Requires someone wants to hire you or allow you to hack them, otherwise it's still illegal, and you can go to jail, even if you don't take anything, and reveal it to the company.
Some companies make rewards for hacking their systems if you come to them, but usually you are just paid a one time amount for finding a vulnerability, and that's it.
No Stupid Questions
No such thing. Ask away!
!nostupidquestions is a community dedicated to being helpful and answering each others' questions on various topics.
The rules for posting and commenting, besides the rules defined here for lemmy.world, are as follows:
Rules (interactive)
Rule 1- All posts must be legitimate questions. All post titles must include a question.
All posts must be legitimate questions, and all post titles must include a question. Questions that are joke or trolling questions, memes, song lyrics as title, etc. are not allowed here. See Rule 6 for all exceptions.
Rule 2- Your question subject cannot be illegal or NSFW material.
Your question subject cannot be illegal or NSFW material. You will be warned first, banned second.
Rule 3- Do not seek mental, medical and professional help here.
Do not seek mental, medical and professional help here. Breaking this rule will not get you or your post removed, but it will put you at risk, and possibly in danger.
Rule 4- No self promotion or upvote-farming of any kind.
That's it.
Rule 5- No baiting or sealioning or promoting an agenda.
Questions which, instead of being of an innocuous nature, are specifically intended (based on reports and in the opinion of our crack moderation team) to bait users into ideological wars on charged political topics will be removed and the authors warned - or banned - depending on severity.
Rule 6- Regarding META posts and joke questions.
Provided it is about the community itself, you may post non-question posts using the [META] tag on your post title.
On fridays, you are allowed to post meme and troll questions, on the condition that it's in text format only, and conforms with our other rules. These posts MUST include the [NSQ Friday] tag in their title.
If you post a serious question on friday and are looking only for legitimate answers, then please include the [Serious] tag on your post. Irrelevant replies will then be removed by moderators.
Rule 7- You can't intentionally annoy, mock, or harass other members.
If you intentionally annoy, mock, harass, or discriminate against any individual member, you will be removed.
Likewise, if you are a member, sympathiser or a resemblant of a movement that is known to largely hate, mock, discriminate against, and/or want to take lives of a group of people, and you were provably vocal about your hate, then you will be banned on sight.
Rule 8- All comments should try to stay relevant to their parent content.
Rule 9- Reposts from other platforms are not allowed.
Let everyone have their own content.
Rule 10- Majority of bots aren't allowed to participate here.
Credits
Our breathtaking icon was bestowed upon us by @Cevilia!
The greatest banner of all time: by @TheOneWithTheHair!
Or, in other words:
(inb4 "not murder")
and use their fiduciary duty as a legal basis to compel patronage of their services
Do you mean a hacker should find a company's tech vulnerability and then either: a) inform the company that a vulnerability exists and they should pay $XYZ to learn what it is, or b) inform the company that a vulnerability is known and it will be disclosed unless $XYZ is paid, or c) simply inform the company of the vulnerability and hope that they'll pay the hacker to consult on how to fix it?
Scenario A is generally permissible, if such a vulnerability does exist. Things like NDAs and contracts can be agreed before the hacker describes the vulnerability, to legally protect the company in case the hacker was bluffing. That said, even without contracts, falsely claiming that a vulnerability exists or that the hacker knows what it is -- when they infact don't -- would be fraud in most jurisdictions.
Scenario B is blackmail, and is illegal. [shocked Pikachu face]
Scenario C is possible, although there's no guarantee that the company is looking for consulting. Although if the hacker's speciality is both how to identify and patch such specific vulnerabilities, this may be more likely.
That said, taking a step back, are you sure you meant to reference the fiduciary duty that corporate directors owe to their shareholders? This is not the same as the business judgement rule, where directors must act with reasonable prudence in the company's best interest. The latter rule exists because there may be multiple tactics to fully honor the fiduciary duty, and it would be inequitable to allow suits against directors just because they decided to achieve the objective in different ways. There is no singularly correct way to run a company.
Neither the fiduciary duty nor the business judgement rule penalize a director just because a business challenge arises, such as a data breach. Rather, the fiduciary duty is violated when a director hides info from the shareholders, or does not follow explicit instructions from the shareholders, for example. And the business judgment rule will not protect a director that is working in bad faith or takes unreasonable risks with the company's assets.
Declining to hire a hacker as a consultant is a reasonable course of action. It would be a strange -- but not impossible -- instruction for the shareholders to order the management a priori to "never negotiate with terrorists" but absent such a hyper-specific command, there wouldn't be a violation of the director's duty of obedience.
Hackers are thus not guaranteed an income stream here. Although I would argue perhaps companies should be required to honor some equivalent to the maritime Law Of Salvage, where the hacker is guaranteed a cut for helping, however that may be defined. Limiting such a law to only data breaches would make sense, since losing other people's data has cascading effects, whereas just losing money is borne solely by the company.
Most hackers are responsible. Hackerone is a site where anyone can sign up and start claiming bug bounties for reporting vulnerabilities. They claim to have 2 million active hackers. Just like anything else, the people breaking the law are in the minority and probably resorted to it after trying to make money the legal way.
Most companies dont give a shit about security except for 6-8 months after a recent hack.
But why would that not fall under their specific fiduciary duties to attend to?
They use fiduciary responsibillity as a legal and ethical defense to ward off disrupting their most harmful efforts, how can that not be moreso relevant towards defending their cyber stuffs?
Because you are not thinking like a board member.
You have an IT system that has been in place since before you were hired. Let's be generous and say it was developed in the 90s and running on an AS400. All costs are accounted for and is costing $400k a month, the platform is working as intended and staff are adequately trained. The platform is rock solid and you don't recall the last time a catastrophic failure happened.
Your IT underling comes to you one day and says we need to change this business critical and it will cost $1.2 million as a Capex with an ongoing opex of $600K a month. it will take 4 years to develop, another 6 months to migrate the data between systems and take another 4 months to train staff back to a basic level.
How in the world do you pitch that to your fellow board members?
this guy boards
You'd be amazed the kinds of excuses companies can come up with to avoid doing something they don't want to do.
Dude is out here thinking corporations are lawful. Cyber security costs money, money that they pocket otherwise.
My dude, the moment you say "just", you make us all run away. "Just" is the keyword that says "someone is going to trivialize a bunch of shit they don't understand" and that never ends well.
Good point, fixed it. Fixxed a couple points ;)
Some people just want to be criminals. They are gamblers or just enjoy feeling superior
It's called "white hat" not white cap.
Haha my bad
IIRC, there’s an investment group that does a version of this - they short the stock then release and publicize the information.
There are companies for specific ethical hacking and to expose cybersecurity flaws. They would just need to apply to them.
Most white hat pen testers apply their trade under contract for security audits. A lot of companies, especially those that work for governments, have requirements to get security audits regurally. It is not outside the realm of reason to hire a company, lay out the rules of engagment, have them assign a team to try, try to break in, detail what they did and any vulnerabilities that were found.
The flip side is that these people are paid very very well to do this (especially people who will risk their skin on physicial security). They take a very "defense against the dark arts" methodology, the best way to teach people how to defend against attacks is to actually attack them and tell them where they messed up. For that reason, you get conventions like DEFCON where security experts from alphabet soup agencies, private sector, white, black and grey hats all meet to see what the others are doing. The presentations are a blast to watch, if you can undertand the arcane runes and rituals of the worlds best security wizards.
Ha! That was fun in the 90s. Good luck now.