Chromium and Google Web Vulnerability Reward Programs: three years after, what results and what next?
Launched in 2010 Chromium and Google Web Vulnerability Reward Programs, is a succeed for Google as a company and
a succeed for security researchers because they have improved their knowledge
and it is also a succeed for the users because they are better protect now.
Yesterday, Connectikpeople has received a post of Chris Evans and Adam
Mein, Masters of Coin from Google. In this post we have
learned that:
learned that:
·
More than 2,000 security bug
reports and also received recognition for setting leading standards for response
time.
·
The collective creativity of
the wider security community has surpassed all expectations, and their
expertise has helped make Chrome even safer for hundreds of millions of users
around the world.
·
Google has paid out in excess
of $2,000,000 (USD) across Google’s security reward initiatives. This total
includes more than $1,000,000 (USD) for the Chromium VRP / Pwnium rewards, and in excess of $1,000,000 (USD) for the Google Web VRP rewards.
In this dynamic, the Chromium program is raising reward levels
significantly. Therefore in a nutshell, bugs previously rewarded at the $1,000
level will now be considered for reward at up to $5,000.
Google will continue to pay previously announced bonuses on top, such as those for providing a patch or finding an issue in a critical piece of open source software.
If interested by the program, you can find how to report a security bug well and how we determine higher reward eligibility.
If interested by the program, you can find how to report a security bug well and how we determine higher reward eligibility.