Apple offers record bounty to researchers who find the iPhone’s security flaws

FILE PHOTO: The different shades of the newly released Apple iPhone and XR are given in the following the product launch event at the Steve Jobs Theater, san francisco, California, USA, September 12, 2018. REUTERS/Stephen Lam/File Photo

LAS VEGAS (Reuters) – Apple Inc’s (AAPL.(O) the provision of cyber security researchers up to $1 million in order to detect errors, in the end, the biggest reward is that for a company to protect it from hackers, at a time of growing concern about the government breaking into the mobile device by dissidents, journalists and human rights defenders.

In contrast to other technology companies, Apple previously offered rewards only to invited researchers, who are trying to have errors in its phone and cloud back-up.

At the annual Black Hat security conference in Las Vegas on Thursday, the company said that it would be the same process for all the researchers, to add to the Mac software, and other structures, as well as a range of rewards, which is called “grace,” for it is the most important of the findings.

The $1 million prize, it would only apply to the access to the iPhone’s kernel, and without any action on the phone by the user. In Apple’s previous highest cash bounty was of $200,000 for the friendly bugs that can be fixed with the updated versions of the software, and do not let them be exposed to criminals or spies.

The government, home builders and real estate brokers have to be paid as much as $2 million of which is for the most effective hacking techniques to obtain information from the devices. Apple’s next-generation security contributions, however, are of the same order of magnitude as some published rates of the contractors.

Apple is taking steps to be undertaken to make the research easier, such as providing an adapted telephone for a number of security measures are turned off.

A number of companies, such as Israel and the NSO working Group, to sell the hacking possibilities for the authorities to target their critics. One such attack was against a friend from the new york times columnist Jamal Khashoggi, a critic of the Saudi government, and who was assassinated at the Saudi arabian consulate in Istanbul, and in October of 2018.

The principal component of such a breach, it is the programs that make use of the unknown flaws in the phones software or applications are installed.

Reporting by Joseph Menn; editing by Grant McCool

Follow us

Don't be shy, get in touch. We love meeting interesting people and making new friends.

Most popular