Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Why don't you guys read the article? They have gotten money for FOUR exploits SO FAR. They WILL GET MORE MONEY.

It shows 4 payments but it doesn't state 4 exploits. Considering there are words like "vulnerabilities" && "system memory leaks" then the text clearly suggest there were more discoveries than one in each segment (payment breakdown).

As part of Apple's Security Bounty Program, the group was able to receive considerable payments for some of their work. As of Sunday, October 4, they had received four payments totaling $51,500. This included $5,000 for disclosing the full name of iCloud users, $6,000 for finding IDOR vulnerabilities, $6,500 for access to internal corporate environments, and $34,000 for discovering system memory leaks containing customer data.
 
Just me, but the rewards is pittance. They'll attract more black hats than white hats. Black hats now knows that there were lots of discovered vulnerabilities. They'll go poking for others, but won't report them to Apple for chump change. They'll cash in by selling to others, most likely China or the Feds.
 
It shows 4 payments but it doesn't state 4 exploits. Considering there are words like "vulnerabilities" && "system memory leaks" then the text clearly suggest there were more discoveries than one in each segment (payment breakdown).

As part of Apple's Security Bounty Program, the group was able to receive considerable payments for some of their work. As of Sunday, October 4, they had received four payments totaling $51,500. This included $5,000 for disclosing the full name of iCloud users, $6,000 for finding IDOR vulnerabilities, $6,500 for access to internal corporate environments, and $34,000 for discovering system memory leaks containing customer data.
"However, it appears that Apple does payments in batches and will likely pay for more of the issues in the following months."
 
  • Like
Reactions: Colstan
50k for 55 discoveries. On average, it doesn't seem to be worthwhile... I would think they would pay more since lawsuits and internal software releases would cost exponentially more. Always looking for the best deal, even with iOS security.
 
User privacy and security are #1.

Be sure:

Overall, Apple was very responsive to our reports. The turn around for our more critical reports was only four hours between time of submission and time of remediation.

Also:

To be brief: Apple's infrastructure is massive.

They own the entire 17.0.0.0/8 IP range, which includes 25,000 web servers with 10,000 of them under apple.com, another 7,000 unique domains, and to top it all off, their own TLD (dot apple). Our time was primarily spent on the 17.0.0.0/8 IP range, .apple.com, and .icloud.com since that was where the interesting functionality appeared to be.

---

We've obtained permission from the Apple security team (product-security@apple.com) to publish this and are doing so under their discretion. All of the vulnerabilities disclosed here have been fixed and re-tested.

That seems to be quite a low payment for finding 55 problems. Each guy made about $850/week.

Did you read the article?

However, it appears that Apple does payments in batches and will likely pay for more of the issues in the following months.
 
  • Like
Reactions: Colstan
This is definitely one area I feel is Apple's strong points. The desire to squash out the bugs. Best part is they can mass update everyone within the iOS support plan. You can not find this type of effort with Google, and nor do they have the power to compel the carriers to update as well. I love Android for the emulators but security... you have to know out the door what your honestly getting. +1 to Apple.
 
  • Disagree
Reactions: SteveJUAE
This seems like a low payout to me for the amount of effort that went in. Five people spent three months on this and were apparently quite prolific - they found 55 different vulnerabilities that Apple evidently knew nothing about. I feel like somebody able to find these kinds of bugs is probably worth at least $100K/year, and maybe 2-5 times that amount. So they had 5 of these people for 3 months = 15 months or 1.25 years. Apple should be paying a minimum of $125K for it all, and maybe as much as $600K.

On the other hand, though, how much value does Apple get out of having these vulnerabilities solved? Were they ever going to be discovered by malicious actors otherwise? How much damage would those actors have been able to do?

I don't disagree, just a remark, we don't know if they where on it full time.
 
"launch a worm capable of automatically taking over a victim's iCloud account"

You'd think that such a bug would warrant the one million dollar bounty. If not that, then what warrants it? I mean the hackers could literally take over Apple employee accounts, see secret hidden product information and automatically take over entire iCloud accounts. Those are insane security holes.
Conspicuously missing from the summary is a list of precisely what conditions are necessary to exploit the vulnerability. If, say, this one could only be triggered when the date is past the year 3000, during a leap second on February 29th and the user is in zero G and the user’s name starts with “”... then it’s a serious problem (because of the potential consequences), but not one warranting the one million dollar bounty.
 
  • Like
Reactions: fredrik9
Seems like the researchers that got the stipend, still opted for the stipend instead of going rogue with them. That seems to say they don't share your point of view.
Nobody knows for sure what was done with the security exploit beforehand (including me). My guess would be that Apple (and others) would/should only pay out to the first people who bring the exploit to their attention. If the bounty is paltry then that opens the door to running the acceptable risk of making a little extra shady cash on the side before submitting it for bounty. If the bounty is appealing enough you wouldn't run that risk.
 
  • Like
Reactions: PC_tech
Nobody knows for sure what was done with the security exploit beforehand (including me). My guess would be that Apple (and others) would/should only pay out to the first people who bring the exploit to their attention. If the bounty is paltry then that opens the door to running the acceptable risk of making a little extra shady cash on the side before submitting it for bounty. If the bounty is appealing enough you wouldn't run that risk.
It doesn’t matter to apple is my guess. But if these researchers double deal, they could set themselves up for some unpleasantness in the future. Again as I noted above whatever the researchers uncovered and what they got paid for, imo, would depend a lot on the vulnerability.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.