Advertisement
Unlike the regular iPhones, the research iPhones will come with specific, custom-built iOS software and debugging tools that make it easier for security researchers to run their code
Apple said that that shell access is available for security researchers and they will be able to run any tools and choose entitlements.
If they confirm a vulnerability, they will have to report it to Apple and, if the bug is in third-party code, to the appropriate third party.
Related Articles
Advertisement