Hacker News new | past | comments | ask | show | jobs | submit login
A Zero Day Broker’s Price List (wired.com)
42 points by pthreads on Nov 19, 2015 | hide | past | favorite | 12 comments



So finding a way to sneak an obfuscated bug into a library used by Webkit now yields 500k? Opens the door for a whole new class of 'open source monetization strategies'. Seems like it starts to make sense to pay people to infiltrate core dev groups of infrastructure libraries.


500k are for a remote jailbreak on iOS from the web browser, not just for code execution in the sandboxed browser. So a webkit vulnerability alone will not be enough, you will need to chain multiple 0 days in order to escape the sandbox, and a kernel memory corruption vulnerability to "jailbreak it". and additionally you will need a codesign vulnerability to run the untether exploit everytime the device boots because the jailbreak is not persistent otherwise.


> Seems like it starts to make sense to pay people to infiltrate core dev groups of infrastructure libraries.

The suspicion is that this has already happened but nobody has been able to prove it conclusively to date.


> For the harder target of Google Chrome, Zerodium’s price rises to $80,000

>> Rewards for qualifying bugs typically range from $500 to $50,000. https://www.google.com/about/appsecurity/chrome-rewards/inde...

Maybe the bug bounty is too low?


Yes let's give more incentive to be black hats.

Anyway, IT has still not proven positive impact on the real world economy...

IT startup are fed up with cash since 20 years and every benefits seems to be sunk into a fast obsolescence sink.

In terms of engineering it is like comparing the F16 now from 40 years ago:

new F16 has a lot of electronic devices, BUT costs more to operate, lose in dogfight vs its former self and former Mig/Suckhoi, it is 9 tons heavier, it costs way more to build...

Nowadays, IED are costing peanuts, and russia is frigthening europa with planes that should be in museums loaded with nuclear missiles.

In economics as in war, costs matters. And at one point for making financial transaction, the costs of security will matter. Given a point of distrust, people may revert back to old tech like faxes and unplugged networks and notice they are more competitive this way.


So they know about vulnerabilities in all those products and keep them private for profit?

Good thing the secret services have no access to those exploits. Fun times we live in.

Edit: /s was omitted as an exercise for the reader.


I could spot the sarcasm a mile off, but them I'm British.


I'm Irish, I laughed.


Was that sarcasm?

The article suggests that government organisations (presumably 'secret services') are some of their biggest clients.


Good thing the secret services have no access to those exploits.

Who do you think buys them?


I think it was sarcasm :)

But the parent should really mark it. On the internet, it's easy to miss the sarcasm.


Also, I'm editorializing, but this was a fairly poor execution of sarcasm.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: