
Best Password Manager for Small Business. How to Access the Deep Web and the Dark Net. Online Storage or Online Backup: What's The Difference?. Time Machine vs Arq vs Duplicati vs Cloudberry Backup. Permanently delete files so that they are not available in the version history and bypass the 30 day, 1 year or forever file retention policies. Demonstrate a way to delete files prior to the object lock expiration. Bypass Backblaze's enhanced ransom ware protection and break object lock. Special Rewards & Bonuses ($15k Reward)īackblaze is offering a special $15k reward for any researcher that is able to In any instance where an issue is downgraded, a full, detailed explanation will be provided to the researcher - along with the opportunity to appeal, and make a case for a higher priority. However, it is important to note that in some cases a vulnerability priority will be modified due to its likelihood or impact. This does not constitute a waiver of any rights Backblaze may otherwise have under applicable laws.įor the initial prioritization/rating of findings, this program will use the Bugcrowd Vulnerability Rating Taxonomy. Any offender of this non-disclosure policy shall be removed from the program, shall repay any rewards payment to Backblaze, and shall be subject to the Bugcrowd policies and guidelines on Bugcrowd’s sites, including but not limited to the Bugcrowd Code of Conduct.
You may not release information about vulnerabilities found in this program to the public or anyone other than Backblaze. Please note: This program does not allow disclosure at any time, even after you leave the program.
Good luck, and happy hunting! Non-Disclosure We are excited for you to participate as a security researcher to help us identify vulnerabilities in our assets. No technology is perfect and Backblaze believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology.