{"id":976,"date":"2010-11-06T02:23:17","date_gmt":"2010-11-05T19:23:17","guid":{"rendered":"http:\/\/deepquest.code511.com\/blog\/?p=976"},"modified":"2010-11-05T02:25:29","modified_gmt":"2010-11-04T19:25:29","slug":"get-paid-to-hack-google","status":"publish","type":"post","link":"https:\/\/deepquest.code511.com\/blog\/2010\/11\/get-paid-to-hack-google\/","title":{"rendered":"Get paid to hack Google!"},"content":{"rendered":"<div>Google has unveiled a new program to pay between $500 and $3,133 to people who  discover security vulnerabilities in its websites and online  applications.<\/p>\n<p>&#8220;We hope our new program will attract new  researchers and the types of reports that help make our users safer,&#8221;  members of Google&#8217;s security team said in a group blog post.<br \/>\n<!--more--><\/div>\n<div>\n<div>\n<div>The  program follows the success of a more limited vulnerability reward  project limited to Google&#8217;s open-source Chromium browser, which resulted  in a sustained increase in the exposure of vulnerabilities, the Google  security team said.<\/p>\n<p>The new initiative will apply to Google web  properties such as Google.com and will cover &#8220;any serious bug which  directly affects the confidentiality or integrity of user data,&#8221;  according to the announcement.<\/p>\n<p>Google said a special panel would determine the level of reward which would be awarded on a first-come, first-serve basis.<\/p><\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Google has unveiled a new program to pay between $500 and $3,133 to people who discover security vulnerabilities in its websites and online applications. &#8220;We hope our new program will&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[43],"tags":[49,30],"class_list":["post-976","post","type-post","status-publish","format-standard","hentry","category-exploit","tag-google","tag-hack"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4bBYZ-fK","_links":{"self":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/976","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/comments?post=976"}],"version-history":[{"count":1,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/976\/revisions"}],"predecessor-version":[{"id":977,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/976\/revisions\/977"}],"wp:attachment":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/media?parent=976"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/categories?post=976"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/tags?post=976"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}