Главная
Study mode:
on
1
Introduction
2
Who dictates the rules
3
The safe harbor
4
The legal implications
5
The call for action
6
Three important points
7
Proof of concept
8
Legal risks
9
Most paradoxical example
10
Alibaba example
11
Facebook example
12
Hackers examples
13
Intermediates
14
Exceptions
15
Platforms Matter
16
Who Can Participate
17
Microsoft Example
18
Suggestions
19
Eliminate Reverse Engineering Language
20
Review the Terms
21
One Language
22
Specific Authorization
Description:
Explore the legal landscape of bug bounty programs in this 25-minute conference talk from BSidesLV 2017. Delve into the complexities of legal terms, safe harbors, and implications for hackers and companies. Examine real-world examples from Alibaba, Facebook, and Microsoft to understand the paradoxes and risks involved. Learn about the importance of platforms, participation restrictions, and intermediaries in shaping bug bounty ecosystems. Discover suggestions for improving legal frameworks, including eliminating reverse engineering language, standardizing terms, and providing specific authorization. Gain insights into the intersection of law and cybersecurity, and understand the call for action to create more equitable and effective bug bounty programs.

Hacking the Law - A Call for Action – Bug Bounties Legal Terms as a Case Study

BSidesLV
Add to list