Apple Has Started Paying Hackers for iPhone Exploits (vice.com) 31
Lorenzo Franceschi-Bicchierai, reporting for Motherboard: In 2016, Apple's head of security surprised the attendees of one of the biggest security conference in the world by announcing a bug bounty program for Apple's mobile operating system iOS. At the beginning, Apple struggled to woo researchers and convince them to report high-value bugs. For the researchers, the main issue was that the bugs they discovered were too valuable to report to Apple, despite rewards as high as $200,000. Companies like GrayShift and Azimuth made an entire business out of exploiting vulnerabilities in Apple products, while other researchers didn't want to report bugs so they could keep doing research on iOS. But two years later, some researchers are finally reporting vulnerabilities to Apple, and the company has begun to award some researchers with bounties, Motherboard has learned.
[...] Adam Donefeld, a researcher at mobile security firm Zimperium said that he has submitted several bugs to Apple and received payments for the company. Donefeld was not part of the first batch of security researchers who were personally invited by Apple to visit its Cupertino campus and asked to join the program. But after submitting a few bugs, Donefeld told me, an Apple employee asked him if he wanted to be part of the bounty program in a phone call. "I know Apple pays people," Donefeld said in an online chat. "I'm certainly not the only payout." Another researcher, who asked to remain anonymous because they are worried about souring their relationship with Apple, said that they have submitted a few bugs and been awarded bounties, but has yet to be paid. [...] Two other researchers told Motherboard they also have concerns with or have had trouble with the program. One said they weren't paid for a bug they submitted (Motherboard could not independently confirm that the researcher did not get a payment), and another said they didn't want to participate in it at all, even after being invited. Further reading: Google Bug Hunter Urges Apple To Change Its iOS Security Culture; Asks Tim Cook To Donate $2.45 Million To Amnesty For His Unpaid iPhone Bug Bounties.
[...] Adam Donefeld, a researcher at mobile security firm Zimperium said that he has submitted several bugs to Apple and received payments for the company. Donefeld was not part of the first batch of security researchers who were personally invited by Apple to visit its Cupertino campus and asked to join the program. But after submitting a few bugs, Donefeld told me, an Apple employee asked him if he wanted to be part of the bounty program in a phone call. "I know Apple pays people," Donefeld said in an online chat. "I'm certainly not the only payout." Another researcher, who asked to remain anonymous because they are worried about souring their relationship with Apple, said that they have submitted a few bugs and been awarded bounties, but has yet to be paid. [...] Two other researchers told Motherboard they also have concerns with or have had trouble with the program. One said they weren't paid for a bug they submitted (Motherboard could not independently confirm that the researcher did not get a payment), and another said they didn't want to participate in it at all, even after being invited. Further reading: Google Bug Hunter Urges Apple To Change Its iOS Security Culture; Asks Tim Cook To Donate $2.45 Million To Amnesty For His Unpaid iPhone Bug Bounties.
So much for being innovative (Score:3)
Re: So much for being innovative (Score:1)
No technical innovation, but certainly business innovation. There are lots of things that people probably shouldn't get paid for, but they do. If you have a skill, find a niche and run with it.
Re: (Score:1)
And apple will certainly be the cheapest of them all.
Re:So much for being innovative (Score:5, Interesting)
If you read the article, Apple has been offering for years but some sleazy companies and researchers found it more valuable to keep the information hidden.
Re: (Score:2)
If you read the article, Apple has been offering for years but some sleazy companies and researchers found it more valuable to keep the information hidden.
The only way this program will be successful is if Apple consistently offers more money than the NSA et al for exploits/zero-days.
If Apple does outbid the government spy agencies, watch for a law/regulation to come down the pike to prevent it. Gotta keep tabs on the Proles or else there could be an outbreak of Constitutionalism, and we can't have *that*! That would ruin *everything* and strip us of power!
Strat
Re: (Score:3)
Apple may be rich, but well equipped government agencies are even richer. Think about it this way - when a state sponsored company can sell an exploit to other state sponsored agencies for 7 figures (i.e., millions) how much would Apple have to pay for it?
GreyKey and the like sell their boxes for $30K. How much do you think the exploit they use is worth?
Apple may make more money
I welcome this culture shift. (Score:5, Insightful)
Thinking back 10-20 years ago. Where if people reported security flaws, the big tech companies other then thanking them for reporting the issues, would try to sue them, to put them in jail for hacking their systems. Not really understanding the hacking community and the fact that most of them are not out to do damage to other people or systems, but just the thrill of finding new ways to get in. Being able to get paid for your efforts helps instinctive the hackers to report their findings, it help the company fix there problems before it become out of hand, and makes sure people are not afraid to use technology beyond its intended purposes and innovate vs using just what is was meant for in fear of getting into trouble by Big Tech.
Re: Entitlement (Score:1)
They have certain skillsets and are taking opportunities to turn those skills into cash. It takes advantage of the gig economy. I'm not sure that sense of entitlement would have much to do with it in and of itself.
Apple should negotiate each exploit bounty amount (Score:5, Interesting)
Re:Apple should negotiate each exploit bounty amou (Score:5, Interesting)
I'm not sure if you're trolling, but in case you're not, I can tell you that just seeing someone exploit your code gives you a LOT of clues as to what the exploit actually is. As a software developer...I've been with >1 companies that get reporting researchers to show us the exploit (against heavily instrumented website/services/etc.) and then we've fixed it without paying/recognizing the researcher AT ALL. In these cases, having a standing reward system actually benefits the reporter, as in "I think I found some XSS vulnerabilities and I'd like to apply for the $1K XSS reward - can we agree to engage under this framework?"
Re: (Score:2, Troll)
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
You haven't ever negotiated a business contract, have you?
Re: (Score:2)