The process of development for any new operating system or motherboard chip is extensive, requiring countless hours of refinement. This means solving numerous bugs within the software or product that are causing significant glitches. One of the newest motherboard chips being released in Google’s Titan M chip, which is being designed for the Pixel handset devices. To combat significant issues with the software and product quality of the Chip, Google has announced the newly reformed Android Bug Bounty Reward Program. This program states that anybody who can hack through the Titan M Chip and thoroughly explain the process will receive a reward of up to $1.5 Million. Before the newly reformed program, the highest payout at one time was more than $150 Thousand.
The Google Corporation has paid out more than $1.5 Million to employed hackers throughout the last twelve months. The common glitch or bug found would allow for a $3,800.00 reward to participating individuals. There was an instance where one individual found a massive security loophole, prompting google to award him with $161 thousand in cash funds. It should be noted that Google has maintained an Android Bug Bounty Program since 2010, which have allowed for the regular improvements to handset devices and the Chrome browser.
Why spend more?
There have been many analysts wondering why Google decided to increase its spending limits with the bug bounty program. The reasoning is because private companies operate their programs that have been worth considerably more, at $2.5 Million in total funds. These companies that exploit Google with these found glitches and bugs, demanding more money than they spent acquiring the information. This earns these companies a profit, but costs google far more cash over prolonged periods. Subsequently, this marks the first time that the tech conglomerate has spent more on their bug bounty program than Apple.
There are also executives in the mobile phone industry that claim Google has risen their bounty limits because the skills required to locate these vulnerabilities is getting lower every year. Limitations for viable hackers is prompted because of the bad name that surrounds the profession. However, by making this information public and advertising the program through their various video services, Google can entice numerous individuals to learn the skills acquired to find these bugged glitches. Those choosing to work under this program will need to detail how the glitch was located and how Google’s developers can solve the problem.