Apple finally introduces bug bounty programme

Bug bounty

Apple has finally announced the creation of a bug bounty programme, in order to let external researchers patch up any holes in its security.

The company will pay security experts up to $200,000 (153,400) for flaws in its secure boot firmware, up to $100,000 for flaws exfiltrating confidential data from the secure enclave processor, and up to $50,000 for flaws executing arbitrary code with kernel privileges on iOS.

Additionally, Apple will offer a maximum of $25,000 to anyone that can get at user data within a sandboxed process, and a prize of up to $50,000 for anyone that can get into iCloud account information from its servers.

The news was announced at the annual Black Hat security conference by Ivan Krsti, Apple's head of security engineering and architecture. "We've had great help from researchers like you and the security mechanisms we build have gotten stronger," he said.

"The feedback that we've heard pretty consistently both from my red team and Apple and also directly is that it's getting more difficult to find some of the most critical types of security vulnerabilities."

The programme will be invitation-only at first, and will start off with a "few dozen" researchers. Krsti also added that if a researcher donates their bounty to charity, Apple will match the amount.

Bug bounty programmes, where companies pay hackers in exchange for telling them about any vulnerabilities they find in their software, are a staple of the security industry. Companies like Google, Microsoft, Uber, and even PornHub all use bug bounties as a way of encouraging hackers to discreetly report flaws rather than exploit them.

Despite being one the largest companies in the tech industry, Apple has waited longer than most of its competition to implement a bounty programme. The company has come in hard though, and its bounties are among the most generous offered by a major corporation.

Apple has not made public why it is finally opening up a bug bounty programme after so long, but it may have something to do with its spat with the US government earlier this year.

The FBI was attempting to force Apple to break its own encryption, but backed down after a third-party company did it for them. Apple consequently opened up its early iOS 10 code to developers, leaving it unencrypted, meaning developers could spot flaws and offer patches.

Adam Shepherd

Adam Shepherd has been a technology journalist since 2015, covering everything from cloud storage and security, to smartphones and servers. Over the course of his career, he’s seen the spread of 5G, the growing ubiquity of wireless devices, and the start of the connected revolution. He’s also been to more trade shows and technology conferences than he cares to count.

Adam is an avid follower of the latest hardware innovations, and he is never happier than when tinkering with complex network configurations, or exploring a new Linux distro. He was also previously a co-host on the ITPro Podcast, where he was often found ranting about his love of strange gadgets, his disdain for Windows Mobile, and everything in between.

You can find Adam tweeting about enterprise technology (or more often bad jokes) @AdamShepherUK.