A method to mathematically prove that a hacker has found a software bug, without revealing details of how the exploit works, could prevent companies from ignoring security vulnerabilities. It is ...