Article 5PC1K Infosec researchers say Apple’s bug-bounty program needs work

Infosec researchers say Apple’s bug-bounty program needs work

by
Jim Salter
from Ars Technica - All content on (#5PC1K)
GettyImages-163855174-800x600.jpg

Enlarge / If you don't maintain good relationships with bug reporters, you may not get to control the disclosure timeline. (credit: mhatzapa via Getty Images / Jim Salter)

The Washington Post reported earlier today that Apple's relationship with third-party security researchers could use some additional fine tuning. Specifically, Apple's "bug bounty" program-a way companies encourage ethical security researchers to find and responsibly disclose security problems with its products-appears less researcher-friendly and slower to pay than the industry standard.

The Post says it interviewed more than two dozen security researchers who contrasted Apple's bug bounty program with similar programs at competitors including Facebook, Microsoft, and Google. Those researchers allege serious communication issues and a general lack of trust between Apple and the infosec community its bounties are supposed to be enticing-"a bug bounty program where the house always wins," according to Luta Security CEO Katie Moussouris.

Poor communication and unpaid bounties

Software engineer Tian Zhang appears to be a perfect example of Moussouris' anecdote. In 2017, Zhang reported a major security flaw in HomeKit, Apple's home automation platform. Essentially, the flaw allowed anyone with an Apple Watch to take over any HomeKit-managed accessories physically near them-including smart locks, as well as security cameras and lights.

Read 13 remaining paragraphs | Comments

index?i=MUdmZYUwJBs:dMgAKREdRTQ:V_sGLiPB index?i=MUdmZYUwJBs:dMgAKREdRTQ:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments