<div dir="ltr"><table width="620" border="0" cellspacing="0" cellpadding="0" align="center" class="gmail-m_-3103111363229047301em_wrapper" style="border-collapse:collapse;font-family:Roboto,RobotoDraft,Helvetica,Arial,sans-serif"><tbody><tr><td align="left" style="border-collapse:collapse;color:rgb(67,67,67);padding-top:10px"><p class="gmail-m_-3103111363229047301em_font1" style="font-family:"Helvetica Neue",Helvetica,Arial,sans-serif;font-size:14px;line-height:24px;margin:0px;padding:0px">A vigilante hacker <a href="http://l.ranenetwork.com/wf/click?upn=bF0YxMxX-2Fcb0Z-2BoslcRaT4n9IZ66XaxaXDHyHK9lbjJ6ngtjqRSL32GPbx4b4z-2Fgw3sut-2FG88V2U0ZrAus7JSYCboW71YJyE1LxXKZeC4-2F1seqXqjDoyeksvasCA1v9qeEYjsCX08elEQvUiL6CX0Fy56N-2By3PB3qTGX47RifYRWPiHBYhK3yTYzizykLMHr_mWlsQqCrp-2FzztTA70tnsIRIstzV2oe5LcVnwFoOpzKQN2KILYmijYYaUiF8Ddf4uiVvwXwHcrQcaNWKlWpNR6j0ibfRy1aMnVx8J2mjTP8a99X5lBlpMi5zahvKwDehROcurkOuJn0J-2F8BGjbDWzlrqYAL9Zp0ZTHU9EReBYr5EvO28rNbvZmWout2lV39VVWRP2uUfDDYUTqNN9c5gwTokBFAAla2trdL7ludd4wqlxWJYF5YDXHkzs0iEazio1t63gi56RUbBPXJm1cxXCFActfwDN-2BAN3K3vsUOcvI4HnhVkMRv8cYNoOjsqnjx9i1d7sdE3EzUhnoEZ5SRrvyk0k2-2F9z5T55Kt5xYRNxIT3tu6DnZ8mCyK8-2BMBFvppWg5dq2wAUNa2R5sCK8APDX-2BNfXN-2FU3DthTIHQA0emI2E7HBH-2F9pe4dYNVpl65ef2jWbRoKQuW1Gtz-2Bq77t2VanFg-3D-3D" rel="noopener noreferrer nofollow" target="_blank" style="color:rgb(44,173,216);border-collapse:collapse;font-weight:700;text-decoration-line:none">known for their hits on surveillance companies is launching a $100,000 bug bounty</a> to reward hackers who expose documents in the public interest, <em>Vice</em> reports. Phineas Fisher’s manifesto for the “Hacktivist Bug Hunting Program” promises to pay for attacks on companies such as mining and livestock concerns in South America, Israeli spyware vendor NSO Group, and oil company Halliburton. Most bug bounty programs are run by companies who want to encourage security researchers to find bugs in their software, but this one explicitly encourages criminal activities — albeit with the aim of doing good. The manifesto says hacking “to obtain and leak documents with public interest is one of the best ways for hackers to use their abilities to benefit society.” Phineas Fisher has conducted hacktivist campaigns against British-German surveillance vendor Gamma Group and the Hacking Team, an Italian company that made hacking and surveillance software for police and intelligence agencies around the world, among other targets, though their identity has never been revealed.</p><p class="gmail-m_-3103111363229047301em_font1" style="font-family:"Helvetica Neue",Helvetica,Arial,sans-serif;font-size:14px;line-height:24px;margin:0px;padding:0px"></p></td></tr><tr><td align="left" style="border-collapse:collapse;padding-top:12px"><table border="0" cellspacing="0" cellpadding="0" align="left" style="border-collapse:collapse"><tbody><tr><td align="left" style="font-family:"Helvetica Neue",Arial,sans-serif;border-collapse:collapse;letter-spacing:1.5px;font-size:10px;line-height:15px;color:rgb(68,74,82)">READ</td><td width="5" style="border-collapse:collapse;font-size:0px;line-height:0"></td><td align="left" style="font-family:"Helvetica Neue",Arial,sans-serif;border-collapse:collapse;font-size:12px;line-height:15px;color:rgb(44,173,216);letter-spacing:1px"><a href="http://l.ranenetwork.com/wf/click?upn=bF0YxMxX-2Fcb0Z-2BoslcRaT4n9IZ66XaxaXDHyHK9lbjJ6ngtjqRSL32GPbx4b4z-2Fgw3sut-2FG88V2U0ZrAus7JSYCboW71YJyE1LxXKZeC4-2F1seqXqjDoyeksvasCA1v9qeEYjsCX08elEQvUiL6CX0Fy56N-2By3PB3qTGX47RifYRWPiHBYhK3yTYzizykLMHr_mWlsQqCrp-2FzztTA70tnsIRIstzV2oe5LcVnwFoOpzKQN2KILYmijYYaUiF8Ddf4uiVvwXwHcrQcaNWKlWpNR6j0ibfRy1aMnVx8J2mjTP8a99X5lBlpMi5zahvKwDehROcurkOuJn0J-2F8BGjbDWzlrqYAL9Zp0ZTHU9EReBYr5EvO28rNbvZmWout2lV39VVWRP2uUfDDYUTqNN9c5gwTokBFAAla2trdL7ludd4wqlxWJYF5YDXHkzs0iEazio1AJMVhSITQcsQW4ZksgqyR0lV9Xrb13w2O7SkuF5H1TtU3uODizhGh-2BGm-2FBGD0skZOynrNzUCzcqPOqFxIJhtsSskTXbgsbIFotOHl-2BTCXCXf1hwyQRxrly31dshCqxp3SGcC7VEeGq6wTh3Dw4fTPSrprFAPZ1vGw32xlUyqjr0mlIpGwopD4fKpCFx8zs1eChDTW8mXTwxcmVJtGiZA8w-3D-3D" target="_blank" style="color:rgb(44,173,216);border-collapse:collapse;text-decoration-line:none">Vice <img align="top" src="https://img.rskbk.co/link.png" width="11" height="11" border="0" class="gmail-CToWUd" style="margin-top: 1px; border: 0px; outline: 0px;"></a></td></tr></tbody></table></td></tr><tr><td class="gmail-m_-3103111363229047301em_social_icon" style="border-collapse:collapse;text-align:right;padding-top:20px"><table border="0" cellspacing="0" cellpadding="0" style="border-collapse:collapse;display:inline"><tbody><tr></tr></tbody></table></td></tr></tbody></table></div>