Apple grants researchers iPhone special phones to raise the level of security



[ad_1]

Next year, Apple plans to provide security researchers with a limited number of special iPhones to help them detect the security vulnerabilities of the iOS operating system.

These phones have much deeper access than is available to ordinary users because they were previously broken iPhones.

The company is expected to provide these security search devices to researchers who report errors via its iOS reward reward program.

Apple launched this error-fixing program three years ago at the Black Hat conference, and is now extending its use to the conference itself to cover macOS, Apple Watch, and Apple TV.

Apple explained that the security search system will be available to researchers with a high quality security research experience on any platform, so that every developer can not access these peripheral devices.

Topics related to what you are currently reading:

The phones will come with the SSH protocol to perform network services securely over an unsecured network and with advanced debugging features, so that these add-ons are designed to facilitate detection of errors on security researchers.

Although these devices for iPhone developers are available to security researchers, they will not benefit from the same level of deep access enjoyed by Apple's internal developers and the company's security team. .

More deep access should make life easier for researchers so they can access deeper functions (iOS) without waiting for protection to be broken for all updates.

This announcement is a big step in the right direction and would facilitate the detection of an increasing number of attacks against the Apple system.

Apple has also expanded its current rewards program to include macOS, tvOS, watchOS and iCloud. In some cases, the rewards amount to $ 1 million.

Apple has now opened a rewards program for all researchers, doubling payments, to reach the current maximum of $ 200,000. The limit is set at $ 1 million for iOS vulnerabilities allowing hackers to control the phone without any user intervention.

[ad_2]
Source link