
Bug bounties: the good and the bad of computer security
The Vergecast
00:00
Intro
This chapter explores the complex landscape of bug bounty programs, focusing on their origins, effectiveness, and challenges. It also touches upon related topics like encryption, government device security policies, and election security concerns.
Play episode from 00:00
Transcript


