Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Security Architecture

Tor Project to Launch Bug Bounty Program

The Tor Project, the organization behind the Tor anonymity network, announced this week at a security conference that it plans on launching a bug bounty program.

The Tor Project, the organization behind the Tor anonymity network, announced this week at a security conference that it plans on launching a bug bounty program.

Tor Project co-founder Roger Dingledine, Tor Browser lead developer Mike Perry, and the Tor Project’s new executive director Shari Steele on Tuesday held a talk titled “The State of the Onion” at the 32nd Chaos Communication Congress (32C3) in Germany.

In 2016, the Tor Project intends to roll out several security enhancements for Tor Browser, including a multiprocess sandbox, application-level sandboxing, and Mac OS signing.

The organization will also launch a bug bounty program via the HackerOne platform, which is used by major companies such as Twitter, Adobe, Yahoo! and LinkedIn.

The program will initially be invite-only, but the Tor Project has promised to make it public later in the year. The goal, according to Perry, is to provide incentive for security experts to review Tor Browser code in an effort to find vulnerabilities that might be specific to the application.

It’s unclear at this point what types of rewards the Tor Project plans on offering, but additional details will be made available in the upcoming period. It’s worth noting that exploit acquisition firm Zerodium is prepared to offer up to $30,000 for remote code execution (RCE) vulnerabilities in Tor Browser.

An increasing number of organizations have launched bug bounty programs to secure their products and many prefer the invitation-only approach thanks to its better signal-to-noise ratio when compared to public programs.

Advertisement. Scroll to continue reading.

The announcement that Tor will have a bug bounty program comes shortly after the Tor Project accused Carnegie Mellon University of getting at least $1 million from the FBI in exchange for helping the agency unmask users. Both the FBI and the university said the reports were inaccurate.

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Artificial Intelligence

ChatGPT is increasingly integrated into cybersecurity products and services as the industry is testing its capabilities and limitations.

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Audits

Out of the 335 public recommendations on a comprehensive cybersecurity strategy made since 2010, 190 were not implemented by federal agencies as of December...

Risk Management

In this virtual summit, SecurityWeek brings together expert defenders to share best practices around reducing attack surfaces in modern computing.

Artificial Intelligence

Microsoft and Mitre release Arsenal plugin to help cybersecurity professionals emulate attacks on machine learning (ML) systems.

Identity & Access

NSA publishes recommendations on maturing identity, credential, and access management capabilities to improve cyberthreat protections.