Bug bounties. They’re an important security tool in the arsenal of many tech companies. Here’s how they work. Give ethical hackers the chance to probe your systems for weaknesses, pay them for exploits they find and fix said exploits before ne’er-do-wells find and use them. Bounty programs vary from company to company. Marketplace’s Jed Kim speaks with Reed Albergotti, a tech reporter for The Washington Post who wrote about widespread dissatisfaction with how Apple pays its bounties and the ways it limits communication about the bugs hackers find — all problems that may hurt security for Apple users.