• Qualcomm Snapdragon 810 & 808 explained.

Qualcomm Snapdragon 810 & 808 explained. (Photo : YouTube/ XEETECHCARE )

Qualcomm has been very aggressive with its goal of dominating the spot on 10nm processors. To hasten and ensure its success, the multinational semiconductor company invited hackers to test for any in modems and processors which may soon include the Snapdragon 835.

The multinational semiconductor and telecommunications equipment company has invited hackers to be part of their security research in order to maintain their responsibilities to their client at the highest level possible. According to The Register, the San Diego-based company is partnering with vulnerability disclosure company, HackerOne, to ensure the best result for the company and their clients. 

Like Us on Facebook

In order to participate in the said security research, the company noted that at the current stage the participation in this program is invitation-only, especially those who have made an impact to improve product security in the past.

As additional rules for application, it was highlighted that only individuals can qualify and that any vulnerabilities must be clearly associated with Qualcomm Technologies and the known affiliates. For the reward system, it was mentioned that only the first report of a vulnerability and confidential disclosures can qualify for a reward.

HackerOne also specifically mentioned  the list of hardware devices or chipset families to be checked by participants, and this would include but not limited to Snapdragon 400, 615, 801, 805, 808, and the Snapdragon X5 Modem, X7 Modem, X12 Modem.

Although there is no mention of the much-anticipated Qualcomm Snapdragon 835, it has been fairly assumed that it will soon be part of the security research, especially that updates on the lists of hardware will be done from time to time.

The successful white hat hackers will receive rewards depending on the level of security impact. But as of the moment, a $15,000 reward has been assigned to the Critical Level apart from being included in the QTI Product Security Hall of Fame or CodeAuroraForum Hall of Fame