Bitcoin Forum
November 23, 2017, 12:48:02 AM *
News: Latest stable version of Bitcoin Core: 0.15.1  [Torrent].
 
   Home   Help Search Donate Login Register  
Pages: « 1 2 3 [4] 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 ... 120 »
  Print  
Author Topic: [ANN] [HACKEN] FIRST DECENTRALIZED MARKETPLACE FOR WHITE HAT HACKERS  (Read 44442 times)
loremipsum
Hero Member
*****
Offline Offline

Activity: 532


Spectiv VR Crowdsale: 12/08/17


View Profile
September 08, 2017, 03:50:23 PM
 #61

This projects looks promising. Im reading your whitepaper.

In the meantime, I already registered for translation and twitter bounties!

Good luck with your project Smiley


              ▄▄████████████▄▄             
          ▄███▀▀▀░░░░░░░░░░▀▀▀███▄▄        
       ▄██▀▀░░░░░░░░░░░░░░░░░░░░░▀██▄      
     ▄██▀░░░░░░░░░░░░░░░░░░░░░░░░░░▀███    
   ▄██▀░░░░░░░░░░░░░░░▄▄▄▄▄█████████████▄  
  ▄██░░░░░░░░░░░▄▄█████████░░░░░░░░░░░░▀█▌ 
 ▐██░░░░░░░░▄█████▀▀▀▀▀▀▀▀▀████▄░░░░░░░░▀█▌
▐██░░░░░░▄███▀▀███████████████▀▀██▄░░░░░░██▌
████▄░░▄██▀███████▄██████▄████████▀██▄░░░▐██
██░▀████▀██████████████████████████████▄░░██
██░░░▀██▄█████████████████████████▄██▀▀██▄██
██▌░░░░▀███▄████████▀▀▀▀███████▄██▀░░░░░▀███
▐██░░░░░░░▀███▄▄███████████▄▄██▀▀░░░░░░░░██▌
 ▐██░░░░░░░░░░▀▀████████████▀░░░░░░░░░░░▄█▌
  ▀██▄▄▄▄▄▄▄▄▄████████▀▀▀░░░░░░░░░░░░░░▄█▌ 
   ▀███▀▀▀▀▀▀░░░░░░░░░░░░░░░░░░░░░░░░▄██▀  
     ▀██▄░░░░░░░░░░░░░░░░░░░░░░░░░░▄██▀    
       ▀███▄░░░░░░░░░░░░░░░░░░░░▄▄██▀      
          ▀████▄▄░░░░░░░░░░▄▄▄███▀         
              ▀▀▀██████████▀▀▀             

    
                         [ Website ]                    
    
Join ICO Now A blockchain platform for effective freelancing
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
1511398082
Hero Member
*
Offline Offline

Posts: 1511398082

View Profile Personal Message (Offline)

Ignore
1511398082
Reply with quote  #2

1511398082
Report to moderator
1511398082
Hero Member
*
Offline Offline

Posts: 1511398082

View Profile Personal Message (Offline)

Ignore
1511398082
Reply with quote  #2

1511398082
Report to moderator
1511398082
Hero Member
*
Offline Offline

Posts: 1511398082

View Profile Personal Message (Offline)

Ignore
1511398082
Reply with quote  #2

1511398082
Report to moderator
MaxiCripto
Full Member
***
Offline Offline

Activity: 140


View Profile
September 08, 2017, 04:57:38 PM
 #62

Quote

Ok, now the picture is somewhat clearer. Clients will use the Hacken platform and submit their product information and use Hacken Token for payment. I assume that only data related to product is shared on blockchain not the product release and source files itself. Now, if a white hacker find bugs or vulnerabilities where he/she will share this information, on the blockchain or to some centralized servers? Who will authenticate that found bugs etc are relevant and hacker has to be paid for this? And what if other hacker found more bugs in the same product? Will he/she paid again for this?

A good question...
when somebody sells a bug, and some other one buys it....why dont know if the buyer will use the info for good intention.
To be honest from what i read till now this will be a marketplace for hacker selling.....not just "white"....it will be like a black market for  ways to penetrate systems....info that are not used only for "white hacking"..
If i got the project right.
But i maybe wrong Huh

▀     DeepOnion  |  TOR Integrated & Secured  [ Facebook  Telegram  Bitcointalk  Twitter  Youtube  Reddit ]     ▀
Your Anonymity Guaranteed  ★  Your Assets Secured by TOR  ★  Guard Your Privacy!   ❱❱❱ JOIN AIRDROP NOW!
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬  File Authenticity Guaranteed by DeepVault  ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
klixion
Sr. Member
****
Offline Offline

Activity: 336


View Profile
September 09, 2017, 12:25:30 AM
 #63

When will the signature campaign codes available?  Thanks.

██   ██   ██   ██      ██   ██   ██   ██
██   ██   ██   ██      ██   ██   ██   ██
██   ██   ██   ██      ██   ██   ██   ██
██   ██   ██   ██      ██   ██   ██   ██
██   ██   ██   █████████████████████████
██   ██   ██                          ██
██   ██   ██                          ██
██   ██   ██████████████████████████████
██   ██                               ██
██   ██                               ██
████████████████████████████████████████
██                               ██   ██
██                               ██   ██
██████████████████████████████   ██   ██
██                          ██   ██   ██
██                          ██   ██   ██
█████████████████████████   ██   ██   ██
██   ██   ██   ██      ██   ██   ██   ██
██   ██   ██   ██      ██   ██   ██   ██
██   ██   ██   ██      ██   ██   ██   ██
██   ██   ██   ██      ██   ██   ██   ██



HACKEN

______


______


______


______


______


______


______

______


______


______


______


______


______


______
Hacken Project
Member
**
Offline Offline

Activity: 68


View Profile
September 09, 2017, 02:05:35 PM
 #64

I could not understand the reason of this project. What is decentralize in it, Hackers or HKN token. What is the need of decentralized in this field? And How will HKN token and decentralization is helpful because of this project. Please elaborate.

If you need Hindi translation and moderation. I can help.

The big idea behind Hacken is that it turns each owner of Hackens into a community member. Because Hacken is a specialized software utility token, being primarily focused on cybersecurity professionals and projects, it will also bring these people together by providing incentives for doing business with one another and for investment in cybersecurity startups. These people will need to communicate and interact with each other in order to make use of their Hackens. The more vibrant the community is, the more value it delivers to each member.

Hacken (HKN) is an ERC20 token, which is the only payment tool allowed in the Hacken Ecosystem. Buying Hackens today, will allow one to receive high quality cybersecurity services in the future, at an attractive price.


Yes, Hindi language is welcome.

Please send us the overview of your previous translation experience. Use this email address for that - kissngerbounty@gmail.com

So, May I say that Hacken is a token to buy-sell cybersecurity services. But how Hacken Ecosystem help security professional and consumer linked with each other? What type of services or products can be distributed through blockchain technology and not by traditional markets.

Yes, you are right!Simply to say -Hacken is a token to buy-sell cybersecurity services.
Here is how Hacken Ecosystem help security professional and consumer linked with each other and about use of blockchain:

We are building platform, that is providing Cebersecurity services, and when clients of our platform sign the bug bounty program agreement, our team creates a relevant blockchain block containing data about the product, the terms of service agreement and a timestamp.
The next block of the chain, which is specific to this client, will contain information on vulnerabilities, discovered during our security research.
Also we will build Cybersecurity Analytics Center, with such areas of research: Blockchain security, vulnerabilities and countermeasures.
All services are charged ONLY in Hackens.



Ok, now the picture is somewhat clearer. Clients will use the Hacken platform and submit their product information and use Hacken Token for payment. I assume that only data related to product is shared on blockchain not the product release and source files itself. Now, if a white hacker find bugs or vulnerabilities where he/she will share this information, on the blockchain or to some centralized servers? Who will authenticate that found bugs etc are relevant and hacker has to be paid for this? And what if other hacker found more bugs in the same product? Will he/she paid again for this?
Thank you for your question - her is answer for it:
Your question consists of a number of separate questions of their own. We answer them in the order in which they are mentioned in your post:
‘I assume that only data related to product is shared on blockchain not the product release and source files itself’
This assumption is correct. We only use blockchain to issue HackenProof Vulnerabilities and Countermeasures Certificate and to prove authenticity of its contents ( number of vulnerabilities was fixed, client reaction) and timestamps. We store no customer sensitive information in the blockchain.
Now, if a white hacker finds bugs or vulnerabilities, where he/she will share this information, on the blockchain or to some centralized servers?
The researcher will share this information to our web portal HackenProof platform via bug bounty participant panel.
Who will authenticate that found bugs etc are relevant and hacker has to be paid for this?
The technical team of the client will investigate the vulnerabilities and determine whether they are relevant. The terms and rules of the bug bounty program will be stipulated by the document called policy.
Policy will contain all the information covering the depth and scope of the work to be performed by the researchers. It will explain to researchers what the customer needs.
We will also use policy as a proof of the customer’s intentions in an unlikely event of conflict between the client and the researcher regarding the relevance of the vulnerability that was discovered. If the client disagrees with our understanding of the policy, the incident will be submitted to the Public Board of Trustees of Hacken Ecosystem for further mediation.
And what if other hacker found more bugs in the same product? Will he/she paid again for this?
We are not sure we understand this question. The bug bounty program can have as many participants as the clients decides. They will be all submitting bug reports, which will be sorted chronologically and grouped by the issues covered.
The purpose of the bug bounty program is to discover as many bugs as possible within the scope determined by the client. Each participant of the bug bounty program gets paid proportionally to the number of bugs discovered, reported and accepted by the client.

Hacken Project
Member
**
Offline Offline

Activity: 68


View Profile
September 09, 2017, 02:13:22 PM
 #65

Quote

Ok, now the picture is somewhat clearer. Clients will use the Hacken platform and submit their product information and use Hacken Token for payment. I assume that only data related to product is shared on blockchain not the product release and source files itself. Now, if a white hacker find bugs or vulnerabilities where he/she will share this information, on the blockchain or to some centralized servers? Who will authenticate that found bugs etc are relevant and hacker has to be paid for this? And what if other hacker found more bugs in the same product? Will he/she paid again for this?

A good question...
when somebody sells a bug, and some other one buys it....why dont know if the buyer will use the info for good intention.
To be honest from what i read till now this will be a marketplace for hacker selling.....not just "white"....it will be like a black market for  ways to penetrate systems....info that are not used only for "white hacking"..
If i got the project right.
But i maybe wrong Huh
Unreported Zero Day Remuneration Platform will acquire original and previously unreported zero-day research affecting major operating systems, software and devices, e.g. binary vulnerabilities.
The research submitted to Zero Day Remuneration Platform will be available via subscription feed. The access to Zero Day Subscription is now regulated in some jurisdictions and will be limited primarily to vendors and law enforcement agencies. The Platform will be subject to annual audit by one of the major auditing organizations.
Do you really think we will work for several years to acquire reputation and recognition in zero day cybersecurity market, which is very conservative, and then risk it all for a one time profit?
Hacken Project
Member
**
Offline Offline

Activity: 68


View Profile
September 09, 2017, 02:22:59 PM
 #66

When will the signature campaign codes available?  Thanks.
Hallo!
Signature campaign codes could be find here -
https://medium.com/@hacken/hacken-bounty-campaign-6eaf46f956db

signature bounty section
klixion
Sr. Member
****
Offline Offline

Activity: 336


View Profile
September 09, 2017, 06:35:40 PM
 #67

When will the signature campaign codes available?  Thanks.
Hallo!
Signature campaign codes could be find here -
https://medium.com/@hacken/hacken-bounty-campaign-6eaf46f956db

signature bounty section

Thank you Hacken Project.  I see it now and am wearing the signature.  It looks like i'm the first person to sign up for the signature campaign.  Makes me feel special.  haha.   Grin

██   ██   ██   ██      ██   ██   ██   ██
██   ██   ██   ██      ██   ██   ██   ██
██   ██   ██   ██      ██   ██   ██   ██
██   ██   ██   ██      ██   ██   ██   ██
██   ██   ██   █████████████████████████
██   ██   ██                          ██
██   ██   ██                          ██
██   ██   ██████████████████████████████
██   ██                               ██
██   ██                               ██
████████████████████████████████████████
██                               ██   ██
██                               ██   ██
██████████████████████████████   ██   ██
██                          ██   ██   ██
██                          ██   ██   ██
█████████████████████████   ██   ██   ██
██   ██   ██   ██      ██   ██   ██   ██
██   ██   ██   ██      ██   ██   ██   ██
██   ██   ██   ██      ██   ██   ██   ██
██   ██   ██   ██      ██   ██   ██   ██



HACKEN

______


______


______


______


______


______


______

______


______


______


______


______


______


______
MaxiCripto
Full Member
***
Offline Offline

Activity: 140


View Profile
September 10, 2017, 04:16:42 AM
 #68


Quote
Unreported Zero Day Remuneration Platform will acquire original and previously unreported zero-day research affecting major operating systems, software and devices, e.g. binary vulnerabilities.
The research submitted to Zero Day Remuneration Platform will be available via subscription feed. The access to Zero Day Subscription is now regulated in some jurisdictions and will be limited primarily to vendors and law enforcement agencies. The Platform will be subject to annual audit by one of the major auditing organizations.
Do you really think we will work for several years to acquire reputation and recognition in zero day cybersecurity market, which is very conservative, and then risk it all for a one time profit?

I would not be surprised , in this damn world , a lot of unbelievable things have happed.
However your previous answer to @sonulrk have clarified some aspects to the project...
And by the way , take it easy , we are just asking question to know this project better. I didnt point the finger, i just got posted a doubt that i had, nothing more... Roll Eyes

▀     DeepOnion  |  TOR Integrated & Secured  [ Facebook  Telegram  Bitcointalk  Twitter  Youtube  Reddit ]     ▀
Your Anonymity Guaranteed  ★  Your Assets Secured by TOR  ★  Guard Your Privacy!   ❱❱❱ JOIN AIRDROP NOW!
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬  File Authenticity Guaranteed by DeepVault  ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
sonulrk
Full Member
***
Offline Offline

Activity: 168


View Profile
September 10, 2017, 04:37:59 PM
 #69

I could not understand the reason of this project. What is decentralize in it, Hackers or HKN token. What is the need of decentralized in this field? And How will HKN token and decentralization is helpful because of this project. Please elaborate.

If you need Hindi translation and moderation. I can help.

The big idea behind Hacken is that it turns each owner of Hackens into a community member. Because Hacken is a specialized software utility token, being primarily focused on cybersecurity professionals and projects, it will also bring these people together by providing incentives for doing business with one another and for investment in cybersecurity startups. These people will need to communicate and interact with each other in order to make use of their Hackens. The more vibrant the community is, the more value it delivers to each member.

Hacken (HKN) is an ERC20 token, which is the only payment tool allowed in the Hacken Ecosystem. Buying Hackens today, will allow one to receive high quality cybersecurity services in the future, at an attractive price.


Yes, Hindi language is welcome.

Please send us the overview of your previous translation experience. Use this email address for that - kissngerbounty@gmail.com

So, May I say that Hacken is a token to buy-sell cybersecurity services. But how Hacken Ecosystem help security professional and consumer linked with each other? What type of services or products can be distributed through blockchain technology and not by traditional markets.

Yes, you are right!Simply to say -Hacken is a token to buy-sell cybersecurity services.
Here is how Hacken Ecosystem help security professional and consumer linked with each other and about use of blockchain:

We are building platform, that is providing Cebersecurity services, and when clients of our platform sign the bug bounty program agreement, our team creates a relevant blockchain block containing data about the product, the terms of service agreement and a timestamp.
The next block of the chain, which is specific to this client, will contain information on vulnerabilities, discovered during our security research.
Also we will build Cybersecurity Analytics Center, with such areas of research: Blockchain security, vulnerabilities and countermeasures.
All services are charged ONLY in Hackens.



Ok, now the picture is somewhat clearer. Clients will use the Hacken platform and submit their product information and use Hacken Token for payment. I assume that only data related to product is shared on blockchain not the product release and source files itself. Now, if a white hacker find bugs or vulnerabilities where he/she will share this information, on the blockchain or to some centralized servers? Who will authenticate that found bugs etc are relevant and hacker has to be paid for this? And what if other hacker found more bugs in the same product? Will he/she paid again for this?
Thank you for your question - her is answer for it:
Your question consists of a number of separate questions of their own. We answer them in the order in which they are mentioned in your post:
‘I assume that only data related to product is shared on blockchain not the product release and source files itself’
This assumption is correct. We only use blockchain to issue HackenProof Vulnerabilities and Countermeasures Certificate and to prove authenticity of its contents ( number of vulnerabilities was fixed, client reaction) and timestamps. We store no customer sensitive information in the blockchain.
Now, if a white hacker finds bugs or vulnerabilities, where he/she will share this information, on the blockchain or to some centralized servers?
The researcher will share this information to our web portal HackenProof platform via bug bounty participant panel.
Who will authenticate that found bugs etc are relevant and hacker has to be paid for this?
The technical team of the client will investigate the vulnerabilities and determine whether they are relevant. The terms and rules of the bug bounty program will be stipulated by the document called policy.
Policy will contain all the information covering the depth and scope of the work to be performed by the researchers. It will explain to researchers what the customer needs.
We will also use policy as a proof of the customer’s intentions in an unlikely event of conflict between the client and the researcher regarding the relevance of the vulnerability that was discovered. If the client disagrees with our understanding of the policy, the incident will be submitted to the Public Board of Trustees of Hacken Ecosystem for further mediation.
And what if other hacker found more bugs in the same product? Will he/she paid again for this?
We are not sure we understand this question. The bug bounty program can have as many participants as the clients decides. They will be all submitting bug reports, which will be sorted chronologically and grouped by the issues covered.
The purpose of the bug bounty program is to discover as many bugs as possible within the scope determined by the client. Each participant of the bug bounty program gets paid proportionally to the number of bugs discovered, reported and accepted by the client.



Thanks for your detail answer. What is more important is you take every question and answer it. I want to clarify my last question:

Let say a client hire Hacken platform to check its product vulnerability. Client paid bug bounty to Hacken platform to be release to successful candidate. Hacken platform propagate information regarding this project on blockchain. Now assume there are 10 bugs (I know that no body knows about exact number of bugs) with severity: 1 critical, 2 high, 3 low, 2 blocker and 2 trivial. One hacker found all but critical bug. He/she reports 9 bugs in the system. He/she gets paid. One hour later other hacker reports 6 bugs as 1 critical, 2 high and 3 low.

Will he be paid? Or he should not report as bug bounty is closed?

The question from @Maxicripto is also relevant. Why are we here? Just because of decentralize-trustless environment. Where law of code works not trust. In the Hacken platform we have to trust the negotiation servers and at the end humans. So first they have to be decentralize one way or another. But in my opinion it is technically impossible for a code to negotiate between real parties in the current scenario. So at least information should be encrypted and/or in a vault until client (if code is private) or client and public (if code is public) is satisfied. But my above question is still valid.

Regards,

Lalit
sud
Sr. Member
****
Offline Offline

Activity: 252


Spectiv VR Crowdsale: 12/08/17


View Profile
September 10, 2017, 04:53:31 PM
 #70

Good to see all those question aswered with details. I learned a lot about the project thanks to this discussion.


              ▄▄████████████▄▄             
          ▄███▀▀▀░░░░░░░░░░▀▀▀███▄▄        
       ▄██▀▀░░░░░░░░░░░░░░░░░░░░░▀██▄      
     ▄██▀░░░░░░░░░░░░░░░░░░░░░░░░░░▀███    
   ▄██▀░░░░░░░░░░░░░░░▄▄▄▄▄█████████████▄  
  ▄██░░░░░░░░░░░▄▄█████████░░░░░░░░░░░░▀█▌ 
 ▐██░░░░░░░░▄█████▀▀▀▀▀▀▀▀▀████▄░░░░░░░░▀█▌
▐██░░░░░░▄███▀▀███████████████▀▀██▄░░░░░░██▌
████▄░░▄██▀███████▄██████▄████████▀██▄░░░▐██
██░▀████▀██████████████████████████████▄░░██
██░░░▀██▄█████████████████████████▄██▀▀██▄██
██▌░░░░▀███▄████████▀▀▀▀███████▄██▀░░░░░▀███
▐██░░░░░░░▀███▄▄███████████▄▄██▀▀░░░░░░░░██▌
 ▐██░░░░░░░░░░▀▀████████████▀░░░░░░░░░░░▄█▌
  ▀██▄▄▄▄▄▄▄▄▄████████▀▀▀░░░░░░░░░░░░░░▄█▌ 
   ▀███▀▀▀▀▀▀░░░░░░░░░░░░░░░░░░░░░░░░▄██▀  
     ▀██▄░░░░░░░░░░░░░░░░░░░░░░░░░░▄██▀    
       ▀███▄░░░░░░░░░░░░░░░░░░░░▄▄██▀      
          ▀████▄▄░░░░░░░░░░▄▄▄███▀         
              ▀▀▀██████████▀▀▀             

    
                         [ Website ]                    
    
egetrorx
Full Member
***
Offline Offline

Activity: 154



View Profile
September 10, 2017, 11:00:12 PM
 #71

reserving croatian translation

▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬  ●    UTRUST // The FUTURE of Online Payments    ●  ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬        whitepaper     facebook     twitter     slack         ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
Main-ICO | Coming soon...

Senior Member
Code:
Sterben
Member
**
Offline Offline

Activity: 84


View Profile
September 10, 2017, 11:23:23 PM
 #72

Each bug found can be used right against you if the hacker knows what he's doing. Some of the black hat ones doesn't even care about the money they would receive as long as they can taste the power of taking control over things. Just my vision, there is nothing wrong in this project @root
A good opportunity for hackers to find each other in one community don't you think?


Hotachy
Full Member
***
Offline Offline

Activity: 126


View Profile
September 10, 2017, 11:27:40 PM
 #73

Mr. Robot very nice
Very interesting project, want to read WP!

REorEVOLUTION
Jr. Member
*
Offline Offline

Activity: 51


View Profile
September 10, 2017, 11:39:02 PM
 #74

interesting idea. there is certainly a market for it

brownfly
Full Member
***
Offline Offline

Activity: 154


View Profile
September 11, 2017, 01:01:40 AM
 #75

A project is backed by russian and ukrainian teams and without involvement of any major cyber security company. Are you kidding me???
Hacken Project
Member
**
Offline Offline

Activity: 68


View Profile
September 11, 2017, 11:18:33 AM
 #76


Quote
Unreported Zero Day Remuneration Platform will acquire original and previously unreported zero-day research affecting major operating systems, software and devices, e.g. binary vulnerabilities.
The research submitted to Zero Day Remuneration Platform will be available via subscription feed. The access to Zero Day Subscription is now regulated in some jurisdictions and will be limited primarily to vendors and law enforcement agencies. The Platform will be subject to annual audit by one of the major auditing organizations.
Do you really think we will work for several years to acquire reputation and recognition in zero day cybersecurity market, which is very conservative, and then risk it all for a one time profit?

I would not be surprised , in this damn world , a lot of unbelievable things have happed.
However your previous answer to @sonulrk have clarified some aspects to the project...
And by the way , take it easy , we are just asking question to know this project better. I didnt point the finger, i just got posted a doubt that i had, nothing more... Roll Eyes
MaxiCripto, we appreciate your interest and questions. However we putting all our energy  and time to launch this "world changing" service in cyber security, so we're taking it seriously.
Feel free to ask any questions - we are happy to answer them Wink
Hacken Project
Member
**
Offline Offline

Activity: 68


View Profile
September 11, 2017, 01:11:25 PM
 #77

reserving croatian translation
Yes, Croatian language is welcome.

Please send us the overview of your previous translation experience. Use this email address for that - kissngerbounty@gmail.com
Hacken Project
Member
**
Offline Offline

Activity: 68


View Profile
September 11, 2017, 01:20:46 PM
 #78

I could not understand the reason of this project. What is decentralize in it, Hackers or HKN token. What is the need of decentralized in this field? And How will HKN token and decentralization is helpful because of this project. Please elaborate.

If you need Hindi translation and moderation. I can help.

The big idea behind Hacken is that it turns each owner of Hackens into a community member. Because Hacken is a specialized software utility token, being primarily focused on cybersecurity professionals and projects, it will also bring these people together by providing incentives for doing business with one another and for investment in cybersecurity startups. These people will need to communicate and interact with each other in order to make use of their Hackens. The more vibrant the community is, the more value it delivers to each member.

Hacken (HKN) is an ERC20 token, which is the only payment tool allowed in the Hacken Ecosystem. Buying Hackens today, will allow one to receive high quality cybersecurity services in the future, at an attractive price.


Yes, Hindi language is welcome.

Please send us the overview of your previous translation experience. Use this email address for that - kissngerbounty@gmail.com

So, May I say that Hacken is a token to buy-sell cybersecurity services. But how Hacken Ecosystem help security professional and consumer linked with each other? What type of services or products can be distributed through blockchain technology and not by traditional markets.

Yes, you are right!Simply to say -Hacken is a token to buy-sell cybersecurity services.
Here is how Hacken Ecosystem help security professional and consumer linked with each other and about use of blockchain:

We are building platform, that is providing Cebersecurity services, and when clients of our platform sign the bug bounty program agreement, our team creates a relevant blockchain block containing data about the product, the terms of service agreement and a timestamp.
The next block of the chain, which is specific to this client, will contain information on vulnerabilities, discovered during our security research.
Also we will build Cybersecurity Analytics Center, with such areas of research: Blockchain security, vulnerabilities and countermeasures.
All services are charged ONLY in Hackens.



Ok, now the picture is somewhat clearer. Clients will use the Hacken platform and submit their product information and use Hacken Token for payment. I assume that only data related to product is shared on blockchain not the product release and source files itself. Now, if a white hacker find bugs or vulnerabilities where he/she will share this information, on the blockchain or to some centralized servers? Who will authenticate that found bugs etc are relevant and hacker has to be paid for this? And what if other hacker found more bugs in the same product? Will he/she paid again for this?
Thank you for your question - her is answer for it:
Your question consists of a number of separate questions of their own. We answer them in the order in which they are mentioned in your post:
‘I assume that only data related to product is shared on blockchain not the product release and source files itself’
This assumption is correct. We only use blockchain to issue HackenProof Vulnerabilities and Countermeasures Certificate and to prove authenticity of its contents ( number of vulnerabilities was fixed, client reaction) and timestamps. We store no customer sensitive information in the blockchain.
Now, if a white hacker finds bugs or vulnerabilities, where he/she will share this information, on the blockchain or to some centralized servers?
The researcher will share this information to our web portal HackenProof platform via bug bounty participant panel.
Who will authenticate that found bugs etc are relevant and hacker has to be paid for this?
The technical team of the client will investigate the vulnerabilities and determine whether they are relevant. The terms and rules of the bug bounty program will be stipulated by the document called policy.
Policy will contain all the information covering the depth and scope of the work to be performed by the researchers. It will explain to researchers what the customer needs.
We will also use policy as a proof of the customer’s intentions in an unlikely event of conflict between the client and the researcher regarding the relevance of the vulnerability that was discovered. If the client disagrees with our understanding of the policy, the incident will be submitted to the Public Board of Trustees of Hacken Ecosystem for further mediation.
And what if other hacker found more bugs in the same product? Will he/she paid again for this?
We are not sure we understand this question. The bug bounty program can have as many participants as the clients decides. They will be all submitting bug reports, which will be sorted chronologically and grouped by the issues covered.
The purpose of the bug bounty program is to discover as many bugs as possible within the scope determined by the client. Each participant of the bug bounty program gets paid proportionally to the number of bugs discovered, reported and accepted by the client.



Thanks for your detail answer. What is more important is you take every question and answer it. I want to clarify my last question:

Let say a client hire Hacken platform to check its product vulnerability. Client paid bug bounty to Hacken platform to be release to successful candidate. Hacken platform propagate information regarding this project on blockchain. Now assume there are 10 bugs (I know that no body knows about exact number of bugs) with severity: 1 critical, 2 high, 3 low, 2 blocker and 2 trivial. One hacker found all but critical bug. He/she reports 9 bugs in the system. He/she gets paid. One hour later other hacker reports 6 bugs as 1 critical, 2 high and 3 low.

Will he be paid? Or he should not report as bug bounty is closed?

The question from @Maxicripto is also relevant. Why are we here? Just because of decentralize-trustless environment. Where law of code works not trust. In the Hacken platform we have to trust the negotiation servers and at the end humans. So first they have to be decentralize one way or another. But in my opinion it is technically impossible for a code to negotiate between real parties in the current scenario. So at least information should be encrypted and/or in a vault until client (if code is private) or client and public (if code is public) is satisfied. But my above question is still valid.

Regards,

Lalit

 After researcher submit report - the technical team of the client will investigate the vulnerabilities and determine whether they are relevant. The terms and rules of the bug bounty program will be stipulated by the document called Policy.
Policy will contain all the information covering the depth and scope of the work to be performed by the researchers. It will explain to researchers what the customer needs. By default only first researcher who report a vulnerability  receive a reward.
blacktux88
Member
**
Offline Offline

Activity: 98


View Profile WWW
September 11, 2017, 01:30:03 PM
 #79

Dear Community are the offers how tos for white hack guides Huh

thanks

  GETTING LOST IN THE SEA OF CRYPTOCURRENCIES? CHOOSE PLAYKEY TOKEN! 
PLAYKEY.IO ◇  DECENTRALIZED CLOUD GAMING PLATFORM 
[ Website ]  [ Reddit ]  [ Medium ]  [ Twitter ]  [ LinkedIn ]  [ Telegram ]  [ BitcoinTalk ]  [ Facebook ]
Hacken Project
Member
**
Offline Offline

Activity: 68


View Profile
September 11, 2017, 01:48:00 PM
 #80

Each bug found can be used right against you if the hacker knows what he's doing. Some of the black hat ones doesn't even care about the money they would receive as long as they can taste the power of taking control over things. Just my vision, there is nothing wrong in this project @root
A good opportunity for hackers to find each other in one community don't you think?


They already work in groups.
By creating marketplace we want to give white hats opportunity to earn money for their work and a chance to bring benefits to community.
Pages: « 1 2 3 [4] 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 ... 120 »
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!