It was to be the easy transition — a browser had been selected, replacing the old worries of Explorer, defying the virus concerns. You were assured Firefox could be the solution. All precautions were embedded. and encryption services were to be available. There was no need for panic. The program was safe.
Now, however, you aren’t so sure.
Because a weakness has been discovered: a tiny line of broken code, the numbers not yet bracketed. You find this, knowing what it could potentially bring — the malware invasions and hacker trials. Mozilla must be alerted and so you offer proof of the problem, expect it to simply be fixed.
It is and you are then given a reward.
Firefox is an uncommon application. While the browser delivers the most modern security measures, including firewalls, sandboxing, transport layers and more, it still recognizes the potential failings of its codes. There can — after all — be no guarantee of perfection. Human error is an all too simple thing. And so it calls for its users to discover any possible problems, providing them with a Bug Bounty if they succeed.
As the name implies, a Bug Bounty is a cash prize offered to those who can find malfunctions in the system. Remote exploits, when uncovered, must be reported. If they are proven to be valid, the one that noted them will be given $3,000, as well as recognition by the Mozilla team.
This sparks the involvement of all individuals, encouraging them to seek out every strand of code, dissecting it for any flaws. Through a peer network Firefox can be strengthened quickly; not suffering from the lagging fixes other browsers must endure. The process is instead efficient, with all users able to be involved. This ensures security and immediacy.
Mozilla is not the standard server. It is instead a reflection of all who rely on it and the results are wanted.