Google Play Will No Longer Pay To Discover Vulnerabilities In Popular Android Apps (androidauthority.com) 19
Android Authority's Mishaal Rahman reports: Security vulnerabilities are lurking in most of the apps you use on a day-to-day basis; there's just no way for most companies to preemptively fix every possible security issue because of human error, deadlines, lack of resources, and a multitude of other factors. That's why many organizations run bug bounty programs to get external help with fixing these issues. The Google Play Security Reward Program (GPSRP) is an example of a bug bounty program that paid security researchers to find vulnerabilities in popular Android apps, but it's being shut down later this month. Google announced the Google Play Security Reward Program back in October 2017 as a way to incentivize security searchers to find and, most importantly, responsibly disclose vulnerabilities in popular Android apps distributed through the Google Play Store. [...]
The purpose of the Google Play Security Reward Program was simple: Google wanted to make the Play Store a more secure destination for Android apps. According to the company, vulnerability data they collected from the program was used to help create automated checks that scanned all apps available in Google Play for similar vulnerabilities. In 2019, Google said these automated checks helped more than 300,000 developers fix more than 1,000,000 apps on Google Play. Thus, the downstream effect of the GPSRP is that fewer vulnerable apps are distributed to Android users.
However, Google has now decided to wind down the Google Play Security Reward Program. In an email to participating developers, such as Sean Pesce, the company announced that the GPSRP will end on August 31st. The reason Google gave is that the program has seen a decrease in the number of actionable vulnerabilities reported. The company credits this success to the "overall increase in the Android OS security posture and feature hardening efforts."
The purpose of the Google Play Security Reward Program was simple: Google wanted to make the Play Store a more secure destination for Android apps. According to the company, vulnerability data they collected from the program was used to help create automated checks that scanned all apps available in Google Play for similar vulnerabilities. In 2019, Google said these automated checks helped more than 300,000 developers fix more than 1,000,000 apps on Google Play. Thus, the downstream effect of the GPSRP is that fewer vulnerable apps are distributed to Android users.
However, Google has now decided to wind down the Google Play Security Reward Program. In an email to participating developers, such as Sean Pesce, the company announced that the GPSRP will end on August 31st. The reason Google gave is that the program has seen a decrease in the number of actionable vulnerabilities reported. The company credits this success to the "overall increase in the Android OS security posture and feature hardening efforts."
Said in another words: (Score:5, Insightful)
We are sick and tired of paying for people finding vulns in App that do not belong to us.
Let the developers implement their own rewards program.
We will save the money thank you very much.
Re: (Score:2)
= short-term profits over everything else.
Re: (Score:2)
Exactly my first thought. This is an incredibly stupid move.
Re:Said in another words: (Score:4, Informative)
Ah, it'll be just like the other app stores... The users are getting exactly what they wanted with competing App stores.
Re: (Score:3)
Re: (Score:2)
That's part one. But there's diminishing returns in finding new security vulnerability prototypes in apps that have already been scanned and fixed repeatedly over the years.
They are probably content with just using this as a scanner, and manually adding patterns that are discovered routinely. They might have a mistaken belief that Gemini will do some of this, but with LLM training it can only find variations of known things - not new things.
Re: (Score:3)
We are sick and tired of paying for people finding vulns in App that do not belong to us.
Let the developers implement their own rewards program.
We will save the money thank you very much.
Nah, it's exactly what the summary said: There are just not very many actionable vulnerabilities being found, mostly because the effort put into hardening the OS has made it very difficult to do much with an app exploit. The number of vulnerability reports is still high, which means that Google has to pay engineers to look at and evaluate every one of them, but the percentage of reports which result in some actual improvement is low.
The way success or failure of a vulnerability reward program (VRP) is e
Insert actual reason here (Score:1)
Re:Insert actual reason here (Score:4, Insightful)
Re: (Score:3)
None of the above. The 37337 h0x0xrs get more money [reason.com] from big security firms who then bundles them and sells them to intelligence agencies once they're properly weaponized. This isn't a theory, it's now reality.
Not for app exploits, they don't. System, kernel, bootloader, TEE, etc., exploits are worth a lot. Your phrasing kind of implies that this is new, but it's not. Android exploits have been worth big money for over a decade. As Android security has improved the values have been climbing. At this point, Android exploit chains are worth significantly more than iOS exploit chains.
However, lots of researchers strongly prefer to use the aboveboard VRPs even though they pay a little less. Partly this is bec
Re: (Score:2)
Re: (Score:2)
No payouts makes it expensive! (Score:2)
Huh? (Score:2)
The reason Google gave is that the program has seen a decrease in the number of actionable vulnerabilities reported. The company credits this success to the "overall increase in the Android OS security posture and feature hardening efforts."
Oh ok.. .. hey wait a second ..that makes NO sense. If vulnerabilities aren't being found that means they can INCREASE the reward, not eliminate it.
Re: Huh? (Score:2)
Bug bounties no longer make sense (Score:2)
However, the world is now full of "security experts" who run open-source or even commercial tools and open up a ticket with the software vendor for every findings. That's true even if the software vendor uses the exact same t
Dont trust Google Play (Score:2)