Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Apple <strong>Security</strong> Bounty<br />
Few dozen initially invited researchers<br />
If vulnerabilities that would be covered under <strong>the</strong> program are submitted by researchers<br />
outside of <strong>the</strong> program, we will review <strong>the</strong> submission and, if <strong>the</strong> work merits it, invite<br />
researcher into <strong>the</strong> program and reward <strong>the</strong> vulnerability