时间:2024-11-22 01:32:02 来源:网络整理编辑:探索
Apple is launching its first security bounty. The news comes on the heels of a presentation from App
Apple is launching its first security bounty. The news comes on the heels of a presentation from Apple’s Ivan Krstic at the annual Black Hat USA security conference in Las Vegas.
Krstic runs security engineering and architecture at Apple and presented an in-depth look at iOS security. This was Apple’s first appearance at Black Hat in four years.
SEE ALSO:Apple opens up on how it approaches security following FBI battleSince its battle with the FBI this spring, Apple has been more outwardly focused on discussing its commitment to security. To that end, Apple is opening up its first security bounty program. The program, which will roll out in September, will accept security submissions in a number of areas. Depending on the type of exploit found, researchers and their organizations will get more money.
The categories and issues up for consideration, along with their bounties, are as follows:
Secure boot firmware components – up to $200,000.
Extraction of confidential material protected by the Secure Enclave Processor – up to $100,000.
Execution of arbitrary code with kernel privileges – up to $50,000.
Unauthorized access to iCloud account data on Apple servers – up to $50,000.
Access to sandboxed processes to user data outside of the sandbox – up to $25,000.
Organizations can accept the money Apple offers or they can donate it to a charity of their choice. Apple says that if researchers choose to donate to a charity, they will consider matching that donation.
Apple tells meit may also award researchers who share significant critical vulnerabilities not outlined above.
Unlike many security bounty programs, this program is notopen to the public. For now, Apple is partnering with a dozen or so security researchers and organizations to focus on finding flaws.
But Apple tells me that this isn’t an attempt to be exclusive. The plan is to open it up to more individuals and organizations over time. Apple also says that if someone not associated with an invited organization responsibly discloses a vulnerability, that feedback will be welcome and they may be invited to join the formal process.
Apple says that it spoke to a number of other companies who have already run successful security bounties and that advice – which was to start small (as to reduce the signal/noise ratio) and then ramp up – contributed to the decision to only involve a few organizations and researchers at the start.
Although it’s great that Apple is introducing a security bounty, it's worth noting that the company has taken its time getting here. Nearly every other major tech company – including Microsoft, Google and Facebook – have offered security bounties for years.
So what took so long?
Apple tells me that although it has been working with outside researchers for years, it has consistently received feedback – from experts inside and outside of the company – that it is more difficult to identify significant security vulnerabilities without a bounty program.
As a result, it makes sense that the company would look (finally!) to outside organizations and researchers to offer their own feedback.
It probably doesn’t hurt that the focus on Apple’s security is now more pointed than ever before. With more eyes on Apple security – and more people trying to bypass it (whether it’s law enforcement or hackers), it makes sense to get more eyes focused on finding flaws.
I understand the need to limit -- at least initially -- involvement in the bounty program, but I do hope Apple commits to expanding the individuals and groups involved quickly. iOS as a platform deserves as many eyes on it as possible.
For now, the focus of the bounty is on iOS, but Apple says that it is open to expanding the bounty program to other platforms (including macOS) and other areas, once the program ramps up.
Have something to add to this story? Share it in the comments.
TopicsAppleCybersecurityiOSiPhone
We asked linguists if Donald Trump speaks like that on purpose2024-11-22 01:08
謝暉道破大連隊為何遭遇兩連敗:球隊處於瓶頸期 將迎來惡戰2024-11-22 00:45
傷病潮潮潮 !紅軍三主力缺戰 太子拉胯?這下胯沒了2024-11-22 00:37
鄭智成最後救命稻草?夏窗變臉的廣州隊 隻剩下最後一張牌2024-11-22 00:26
Early Apple2024-11-22 00:23
高天意:球隊防守細節做得好 協防非常到位2024-11-22 00:22
李瑋鋒:球隊總是在輸球 隊員自信顯然會差很多2024-11-21 23:44
間歇期成萊科最後機會 ?若不能重組海港進攻體係 恐提前下課2024-11-21 23:33
Olympian celebrates by ordering an intimidating amount of McDonald's2024-11-21 23:19
泰山驚險逆轉克雷桑當記頭功 僅落後一分爭冠懸念陡增2024-11-21 23:18
Twitter grants everyone access to quality filter for tweet notifications2024-11-22 01:29
巴薩被判死緩 !兩功勳成罪魁 四大隊長或聯袂離隊2024-11-22 01:21
中超最佳陣容:海港進攻3人組領銜 高天意PK莫伊塞斯2024-11-22 01:16
中超兩大懸念解讀 ,領頭羊挺過至暗時刻 廣州城尚存逆襲希望2024-11-22 01:09
Cat gets stuck in the most awkward position ever2024-11-22 01:01
海港主帥:幫助武磊恢複最佳狀態 張玉寧是最好的前鋒之一2024-11-22 00:27
中超第22輪最佳球員 :大連人隊球員商隱傳射建功當選2024-11-22 00:08
喜憂參半!馬爾康獻救命球又傷退 爭冠形勢或一夜間再逆轉2024-11-21 23:51
Balloon fanatic Tim Kaine is also, of course, very good at harmonica2024-11-21 23:41
討薪!前武漢長江梯隊教練 :至今已經欠薪18個月2024-11-21 23:25