Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Apple to issue hackable iPhones
techxplore.com ^ | July 23, 2020 | by Peter Grad , Tech Xplore

Posted on 07/23/2020 11:17:15 AM PDT by Red Badger

Credit: Unsplash/CC0 Public Domain

Apple announced this week that it will begin shipping out specially configured Security Research Device iPhones to researchers so that they can probe for vulnerabilities without interference from standard iPhone security walls.

The marks the first time Apple has released such research models that grant specialists virtually unlimited operating system permissions to run their own programs, custom commands and code. The iPhones will come with debugging tools and allow access root shell code.

Apple first announced plans at last year's Black Hat security conference to release modified iPhones to make it simpler for researchers to probe for vulnerabilities.

Security specialists currently have to rely on jailbreaks or third party emulators to study security issues. But those approaches have limitations. According to Apple, results achieved on jailbroken phones are not reliable because of the inherent differences between a legitimate model and a hacked one. Also, Apple notes, most jailbreaks work only older phones and older iOS versions.

At least in part in recognition of those obstacles, Apple is taking this step to work more closely with researchers.

"Security researchers have already proved to be rather successful at uncovering flaws in both iOS proper and security and privacy issues in third-party apps," Patrick Wardle, an Apple security researcher at the enterprise management firm Jamf, told Wired magazine. "Armed with these new devices, they are likely only going to find more. Being able to audit and analyze third-party apps more easily on modern devices running the latest version of iOS would be lovely. It's ultimately a big win for Apple's users and Apple itself."

Apple is accepting applications for the new program from researchers with established records of security research. Applicants must be account holders in the Apple Developer Program. The phones will be loaned to researchers and renewals must be made yearly.

The program will work alongside Apple's bug bounty program, which was expanded to all researchers last year. Researchers uncovering vulnerabilities can earn up to $1 million from Apple plus bonuses of up to 50 percent depending on the potential severity of the problems they find.

Restrictions will be placed on program participants. The phones cannot be used for personal calls. Vulnerabilities uncovered by researchers cannot be revealed to the public until Apple gives permission, presumably after patches are designed.

Some security groups are concerned about the secrecy provisions. One expert explained his concern about the possibility of a significant flaw that remains uncorrected being kept from the public. Will Strafach, CEO of mobile security company Guardian and an iOS security researcher, said he favors public disclosure of security problems as a means of pressuring sometimes recalcitrant companies from acting. Because of Apple's restrictions on disclosure, he said his company would not apply for the program.

And Ben Hawkes of Google's security research team Project Zero said his group, too, will decline participation for the same reasons. "We'll continue to research Apple platforms and provide Apple with all of our findings, because we think that's the right thing to do for user security. But I'll confess, I'm pretty disappointed," he said.


TOPICS: Business/Economy; Music/Entertainment; Society
KEYWORDS:

1 posted on 07/23/2020 11:17:15 AM PDT by Red Badger
[ Post Reply | Private Reply | View Replies]

To: Swordmaker; ShadowAce

Ping!.............


2 posted on 07/23/2020 11:17:37 AM PDT by Red Badger (To a liberal, 9-11 was 'illegal fireworks activity'..........................)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Red Badger

How long till the Chinese. get ahold of these?


3 posted on 07/23/2020 11:24:07 AM PDT by TexasGator (Z1z)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TexasGator

I’m sure they’ve been using them for a long while already.


4 posted on 07/23/2020 11:28:45 AM PDT by FoxInSocks ("Hope is not a course of action." -- M. O'Neal, USMC)
[ Post Reply | Private Reply | To 3 | View Replies]

To: TexasGator

They just pull one from the assembly line, install the hacked IOS stollen from the US.


5 posted on 07/23/2020 11:42:30 AM PDT by wgmalabama
[ Post Reply | Private Reply | To 3 | View Replies]

To: Red Badger; ~Kim4VRWC's~; 1234; 5thGenTexan; AbolishCSEU; Abundy; Action-America; acoulterfan; ...
Apple to make “hackable” iPhone models for the first time, available only to selected security researchers to make it easier to find vulnerabilities in core code—PING!


APPLE iOS Security PING!

If you want on or off the Apple/Mac/iOS Ping List, Freepmail me.

6 posted on 07/23/2020 12:11:42 PM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplophobe bigot1)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Curious - IF it requires a phone minus the many security features, just to probe for “vulnerabilities”, are they REALLY vulnerabilities?


7 posted on 07/23/2020 1:07:19 PM PDT by TheBattman (Democrats-Progressives-Marxists-Socialists - redundant labels.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: wgmalabama
They just pull one from the assembly line, install the hacked IOS stollen from the US.

Show Apple how you can do that and get your Million Dollars wgm.

8 posted on 07/23/2020 2:58:03 PM PDT by itsahoot (Welcome to the New USA where Islam is a religion of peace and Christianity is a mental disorder.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: itsahoot

The factory is in China. Apple has a bunch of foreign workers. 1 + 1 = 2.

Million or not but the fact is fact.


9 posted on 07/23/2020 3:32:44 PM PDT by wgmalabama
[ Post Reply | Private Reply | To 8 | View Replies]

To: TheBattman
Curious - IF it requires a phone minus the many security features, just to probe for “vulnerabilities”, are they REALLY vulnerabilities?

They may be vulnerabilities in certain modules, but not exploitable, because they aren’t reachable due to other areas not having vulnerabilities.

10 posted on 07/23/2020 3:37:31 PM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplophobe bigot1)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Red Badger
> ... at last year's Black Hat security conference ...

You can’t say “Black Hat” any more. It’s offensive because it associates “Black” with “Bad Guys”, dontchaknow.

Gonna have to change the name of the conference. Maybe something like “Conference for Those Wearing the Hat Designating Unsavory Intent”.

Yeah, that’s got a nice ring to it...

11 posted on 07/24/2020 5:22:04 AM PDT by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government."`)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored

White Hat is White Supremacy.

Blue Hat is the UN.

Red Hat is already taken.............


12 posted on 07/24/2020 5:27:39 AM PDT by Red Badger (To a liberal, 9-11 was 'illegal fireworks activity'..........................)
[ Post Reply | Private Reply | To 11 | View Replies]

To: wgmalabama
The factory is in China. Apple has a bunch of foreign workers. 1 + 1 = 2.

Those facts were indeed facts, but they have nothing to do with how you could exploit the Apple device.

13 posted on 07/24/2020 10:18:43 AM PDT by itsahoot (Welcome to the New USA where Islam is a religion of peace and Christianity is a mental disorder.)
[ Post Reply | Private Reply | To 9 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson