posts
- 4.55K Comments
on all three occasions after discovering the vulnerability the person depicted spent three months trying to get in touch with the software company and get them to fix shit, and then, after either getting like 400$ or not being able to get the company do anything at all, they made a blogpost that got viral on /r/programming or /r/hacking, after which the company issues a pr piece that says that they love their users so so much and how they love gay sex, and then give the author two 10$ coupons to a nearby restaurant
seriously though, with the amount of posts saying basically that the company did literally nothing or paid them a sum barely enough to buy groceries, it amazes me how much much more security people don’t go straight to the blackmarket with their vulnerabilities…
I would sell those vulnerabilities (if I had the ability to do so) straight to the black market simply because fuck Apple to be honest, but the pay is still better.
you mean better where?
In the black market.
And right after you got your money some kid from [random country] “discovers” the same vulnerability “by chance” and does full disclosure online. Too bad :D
Tim Cock, amirite
or the cocking sound of the handcuffs