Goto

Collaborating Authors

 bounty


A 10K Bounty Awaits Anyone Who Can Hack Ring Cameras to Stop Sharing Data With Amazon

WIRED

The Fulu Foundation, a nonprofit that pays out bounties for removing user-hostile features, is hunting for a way to keep Ring cameras from sending data to Amazon--without breaking the hardware. Usually, when you see a feel-good story about finding a lost dog, you don't immediately react with fear and revulsion. But that was indeed the case in response to a Super Bowl commercial from Amazon-owned security camera company Ring. There's now a group offering to dole out a $10,000 bounty to wrest back control of the user data Ring controls. The ad showed off a new feature from Ring called Search Party.


I Tried RentAHuman, Where AI Agents Hired Me to Hype Their AI Startups

WIRED

Rather than offering a revolutionary new approach to gig work, RentAHuman is filled with bots that just want me to be another cog in the AI hype machine. I'm not above doing some gig work to make ends meet. In my life, I've worked snack food pop-ups in a grocery store, ran the cash register for random merch booths, and even hawked my own plasma at $35 per vial. So, when I saw RentAHuman, a new site where AI agents hire humans to perform physical work in the real world on behalf of the virtual bots, I was eager to see how these AI overlords would compare to my past experiences with the gig economy. Launched in early February, RentAHuman was developed by software engineer Alexander Liteplo and his cofounder, Patricia Tani.


Inside the marketplace powering bespoke AI deepfakes of real women

MIT Technology Review

New research details how Civitai lets users buy and sell tools to fine-tune deepfakes the company says are banned. Civitai--an online marketplace for buying and selling AI-generated content, backed by the venture capital firm Andreessen Horowitz--is letting users buy custom instruction files for generating celebrity deepfakes. Some of these files were specifically designed to make pornographic images banned by the site, a new analysis has found. The study, from researchers at Stanford and Indiana University, looked at people's requests for content on the site, called "bounties." The researchers found that between mid-2023 and the end of 2024, most bounties asked for animated content--but a significant portion were for deepfakes of real people, and 90% of these deepfake requests targeted women. The debate around deepfakes, as illustrated by the recent backlash to explicit images on the X-owned chatbot Grok, has revolved around what platforms should do to block such content.


This Group Pays Bounties to Repair Broken Devices--Even If the Fix Breaks the Law

WIRED

Fulu sets repair bounties on consumer products that employ sneaky features that limit user control. Just this week, it awarded more than $10,000 to the person who hacked the Molekule air purifier. Companies tend to be rather picky about who gets to poke around inside their products. Manufacturers sometimes even take steps that prevent consumers from repairing their device when it breaks, or modifying it with third-party products. But those unsanctioned device modifications have become the raison d'être of a bounty program set up by a nonprofit called Fulu, or Freedom from Unethical Limitations on Users.


BountyBench: Dollar Impact of AI Agent Attackers and Defenders on Real-World Cybersecurity Systems

Zhang, Andy K., Ji, Joey, Menders, Celeste, Dulepet, Riya, Qin, Thomas, Wang, Ron Y., Wu, Junrong, Liao, Kyleen, Li, Jiliang, Hu, Jinghan, Hong, Sara, Demilew, Nardos, Murgai, Shivatmica, Tran, Jason, Kacheria, Nishka, Ho, Ethan, Liu, Denis, McLane, Lauren, Bruvik, Olivia, Han, Dai-Rong, Kim, Seungwoo, Vyas, Akhil, Chen, Cuiyuanxiu, Li, Ryan, Xu, Weiran, Ye, Jonathan Z., Choudhary, Prerit, Bhatia, Siddharth M., Sivashankar, Vikram, Bao, Yuxuan, Song, Dawn, Boneh, Dan, Ho, Daniel E., Liang, Percy

arXiv.org Artificial Intelligence

AI agents have the potential to significantly alter the cybersecurity landscape. Here, we introduce the first framework to capture offensive and defensive cyber-capabilities in evolving real-world systems. Instantiating this framework with BountyBench, we set up 25 systems with complex, real-world codebases. To capture the vulnerability lifecycle, we define three task types: Detect (detecting a new vulnerability), Exploit (exploiting a given vulnerability), and Patch (patching a given vulnerability). For Detect, we construct a new success indicator, which is general across vulnerability types and provides localized evaluation. We manually set up the environment for each system, including installing packages, setting up server(s), and hydrating database(s). We add 40 bug bounties, which are vulnerabilities with monetary awards from \$10 to \$30,485, covering 9 of the OWASP Top 10 Risks. To modulate task difficulty, we devise a new strategy based on information to guide detection, interpolating from identifying a zero day to exploiting a given vulnerability. We evaluate 10 agents: Claude Code, OpenAI Codex CLI with o3-high and o4-mini, and custom agents with o3-high, GPT-4.1, Gemini 2.5 Pro Preview, Claude 3.7 Sonnet Thinking, Qwen3 235B A22B, Llama 4 Maverick, and DeepSeek-R1. Given up to three attempts, the top-performing agents are Codex CLI: o3-high (12.5% on Detect, mapping to \$3,720; 90% on Patch, mapping to \$14,152), Custom Agent: Claude 3.7 Sonnet Thinking (67.5% on Exploit), and Codex CLI: o4-mini (90% on Patch, mapping to \$14,422). Codex CLI: o3-high, Codex CLI: o4-mini, and Claude Code are more capable at defense, achieving higher Patch scores of 90%, 90%, and 87.5%, compared to Exploit scores of 47.5%, 32.5%, and 57.5% respectively; while the custom agents are relatively balanced between offense and defense, achieving Exploit scores of 17.5-67.5% and Patch scores of 25-60%.


Apple offers 1 million bounty to anyone who can hack its new AI system

Daily Mail - Science & tech

Apple is willing to bet big on the safety of Apple Intelligence, so much that the tech giant has offered up to a 1 million bounty to anyone who can hack it. The company announced Thursday that it's inviting'all security researchers - or anyone with interest and a technical curiosity' to perform'their own independent verification of our claims.' The public has been challenged to test the security of'Private Cloud Compute,' the servers that will receive and process user requests for Apple Intelligence when the AI task is too complex for on-device processing. The system, according to Apple, features end-to-end encryption and immediately deletes a user's request once the task is fulfilled. There are different payouts for certain discoveries, but the 1 million goes to anyone who can run code on the system without being detected and accessing sensitive parts.


To Err is AI : A Case Study Informing LLM Flaw Reporting Practices

McGregor, Sean, Ettinger, Allyson, Judd, Nick, Albee, Paul, Jiang, Liwei, Rao, Kavel, Smith, Will, Longpre, Shayne, Ghosh, Avijit, Fiorelli, Christopher, Hoang, Michelle, Cattell, Sven, Dziri, Nouha

arXiv.org Artificial Intelligence

In August of 2024, 495 hackers generated evaluations in an open-ended bug bounty targeting the Open Language Model (OLMo) from The Allen Institute for AI. A vendor panel staffed by representatives of OLMo's safety program adjudicated changes to OLMo's documentation and awarded cash bounties to participants who successfully demonstrated a need for public disclosure clarifying the intent, capacities, and hazards of model deployment. This paper presents a collection of lessons learned, illustrative of flaw reporting best practices intended to reduce the likelihood of incidents and produce safer large language models (LLMs). These include best practices for safety reporting processes, their artifacts, and safety program staffing.


Popular AI platform introduces rewards system to encourage deepfakes of real people

Engadget

Civitai, an online marketplace for sharing AI models, just introduced a new feature called "bounties" to encourage its community to develop passable deepfakes of real people, as originally reported by 404 Media. Whoever concocts the best AI model gets a virtual currency called "Buzz" that users can buy with actual money. Many of the bounties posted to the site ask users to recreate the likeness of celebrities and social media influencers, most of them female. The reporting also calls out the lion's share of these results as "nonconsensual sexual images." This is the kind of thing that has been proliferating across the internet for years and years, but artificial intelligence allows for a more realistic end result.


Bound by the Bounty: Collaboratively Shaping Evaluation Processes for Queer AI Harms

QueerInAI, Organizers of, Dennler, Nathan, Ovalle, Anaelia, Singh, Ashwin, Soldaini, Luca, Subramonian, Arjun, Tu, Huy, Agnew, William, Ghosh, Avijit, Yee, Kyra, Peradejordi, Irene Font, Talat, Zeerak, Russo, Mayra, Pinhal, Jess de Jesus de Pinho

arXiv.org Artificial Intelligence

Bias evaluation benchmarks and dataset and model documentation have emerged as central processes for assessing the biases and harms of artificial intelligence (AI) systems. However, these auditing processes have been criticized for their failure to integrate the knowledge of marginalized communities and consider the power dynamics between auditors and the communities. Consequently, modes of bias evaluation have been proposed that engage impacted communities in identifying and assessing the harms of AI systems (e.g., bias bounties). Even so, asking what marginalized communities want from such auditing processes has been neglected. In this paper, we ask queer communities for their positions on, and desires from, auditing processes. To this end, we organized a participatory workshop to critique and redesign bias bounties from queer perspectives. We found that when given space, the scope of feedback from workshop participants goes far beyond what bias bounties afford, with participants questioning the ownership, incentives, and efficacy of bounties. We conclude by advocating for community ownership of bounties and complementing bounties with participatory processes (e.g., co-creation).


Florida man wins women's poker tournament, sparks debate over male inclusion in female sporting events

FOX News

Fox News Flash top sports headlines are here. Check out what's clicking on Foxnews.com. A Florida man drew ire over the weekend when he entered and won a women's poker tournament at the Seminole Hard Rock Hotel & Casino in the Sunshine State. Dave Hughes, 70, entered the $250 no-limit Texas Hold'em event with a prize pool of up to $17,450. Of the 83 competitors to enter the tournament, 82 of them were women, and the last one was Hughes.