Uber Offers Hackers 'Treasure Map' to Find Bugs in Its Systems

Advertisement
By Reuters | Updated: 23 March 2016 09:51 IST

Uber, the high-flying transportation firm, is releasing a technical map of its computer and communications systems and inviting hackers to find weaknesses in exchange for cash bounties.

While so-called "bug bounties" are not new, Uber's move shows how mainstream companies are increasingly relying on independent computer researchers to help them bolster their systems. It also indicates growing acceptance of the idea that making computer code public can make systems more secure, a philosophy that has long been advocated by the open-source software movement.

Uber's "Treasure Map" details the ride-hailing company's software infrastructure, identifies what sorts of data might be exposed inadvertently and suggests what types of flaws are the most likely to be found.

Advertisement

"We're wrapping up a lot of information and posting that to level the playing field so that it could be as easy for outside researchers to find flaws as us," said Collin Greene, manager of security engineering at Uber.

Advertisement

Companies rarely say much about their proprietary programming, except to enable third parties to make compatible software.

"That's a level of confidence that you have not seen too many closed-source software companies take in the past, and I'm really hopeful that others will follow suit," said Alex Rice, chief technology officer at HackerOne, which is managing Uber's bounty program.

Advertisement

HackerOne, a San Francisco rival called Bugcrowd and other startups have helped accelerate efforts to tap the independent security community to identify serious programming mistakes before criminals or spies do. They can serve as intermediaries between researchers and companies, and sometimes vet their findings.

A decade ago, hackers pointing out problems feared arrest but they can now earn modest sums from platforms like HackerOne. Firms such as Uber, looking to bolster their defenses, don't pay as much as criminals and military contractors who are looking for tools to carry out offensive attacks, but they offer options to those who would prefer to act as "white hats."

Advertisement

Bugcrowd Chief Executive Officer Casey Ellis said he has seen a surge in corporate clients asking for private bounty programs that are open to selected researchers.

"That increases the amount of trust you are giving to the researchers," Ellis said. "We run trusted programs where people get prerelease versions of Internet of Things devices or access to source code."

© Thomson Reuters 2016

 

Catch the latest from the Consumer Electronics Show on Gadgets 360, at our CES 2026 hub.

Advertisement

Related Stories

Popular Mobile Brands
  1. Samsung Galaxy S26 Series Roundup: Everything That We Know So Far
  1. Quantum Haloscope Sharpens the Search for Dark Matter Axions at Higher Frequencies
  2. Rare Interstellar Object 3I/ATLAS Fails Alien Test, Scientists Say
  3. CNAP vs Truecaller: How India’s Official Caller ID System Differs From the Popular App
  4. Prayagraj Ki Love Story Set to Stream Soon on Hungama OTT
  5. Mask OTT Release Date: When and Where to Watch This Action-Packed Thriller Online?
  6. New Year 2026 Custom Greetings: 5 Best AI Prompts for ChatGPT, Gemini, and Other AI Tools
  7. NASA’s Chandra Spots Champagne Cluster Formed by a Massive Galaxy Collision
  8. NASA’s Curiosity Rover Sends Stunning Sunrise-and-Sunset Holiday Postcard from Mars
  9. Oppo Find X9s Key Specifications Leaked Again; Might Also Launch in India
  10. Redmi Turbo 5, Redmi Turbo 5 Pro to Be Equipped With Upcoming MediaTek Dimensity Chips, Tipster Claims
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.