{"id":1552,"date":"2009-03-09T14:52:46","date_gmt":"2009-03-09T14:52:46","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=1552"},"modified":"2015-09-09T19:39:00","modified_gmt":"2015-09-09T11:39:00","slug":"google-native-client-securityhacking-contest-win-8192-usd","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2009\/03\/google-native-client-securityhacking-contest-win-8192-usd\/","title":{"rendered":"Google Native Client Security\/Hacking Contest – Win $8,192 USD!"},"content":{"rendered":"

[ad]<\/p>\n

What is Native Client?<\/strong><\/p>\n

Native Client<\/a> is an open-source research technology for running x86 native code in web applications, with the goal of maintaining the browser neutrality, OS portability, and safety that people expect from web apps. We’ve released this project at an early, research stage to get feedback from the security and broader open-source communities. We believe that Native Client technology will someday help web developers to create richer and more dynamic browser-based applications.<\/p>\n

About the contest<\/strong><\/p>\n

Do you think it is impossible to safely run untrusted x86 code on the web? Do you want a chance to impress a panel of some of the top security experts in the world? Then submit an exploit to the Native Client Security Contest<\/a> and you could also win cash prizes, not to mention bragging rights.<\/p>\n

What is the contest<\/strong><\/p>\n

This is a contest with the goal to test the security of Native Client.<\/p>\n

To participate, you will need to:<\/p>\n