this post was submitted on 09 Jun 2025
433 points (99.1% liked)
Technology
71163 readers
3972 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
This is like 1/10th of what a good blackhat hacker would have gotten out of it.
I always wonder what's stopping security researchers from selling these exploits to Blackhat marketplaces, getting the money, waiting a bit, then telling the original company, so they end up patching it.
Probably break some contractual agreements, but if you're doing this as a career surely you'd know how to hide your identity properly.
It's not worth the risk. If your job is border control, would you be smuggling goods? Maybe some would, but most would not.
They're whitehat because they don't want to take part in illegal activities, or already have and have grown from it.
Chances that such an old exploit get found at the same time by a whitehat and a blackhat are very small. It would be hard not to be suspicious.
Yes, but I was saying the Blackhat marketplaces wouldn't really have much recourse if the person selling the exploit knew how to cover their tracks. i.e. they wouldn't have anyone to sue or go after.
I'm saying blackhat hackers can make far more money off the exploit by itself. I've seen far worse techniques being used to sell services for hundreds of dollars and the people behind those are making thousands. An example is the slow bruteforcing of blocked words on YouTube channel as they might have blocked their name, phone number, or address.
What you're talking about is playing both sides, and that is just not worth doing for multiple reasons. It's very obvious when somebody is doing that. People don't just find the same exploit at the same time in years old software.