{"id":28966,"date":"2020-05-19T15:42:51","date_gmt":"2020-05-19T19:42:51","guid":{"rendered":"https:\/\/mjtsai.com\/blog\/?p=28966"},"modified":"2021-07-16T14:23:33","modified_gmt":"2021-07-16T18:23:33","slug":"apple-vs-security-researchers","status":"publish","type":"post","link":"https:\/\/mjtsai.com\/blog\/2020\/05\/19\/apple-vs-security-researchers\/","title":{"rendered":"Apple vs. Security Researchers"},"content":{"rendered":"<p><a href=\"https:\/\/www.vice.com\/en_us\/article\/wxqee4\/apple-copyright-lawsuit-corellium-chilling-effect-security-research\">Lorenzo Franceschi-Bicchierai<\/a>:<\/p>\n<blockquote cite=\"https:\/\/www.vice.com\/en_us\/article\/wxqee4\/apple-copyright-lawsuit-corellium-chilling-effect-security-research\"><p>The lawsuit, however, has already produced a tangible outcome: very few people, especially current and former customers and users, want to talk about Corellium, which sells the eponymous software that virtualizes iPhones and Android devices. During the lawsuit&rsquo;s proceedings, Apple has sought information from companies that have used the tool, which emulates iOS on a computer, allowing researchers to probe potential iPhone vulnerabilities in a forgiving and easy-to-use environment.<\/p><p>&ldquo;Apple has created a chilling effect,&rdquo; a security researcher familiar with Corellium&rsquo;s product, who asked to remain anonymous because he wasn&rsquo;t allowed to talk to the press, told Motherboard.<\/p><p>&ldquo;I don&rsquo;t know if they intended it but when they name individuals at companies that have spoken in favor [of Corellium], I definitely believe retribution is possible,&rdquo; the researcher added, referring <a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2020\/02\/22\/apple-just-demanded-santander-and-a-50-billion-us-intelligence-contractor-reveal-how-they-use-iphone-hacking-tech\/#b0dfd4846c57\">to Apple&rsquo;s subpoena to the spanish finance giant Santander Bank<\/a>, which named an employee who had Tweeted about Corellium. <\/p><\/blockquote>\n\n<p><a href=\"https:\/\/twitter.com\/steipete\/status\/1258397668591755265\">Peter Steinberger<\/a>:<\/p>\n<blockquote cite=\"https:\/\/twitter.com\/steipete\/status\/1258397668591755265\">\n<p>So we&rsquo;re back at security through obscurity? That always worked out great in history.<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/www.macrumors.com\/2020\/05\/14\/zerodium-pauses-acquiring-ios-exploits\/\">Joe Rossignol<\/a>:<\/p>\n<blockquote cite=\"https:\/\/www.macrumors.com\/2020\/05\/14\/zerodium-pauses-acquiring-ios-exploits\/\">\n<p>Zerodium this week announced that it will not be purchasing any iOS exploits for the next two to three months due to a high number of submissions. In other words, the company has so many security vulnerabilities at its disposal that it does not need any more.<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/www.theregister.co.uk\/2020\/05\/14\/zerodium_ios_flaws\/\">Thomas Claburn<\/a> (<a href=\"https:\/\/news.ycombinator.com\/item?id=23214279\">Hacker News<\/a>):<\/p>\n<blockquote cite=\"https:\/\/www.theregister.co.uk\/2020\/05\/14\/zerodium_ios_flaws\/\"><p>&ldquo;iOS Security is fucked,&rdquo; said Zerodium&rsquo;s founder Chaouki Bekrar <a href=\"https:\/\/twitter.com\/cBekrar\/status\/1260543284008456192?s=20\">via Twitter<\/a>. &ldquo;Only [Pointer Authentication Codes] and non-persistence are holding it from going to zero&#8230;but we&rsquo;re seeing many exploits bypassing PAC, and there are a few persistence exploits (0days) working with all iPhones\/iPads. Let&rsquo;s hope iOS 14 will be better.&rdquo;<\/p><p>[&#8230;]<\/p><p>The market for iOS vulnerabilities took a hit last September when Zerodium <a href=\"https:\/\/twitter.com\/Zerodium\/status\/1168862389262880768?s=20\">said<\/a> for the first time that it would <a href=\"https:\/\/www.theregister.co.uk\/2019\/09\/04\/zerodium_android_bug\/\">pay more for flaws in Android<\/a> than in iOS.<\/p><p>[&#8230;]<\/p><p>Asked whether Zerodium&rsquo;s statement reflects the actual state of iOS security or should be taken as a company just trying to make waves, Patrick Wardle, principal security researcher at Jamf Security and founder of Objective-See, told <i>The Register<\/i> that it&rsquo;s probably a bit of both.<\/p><\/blockquote>\n\n<p><a href=\"https:\/\/twitter.com\/steipete\/status\/1261199554906644481\">Peter Steinberger<\/a>:<\/p>\n<blockquote cite=\"https:\/\/twitter.com\/steipete\/status\/1261199554906644481\">\n<p>Almost seems like Apple suing the #1 company allowing security research on iOS (Corellium) and not paying out bounties could have a chilling effect on white hats while black hats thrive.<\/p>\n<\/blockquote>\n\n<p>Previously:<\/p>\n<ul>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2020\/04\/28\/mac-sandbox-escape-via-textedit\/\">Mac Sandbox Escape via TextEdit<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2019\/12\/30\/apples-filing-against-corellium-and-jailbreaking\/\">Apple&rsquo;s Filing Against Corellium and Jailbreaking<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2019\/12\/20\/mac-bug-bounty-program-opens\/\">Mac Bug Bounty Program Opens<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2019\/08\/06\/hacker-friendly-iphones-and-mac-bug-bounty-program\/\">Hacker-Friendly iPhones and Mac Bug Bounty Program<\/a><\/li>\n<\/ul>\n\n<p id=\"apple-vs-security-researchers-update-2021-02-05\">Update (2021-02-05): <a href=\"https:\/\/twitter.com\/p0sixninja\/status\/1355953193738330114\">Joshua Hill<\/a>:<\/p>\n<blockquote cite=\"https:\/\/twitter.com\/p0sixninja\/status\/1355953193738330114\">\n<p>Apple denied my access to the security developer program because I haven&rsquo;t done enough work. Almost all my CVE&rsquo;s are credited to anonymous or my team name.<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/twitter.com\/theevilbit\/status\/1355968388263247872\">Csaba Fitzl<\/a>:<\/p>\n<blockquote cite=\"https:\/\/twitter.com\/theevilbit\/status\/1355968388263247872\">\n<p>I had to realize as well that reporting vulnerabilities and applying for security entitlements are two unrelated things. The entitlement team doesn&rsquo;t care at all about the other type of work  although it took me 10 months to get the ES one, KEXT is a clear no-go<\/p>\n<p>For example the product-security team supported me in getting a kext signing cert, yet the entitlement team said they don&rsquo;t care and they also said that it&rsquo;s not the product-security team&rsquo;s authority to decide. Sigh.<\/p>\n<\/blockquote>\n\n<p id=\"apple-vs-security-researchers-update-2021-07-16\">Update (2021-07-16): <a href=\"https:\/\/twitter.com\/KhaosT\/status\/1415869846957350917\">Khaos<\/a> <a href=\"https:\/\/twitter.com\/KhaosT\/status\/1415884188612399106\">Tian<\/a>:<\/p>\n<blockquote cite=\"https:\/\/twitter.com\/KhaosT\/status\/1415869846957350917\">\n<p>lol apparently reporting security issue to Apple product security can lead to termination from Apple Developer Program? Got a notice of termination from the personal account that has no activity recently today &#x1F643;<\/p>\n<\/blockquote>\n\n<blockquote cite=\"https:\/\/twitter.com\/KhaosT\/status\/1415884188612399106\"><p>Standard termination template citing violation of 3.2(f) of the agreement&#8230; Typically I think it&rsquo;s used for people making fraudulent\/scam apps? I haven&rsquo;t submit any apps for years so who knows &macr;\\_(&#x30C4;)_\/&macr;<\/p><\/blockquote>","protected":false},"excerpt":{"rendered":"<p>Lorenzo Franceschi-Bicchierai: The lawsuit, however, has already produced a tangible outcome: very few people, especially current and former customers and users, want to talk about Corellium, which sells the eponymous software that virtualizes iPhones and Android devices. During the lawsuit&rsquo;s proceedings, Apple has sought information from companies that have used the tool, which emulates iOS [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"apple_news_api_created_at":"2020-05-19T19:42:55Z","apple_news_api_id":"15937f51-662b-4e44-b757-338073d82b61","apple_news_api_modified_at":"2021-07-16T18:23:37Z","apple_news_api_revision":"AAAAAAAAAAAAAAAAAAAAAg==","apple_news_api_share_url":"https:\/\/apple.news\/AFZN_UWYrTkS3VzOAc9grYQ","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_is_hidden":false,"apple_news_is_paid":false,"apple_news_is_preview":false,"apple_news_is_sponsored":false,"apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":"\"\"","apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[2],"tags":[2098,131,1909,31,1667,48],"class_list":["post-28966","post","type-post","status-publish","format-standard","hentry","category-technology","tag-apple-security-bounty","tag-bug","tag-corellium","tag-ios","tag-ios-13","tag-security"],"apple_news_notices":[],"_links":{"self":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/28966","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/comments?post=28966"}],"version-history":[{"count":3,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/28966\/revisions"}],"predecessor-version":[{"id":33154,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/28966\/revisions\/33154"}],"wp:attachment":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/media?parent=28966"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/categories?post=28966"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/tags?post=28966"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}