{"id":180,"date":"2018-11-02T16:01:37","date_gmt":"2018-11-02T15:01:37","guid":{"rendered":"http:\/\/blog.unifr.ch\/cva\/?p=180"},"modified":"2018-11-02T16:01:37","modified_gmt":"2018-11-02T15:01:37","slug":"the-practice-of-vulnerability-disclosure","status":"publish","type":"post","link":"https:\/\/blog.unifr.ch\/cva\/2018\/11\/02\/the-practice-of-vulnerability-disclosure\/","title":{"rendered":"The practice of vulnerability disclosure"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img alt=\"\"\/><\/figure>\n\n\n\n<p>\n\nComputer vulnerability disclosures can take various forms. They are complex social processes composed of several steps and are highly sensitive in nature. They can lead to legal actions against the security researchers who discovery the vulnerability, compromise the reputation of the vendors who are asked to \u201cpatch\u201d their products and of course, they can temporarily increase the vulnerability of computer systems and even compromise the data of millions of users. We are interested in researching the socio-cultural organization and negotiation of these disclosures over the last several years to highlight the socio-technical and ethical dynamics in the computer security arena that includes security researchers, vendors and various intermediaries.\n\n<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Computer vulnerability disclosures can take various forms. They are complex social processes composed of several steps and are highly sensitive in nature. They can lead &hellip; <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"image","meta":[],"categories":[1],"tags":[],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/blog.unifr.ch\/cva\/wp-json\/wp\/v2\/posts\/180"}],"collection":[{"href":"https:\/\/blog.unifr.ch\/cva\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.unifr.ch\/cva\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.unifr.ch\/cva\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.unifr.ch\/cva\/wp-json\/wp\/v2\/comments?post=180"}],"version-history":[{"count":1,"href":"https:\/\/blog.unifr.ch\/cva\/wp-json\/wp\/v2\/posts\/180\/revisions"}],"predecessor-version":[{"id":181,"href":"https:\/\/blog.unifr.ch\/cva\/wp-json\/wp\/v2\/posts\/180\/revisions\/181"}],"wp:attachment":[{"href":"https:\/\/blog.unifr.ch\/cva\/wp-json\/wp\/v2\/media?parent=180"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.unifr.ch\/cva\/wp-json\/wp\/v2\/categories?post=180"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.unifr.ch\/cva\/wp-json\/wp\/v2\/tags?post=180"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}