This site may earn chapter commissions from the links on this page. Terms of use.

Android has a reputation for poor security, only that'south a event of past failings. Almost security flaws you hear almost now bear on erstwhile builds of the OS, or require clever social engineering science to get the user to weaken device security. The versions of Android being released now are vastly more secure than what Google was putting out years ago. In fact, no ane has managed to claim Google's largest bug bounties for Android. And so, the company is increasing the rewards to every bit much as $200,000.

Google started the issues bounty program for Android almost two years ago. Information technology works just like other bug bounties the company has used for other products. Security researchers who can demonstrate an exploit get a greenbacks prize, the amount of which varies based on the severity of the hack. So, Google gets to fix the bug and avoid future security issues. All the same, no one has submitted a working exploit for Android's cadre components, even when such an exploit is worth $30,000-$50,000. Then, by increasing the reward, Google hopes it will concenter more researchers and engineers to the problems bounty program.

The increases reward applies to two bounties; ane for vulnerabilities in TrustZone or Verified Boot, and the other for a remote kernel exploit. Android is based on the Linux kernel, which has given the platform peachy flexibility over the years. Nonetheless, the Linux kernel also comes with baggage. It has been the cause of several significant security breaches known as remote kernel exploits. An example of this would exist the TowelRoot exploit, which could exist used by users to proceeds root on a device. Of form, hackers could also use remote kernel exploits like that to infiltrate devices and steal data. The bounty for a new remote kernel exploit has gone upward to $150,000 from $30,000.

Verified Kicking process.

Google considers a flaw in TrustZone or Verified Boot to be an even more serious affair. TrustZone is actually an ARM technology related to the SoC inside your device. Information technology ensures that biometric data (fingerprints), DRM, and boot settings are kept in a trusted secure environment. That'south all data you definitely don't want exposed to hackers. Verified Boot was introduced in Android 4.four KitKat as a mode to make sure system software has not been tampered with each time a device starts up. Devices on Android 6.0 and higher actually alarm the user to problems with Verified Kick. An exploit that can silently alter the system would be a big problem. Google has increased the bounty for both TrustZone and Verified Boot from $50,000 to $200,000.

Google will probably increase the rewards yet once again if this still doesn't result in a valid report. Eventually information technology'll be worth the fourth dimension for someone to put in the necessary effort to uncover a new bug. Later on all, no software is perfect.

Now read: 25 Best Android Tips to Brand Your Telephone More than Useful