That same year, Apple announced the Security Research Device Program with the aim of help others find vulnerabilities in iOS and on the devices themselves. Participants would have access to the same devices as Apple’s internal security team in order to investigate. This means that dwould have specially modified material for your investigations.
Everything seems to indicate that Apple would start shipping iPhones rooted to all who have joined the program
Modified iPhones shipped would come with access root by default. Something similar to the capabilities that jailbreaking gave us to users. This makes it much easier for researchers to analyze the core of the operating system without the need for third-party applications to access it.
he Security search device (SRD), Security Investigation Device, is ready to use in controlled security settings for the investigation. Access to shell
is available and allows you to run any tool and choose the rights. On the other hand, the SRD behaves almost the same as a standard iPhone in order to conduct representative research.
Apple indicates that IPhones delivered are loaned only and must be returned after 12 months if the interviewer decides not to re-enroll in the program. Any vulnerabilities found in devices while in the program should be reported to Apple, which offers rewards through the Apple Security Bounty.
If you are planning to sign up for the program, you have all the information available on the Apple Developer website, where you can see all the requirements required for registration to be accepted.
Without a doubt Apple takes the security of our devices seriously. Although one of the last campaigns focused on this one with the slogan “Privacy. It’s the iPhone. Initiatives like this will certainly contribute to an even safer future within the Apple ecosystem for all of our devices.