Mega launches vulnerability reward program
Mega's founders offer to pay up to $13,600 for every serious security flaw found in the platform and reported responsibly
IDG News Service - The Mega file-sharing service has launched a vulnerability reward program that will pay up to 10,000 euros (around $13,600) for every serious security flaw found in the platform and reported responsibly. The rules of the program were laid out in a blog post published Saturday.
The type of bugs that qualify for a reward include: SQL injection and XSS (cross-site scripting) flaws that can result in remote code execution on Mega's servers or in any client browser; issues that defeat the site's cryptographic security model resulting in unauthorized access to encryption keys or user data; access control bypasses that allow the destruction of keys or data and issues that can result in an account's data being compromised as the result of its associated email address being hacked.
The type of security issues that won't be rewarded include: issues that require user interaction like phishing and other forms of social engineering attacks; issues resulting from the use of weak passwords; issues that require a large number of server requests (brute force); any issues that result from the use of compromised client machines; issues that require an unsupported or outdated browser; vulnerabilities in third-party services, for example those run by resellers; denial-of-service issues; issues that require physical access to data centers; issues that involve the use of forged SSL certificates; cryptographic deficiencies that require extreme computational power to exploit, like the prediction of random numbers; or any other bugs that don't affect the integrity, availability and confidentiality of user data.
The launch of the Mega vulnerability reward program follows criticism from the security and cryptography community regarding some of the service's design decisions and claims that the service cannot deliver on its security and privacy promises to users.
Mega's creators responded to these concerns in an earlier blog post, acknowledging some of them, but dismissing others.
"Mega's open source encryption remains unbroken! We'll offer 10,000 EURO to anyone who can break it," Mega founder Kim Dotcom said Friday on Twitter.
In response to that Twitter message, some people argued that the validity of that statement depends on one's interpretation of "broken" in a cryptographic context.
For example, Mega's administrators said that "anything requiring extreme computing power (2^60 cryptographic operations+) or a working quantum computer" doesn't qualify for a reward. "This includes allegedly predictable random numbers -- you qualify only if you are able to show an actual weakness rather than general conjecture," they said.
- Top 10 Reasons to Strengthen Information Security with Desktop Virtualization Regain control and reduce risk without sacrificing business productivity and growth
- Preventing Sophisticated Attacks: Anti-Evasion & Advanced Evasion Techniques McAfee Next Generation Firewall applies sophisticated analysis techniques specifically to detect advanced evasion techniques (AET).
- The Security Industry's Dirty Little Secret The debate over advanced evasion techniques (AETs) This report summarizes the findings of a McAfee commissioned research group to determine the level of understanding IT security professionals have about AETs...
- Demand More, Get the Most from the Move to a Next-Generation Firewall Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!