Google Will Pay $100k if You Can Hack a Chromebook

Google has put up a $100,000 reward for anyone who can hack a Chromebook virtually via the web.

The motion doubles last year’s top reward of $50,000, which was exclusively for hacking that effects long-term use in guest-mode.

For Chromebooks, guest mode is designed to completely erase all history and cookies upon the conclusion of the session.

Google noted that, even after dangling a weighty prize over hackers’ heads, no one managed to bite. Not once have they received a successful submission.

Google has only recently raised its rewards for those who disclose their knowledge about the weaknesses within the technology. However, it has again increased its bug bounties, especially around cross-site scripting flaws, “That said, great research deserves great awards, so we’re putting up a standing six-figure sum, available all year round with no quotas and no maximum reward pool,” Google security team members said.

According to Google’s rewards page: “We have a standing $100,000 reward for participants who can compromise a Chromebook or Chromebox with device persistence in guest mode, ie, guest-to-guest persistence with interim reboot, delivered via a web page.”

Google has previously offered substantially more for the similar attacks on Chromebooks at the Pwnium hacking contest, but that competition was in one day as opposed to throughout the year.

Attacks on Chromebooks accounted for none of the $2million that Google dished out the researchers last year, and they hope to pique interest among hackers with these new prizes.

According to ZDNET, Google has also “broadened its bounty program to include attacks on its Safe Browsing technology,” which protects chrome users from viruses and other malware.

The new bounty, Download Protection Bypass, offers up to $1,000 for reports that bypass the feature, which is supposed to be triggered whenever a malicious or unknown website surfaces.

Google is more likely to reward those who can sneak a binary into a location such as the Downloads folder where a user is more likely to execute it.

Screen Shot 2016-03-16 at 5.44.47 PM

Check Also

Pikachu parade dance during Pokemon World Festival 2017

A Pikachu Mascot Made a Scene After Deflating Twice During Dance Parade

The Pokemon World Festival 2017, which transpired last week at Songdo, South Korea, has made an unexpected scene as one Pikachu mascot deflated not just once but twice during its parade dance.