OnePlus Launches Bug Bounty Programme

OnePlus Bug Bounty Programme

OnePlus Launches Bug Bounty Programme

Chinese smartphone manufacturer OnePlus has announced that it will offer a bug bounty offering up to US$ 7,000 (approx. Rs 4.9 lakh) to security experts who discover and report potential threats to OnePlus’ systems. The company has partnered with HackerOne, a hacker-powered security platform as part of its efforts to better protect users from cyber threats.

In an official statement from the company, it said that OnePlus Global Security Response Centre will engage academics and security professionals to responsibly discover, disclose and remediate issues that could affect the security of OnePlus’ systems and will help OnePlusproactively counter potential external threats to user security.

Security researchers around the world can proactively search for and report OnePlus-related security issues through the new bug bounty programme.

“Rewards for qualifying bugs reports will range from US$ 50 to US$ 7,000, depending on the potential impact of the threat,” the statement said.Security researchers are encouraged to report any potential threats to the OnePlus official website, OnePlus Community forums and OnePlus applications. Reports will be reviewed by OnePlus technical experts.

OnePlus founder and CEO Pete Lau said,”OnePlus truly values the privacy of all information our customers entrust to us. The two projects demonstrate OnePlus’ commitment to protect our users’ data through more secure systems and data lifecycles”.

The partnership with HackerOne will help tap into an extensive network of security experts to surface the most relevant security vulnerabilities before they can be exploited by external actors. The HackerOne collaboration will start as a pilot programme inviting select researchers to test out OnePlus’ systems against potential threats. A public version of the programme is slated to go live later in 2020. All invited researchers will submit their reports through HackerOne.

LEAVE A REPLY

Please enter your comment!
Please enter your name here