Security researcher hands Apple details of Keychain bug, calls for explanation regarding l...
Linus Henze has informed Apple of all details regarding a bug he discovered in the macOS Keychain security software, and has done so without payment from the company. He previously withheld the information in protest of the company's lack of a Bug Bounty for Mac, but now says the problem is too important to keep to himself.
German teenager Linus Henze has sent Apple full details of a Keychain security exploit that he demonstrated in early February, and has done so despite the company ignoring his previous conditions. Henze says that he has decided to reveal the details to Apple because the bug he's found "is very critical and because the security of macOS users is important to me."
"I'm willing to immediately submit you the full details - including a patch," he said in an email to the company dated Feb. 5. "If an official Apple representative sends me an official (and reasonable!) statement why Apple does not have nor wants to create a Bug Bounty program for macOS."
Apple did reach out to Henze to ask about his discovery, but not to discuss his demands. On Feb. 8, he emailed again, re-stating his conditions, but seemingly got no response.
There have been no reports of the exploit being used by malicious apps but AppleInsider explained that concerned users can make sure they're safe by adding an extra password to the login keychain.
While Apple does have a Bug Bounty program for researchers who find security problems in iOS, even that has been called stingy compared to other firms.
German teenager Linus Henze has sent Apple full details of a Keychain security exploit that he demonstrated in early February, and has done so despite the company ignoring his previous conditions. Henze says that he has decided to reveal the details to Apple because the bug he's found "is very critical and because the security of macOS users is important to me."
The 18-year-old had discovered a macOS bug that could allow apps to see passwords held in Mojave's Keychain security feature. He developed an app he called KeySteal to demonstrate it, but originally refused to inform Apple. Henze was protesting against the fact that Apple has no Bug Bounty program for macOS the way it does for iOS.I've decided to submit my keychain exploit to @Apple, even though they did not react, as it is very critical and because the security of macOS users is important to me. I've sent them the full details including a patch. For free of course.
-- Linus Henze (@LinusHenze)
"I'm willing to immediately submit you the full details - including a patch," he said in an email to the company dated Feb. 5. "If an official Apple representative sends me an official (and reasonable!) statement why Apple does not have nor wants to create a Bug Bounty program for macOS."
Apple did reach out to Henze to ask about his discovery, but not to discuss his demands. On Feb. 8, he emailed again, re-stating his conditions, but seemingly got no response.
There have been no reports of the exploit being used by malicious apps but AppleInsider explained that concerned users can make sure they're safe by adding an extra password to the login keychain.
While Apple does have a Bug Bounty program for researchers who find security problems in iOS, even that has been called stingy compared to other firms.
Comments
I don't know all the details of this situation, and he's in Germany so applicable principles might be very different, but I wouldn't rule out the possibility that he could face civil liability if he didn't take reasonable action (e.g. revealing details of the exploit to Apple) to mitigate the risk of harm to others. Again, the general rule would protect him from such liability. But I can think of exceptions which could possibly apply in this case. So it's possible - though I don't mean to suggest likely, I just don't know enough to make such an assessment - that he's now been made aware that he could face civil liability if he doesn't disclose the details of the exploit to Apple and, as a result of Apple not being able to address the problem as quickly, third parties are harmed.
The sensible thing to do would be to band together with other security researchers and petition for such a program, not try low-level extortion as a first approach. Apple was absolutely right to respond but ignore the demands.
Bringing attention to Apple’s inconsistencies with a bug-bounty for iOS and a lack of one for MacOS is a good thing.
There was no blackmail! There was no exploit in the wild. No one was a risk yet. But, it was just a matter of time before it became an issue, and the researcher decided to release more information to Apple.
The real risk here is Apple’s half-assed approach to security for MacOS. I own an iPhone and iPad, and I was looking forward to a MacOS based purchase (probably an A Series one). My motivation with sticking was Apple was their superior approach to security in iOS vs Google. But, the lack of a bug-bounty program means MacOS is inferior to Windows. Windows has plenty of flaws (not a fan of Windows 10) but there are enough advantages, especially in hardware, that my next PC will be Windows.
This determination is important. I’ve found myself spending more time looking at Android devices also. My desire to go “all Apple” has fallen apart.
I’m not in the market a phone at the moment, but Samsung’s DeX is cooler than Apple’s AR with not uses.
https://www.samsung.com/us/business/solutions/samsung-dex/
My perception of Apple recently is “hear no evil, see no evil” or if a security issue isn’t in the news, and therefore not a PR problem... it’s not that big a problem. Security is a 24/7 problem! Not a fan of Apple’s approach... If I’m not aware of a problem, I can’t mediate the risk.
For issues like this, tech nerds play a disproportionate role in the perception and reputation of a company. Apple prides itself on privacy and security. Bounty programs are rapidly becoming industry standard. Hackers do a lot of work for tech companies by finding these bugs. Whether Apple choses to compensate them for their work (and for the security value they provide) is obviously up to Apple, but when other companies have bounty program it makes Apple look cheap and increase the risk that people either won't continue to look for Mac security flaws or worse, will sell them to someone else who will pay.
If Apple wants to kill macOS they can stop selling Macs, and just take the $25 billion revenue hit—nearly the size of a Fortune 100 company btw—and skip the part where they shoot themselves in the foot by trashing their reputation.
But I get it... Mr. Cook hates the Mac and wants to force you to use an iPad. *eyeroll*
Others companies give money rewards for such findings.
I also think Apple should have already developed a much more robust version of iOS for iPad. It seems silly to have spent the past year or so touting the iPad as powerful enough to replace traditional computers without putting the required effort into fast-tracking the software development. Rumours have it, though, that the next version of iOS will be a significant step forward for the iPad. If this comes to pass -- I think it will eventually --, then we'll have to see what Apple does with iOS on the iPad. Maybe it will become capable enough to be "the" OS. Today, it's not (for me and many other "power" users). But that doesn't mean it can't become something much better.