958 Trust

Are hackers spineless?

Just being threatened by someone with better technology is direct and unconditional obedience?

At first glance, this may seem like the case.

After all, this circle pays attention to the mode that the winner is the king, the weak eat the strong, the capable go up and the mediocre go down, and the big fish eat the small fish.

But in fact.

can make so many top hackers obey, in addition to the fact that the technical strength of the boss is really strong enough, there is another reason because.

Loophole hunter is a real trick!

For people who don't know about hackers, or newcomers who have just entered the industry, this circle is mysterious, powerful, and no matter what problems they encounter, they can be solved with just one computer.

But in fact.

Only if you really understand it, you will understand.

In the early years, there may indeed be a possibility of such a thing happening, but with the popularization of the Internet, all kinds of software and hardware upgrades, and all kinds of products for the core code improvement.

It is becoming more and more rare to be able to do things that can be eaten all over the world by a computer.

Even many so-called hackers, in fact, will begin to rely on internal ghosts, obtain internal source code, or even directly pull the gate, relative to the physical mode to launch hacker attacks.

Plainly.

It's just that the systems of each family are getting better and better.

Firewalls are getting stronger.

The probability of system vulnerabilities is getting lower and lower.

This situation made the hackers, who were originally high-end, mysterious and powerful, begin to slowly weaken, and the lives of hackers began to gradually become sad.

Previous hackers weren't dedicated to doing bad things.

But what about hackers now?

Account theft, implanting Trojan viruses, undermining public network security, and collecting personal information for reselling and reselling......

It seems that this is the real mainstream.

No way.

It's not that you don't want to compete for popularity, but because in the current environment, there is no opportunity to give you practical talent, let alone want to rely on the technology in your hand to obtain a legitimate income.

The identity of a hacker would have been a plus five years ago, even if you were looking for a job and you told someone that you were a hacker, at least HR would have looked at you differently.

And now?

this thing.

It's already a minus.

Everyone knows black hats and white hats, but not everyone can become white hats, so only the big bulls who are ahead of the hacker and whose strength has been recognized have a chance.

But what about ordinary hackers?

There's simply no room to grow.

However, the emergence of vulnerability hunters will have the potential to change the current situation, and it is possible that the profession of hackers, which everyone originally shouted about, will begin to develop towards professionalism and prospects.

The benefits are obvious.

It is even possible that they will no longer need to rely on some indiscriminate means to profit for themselves.

They can even walk in the sun with dignity.

Be a bounty hunter!

In this case, the meaning of the existence of the vulnerability hunter website is different, as long as the problem is not very serious, in fact, deep down, everyone is also full of interest in this thing.

With such an attitude, in the next group chat, many people really gave a lot of good suggestions:

"The idea of the vulnerability hunter website is good, and I think it is also very promising, but the biggest problem of this website still exists, that is, most of the hackers and these companies are in conflict, and they can't trust each other, so I'm afraid it's difficult to change anything."

"Yes, if we want to find vulnerabilities or fix vulnerabilities, we need to get system authorization, do these companies dare to give us authorization, and our hackers really won't take the opportunity to invade the computer?"

"We can all have real-name authentication, and the hacker will definitely sign the corresponding contract before receiving the order, in this case, in fact, the chance of the hacker doing his hand is not high, not to mention that there is no BOSS in charge, as long as anyone dares to do this, it means that basically don't want to mix in this circle in the future."

"That being said, but do we know that the customers know, do the companies know?"

"Yes, for us, we just need to ensure that if you have a hacker under your hands, your hands and feet will be clean, but for those enterprises, if you really encounter a hacker with unclean hands and feet, the loss will be big in the end."

"The problem of trust has always existed, and if it can't be solved, it is doomed to not develop."

“……”

Those who can be hackers are smart people, and everyone easily analyzed the biggest dilemma now.

Trust.

Perhaps, with these top hackers in charge, the hacker community can have a little more trust in this website.

Even because they set an example.

Everyone may not be so resistant to real-name authentication.

But......

The people that this website wants to serve are not only hackers, but also key customer groups that are crucial and even affect whether the website can grow.

Enterprise!

After all, according to the current plan, if you want this website to operate normally, the only thing you can rely on is for the owners to provide funds and draw points from the commissions of hackers.

This model is right, as long as the popularity of the website is high enough and the number of customers is large enough, they can just rely on the car point, it is enough to maintain the operation of the website, and even make a lot of money.

But only if it is.

This site can win the favor of the dads of the financiers, and they will be willing to pay for hackers to deal with the vulnerability.

That's the most important thing.

Really.

In the next few days, as more and more hackers moved into the vulnerability hunter website, the website became a hot topic in the hacker circle in the next few days.

But......

It's different from the crazy influx of hackers.

The corporate teams responsible for giving commissions and rewards, but there was no movement at all.

It's not that there are no companies moving in.

After all, Shen is so vast, in fact, there are still many large enterprise groups who have come to see it, and even many company teams that need to rely on Internet technology have paid attention to this website for the first time.

Unfortunately, none of the commissions have been forthcoming.

The most embarrassing situation.

Many people began to laugh at the mysterious founder of the website, thinking that the founder might have an idea, but it was only an idea.

Now everyone is watching, but no one wants to be the guinea pig.

But......

When everyone watched coldly, even waiting for ridicule.

The Bug Hunter website suddenly launched a campaign for the first time since the site was built.

Loophole Finding Contest!

As soon as this news came out, many people were stunned.

Because that's what it means......

They didn't plan to sit back and wait for the wisher to take the bait, but directly planned to take the initiative!