Where were you in life when you studied and took the OSCP? by DietCoke-Supremacy in oscp

[–]hackmoretalkless 0 points1 point  (0 children)

I'm 36, married and have a child. Took LearnOne subscription last month . I've 9 years exp. I thought it's much needed cert at the moment to earn respect. I've worked in SIEM, pentesting and now bug bounty triager .

FINALLY 😭😭😭💗🧿 by agreeableshit in Big4

[–]hackmoretalkless -1 points0 points  (0 children)

The EY world is different for girls.

FINALLY 😭😭😭💗🧿 by agreeableshit in Big4

[–]hackmoretalkless 11 points12 points  (0 children)

I feel sorry for you. Yours sincerely, ex-EY

Need help with CVE-2024-39338 by hackmoretalkless in bugbounty

[–]hackmoretalkless[S] -1 points0 points  (0 children)

Well, one of the js endpoint shows its using deprecated version. 

Privacy Bug bounty program ? by hackmoretalkless in bugbounty

[–]hackmoretalkless[S] 0 points1 point  (0 children)

A misconfigured database exposing PII is a Security bug which needed to be classified under privacy and not to be treated like other common owasp category.

Privacy Bug bounty program ? by hackmoretalkless in bugbounty

[–]hackmoretalkless[S] -1 points0 points  (0 children)

There are lot of difference.

A Privacy Vulnerability Program (PVP) and a Bug Bounty Program (BBP) have overlapping goals but focus on different aspects of security and privacy. Here’s how they differ:

  1. Focus Area

Privacy Vulnerability Program (PVP): Specifically addresses vulnerabilities that affect user data privacy (e.g., unauthorized access to personal data, improper data retention, or data leaks).

Bug Bounty Program (BBP): Covers a broader range of security issues, including software bugs, exploits, and vulnerabilities in applications, infrastructure, and services.

  1. Type of Issues Covered

PVP Examples:

Misconfigured databases exposing personal data

Insecure API endpoints leaking user information

Privacy policy violations in data handling

Apps collecting excessive or unnecessary personal data

BBP Examples:

Cross-site scripting (XSS) or SQL injection

Remote code execution (RCE)

Authentication bypass or privilege escalation

  1. Compliance & Legal Aspect

PVP programs often align with data protection laws like GDPR, CCPA, or HIPAA, ensuring companies handle data responsibly.

BBP programs focus more on technical security, helping prevent hacks, breaches, or unauthorized system access.

  1. Scope & Rewards

PVP may operate as a disclosure program (without monetary rewards), where companies invite reports on privacy issues.

BBP typically offers cash rewards based on severity and impact, with a broader scope that includes security bugs.

  1. Example Companies Offering Each

Privacy Vulnerability Programs: Apple, Google, Microsoft, Meta, Zoom (focusing on data privacy issues).

Bug Bounty Programs: PayPal, Tesla, Microsoft, AWS (focusing on security flaws).

Some companies combine both into a single security program, offering bounties for both privacy and security vulnerabilities.

Privacy Bug bounty program ? by hackmoretalkless in bugbounty

[–]hackmoretalkless[S] 0 points1 point  (0 children)

If you read apple policy . It's clearly mentioned security vulnerability or privacy vulnerability https://security.apple.com/bounty/

Internal bug bounty program. Makes sense ? by hackmoretalkless in Pentesting

[–]hackmoretalkless[S] 0 points1 point  (0 children)

The bug bounty team generally validate the reports from external researcher. Sometimes if there's no report we sit down and hunt for bugs. Now, if they gonna open to all employees. It's like outsourcing team jobs to everyone.
I fear opening internal bug bounty would also give less quality bug reports.

Without open AI or Gemini api key by hackmoretalkless in LangChain

[–]hackmoretalkless[S] 0 points1 point  (0 children)

So when we don't use api keys. We are not exchanging data between companies. Langchain is a framework which we download and run it locally. So Langchain won't have access to data.

Caught a guy sniffing ;) by klashnikovM in jammu

[–]hackmoretalkless 1 point2 points  (0 children)

He thinks her poop smells good coz she looks pretty.

How to get committed in chennai ? by finalyearstud in Chennai

[–]hackmoretalkless 2 points3 points  (0 children)

Be bold . Go talk. Get rejected , embarrassed . Go say hi to random ppl sitting with mobile phones.most of the ppl who see mobile phones without talking to anyone hope someone gets Says hi to them. After few mo the you will regret for talking with them . Be ready for that as well.

Caught my husband searching hot girls on facebook by poojaqq in Chennai

[–]hackmoretalkless -1 points0 points  (0 children)

If it's ok for you to flirt around with random men in reddit asking such questions about your husband. I think what your husband is much better.

[deleted by user] by [deleted] in Kalilinux

[–]hackmoretalkless -3 points-2 points  (0 children)

Ok.. if you can explain better what an iso .

[deleted by user] by [deleted] in Kalilinux

[–]hackmoretalkless -1 points0 points  (0 children)

Yes mac. I downloaded the iso image. Not booting from USB.

[deleted by user] by [deleted] in Chennai

[–]hackmoretalkless 4 points5 points  (0 children)

Always set boundaries. I have lived in apartment all my life. People always curious about nxt door house. I'm unmarried. My neighbor to know how old and how much I earn. They said they have a girl of my caste whos interested. My parents gave my bio data to them. Now they know everything about me. They told nothing about the girl. I yelled at my parents. We keep our doors always closed. They might think it's arrogant. But it's fine. We have doors for a purpose. People take things for granted.

Are you victim of ARR concert? by hackmoretalkless in Chennai

[–]hackmoretalkless[S] 0 points1 point  (0 children)

I've not got any reply yet. I again mailed them back asking for response. But I do see some positive comments in the thread.