![]() ![]() ![]() Despite his technical savvy, Cable was at a loss for how to alert the authorities. It suggested that the site was vulnerable to those with less beneficent intentions than his own, that they could read and perhaps even alter databases listing the names and addresses of voters in the country’s third-largest city. Though it wouldn’t have given the average citizen a moment of pause, Cable recognized the error message on the Chicago Board of Elections website as a telltale sign of a gaping hole in its security. He collected enough cash prizes from the bug bounties to cover the costs of four years at Stanford. Cable, who is preternaturally persistent, had a knack for finding these soft spots. The fact that a single keystroke had short-circuited his registration filled Cable with a sense of dread.ĭespite his youth, Cable already enjoyed a global reputation as a gifted hacker-or, as he is prone to clarify, an “ethical hacker.” As a sophomore in high school, he had started participating in “bug bounties,” contests in which companies such as Google and Uber publicly invite attacks on their digital infrastructure so that they can identify and patch vulnerabilities before malicious actors can exploit them. Clicking back to his initial entry, he realized that he had accidentally typed an extraneous quotation mark into his home address. When Cable tried to complete the digital forms, an error message stared at him from his browser. To hear more feature stories, get the Audm iPhone app. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |