Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> parental controls and screen pinning

Will be used in scenarios with much more at stake than someone's belligerent teenager.

Think of these features in the broadest sense you possibly can.



Are you thinking about something specific? What's the scenario where the public harm to a usage control bypass becomes more valuable to an attacker than the bug bounty?

(Edit: <sigh> than the bug bounty that the linked author desires. Really?)

Remember that both of these technologies don't allow the device to do anything it isn't able to do in its default configuration. They're essentially a form of DRM: disallowing otherwise useful activities because of the desires of the owner (and not the user). Would you demand, say, Apple pay a bug bounty for a DRM bypass that let people rip Netflix videos? Probably not, right?


> What's the scenario where the public harm to a usage control bypass becomes more valuable to an attacker than the bug bounty?

Since the bug bounty is zero. All the time?


Or the value of the exploit is zero too.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: