Home » today » Technology » Apple gives ethical hackers exclusive iPhones

Apple gives ethical hackers exclusive iPhones

close up of a business man using a mobile phone

With this new initiative, Apple wants to give security researchers the opportunity to detect vulnerabilities in the iOS operating system.


How does technology impact your business?
Receive business IT news straight to your inbox every week!


iPhones are known to many users as the safest mobile devices on the market. Apple has been strongly committed to security for years, including by shielding the software as much as possible. While this approach has its advantages, it does make it harder for security experts and ethical hackers to investigate vulnerabilities if things go wrong. The company now wants to change that.

This week, Apple is launching a new initiative with which it wants to make its devices even safer. With the Security Research Device Program, the company distributes special devices to ethical hackers. With this, Apple wants to increase the security of iOS. The iPhones are focused on security research and contain extensive functions. For example, ethical hackers who register for the program get SSH access and can use a root shell to execute their own commands. Debugging tools are also provided to make it easier to run the code and understand exactly what is happening.

Strict rules

To make the program work as safely as possible, Apple has drawn up a list of conditions and rules that security researchers must adhere to. First and foremost, they must be an Account Holder in the Apple Developer Program. They must also have previously found security vulnerabilities on Apple platforms such as iOS or in other modern operating systems.

Apple told the news site TechCrunch that the program should become a collaboration rather than a one-sided transaction. Researchers participating in the initiative will have access to extensive documentation and a forum with Apple engineers to request feedback. The devices are also loaned for 12 months and remain in Apple’s possession. They should not be used for private purposes and should also remain in a fixed location to exclude the possibility of theft.

Hackers who use a Security Research Device to detect vulnerabilities in the software must also report these vulnerabilities to Apple. If the bug is in third party software, participants should also report it.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.