Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
I’d blame modern day DevOps environments for this happening in the first place. Automated testing, poor timelines, rapid deployment and development. It’s a frigging rush-the-code-our-the-door factory where security is an afterthought handled by software engineers that might not know a lot about infrastructure or security. Horrible!

Hearing stories I'm pretty sure there is no modern day DevOps going on at Apple. That would at least flag several of these exploits.
 
The security could be better if they weren't operating a blackmarket of vulnerabilities and instead were reporting them to Apple. But hey, greed trumps the security of users I guess?
If Apple would finally have a real bug bounty program and the dev-fused iPhones they announced for security researchers more than a year ago but never rolled out this would provide an good alternative to the black market and people would just choose that.

That someone who's working months on finding security issues needs to get paid for their time spent on it makes sense, otherwise only companies like Google's Project Zero who can fund it will be able to do research on it.

Would you work on something for free for month just to improve the security of a billion dollar company?
[automerge]1589540036[/automerge]
I’d blame modern day DevOps environments for this happening in the first place. Automated testing, poor timelines, rapid deployment and development. It’s a frigging rush-the-code-our-the-door factory where security is an afterthought handled by software engineers that might not know a lot about infrastructure or security. Horrible!

Are you saying that security was better in the olden days where there was apparently no such "rush" to get code out the door? I'd highly doubt that, all the changes that were added to modern operating systems weren't there before and it was trivial to exploit any old software. It's quite the opposite really as even the programming languages used were way easier to get wrong where things nowadays are already more secure by default. It's just that the surface area is way larger now and there's a lot more incentives to gain access or exploit software than it was before. Software will never be flawless no matter how much testing there is, otherwise we wouldn't have things like satellites, rockets or Boing airplanes having issues with software.
[automerge]1589540084[/automerge]
Hearing stories I'm pretty sure there is no modern day DevOps going on at Apple. That would at least flag several of these exploits.

Why would "DevOps" be in charge of security reviews?
 
... And in other news, Apple will likely not roll out iOS 14 / iPad OS 14 to iPad mini 4, iPad Air 2 (the two top selling iPads of their times), among other devices.
 
It's like saying:

- Apple has made major contributions toward the fight of covid 19
- google sells you advertising.

The original post was some implied snark.

You are right, that my statement was snarky. What I wanted to exemplify was the fact, that currently Apple misses some important quality goals, that are fundamental to a leading tech company.

The way Apple works poses some real threats to their future success.
 
You are right, that my statement was snarky. What I wanted to exemplify was the fact, that currently Apple misses some important quality goals, that are fundamental to a leading tech company.

The way Apple works poses some real threats to their future success.
All companies miss these goals, including Microsoft, which was a point I made somewhere. If Microsoft can't get it right, no company can. Android isn't quite the bastion of safety and privacy either.
 
iOS is still the world's most advanced and secure operating system in the entire world. Nobody can convince me otherwise. We get always best-in-class security and privacy protection when we choose an Apple device.
And what exactly do you base your opinion on? Apple commercials? Here we have a fact that clearly shows that your opinion is wrong.
 
Hate to play devils advocate - but how do we know that the claim from the company is fact or fiction? If you wanted to be a company seeking the limelight what would you do? Would you pull a stunt like this? Or would you do something else?
Not to mention iOS 14 is JUST around the corner. Who’s gonna pay for exploits that could be worth nothing in a month or two?
 
  • Like
Reactions: xnsys
Not to mention iOS 14 is JUST around the corner. Who’s gonna pay for exploits that could be worth nothing in a month or two?
Only small fraction of the code is changed from one release to another. Respectively, one should expect that only a small fraction of the vulnerabilities may be gone. Remember, these are the vulnerabilities that Apple does not know about (otherwise they would have fixed them already)
 
Only small fraction of the code is changed from one release to another. Respectively, one should expect that only a small fraction of the vulnerabilities may be gone. Remember, these are the vulnerabilities that Apple does not know about (otherwise they would have fixed them already)
How do you know how much code was changed from one release to another? Especially a new version of ios. Your spitballing here. Correlation does not imply causation. Not only that Apple could know about some vulnerabilities but prioritize what it has to fix first. Additionally it's very easy, via public blogs, to see the vulnerabilities discovered that the company (any company) didn't know about and I posted one example of a zero-day related to Windows that somehow was not turned around in a day.
 
How do you know how much code was changed from one release to another? Especially a new version of ios. Your spitballing here. Correlation does not imply causation. Not only that Apple could know about some vulnerabilities but prioritize what it has to fix first. Additionally it's very easy, via public blogs, to see the vulnerabilities discovered that the company (any company) didn't know about and I posted one example of a zero-day related to Windows that somehow was not turned around in a day.
I am a software designer and I know software livecycle very well. It's you who are spitballing and trying to question obvious things. There are no public blogs about the vulnerabilities used by Zerodium. For obvious reasons they do not disclose this information. To learn about these vulnerabilities, Apple have to buy them, as many people here already suggested. Apple does not do it.
 
I am a software designer and I know software livecycle very well. It's you who are spitballing and trying to question obvious things. There are no public blogs about the vulnerabilities used by Zerodium. For obvious reasons they do not disclose this information. To learn about these vulnerabilities, Apple have to buy them, as many people here already suggested. Apple does not do it.
You’re spitballing because you don’t know apples internal workings. There are public blogs about the vulnerabilities after they are remediated so you know who found what. Microsoft et al credits the finder. These are the public blogs.
 
Last edited:
You’re spitballing because you don’t know apples internal workings. There are public blogs about the vulnerabilities after they are remediated so you know who found what. Microsoft et al credits the finder.thise are public blogs.
And we are talking about the vulnerabilities purchased and used by Zerodium. Some of them might be discovered by others and fixed but to say (as OP did) that Zerodium might have stopped buying iOS vulnerabilities a few months before the release of a new version is just an ignorant spitballing and an attempt to find an excuse for Apple. Did Zerodium stop buying iOS bugs before? No. Why? It's not like the next iOS release will be just a second release or a particularly special one. Besides, Android 11 will be revealed on June 3rd. Why did not Zerodium stop using Android vulnerabilities until then?
 
And we are talking about the vulnerabilities purchased and used by Zerodium. Some of them might be discovered by others and fixed but to say (as OP did) that Zerodium might have stopped buying iOS vulnerabilities a few months before the release of a new version is just an ignorant spitballing and an attempt to find an excuse for Apple. Did Zerodium stop buying iOS bugs before? No. Why? It's not like the next iOS release will be just a second release or a particularly special one. Besides, Android 11 will be revealed on June 3rd. Why did not Zerodium stop using Android vulnerabilities until then?
Nobody has any real facts of what’s behind it and there’s a lot of uniformed spitballing masquerading as facts.

Zerodium is still buying android vulnerabilities because the market share argument applies to bigger payloads, imo.

This tit for tat discussions can be spun any which way. (edited for clarity)
 
Last edited:
Hate to play devils advocate - but how do we know that the claim from the company is fact or fiction? If you wanted to be a company seeking the limelight what would you do? Would you pull a stunt like this? Or would you do something else?

bingo we have a winner
 
  • Like
Reactions: xnsys
I don't think it's a matter of bidding. Exploit finders seek out Zerodium because they pay more than Apple's bounty. Apple would have to pay out larger bounties to attract the type of person who seeks out Zerodium.
Yeah, that's what I was trying to say. Their bounties are pitiful compared to:

  1. How much they say they care about privacy and security
  2. How many customers they have
  3. How much money they have
  4. How much they charge for each product
Are they worried about an avalanche of reports they'd have to pay out iif they up their bounty? If so, that seems worrying. But if it's only 20 per year, pay tens of millions. Who cares? They have Apple money.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.