Menu
Encrypted messaging startup Wickr offers $100K bug bounty

Encrypted messaging startup Wickr offers $100K bug bounty

The company hopes to tap the security research community to find potential problems

Two-year-old startup Wickr is offering a reward of up to US$100,000 to anyone who can find a serious vulnerability in its mobile encrypted messaging application, which is designed to thwart spying by hackers and governments.

The reward puts the small company in the same league as Google, Facebook and Microsoft, all of which offer substantial payouts to security researchers for finding dangerous bugs that could compromise their users' data.

Wickr has already closely vetted its application so the challenge could be tough. Veracode, an application security testing company, and Stroz Friedberg, a computer forensics firm, have reviewed the software, in addition to independent security researchers.

In a statement, Wickr said "we expect finding critical vulnerabilities in Wickr to be difficult and are honored to work with those that do."

Companies benefit from these bug bounty programs because they create an incentive for a large number of engineers with various types and levels of expertise to test their applications. It can be a better investment than hiring full-time staff, according to one study.

Wickr said vulnerabilities that substantially affect the confidentiality or integrity of user data could qualify for the maximum reward. Less severe bugs could garner a researcher $10,000 or more. Researchers are required not to publicize their discoveries for three months without written permission, giving Wickr time to review and fix potential issues. Bug information should be sent to bugbounty@mywickr.com.

Messages sent through Wickr are encrypted on the mobile device. Although the scrambled data passes through Wickr's servers, Wickr does not have a key to decrypt the content. A message can be tagged with an expiry date that causes it to be erased on the recipient's phone after a specific time.

Wickr, based in San Francisco, promotes its application, which runs on iOS and Android, as a safe way to send messages, photos, files and video. Since it does not retain data on its servers, the company maintains it would be unable to turn over users' data to law enforcement.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags Exploits / vulnerabilitiesWickr

More about FacebookGoogleMicrosoft

Show Comments
[]