Certain knowledge has value precisely because it is not widely held. We maintain research programs focused on the identification and analysis of security weaknesses in systems of consequence. What follows from discovery depends on circumstance.
The asymmetry between discovery and defense creates markets—acknowledged or otherwise. Every significant vulnerability exists within an ecosystem of competing interests: those who would exploit, those who would defend, and those who determine which path serves broader objectives.
We do not subscribe to ideological positions on disclosure. Rigid frameworks serve rigid situations. The responsible handling of security research requires judgment applied to specific circumstances, not adherence to policies designed for different contexts.
Our work exists at intersections that some prefer not to acknowledge. This positioning is deliberate.
We accept submissions from researchers with original findings. Evaluation is based on criteria that include but are not limited to: technical merit, exploitation reliability, scope of affected systems, and factors not detailed publicly.
Compensation structures exist. Terms are determined case-by-case. Initial contact should include sufficient technical detail for preliminary assessment without full disclosure. Secure communication is expected.
Submissions involving unauthorized access to systems not owned by the researcher, research obtained through illegal means, or capabilities intended for use against specifically prohibited targets are declined without review.
Access your security dashboard and reports