Researchers being unhappy with Apple's security posture, is about the same as someone claiming that "water is wet".
Having personally reported an observed bug in Apple's OpenSSH implementation, and reported it, and having had Apple subsequently closed it as a duplicate bug, and then only having seen it actually *fixed* two years later, with 0 attribution (either to me, or whomever apparently had previously reported it hence it being closed as a duplicate)? Yeah, that stings. Albeit, that was before they had a bug bounty program, so it wasn't as if it hurt materially. It was more: wow, it took you two years to patch that, and I wasn't even the first person to bring it to your attention? Geeze you rest on your laurels something awful!
Though I personally, could care less about bug bounty programs, which in my humble opinion negatively incentivize the field of research.
Full disclosure: I know Katie Moussouris personally. She and I do not see eye to eye on bug bounty programs. She advocates for such things, so seeing her outspoken here is also no surprise. In my personal opinion, I think bug bounties are like giving safe haven and sponsorship and potentially even ammunition to your sworn enemies, when you probably had a bunch of paying customers and maybe even some internal engineers already ringing alarm bells that were being ignored as the roof sprouts yet another leak.
Nonetheless, bug bounty programs do now exist in the industry, against all better judgement. Apple was late to implement such a thing, but many organizations which ship code used by swaths of users, still have nothing in such realms. IMHO, such organizations are better for it, but they probably also don't have hundreds of billions of dollars in cash as Apple does, and thus are not likely to be detracted for their lack of bug bounty programs by individuals who would choose to manipulate the market to their world view.
Maybe I should also mention that I am friends with a number of individuals who were part of MoAB (Month of Apple Bugs) wherein every day, for 30 days, a new Apple exploit was disclosed.
Albeit, that was not for monetary gain! That was also, long before Apple had a bug bounty program.
That was mostly to hammer home a point against Apple fans and Daring Fireball sorts of dip it.sh types who claimed that legitimate security researchers were not disclosing legitimate findings.
I don't recall if Daring Fireball ever issued an apology to Johnny Cache nor David Maynor, but I do recall that Apple issued a number of patches to address the exploits disclosed in MoAB.
If researchers are in this field to make money, they picked the wrong industry.
The billionaires in tech are more often than not, egregious robber barons, claiming spoils for others' creations. Bill Gates did not invent BASIC, he monetized it. Bill Gates did not write MS-DOS, he bought Tim Patterson's rip off of Gary Kildall's CP/M. So, when you have monied idolatry and hero worship in the tech sector with big dollar amounts being bandied about, a lot of people get the completely wrong idea that they can somehow earn a living at it, instead of realizing the true nature of greed and duplicity.
Apple has never demonstrated, to me at least, that they take reporting bugs through official channels with as much severity as exploits appearing in the wild. They are not alone in that, but I don't see this particular story as anything new or remarkable either. I could enumerate other bug bounty programs where the researchers were upset they did not get pay outs, or got significantly less than they expected as well. It is not unique to Apple, it is the nature of the beast.
Real villainy in the realms of computer security research is common place. Some of it, is extremely well funded. Typically, the better funded it is, the less likely that research will ever be disclosed to the upstream vendors to actually patch the bugs. To wit, since being released, Kevin Mitnick has come under some, IMHO, deserved scrutiny for offering his security evaluation services to companies who subsequently pocket the findings rather than disclose them to the vendors in which the vulnerabilities were found.
As contrasted with the likes of Crypto AG, or other COINTELPRO which is part and parcel with information warfare, Apple seems relatively benign. If anything, their stance seems pretty rooted in the reality that there were in excess of 100 Apple ][ clones back in the day (
https://en.wikipedia.org/wiki/List_of_Apple_II_clones) and those early endeavors being copying and resold by other vendors in the market, I think gave Apple a pretty bad taste in their mouth early enough in their history that they considered that many "researchers" were adversarial and treated them accordingly.
That evaluation may still be entirely, 100% accurate, but to Apple's credit, they still at least seem to be attempting to "play ball" ethically in the here and now, whether by offering bug bounty programs to keep pace with some of their competitors, or in appealing the Corellium decision. I have it on good authority that Apple even paid SRI for use of the patents on Bill English's mouse invention way back when, and in subsequent years seemed to be pretty savvy with buying out other IP owners before adapting such technology for their own use (e.g. Apple bought Fingerworks, before they utilized the extensive IP Fingerworks had previously established in gesture driven UIs, which later went into iOS and the iPhone). A lot of other companies in this industry, never pay due diligence to prior art.
Anyway, will this change anything? Will additional pressure on Apple lead to anything great? I kind of doubt it, but as their cash reserves and market share have grown, more haters and vulnerabilities aimed their way will doubtlessly increase as well.