Frontier Justice
Microsoft has stepped up with a $250,000 bounty for the skin of the author of the MyDoom.B email virus. Sounds interesting, but is there any evidence that such cyber-bounties produce positive results?
I mean, the people who build these kinds of things might be more motivated by the prospect of big, fat bounty on their weaselly little heads than other folks might be moved by a reward in exchange for stopping said weasels. Could make the problem worse. That's why I say the only safe recourse is shoot-on-sight.
Editor's Note: As of February 29, 2024, commenting privileges on reason.com posts are limited to Reason Plus subscribers. Past commenters are grandfathered in for a temporary period. Subscribe here to preserve your ability to comment. Your Reason Plus subscription also gives you an ad-free version of reason.com, along with full access to the digital edition and archives of Reason magazine. We request that comments be civil and on-topic. We do not moderate or assume any responsibility for comments, which are owned by the readers who post them. Comments do not represent the views of reason.com or Reason Foundation. We reserve the right to delete any comment and ban commenters for any reason at any time. Comments may only be edited within 5 minutes of posting. Report abuses.
Please
to post comments
Why doesn't Microsoft pay a $250K reward to it's own programmers who discover and close vulnerabilities within MS software?
It would probably have a better net effect.
Microsoft doesn't make money by fixing bugs. They make money by selling new whizbang features. I think these virus bounties are mostly PR, but after a few haXor d3wdz fink out their buddies, the bounties will have created a nice deterrent. Note that this does NOT mean Microsoft software will be more secure! It just means that the truly evil or "professional" hackers will keep security holes to themselves (like Microsoft's NSA_KEY cryptography backdoor).
Why doen't the Department of Homeland Security fine Microsoft $250k and use it to pay for the US-CERT virus alert system.
Compromise:
$200k dead
$50k alive.
Same outlay.
Joe - you may have been being facetious, but schemes like that have been tried. The problem is that they create an incentive for programmers to create bugs in their programs so they can "find" them later and claim the bounty. Assuming, of course, that an MS programmer is smart enough to know whether or not he's creating a security hole.
More seriously, Joel Spolsky (of joelonsoftware.com) has written a bit on the Microsoft practice of having an individual programmer "own" certain code or functionality. It's usually portrayed as a good thing, but I wonder if it doesn't have negative implications in terms of getting more eyeballs on a given piece of code.
>is there any evidence that such cyber-bounties produce positive results?
Hello, did I complete this correctly?