{"id":16037,"date":"2019-08-09T06:30:03","date_gmt":"2019-08-09T14:30:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/08\/09\/news-9780\/"},"modified":"2019-08-09T06:30:03","modified_gmt":"2019-08-09T14:30:03","slug":"news-9780","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/08\/09\/news-9780\/","title":{"rendered":"Apple announces a new iPhone (and you can\u2019t have it)"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2019\/07\/cso_black_hat_hacker_by_matiasenelmundo_gettyimages-823247618_blue_binary_matrix_binary_rain_by_bannosuke_gettyimages-687353118_2400x1600-100802503-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Jonny Evans| Date: Fri, 09 Aug 2019 06:55:00 -0700<\/strong><\/p>\n<p>Apple has announced a new iPhone for 2020, but it will only be made available to a select group of security researchers \u2013 along with huge bounties to anyone informing the company of a new OS vulnerability.<\/p>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Ivan_Krsti%C4%87\" rel=\"noopener nofollow\" target=\"_blank\">Ivan Krsti\u0107<\/a>, Apple\u2019s head of security engineering provided big insights into Apple\u2019s platform security during his presentation at <a href=\"https:\/\/www.blackhat.com\/us-19\/briefings\/schedule\/#behind-the-scenes-of-ios-and-mac-security-17220\" rel=\"noopener nofollow\" target=\"_blank\">Black Hat U.S. 2019<\/a>.<\/p>\n<p>He promised much bigger bug bounties and an exclusive new \u2018pre-jailbroken\u2019 iPhone for selected security researchers would be made available next year.<\/p>\n<p>The Apple security chief explained that Apple is aware that lots of security professionals want to examine its devices, but that the high degree of protection makes it a time-consuming task.<\/p>\n<p>The pre-jailbroken device lacks some of the layers of security Apple wraps around iPhones, so it is much easier for researchers to explore these systems for security weaknesses.<\/p>\n<p>The device ships with ssh, a root shell and advanced debug capabilities and will be made available to invite-only members of Apple\u2019s iOS Security Research Device program.<\/p>\n<p>Anyone with a track record of high-quality systems security research on any platform can apply to join this scheme, though Apple will select who it invites.<\/p>\n<p>Similar devices are widely used in Apple\u2019s factories for testing and quality control, which has spawned a black market in them among security researchers, governments and others &#8212; they are often spirited out of factories for sale.<\/p>\n<p>The idea is that by opening up the platform a little, security pros will find it worthwhile to probe it for vulnerabilities and the black market in such devices will erode.<\/p>\n<p>Apple understands the value of security on its platforms.<\/p>\n<p>It also recognizes that security research is a business.<\/p>\n<p>As such. it makes sense to motivate researchers to disclose found flaws with the company, rather than competitors or cyber-criminals.<\/p>\n<p>Reflecting this, Apple has raised its maximum bounty from $200,000 to $1 million, with an additional 50 percent paid to researchers who identify a flaw while an OS is still in beta.<\/p>\n<p>The fee scale varies.<\/p>\n<p>For example, a lock screen bypass will fetch $100,000, user data extraction $250,000 while a network attack with no user interaction that an access high-value user data will net a researcher $500,000.<\/p>\n<p>While it is true to say Apple\u2019s platforms are highly secure, they are not invulnerable and those flaws that do exist command huge fees on the dark web.<\/p>\n<p>Criminals, governments and other dubious groups will spend millions on ways to break into iPhones, iPads and Macs.<\/p>\n<p>The hope is that by offering more generous bounties, Apple will take some hitherto unknown flaws out of the market and more quickly learn of new ones.<\/p>\n<p>Apple is offering bounties to researchers who can identify security flaws in Macs, iPads, Apple TV, Apple Watch, iOS and iCloud.<\/p>\n<p>Apple\u2019s rebooted bug bounty scheme begins this fall.<\/p>\n<p>Security researchers have been pressing Apple to widen its bug bounty scheme for some time.<\/p>\n<p>After all, Apple only began offering such a scheme in 2016 and even then only to selected researchers and only for iOS.<\/p>\n<p>During his briefing at Black Hat, Kristic revealed that Apple has learned of 50 serious vulnerabilities during the three years it has offered a bug bounty.<\/p>\n<p>Apple is now open to submissions from all researchers, not just its invited group.<\/p>\n<p>It makes sense to see this as another big step on Apple\u2019s part to kick back against those who use small exploits in its systems to track users, exfiltrate personal data and undermine security for other <a href=\"https:\/\/www.middleeastmonitor.com\/20190114-israeli-company-admits-spying-on-emir-of-qatar\/\" rel=\"noopener nofollow\" target=\"_blank\">egregious ends<\/a>.<\/p>\n<p>A string of in the wild iPhone exploits were reported in recent months.<\/p>\n<p>In July, six critical security vulnerabilities <a href=\"https:\/\/i.blackhat.com\/USA-19\/Wednesday\/us-19-Silvanovich-Look-No-Hands-The-Remote-Interactionless-Attack-Surface-Of-The-iPhone.pdf\" rel=\"noopener nofollow\" target=\"_blank\">originally discovered<\/a> by Google\u2019s Project Zero team were patched in iOS 12.4, these included bugs that could be <a href=\"https:\/\/googleprojectzero.blogspot.com\/2019\/08\/the-fully-remote-attack-surface-of.html\" rel=\"noopener nofollow\" target=\"_blank\">executed remotely<\/a> on a device without user interaction.<\/p>\n<p>As a general rule, it\u2019s not hard to spot a pattern around security releases and major cyber-security events like Black Hat.<\/p>\n<p>You almost always see platform security patches appear just before the event with another following a little later, patching any fresh vulnerabilities exposed at the show.<\/p>\n<p>This is at least the case on responsible platforms.<\/p>\n<p>Black Hat saw multiple iOS vulnerabilities discussed, many of were previously disclosed to Apple and patched in iOS 12.4.<\/p>\n<p>With <a href=\"https:\/\/www.applemust.com\/ios-12-is-now-installed-on-c-90-of-all-iphones-apple-claims\/\" rel=\"noopener nofollow\" target=\"_blank\">90 percent<\/a> of current iOS devices now running iOS 12, I\u2019d urge any iPhone, iPad or Mac user to upgrade their systems to the latest version of the OS as soon as they can.<\/p>\n<p>Given the nature of this year\u2019s crop of vulnerabilities, enterprise security chiefs should encourage their IT support teams to expedite approval of the latest software update for installation.<\/p>\n<p>Please follow me on<em>\u00a0<a href=\"https:\/\/twitter.com\/jonnyevans_cw\" rel=\"nofollow\">Twitter<\/a>, or join me in the\u00a0<a href=\"https:\/\/mewe.com\/join\/appleholics_bar_and_grill\" rel=\"nofollow\">AppleHolic\u2019s bar &amp; grill<\/a>\u00a0and\u00a0<a href=\"https:\/\/mewe.com\/join\/apple_discussions\" rel=\"nofollow\">Apple Discussions<\/a>\u00a0groups on MeWe.<\/em><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3431150\/apple-announces-a-new-iphone-and-you-can-t-have-it.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2019\/07\/cso_black_hat_hacker_by_matiasenelmundo_gettyimages-823247618_blue_binary_matrix_binary_rain_by_bannosuke_gettyimages-687353118_2400x1600-100802503-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Jonny Evans| Date: Fri, 09 Aug 2019 06:55:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>Apple has announced a new iPhone for 2020, but it will only be made available to a select group of security researchers \u2013 along with huge bounties to anyone informing the company of a new OS vulnerability.<\/p>\n<h2><strong>Probably the world\u2019s most exclusive iPhone<\/strong><\/h2>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Ivan_Krsti%C4%87\" rel=\"noopener nofollow\" target=\"_blank\">Ivan Krsti\u0107<\/a>, Apple\u2019s head of security engineering provided big insights into Apple\u2019s platform security during his presentation at <a href=\"https:\/\/www.blackhat.com\/us-19\/briefings\/schedule\/#behind-the-scenes-of-ios-and-mac-security-17220\" rel=\"noopener nofollow\" target=\"_blank\">Black Hat U.S. 2019<\/a>.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3431150\/apple-announces-a-new-iphone-and-you-can-t-have-it.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[2211,10480,21640,10554,714],"class_list":["post-16037","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-apple","tag-ios","tag-macs","tag-mobile","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16037","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16037"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16037\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16037"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16037"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16037"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}