Because we care deeply about any compromise to user privacy or security, we will consider any security issue that has a significant impact to PCC for an Apple Security Bounty reward, even if it doesn’t match a published category. We’ll evaluate every report according to the quality of what's presented, the proof of what can be exploited, and the impact to users. Visit our Apple Security Bounty page to learn more about the program and to submit your research.
You are viewing a single comment's thread from: