Google has ramped up the stakes for tech-savvy security researchers. In a potentially tempting offer, it’s offering a whopping $100,000 – a hefty sum equivalent to approximately 30 million Naira – to anyone who can successfully hack a Chromebook. This hefty increase was announced in a recent blog post, maintaining the tech giant’s track record of rewarding those sharp-eyed researchers who can spot weaknesses in its digital armor.
This isn’t the first time Google has put up a bounty for spotting security flaws. The company initiated its “bug bounty” program in 2010. Since then, it has reportedly shelled out over $6 million, or about 1.2 billion Naira, in rewards to security researchers. These rewards programs aim to strengthen security measures and improve overall services by casting a wide net for potential vulnerabilities. In some instances, these programs also serve as an effective way of showcasing robust security systems.
Why double the bounty?
One reason for doubling the stakes may stem from the fact that since its initial launch of a $50,000 (or 15 million Naira) reward last year, no one has been successful in hacking the Chromebook. As such, this heightened bounty is Google’s way of incentivizing more intensive attempts. “Since we introduced the $50,000 reward, we haven’t had a successful submission. That said, great research deserves great awards, so we’re putting up a standing six-figure sum, available all year round with no quotas and no maximum reward pool,” said Chrome Defender Nathan Parker in the blog post.
Of course, like any competition, there are rules to this techno-challenge. You can find Google’s guidelines for this endeavor here. Buckle up your skills and start stretching those programming muscles – it’s time to get hacking!
Image: “Google Chromebook”, [add full-width image of Google Chromebook]
Image Source: [source of the image]
As always, remember to follow responsible and ethical hacking practices. Happy bug hunting!
Discover more from TechBooky
Subscribe to get the latest posts sent to your email.