My security research PoC was confirming exploits that didn't exist

(stuart-thomas.com)

3 points | by ethical 5 hours ago ago

1 comments

  • ethical 5 hours ago ago

    Author here. Happy to answer questions about the methodology, the broader Are You There? series (16 closed findings in total), or how Apple's security response process works in practice.