+27 27 0
Published 8 years ago by idlethreat with 2 Comments
Additional Contributions:

Join the Discussion

  • Auto Tier
  • All
  • 1
  • 2
  • 3
Post Comment
  • [Deleted Profile]

    [This comment was removed]

  • idlethreat (edited 8 years ago)
    +1

    I did a quick perusal of the security overview (linked above) and this is exactly the way that you handle a security issue. Namely, researcher contacts the vendor first, they isolate and define the security problem, issue report back to vendor. The vendor fixes the issue and then, and only then does the researcher report the problem to the world.

    What happened in Jeep's case was irresponsible and wrong. It could have jeopardized innocent people as well.

Here are some other snaps you may like...