  {"id":17295,"date":"2016-11-18T01:38:05","date_gmt":"2016-11-18T06:38:05","guid":{"rendered":"https:\/\/digital.hbs.edu\/platform-rctom\/submission\/hackerone-helping-good-guys-protect-the-internet-from-pornhub-to-pentagon\/"},"modified":"2020-08-07T12:06:51","modified_gmt":"2020-08-07T16:06:51","slug":"good-guys-protecting-the-internet-from-pornhub-to-the-pentagon","status":"publish","type":"hck-submission","link":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/good-guys-protecting-the-internet-from-pornhub-to-the-pentagon\/","title":{"rendered":"Good Guys Protecting the Internet, From Pornhub To The Pentagon"},"content":{"rendered":"<p><strong>Why Security Matters<\/strong><\/p>\n<p>In just one day, we create 2.5 quintillion bytes of data.<a href=\"#_ftn1\" name=\"_ftnref1\">[1]<\/a> A lot of this data is data we don\u2019t want others to know, like our bank account information, stuff we say behind our boss\u2019 back, or whom we are having affairs with. Yet we are bombarded with continuous streams of security breach horror stories such as 40 million Target shoppers getting their credit card information stolen, personally identifiable information of 78.8 million insurance policy holders floating around, and the whole world reading Sony producers\u2019 evaluation of Angelina Jolie: \u201ca minimally talented spoiled brat.\u201d <a href=\"#_ftn2\" name=\"_ftnref2\">[2]<\/a> <a href=\"#_ftn3\" name=\"_ftnref3\">[3]<\/a> <a href=\"#_ftn4\" name=\"_ftnref4\">[4]<\/a> Whether it\u2019s embarrassing or hilarious, a security breach often leads to lawsuits and has unfathomably heavy cost to company and its customers. Naturally, cybersecurity is becoming a priority for everyone.<\/p>\n<p><figure id=\"attachment_17307\" aria-describedby=\"caption-attachment-17307\" style=\"width: 417px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/jolie.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-17307 \" src=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/jolie-300x169.jpg\" alt=\"jolie\" width=\"417\" height=\"235\" srcset=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/jolie-300x169.jpg 300w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/jolie-768x433.jpg 768w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/jolie-600x338.jpg 600w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/jolie.jpg 928w\" sizes=\"auto, (max-width: 417px) 100vw, 417px\" \/><\/a><figcaption id=\"caption-attachment-17307\" class=\"wp-caption-text\">[1] Jolie and Pascal post Sony Hack. Awkward&#8230;<\/figcaption><\/figure><strong>Is Cyber Security\u00a0Rocket Science?<\/strong><\/p>\n<p>Guarding a website against hackers is incomparably more challenging and complicated than keeping burglars out of a house. Unlike a house, with a door and few windows, a digital property has a host of access points. Most digital property is also in continuous development; with new features and improvements, the product is always shapeshifting. Because developing and maintaining a product involve so many parties, including some third party APIs, it\u2019s hard to know what exactly is a product.<\/p>\n<p><strong>Bug Bounty: There are Good Guys Out There\u00a0<\/strong><\/p>\n<p>In as early as 1995, big companies like Netscape figured out a way to reduce the risk of getting hacked: placing a bounty on a bug. <a href=\"#_ftn5\" name=\"_ftnref5\">[5]<\/a> \u00a0Although it sounds like an oxymoron, well-intended hackers exist. Companies can pay these <em>white hat hackers<\/em>\u2014engineers who are skilled enough to find weaknesses but are not malicious enough to exploit them and commit crimes\u2014to test and identify vulnerabilities on their systems. Unfortunately, bug bounty did not pick up for a while because trust between companies and hackers, even ones whose intentions are good, was hard to establish.<\/p>\n<p><strong>HackerOne\u00a0<\/strong><\/p>\n<p>HackerOne founders, Prins and Abma, were aforementioned white hat hackers who enjoyed hacking websites, but did not want to become criminals, and in fact thought about how companies could fix their vulnerabilities.<a href=\"#_ftn6\" name=\"_ftnref6\">[6]<\/a> Seeing how difficult it was for white hat hackers and companies to establish trust and interact, Prins and Abma built a platform connecting companies and hackers. (From now on, \u201chackers\u201d will be referred to as the PC synonym, security researchers.)<\/p>\n<p>By putting monetary value on bugs, HackerOne incentivizes security researchers to take the time to find loopholes and report them to the companies instead of using them for criminal activities. Companies can communicate and transact with security researchers through HackerOne, vetting vulnerability submissions, paying researchers, and building solutions together. Implications of white hat researchers protecting companies against the black hats, the bad guys, are far reaching: we can make the internet great again.<\/p>\n<p><figure id=\"attachment_20822\" aria-describedby=\"caption-attachment-20822\" style=\"width: 395px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Screen-Shot-2016-11-19-at-8.06.25-PM.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-20822\" src=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Screen-Shot-2016-11-19-at-8.06.25-PM-300x152.png\" alt=\"[2] Pornhub's listing on HackerOne\" width=\"395\" height=\"200\" srcset=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Screen-Shot-2016-11-19-at-8.06.25-PM-300x152.png 300w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Screen-Shot-2016-11-19-at-8.06.25-PM-768x390.png 768w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Screen-Shot-2016-11-19-at-8.06.25-PM-600x305.png 600w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Screen-Shot-2016-11-19-at-8.06.25-PM.png 980w\" sizes=\"auto, (max-width: 395px) 100vw, 395px\" \/><\/a><figcaption id=\"caption-attachment-20822\" class=\"wp-caption-text\">[2] Pornhub&#8217;s listing on HackerOne<\/figcaption><\/figure><figure id=\"attachment_20820\" aria-describedby=\"caption-attachment-20820\" style=\"width: 386px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Screen-Shot-2016-11-19-at-7.59.30-PM.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-20820\" src=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Screen-Shot-2016-11-19-at-7.59.30-PM-241x300.png\" alt=\"[3] PornHub's bounty price list on HackerOne\" width=\"386\" height=\"480\" srcset=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Screen-Shot-2016-11-19-at-7.59.30-PM-241x300.png 241w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Screen-Shot-2016-11-19-at-7.59.30-PM-482x600.png 482w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Screen-Shot-2016-11-19-at-7.59.30-PM.png 682w\" sizes=\"auto, (max-width: 386px) 100vw, 386px\" \/><\/a><figcaption id=\"caption-attachment-20820\" class=\"wp-caption-text\">[3] Pornhub&#8217;s bounty price list<\/figcaption><\/figure><strong>An Unconventional Client List<\/strong><\/p>\n<p>Unsurprisingly, big tech companies like Facebook, Google, Uber have flocked over to start bug bounty programs on HackerOne, inviting white hat researchers to poke around their assets. In 100 days, Uber has paid $345,120 and fixed 161 unique vulnerabilities.<a href=\"#_ftn7\" name=\"_ftnref7\">[7]<\/a> This July, three security researchers made $22,000 from identifying a serious weakness from PornHub.<a href=\"#_ftn8\" name=\"_ftnref8\">[8]<\/a> The researchers never clarified why they were on Pornhub in the first place, but they did help protect the identities of Pornhub\u2019s 60 millions daily visitors. Even the Department of Defense recently hired HackerOne and have paid out $150,000 to \u201cHack the Pentagon\u201d, a productive campaign that would have cost $1M if they had hired a contractor.<a href=\"#_ftn9\" name=\"_ftnref9\">[9]<\/a><\/p>\n<p><figure id=\"attachment_20821\" aria-describedby=\"caption-attachment-20821\" style=\"width: 499px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Screen-Shot-2016-11-19-at-8.02.18-PM.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-20821\" src=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Screen-Shot-2016-11-19-at-8.02.18-PM-300x225.png\" alt=\"[3] Recent Bug Submissions on HackerOne\" width=\"499\" height=\"374\" srcset=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Screen-Shot-2016-11-19-at-8.02.18-PM-300x225.png 300w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Screen-Shot-2016-11-19-at-8.02.18-PM-768x576.png 768w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Screen-Shot-2016-11-19-at-8.02.18-PM-600x450.png 600w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Screen-Shot-2016-11-19-at-8.02.18-PM.png 971w\" sizes=\"auto, (max-width: 499px) 100vw, 499px\" \/><\/a><figcaption id=\"caption-attachment-20821\" class=\"wp-caption-text\">[4] Recent Bug Submissions on HackerOne<\/figcaption><\/figure><strong>What\u2019s Next?<\/strong><\/p>\n<p>While companies like HackerOne provide researchers to stress test assets in the internet, I think a natural next step lies in physical assets. HackerOne resolved the issue of mistrust between researchers and companies and created a marketplace for bug discovery. If they were able to expand the scope of bug bounty to physical assets such as data warehouses or company sites, to prevent mischievous practices like tailgating or malicious USB sticks, I think companies would be able to enjoy added layers of security in their often neglected offline assets on top of online assets.<\/p>\n<p>&nbsp;<\/p>\n<p>(Word count: 793)<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\">[1]<\/a> &#8220;Bringing Big Data to the Enterprise.&#8221; IBM. Accessed November 17, 2016. https:\/\/www.ibm.com\/software\/data\/bigdata\/what-is-big-data.html.<\/p>\n<p><a href=\"#_ftnref2\" name=\"_ftn2\">[2]<\/a> Pagliery, Jose., Riley, Charles. &#8220;Target Will Pay Hack Victims $10 Million.&#8221; CNNMoney. Accessed November 17, 2016. http:\/\/money.cnn.com\/2015\/03\/19\/technology\/security\/target-data-hack-settlement\/index.html.<\/p>\n<p><a href=\"#_ftnref3\" name=\"_ftn3\">[3]<\/a> Elkind, Peter. &#8220;Sony Pictures: Inside the Hack of the Century.&#8221; Fortune. June 25, 2015. Accessed November 17, 2016. http:\/\/fortune.com\/sony-hack-part-1\/.<\/p>\n<p><a href=\"#_ftnref4\" name=\"_ftn4\">[4]<\/a> Mathews, Anna. &#8220;Anthem: Hacked Database Included 78.8 Million People.&#8221; WSJ. February 24, 2015. Accessed November 17, 2016. http:\/\/www.wsj.com\/articles\/anthem-hacked-database-included-78-8-million-people-1424807364.<\/p>\n<p><a href=\"#_ftnref5\" name=\"_ftn5\">[5]<\/a> Burningham, Grant. &#8220;The Rise of White Hat Hackers, Our Modern-day Web Cowboys.&#8221; Newsweek. January 31, 2016. Accessed November 17, 2016. http:\/\/www.newsweek.com\/2016\/02\/12\/white-hat-hackers-keep-bug-bounty-421357.html.<\/p>\n<p><a href=\"#_ftnref6\" name=\"_ftn6\">[6]<\/a> <em>ibid.<\/em><\/p>\n<p><a href=\"#_ftnref7\" name=\"_ftn7\">[7]<\/a> Fletcher, Paul. &#8220;100 Days Into Uber Engineering&#8217;s Public Bug Bounty Program &#8211; Uber Engineering Blog.&#8221; Uber Engineering Blog. August 11, 2016. Accessed November 18, 2016. https:\/\/eng.uber.com\/bug-bounty-update\/.<\/p>\n<p><a href=\"#_ftnref8\" name=\"_ftn8\">[8]<\/a> Spring, Tom. &#8220;PornHub Hack Earns Researchers $22,000.&#8221; Threatpost. July 25, 2016. Accessed November 18, 2016. https:\/\/threatpost.com\/pornhub-hack-earns-researchers-22000\/119450\/.<\/p>\n<p><a href=\"#_ftnref9\" name=\"_ftn9\">[9]<\/a> Kuldell, Heather. &#8220;DOD Wants You to Hack the Pentagon Again and Again.&#8221; Nextgov. October 21, 2016. Accessed November 18, 2016. http:\/\/www.nextgov.com\/defense\/2016\/10\/dod-wants-you-hack-pentagon-again-and-again\/132539\/.<\/p>\n<p>Pictures<\/p>\n<p>[1] THR Staff. &#8220;Angelina Jolie Speaks Out for First Time on Insults From Sony-Hack Emails.&#8221; The Hollywood Reporter. November 5, 2015. Accessed November 18, 2016. http:\/\/www.hollywoodreporter.com\/news\/angelina-jolie-sony-hack-amy-pascal-837389.<\/p>\n<p>[2] &#8220;Pornhub on HackerOne.&#8221; HackerOne. Accessed November 18, 2016. https:\/\/hackerone.com\/pornhub.<\/p>\n<p>[3] &#8220;Pornhub on HackerOne.&#8221; HackerOne. Accessed November 18, 2016. https:\/\/hackerone.com\/pornhub.<\/p>\n<p>[4]\u00a0&#8220;New Hacktivity List.&#8221; HackerOne. Accessed November 18, 2016. https:\/\/hackerone.com\/hacktivity?sort_type=latest_disclosable_activity_at&amp;filter=type%3Aall&amp;page=1.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity should be on everyone&#039;s mind in this day and age, but it&#039;s very difficult to implement. Bug bounty programs mobilize the good guys of the internet to help companies protect themselves before the bad guys can hurt them. HackerOne establishes trust between hackers and companies and provides a marketplace for discovering and fixing bugs.<\/p>\n","protected":false},"author":2037,"featured_media":17301,"comment_status":"open","ping_status":"closed","template":"","categories":[2044,845,2478,502],"class_list":["post-17295","hck-submission","type-hck-submission","status-publish","has-post-thumbnail","hentry","category-cyber_security","category-cybersecurity","category-hackers","category-marketplace"],"connected_submission_link":"https:\/\/d3.harvard.edu\/platform-rctom\/assignment\/digitization-challenge-2016\/","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Good Guys Protecting the Internet, From Pornhub To The Pentagon - Technology and Operations Management<\/title>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Good Guys Protecting the Internet, From Pornhub To The Pentagon - Technology and Operations Management\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity should be on everyone&#039;s mind in this day and age, but it&#039;s very difficult to implement. Bug bounty programs mobilize the good guys of the internet to help companies protect themselves before the bad guys can hurt them. HackerOne establishes trust between hackers and companies and provides a marketplace for discovering and fixing bugs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/good-guys-protecting-the-internet-from-pornhub-to-the-pentagon\/\" \/>\n<meta property=\"og:site_name\" content=\"Technology and Operations Management\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-07T16:06:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/whitehat-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"370\" \/>\n\t<meta property=\"og:image:height\" content=\"198\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/good-guys-protecting-the-internet-from-pornhub-to-the-pentagon\\\/\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/good-guys-protecting-the-internet-from-pornhub-to-the-pentagon\\\/\",\"name\":\"Good Guys Protecting the Internet, From Pornhub To The Pentagon - Technology and Operations Management\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/good-guys-protecting-the-internet-from-pornhub-to-the-pentagon\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/good-guys-protecting-the-internet-from-pornhub-to-the-pentagon\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2016\\\/11\\\/whitehat-1.jpg\",\"datePublished\":\"2016-11-18T06:38:05+00:00\",\"dateModified\":\"2020-08-07T16:06:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/good-guys-protecting-the-internet-from-pornhub-to-the-pentagon\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/good-guys-protecting-the-internet-from-pornhub-to-the-pentagon\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/good-guys-protecting-the-internet-from-pornhub-to-the-pentagon\\\/#primaryimage\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2016\\\/11\\\/whitehat-1.jpg\",\"contentUrl\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2016\\\/11\\\/whitehat-1.jpg\",\"width\":370,\"height\":198},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/good-guys-protecting-the-internet-from-pornhub-to-the-pentagon\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Submissions\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Good Guys Protecting the Internet, From Pornhub To The Pentagon\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\",\"name\":\"Technology and Operations Management\",\"description\":\"MBA Student Perspectives\",\"potentialAction\":[{\"@type\":\"性视界Action\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Good Guys Protecting the Internet, From Pornhub To The Pentagon - Technology and Operations Management","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"en_US","og_type":"article","og_title":"Good Guys Protecting the Internet, From Pornhub To The Pentagon - Technology and Operations Management","og_description":"Cybersecurity should be on everyone&#039;s mind in this day and age, but it&#039;s very difficult to implement. Bug bounty programs mobilize the good guys of the internet to help companies protect themselves before the bad guys can hurt them. HackerOne establishes trust between hackers and companies and provides a marketplace for discovering and fixing bugs.","og_url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/good-guys-protecting-the-internet-from-pornhub-to-the-pentagon\/","og_site_name":"Technology and Operations Management","article_modified_time":"2020-08-07T16:06:51+00:00","og_image":[{"width":370,"height":198,"url":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/whitehat-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/good-guys-protecting-the-internet-from-pornhub-to-the-pentagon\/","url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/good-guys-protecting-the-internet-from-pornhub-to-the-pentagon\/","name":"Good Guys Protecting the Internet, From Pornhub To The Pentagon - Technology and Operations Management","isPartOf":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website"},"primaryImageOfPage":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/good-guys-protecting-the-internet-from-pornhub-to-the-pentagon\/#primaryimage"},"image":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/good-guys-protecting-the-internet-from-pornhub-to-the-pentagon\/#primaryimage"},"thumbnailUrl":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/whitehat-1.jpg","datePublished":"2016-11-18T06:38:05+00:00","dateModified":"2020-08-07T16:06:51+00:00","breadcrumb":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/good-guys-protecting-the-internet-from-pornhub-to-the-pentagon\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/d3.harvard.edu\/platform-rctom\/submission\/good-guys-protecting-the-internet-from-pornhub-to-the-pentagon\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/good-guys-protecting-the-internet-from-pornhub-to-the-pentagon\/#primaryimage","url":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/whitehat-1.jpg","contentUrl":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/whitehat-1.jpg","width":370,"height":198},{"@type":"BreadcrumbList","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/good-guys-protecting-the-internet-from-pornhub-to-the-pentagon\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/d3.harvard.edu\/platform-rctom\/"},{"@type":"ListItem","position":2,"name":"Submissions","item":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/"},{"@type":"ListItem","position":3,"name":"Good Guys Protecting the Internet, From Pornhub To The Pentagon"}]},{"@type":"WebSite","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website","url":"https:\/\/d3.harvard.edu\/platform-rctom\/","name":"Technology and Operations Management","description":"MBA Student Perspectives","potentialAction":[{"@type":"性视界Action","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/d3.harvard.edu\/platform-rctom\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/17295","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission"}],"about":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/types\/hck-submission"}],"author":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/users\/2037"}],"replies":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/comments?post=17295"}],"version-history":[{"count":1,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/17295\/revisions"}],"predecessor-version":[{"id":37035,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/17295\/revisions\/37035"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/media\/17301"}],"wp:attachment":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/media?parent=17295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/categories?post=17295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}