Press
What’s in a bug bounty? Not extortion
The Parallax published an analysis of the Uber data breach cover-up and the distinction between legitimate bug bounty payments and extortion. Casey Ellis examines how the circumstances surrounding Uber's handling of the breach illustrate the ethical and legal boundaries in responsible vulnerability disclosure.