Login

Register

Login

Register

Developer feels ‘robbed’ by Apple’s Security Bounty Program | #ios | #apple | #iossecurity | #cybersecurity | #infosecurity | #hacker



An iOS engineer by the name of Nicolas Brunner says they feel “robbed” by Apple after discovering a bug in iOS 13, only to be told their findings didn’t qualify for the company’s Security Bounty Program.

In a post to Medium Brunner shared a blog post that states “This is my personal story with the Apple Security Bounty program and why I believe it is a lie after reporting an issue, testing fixes and being left in the dark after 14 months.”

Brunner claims that in March 2020 they found a way “to access a User’s location permanently and without consent on any iOS 13 (or older) device”. Brunner’s report was accepted by Apple, corrected, and Brunner was even credited with the finding in iOS 14’s security release notes. However, Brunner says they feel “robbed” by the company after being told the finding did not qualify them for a payout from Apple’s Security Bounty Program:

The report got accepted and the issue was fixed in iOS 14 and I got credited on the iOS 14 security content release notes. However, as of today, Apple refuses any bounty payment, although the report at hand very clearly qualifies according to their own guidelines. Also, Apple refuses to elaborate on why the report would not qualify. So read this article with a pinch of salt, since as a long-time iOS developer I’m very disappointed with Apple’s communication.

Brunner says Apple took 14 months to clarify they wouldn’t be receiving a payment, an email received in May states “the issue has been reviewed for the Apple Security Bounty, and, unfortunately, it does not qualify.” Brunner insists the finding does in fact fall under Apple’s ‘App access to sensitive data normally protected by a TCC prompt’, which can pay out up to $100,000 to whoever discovers the issue.

VPN Deals: Lifetime license for $16, monthly plans at $1 & more

Brunner stated in the post that they hope “the security bounty program turns out to be a win-win situation for both parties” but saw no reason at present “why developers like myself should continue to contribute to it.”

Apple launched the most recent version of its Security Bounty Program in December of 2019, the program can pay out as much as $1.5 million if a developer finds an issue previously unknown to Apple, and its website further states “ll security issues with significant impact to users will be considered for Apple Security Bounty payment, even if they do not fit the published bounty categories.”

iMore has reached out to Apple for comment on the story.

var fbAsyncInitOrg = window.fbAsyncInit;
window.fbAsyncInit = function() {
if(typeof(fbAsyncInitOrg)==’function’) fbAsyncInitOrg();
FB.init({
appId: “291830964262722”,
xfbml: true,
version : ‘v2.7’
});

FB.Event.subscribe(‘xfbml.ready’, function(msg) { // Log all the ready events so we can deal with them later
var events = fbroot.data(‘ready-events’);
if( typeof(events) === ‘undefined’) events = [];
events.push(msg);
fbroot.data(‘ready-events’,events);
});

var fbroot = $(‘#fb-root’).trigger(‘facebook:init’);
};

Original Source link



Original Source link

Leave a Reply

Shqip Shqip አማርኛ አማርኛ العربية العربية English English Français Français Deutsch Deutsch Português Português Русский Русский Español Español

National Cyber Security Consulting App

 https://apps.apple.com/us/app/id1521390354

https://play.google.com/store/apps/details?id=nationalcybersecuritycom.wpapp


Ads

NATIONAL CYBER SECURITY RADIO

Ads

ALEXA “OPEN NATIONAL CYBER SECURITY RADIO”

National Cyber Security Radio (Podcast) is now available for Alexa.  If you don't have an Alexa device, you can download the Alexa App for free for Google and Apple devices.   

nationalcybersecurity.com

FREE
VIEW