Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Security Architecture

Tor Project to Launch Bug Bounty Program

The Tor Project, the organization behind the Tor anonymity network, announced this week at a security conference that it plans on launching a bug bounty program.

The Tor Project, the organization behind the Tor anonymity network, announced this week at a security conference that it plans on launching a bug bounty program.

Tor Project co-founder Roger Dingledine, Tor Browser lead developer Mike Perry, and the Tor Project’s new executive director Shari Steele on Tuesday held a talk titled “The State of the Onion” at the 32nd Chaos Communication Congress (32C3) in Germany.

In 2016, the Tor Project intends to roll out several security enhancements for Tor Browser, including a multiprocess sandbox, application-level sandboxing, and Mac OS signing.

The organization will also launch a bug bounty program via the HackerOne platform, which is used by major companies such as Twitter, Adobe, Yahoo! and LinkedIn.

The program will initially be invite-only, but the Tor Project has promised to make it public later in the year. The goal, according to Perry, is to provide incentive for security experts to review Tor Browser code in an effort to find vulnerabilities that might be specific to the application.

It’s unclear at this point what types of rewards the Tor Project plans on offering, but additional details will be made available in the upcoming period. It’s worth noting that exploit acquisition firm Zerodium is prepared to offer up to $30,000 for remote code execution (RCE) vulnerabilities in Tor Browser.

An increasing number of organizations have launched bug bounty programs to secure their products and many prefer the invitation-only approach thanks to its better signal-to-noise ratio when compared to public programs.

Advertisement. Scroll to continue reading.

The announcement that Tor will have a bug bounty program comes shortly after the Tor Project accused Carnegie Mellon University of getting at least $1 million from the FBI in exchange for helping the agency unmask users. Both the FBI and the university said the reports were inaccurate.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join security experts as they discuss ZTNA’s untapped potential to both reduce cyber risk and empower the business.

Register

Join Microsoft and Finite State for a webinar that will introduce a new strategy for securing the software supply chain.

Register

Expert Insights

Related Content

Artificial Intelligence

ChatGPT is increasingly integrated into cybersecurity products and services as the industry is testing its capabilities and limitations.

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Artificial Intelligence

Microsoft and Mitre release Arsenal plugin to help cybersecurity professionals emulate attacks on machine learning (ML) systems.

Risk Management

In this virtual summit, SecurityWeek brings together expert defenders to share best practices around reducing attack surfaces in modern computing.

Audits

Out of the 335 public recommendations on a comprehensive cybersecurity strategy made since 2010, 190 were not implemented by federal agencies as of December...