Here is the explanation on the anti security policy regarding an anonymmous writter point of view.
He says "This is my view and it does not fully speak for all the people -- that are involved in anti security and it is subject to heavy change."Read more
2014/06 : "The Industry Consortium for Advancement of Security on the Internet, ICASI, proposed to the FIRST Board of Directors that a Special Interest Group (SIG) be considered on Vulnerability Disclosure. After holding meetings at the FIRST Conferences in Boston in June 2014...Read more
1998-1999 : Birth of the anti-Sec movement.
"We are the Ant-Sec movement, and we are dedicated to eradicating full-disclosure of vulnerabilities and exploits and free discussion on hacking related topics."
This artifact is part of the ...Read more
2010/07/16 : "In an effort to enlist more help finding bugs in its most popular software, such as Firefox, Thunderbird and Firefox Mobile, Mozilla is jacking up the bounty it pays to researchers who report security flaws to $3,000."Read more
2000 : Here is a slide presented by Ranum on a CSI Conference in Chicago. He talks about his keynote and go farther.
This artifact is part of the Bundle Ranum Keynote Debate.Read more
2018/12 : ENISA (European Union Agency for Cybersecurity) release its Economics of Vulnerability Disclosure Report.
"Vulnerability disclosure refers to the process of identifying, reporting and patching weaknesses of software, hardware or services that can be exploited....Read more
2002/02 : IETF Draft by Steve Christey from MITRE and Chris Wysopal :
"During the process of disclosure, many vendors, security researchers, and other parties follow a variety of unwritten or informal guidelines for how they interact and share information. Some parties may be unaware of...Read more
2014/11/18 in Golem.de : Hanno Böck writes on the BTX-Hack.
1984 : Two members of the Chaos Computer Club (CCC) hacked BTX, by stealing 135 000Marks. They wanted to prove that the online service BTX, which had been in existence for a year at the time, was not sufficiently...Read more
2017 : FIRST release their Guidelines and Practices for Multi-Party Vulnerability Coordination and Disclosure.
"The purpose of this document is to assist in improving multi-party vulnerability coordination across different stakeholder communities."
This artifact is...Read more
Here is "the survey and statistics of the ethical hacker community" for the year of 2020.
This artifact is part of the HackerOne Reports and Guidelines Bundle.Read more
2017/11/15 : "[T]he White House released a charter for the administration’s once-shadowy Vulnerabilities Equities Process (VEP)." (see : https://www.lawfareblog.com/...Read more