Apple’s new hacker-friendly iPhones offer security researchers unrestricted access to devices so that they can easily hunt down vulnerabilities and bugs. But Ben Hawkes, technical lead at Project Zero, a team at Google tasked with discovering security flaws, says he’s “pretty disappointed” with Apple’s latest security program.
Hawkes, in a Twitter thread, said that its team won’t be able to take advantage of Apple’s “Security Research Device” (SRD) iPhones since it appears to exclude security groups that have a policy to publish their findings in three months.
Every time a security researcher discovers a vulnerability, they offer the company a period of time to patch it before it is publicly reported. Project Zero, like many security researchers, has a 90-day policy. However, Apple has kept the control of the timeline to itself and developers who sign up for this new iPhone security program have to agree that they can’t disclose the issues they find until Apple allows them to.
“If you report a vulnerability affecting Apple products, Apple will provide you with a publication date (usually the date on which Apple releases the update to resolve the issue). Apple will work in good faith to resolve each vulnerability as soon as practical. Until the publication date, you cannot discuss the vulnerability with others,” notes the SRD program’s sign-up page.
Project Zero is one of the most widely regarded research groups, and since early 2015, it has reported over 350 security vulnerabilities to Apple.
“We’ll continue to research Apple platforms and provide Apple with all of our findings because we think that’s the right thing to do for user security. But I’ll confess, I’m pretty disappointed,” Hawkes added in a tweet.
Apple’s Security Research Device program has been long overdue and was first mentioned last year at the Black Hat security conference by the company’s head of security, Ivan Krstic. Over the past year or two, iPhone’s security has been found lax and compromised on multiple occasions. The new program ensures eligible developers don’t have to go out of their way to hack into iPhones for research purposes and allows them to access the device’s core components to unearth any potential vulnerabilities.
Security researchers can now sign up to request an SRD on a 12-month renewable basis.
Related Posts
Your future Samsung phone might finally run on truly “Samsung-made” silicon
The new team sits under Samsung’s System LSI division, with SoC veteran Park Bong‑il tapped to lead the effort.
I analyzed 7 Galaxy S26 renders, here’s what you need to care about
While some are seemingly based on insider information and others feel largely like guesswork, I took a look at a bunch of them to decide which ones might be the closest to being realistic - if not entirely accurate.
A foldable iPhone is coming, and it may change how you see foldables forever
According to a new report from the Economic Daily News, the design is basically locked in. Supply chain insiders were quoted saying Apple is done with the experimental phase and is now just tweaking the final details. This is a huge signal that the company is aiming to get this thing on shelves by late 2026.