73
The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee @amitelazari #legalbugbounty

The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

The Law and Economics of Bug Bounties

Amit Elazari, Berkeley Law, CLTC Grantee @amitelazari #legalbugbounty

Page 2: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

@d0tslash

Photo Credit DFSB DE

Page 3: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and
Page 4: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

Sources: https://www.cyberscoop.com/dji-bug-bounty-drone-technology-sean-melia-kevin-finisterre/ but see https://www.dji.com/newsroom/news/statement-about-dji-cyber-security-and-privacy-practices

Page 5: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and
Page 6: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

Sources: https://arstechnica.com/information-technology/2017/11/dji-left-private-keys-for-ssl-cloud-storage-in-public-view-and-exposed-customers/ but see https://www.dji.com/newsroom/news/statement-about-dji-cyber-security-and-privacy-practices

Page 7: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

The Law and Economics of Bug Bounties

Amit Elazari, Berkeley Law, CLTC Grantee

@amitelazari #legalbugbounty

Page 8: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and
Page 9: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

http://www.zdnet.com/article/chilling-effect-lawsuits-threaten-security-research-need-it-most/

Page 10: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

https://cdt.org/files/2018/04/2018-04-09-security-research-expert-statement-final.pdf

“Security researchers hesitate to reportvulnerabilities and weaknesses to companies forfear of facing legal retribution; these chillingeffects invite the release of anonymous, publiczero-day research instead of coordinateddisclosure. The undersigned urge support forsecurity researchers and reporters in their work,and decry those who oppose research anddiscussion of privacy and security risks. Harmingthese efforts harms us all.”

Page 11: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and
Page 12: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

Source: https://www.the-parallax.com/2017/08/01/congress-defcon-help-hackers

Page 13: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

Bug Bounty Programs

Page 14: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and
Page 15: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and
Page 16: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and
Page 17: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

Disclaimer

Page 18: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

2017

https://bugcrowd.com/resources/history-of-bug-bounties

Page 19: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

Talk to Me in Numbers...• Bugcrowd:

$6M+ total payouts53K+ researchers52K+ vulnerabilities700+ programs

• HackerOne:$30M+ total payouts800+ programs50K+ vulnerabilities (88 individual bounties over $10K)70K+ researchers

• Google: $9M+ paid• Facebook: $6M+ total payouts• Mozilla & Firefox: ~$1M total payouts• Microsoft: $3M+ total payouts

Bugcrowd and Hackerone reports, Mozilla, Bug Bounty Program, https://www.mozilla.org/en-US/security/bug-bounty/.

Page 20: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

Photo: John Martinez, US Army

Page 21: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and
Page 22: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and
Page 23: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

@jackhcable

“The advantages of these bug bounty programs aregreat because you get recognition from the companies,they pay you and you get to say you found avulnerability rather than just having to hide it.”Source: https://www.marketplace.org/2017/08/10/tech/17-year-old-hacked-air-force

Page 24: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

“The advantages of these bug bounty programs aregreat because you get recognition from the companies,they pay you and you get to say you found avulnerability rather than just having to hide it.”Source: https://www.marketplace.org/2017/08/10/tech/17-year-old-hacked-air-force

Page 25: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

Value of Bug Bounties • Depending on your security product maturity level, an

economically effective way to discover vulnerabilities andprevent data breaches

• Insights on your security development life cycle (Uber’s dashboard) and your vendors security posture

• Engagement with the community and communication channel(depending on how prepare and responsive you are) criticalregulatory and legal value

• Hiring channel (security pipe line)• Reputational valueBut, if not planned right Bug Bounties can go terribly wrong

Page 26: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

2017:Senate Bill to Enact Bug Bounty

at DHS

1983: VRTXGet a Bug (or $1,000) if You Find

a Bug

https://techcrunch.com/2017/01/19/hacking-the-army/, https://www.gpo.gov/fdsys/pkg/BILLS-115s1281is/pdf/BILLS-115s1281is.pdf

Page 27: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

“Indeed, in many cases, the FTC has alleged, among other things,that the failure to maintain an adequate process for receivingand addressing security vulnerability reports from securityresearchers and academics is an unreasonable practice, inviolation of Section 5 of the FTC Act”

Page 28: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

https://dti.delaware.gov/information/standards-policies.shtml

Page 29: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and
Page 30: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

So why we are still attacking friendly hackers instead of helping them to help us?

Page 31: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

Who dictates the rules of this bug bounty/VDP economy?

Who safeguards the legal interests of the individual

hackers, the crowd, given this is a very risky legal business?

Page 32: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

Companies often put hackers in “legal” harm’s way, shifting the risk for liability towards

hackers instead of authorizing access and creating “safe

harbors”

Page 33: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

See for more examples the terms of Twitter, Yahoo, Avg, Google, NetGear

“You agree to comply with all applicable local and national laws”

Page 34: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

Hackers Might be Forced into Contractual Breach and Civil and Criminal Liability by the Terms

AVG EULA: “You may not…(A) reverse engineer, disassemble, decompile,translate, reconstruct, transform or extract any Solution or any portion of theSolution (including without limitation any related malware signatures andmalware detection routines), or …. attempt to gain unauthorized access toany Solution or to networks connected to it, or to content stored or deliveredthrough it, by any means, including by hacking, spoofing or seeking tocircumvent or defeat any firewalls or other technological or other protectionsor security measures”.

Page 35: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and
Page 36: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and
Page 37: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and
Page 38: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and
Page 39: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

After reading hundreds of terms, I found that

While programs usually clearly disclose the “technical scope” of authorization given to the researcher, the legal scope of “authorization” and “access” is often

ignored, non-existing or lacking. Safe harbor is the exception not the

standard.

Page 40: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

Laszka, A., Zhao, M., Malbari, A. & Grossklags, J. “The Rules of Engagement for Bug Bounty Programs”. Proceedings of the Twenty-Second International Conference on Financial Cryptography and Data Security (FC)

• 17 out of 77 analyzed policies on Hackeroneplatform (1/2016), had a clause stating they will not take legal action against Researchers (a partial safe harbor)

• The average level of the Flesch ReadingEase index of those policies is 39.6, meaning it required some college education (on average) to understand

Page 41: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

Hackers care about their legal risk and legal incentives should matter

“The threat of legal action was cited by 60%of researchers as a reason they might not

work with a vendor to disclose”

Researchers fear “they may be subject to legal proceedings if they disclose their

work.” September 2015, the National Telecommunications and Information Administration (NTIA) a survey among 414 security researchers participating in coordinated disclosure

Page 42: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

source: CDT, https://cdt.org/files/2018/04/2018-03-27-Risk-Basis-for-Security-Research-FNL.pdf, March 2018

• “Nearly half of the researchersinterviewed mentioned the DMCAspecifically as a source of legal risk …In some cases, researchers avoidedworking with devices and systemsprotected by access controls toeliminate the legal risks stemmingfrom the DMCA.”

• “Half of the interview subjectsreported the CFAA as a primarysource of risk. Of those, more thanhalf reported avoiding some or alltypes of research that mightimplicate the CFAA”.

Page 43: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

Hackers care about Communication/Trust and the Policy Language Matters in this Respect • “The vast majority of researchers (92%) generally

engage in some form of coordinated vulnerabilitydisclosure. When they have gone a different route(e.g., public disclosure) it has generally been becauseof frustrated expectations, mostly aroundcommunication.” (NTIA Survey)

• “[T]he results indicate that rules with more content(e.g., more detailed list of included / excluded areasand issues) and explicit statements on duplication,disclosure, etc., are associated with more bugsresolved.” (Laszka et al., 2018)

Page 44: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

Why VDP/Bug Bounty Terms are so Important

DMCA

Bug Bounty Legal TermsCFAA Private

Law/Contracts

DMCA good faith security research

exemption

Page 45: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and
Page 46: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and
Page 47: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

Potential Agency Problem – Different Legal/Economic Interests

Hackers

Companies Platforms Vendors/3rd Parties

Page 48: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

Hackers want to play by the rules but the rules won’t let them: therefore, clearly the

rules should change. Ethics goes both ways.

What can we do?

Page 49: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and
Page 50: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

• Set guidelines: “Describe authorized and unauthorized conductin plain, easily understood terms”

• Establish Boundaries: Prevent damage to system integrity andmaintain users privacy, use test accounts, detail prohibitedtechniques

• Be prepared: “Crawl, Walk, Run”, VDP, staffing, patching,regulatory implications (notification)

• Engagement of with the crowd (tweaking the policy, CTF,“Treasure” maps)

• Safe Harbors

DoJ “Framework for a Vulnerability Disclosure Programfor Online Systems”

https://www.justice.gov/criminal-ccips/page/file/983996/download

Page 51: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

DoJ “Framework for a Vulnerability Disclosure Programfor Online Systems” – Legal Implications

• Careful and Clear Scoping: “Consider whether any of thenetwork components or data within the scope of thevulnerability disclosure program implicates third-partyinterests”

• Setting expectations on PoCs: “Describe the form inwhich proof of a vulnerability should be submitted”:Provide examples and case studies of effective PoCs thatmaintain the integrity of the system and protect usersprivacy

https://www.justice.gov/criminal-ccips/page/file/983996/download

Page 52: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

Lacking Terms Vs. Clear Safe HarborsThe submission of a bug “constitutesacceptance of our End User LicenseAgreement.” The EULA will usuallyprohibit testing, hacking or “spoofing”Stating the researcher should “complywith all laws” without authorizingaccess under the relevant lawsCreating complex disclosures wherecontracts are hyperlinked and legalterms are buried in multiple linksFailing to provide clear technicalscopes and instructions with respectto allowed disclosures and techniquesas well as prohibited usage

Prioritize the legal part of your bugbounty policy

Eliminate paradoxical terms:Researchers should be exempted fromgeneral EULA “anti-hacking” language

Simplify disclosures and create legaleducational resources for researchers

Include a contractual commitmentnot to pursue legal action for in-scopetesting

Provide Specific authorization (withclear scope) for the purpose of theCFAA, DMCA and other relevant lawsin light of DOJ framework

Page 53: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

Specific authorization (with clear scope) for the purpose of the CFAA and the DMCA in light of DOJ

framework - Make the Exception the Standard DOJ Framework suggest for example this language:1. The organization will not to pursue civil action for accidental, good faithviolations of its policy or initiate a complaint to law enforcement forunintentional violations.2. The organization considers activities conducted consistent with the policyto constitute “authorized” conduct under the Computer Fraud and AbuseAct, [The DMCA and applicable anti-hacking laws such as Cal. Penal Code502(c)][my addition – A.E.]”.3. If legal action is initiated by a third party against a party who compliedwith the vulnerability disclosure policy, the organization will take steps tomake it known, either to the public or to the court, that the individual’sactions were conducted in compliance with the policy.

https://www.justice.gov/criminal-ccips/page/file/983996/download

Page 54: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

How many programs adopted an Explicit Safe Harbor (clear authorization) – 1 Year after the publication of the DOJ

framework?

Page 55: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

http://amitelazari.com/%23legalbugbounty-hof

Page 56: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

Standardization of Legal language in VDP/BBP• One language of safe harbor akin to Creative

Commons/Open Source: see #legalbugbounty • Create an industry standard that will serve as a benchmark

and signal to hackers if companies don’t adopt it • Reduce the informational burden and increase hackers’

awareness towards terms• Reduce transaction and drafting costs, simplify the

disclosures• Create a reputation system for legal terms

Page 57: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

https://github.com/EdOverflow/legal-bug-bounty/blob/master/templates/safe_harbor.md

Page 58: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

EULA Conflict

• The Bug Bounty Terms [use a term you previously defined]supplement the terms our [X] User Agreement [With Hyperlink], [Y]Agreement [With Hyperlink] with you [collectively the “Agreements”].The terms of those Agreements will apply to your use andparticipation in our Bug Bounty Program. If any inconsistency existsbetween the terms of such Agreements and the Bug Bounty Terms,the Bug Bounty Terms will prevail with respect to your participation inthe Bug Bounty Program.

https://github.com/EdOverflow/legal-bug-bounty/blob/master/templates/safe_harbor.md

Page 59: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

“We will not share your report with a third-party withoutgaining their commitment they will not pursue legal actionagainst you or refer you the public inquiry. Please note againthat we can’t authorize out-of-scope testing in the name ofthird parties and such testing is beyond the scope of theprogram.”

• Establish a process to report a bug to a third party • Commitment to the researcher + waiver • Get contractual commitments and authorization • Encourage vendors to adopt VDP process with a safe harbor

Third Party/Vendor Authorization

https://github.com/EdOverflow/legal-bug-bounty/blob/master/templates/safe_harbor.md

Page 60: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

Source: https://github.com/EdOverflow/legal-bug-bounty, credit @edoverflow

Page 61: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

Place holder disclose.io

Page 62: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and
Page 63: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

@d0tslash

Page 64: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

“Waiver and ReleaseBy participating in this program and abiding by these terms, DJI grants you limited “authorized access” to its systems under the Computer Fraud and Abuse Act in accordance with the terms of the program and will waive any claims under the Digital Millennium Copyright Act (DCMA) and other relevant laws. Furthermore, if you conduct your security research and vulnerability disclosure activities in accordance with the terms set forth in this policy, DJI will take steps to make known that your activities were conducted pursuant to and in compliance with this policy in the event of any law enforcement or civil action brought by anyone other than DJI.”

Page 65: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

https://bugcrowd.com/keepersecurity

Page 66: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and
Page 67: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and
Page 68: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and
Page 69: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and
Page 70: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and
Page 71: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and
Page 72: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

This community has the power to change this reality, and this can start right now

Page 73: The Law and Economics of Bug Bounties - USENIX · The Law and Economics of Bug Bounties Amit Elazari, Berkeley Law, CLTC Grantee ... •Hiring channel (security pipe line) ... and

Amit Elazari, Doctoral Candidate, UC Berkeley School of Law, CLTC Grantee

@amitelazari, www.amitelazari.com#legalbugbounty