Fortune | FORTUNE 2024年10月31日
Apple is challenging hackers to break into the company’s servers: If you’re successful, you could earn up to $1 million
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

苹果重视服务器安全,推出安全研究挑战,悬赏100万美元给能成功攻破其技术的人。此挑战与iOS 18.1的新AI功能相关,旨在保护Private Cloud Compute服务器。公司邀请黑客和安全专家尝试找出漏洞,并提供了安全指南和部分源代码,还列出了不同难度黑客行为的奖励金额。

🍎苹果重视服务器安全,开展安全研究挑战,与iOS 18.1新AI功能的推出相配合,该服务器名为Private Cloud Compute(PCC),公司极力保护其免受网络攻击和安全漏洞威胁。

📄苹果向业余黑客和安全专家发出邀请,尝试在其PCC服务器中寻找漏洞,并提供安全指南,详细说明了服务器的功能、如何验证请求以及如何防止入侵,甚至在GitHub上发布了部分PCC的源代码。

💰苹果列出了攻破服务器的奖励金额,根据难度和严重性不同,从数万美元到数百万美元不等。如因部署或配置问题导致意外数据披露可获5万美元,能执行未经验证的代码可获10万美元等,若能在用户不知情或未允许的情况下任意执行代码,将获100万美元。

Apple is taking its server safety very seriously. The $3.5 trillion software giant is challenging hackers to break into the company’s tech—and a $1 million check is up for grabs to those who succeed.The “security research challenge” coincides with Apple’s rollout of its new AI-powered Apple Intelligence offering, as part of iOS 18.1. The server on which many of the Intelligence commands are run is called the Private Cloud Compute (PCC) server—and Apple is desperate to protect that server from any cyberattacks, hacks, or security breaches. The company swiftly sent out a call to amateur hackers and security experts alike to attempt to poke holes in its PCC: “Today we’re making these resources publicly available to invite all security and privacy researchers—or anyone with interest and a technical curiosity—to learn more about PCC and perform their own independent verification of our claims,” Apple wrote in a statement last week. “And we’re excited to announce that we’re expanding Apple Security Bounty to include PCC, with significant rewards for reports of issues with our security or privacy claims.”The tech firm also supplied a security guide for the server, detailing how it functions, how it authenticates requests, and how it’s built to protect against break-ins. It even released the source code for some parts of PCC on GitHub. Then it outlined the rewards for anyone willing to give it a whirl: anywhere from hundreds of thousands to millions of dollars, depending on the difficulty and gravity of the hack.The parameters of the bug bountySo just how much could you take home if you manage to break into Apple’s servers? “We award maximum amounts for vulnerabilities that compromise user data and inference request data outside the PCC trust boundary,” Apple explained, before breaking down the bug bounty on offer. If you’re able to hit upon “accidental or unexpected data disclosure due to [a] deployment or configuration issue,” you’ll get $50,000.Moving up the chain, if you can “execute unattested code,” you’ll get $100,000.Gaining “access to a user’s request data or other sensitive information about the user outside the trust boundary” gets you $150,000, while access to sensitive information about the user’s requests outside the trust boundary gets $250,000.In the blog post explaining the challenge, Apple wrote that it considers PCC to be the “most advanced security architecture ever deployed for cloud AI compute at scale, and we look forward to working with the research community to build trust in the system and make it even more secure and private over time.”What’s more, if a hacker spots a security issue not covered by Apple’s outline, the company still promises to consider providing a bounty. And the big-ticket ask? If a hacker is able to pull off “arbitrary execution of code without the user’s permission or knowledge with arbitrary entitlements,” they’ll be awarded $1,000,000.Recommended newsletter Data Sheet: Stay on top of the business of tech with thoughtful analysis on the industry's biggest names. Sign up here.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

苹果 服务器安全 安全挑战 奖励金额 PCC服务器
相关文章