Rephrase and rearrange the whole content into a news article. I want you to respond only in language English. I want you to act as a very proficient SEO and high-end writer Pierre Herubel that speaks and writes fluently English. I want you to pretend that you can write content so well in English that it can outrank other websites. Make sure there is zero plagiarism.:
- Images are circulating on social media of Apple’s official jailbroken iPhones.
- The Security Research Devices are shipped to professionals who try to find and report security bugs.
Jailbreaking iPhones — essentially, hacking iOS to remove security features — is a talking point on social media again.
But this time, Apple is the one doing the jailbreaking.
Gergely Kalman, a security researcher, posted a photo of a “Security Research Device,” or SRD, a jailbroken iPhone 14 Pro sent to him Apple, on X (formerly known as Twitter).
The photo also included a page of instructions for researchers and several promotional stickers with the device.
Kalman, who runs a cybersecurity firm based in Spain, said in the replies that he was “a bit shocked” at some of the jailbroken features.
Apple pre-jailbreaks the devices, allowing third-party researchers to probe for vulnerabilities without worrying about being locked out.
“This allows the rest of the security policies to remain enabled, providing the flexibility of a jailbroken device, while keeping the systems you’re investigating intact in a customer-like state,” read the instructions in Kalman’s photo.
Any new vulnerabilities found are reported to Apple and addressed the iOS developers. Researchers who find new vulnerabilities are eligible for a financial reward.
Aside from the jailbreaking, the devices are essentially “identical” to normal iPhones, Kalman told TechCrunch.
Kalman did not return a request for comment from Business Insider before publication.
Apple started offering so-called “bug bounties” in 2020, TechCrunch reported. Researchers are provided SRDs for 12-month periods, though access to the devices themselves is tightly controlled.
The bounties listed on Apple’s security website range considerably; on the lower end of the spectrum, a $5,000 reward is available to researchers who manage to access an app bypassing the lock screen “without significant or very technical effort.”
Those who find a new vulnerability allowing them to bypass the iOS Lockdown Mode — an exceptionally difficult feat — may be eligible for a payout worth up to $2 million.
That’s not to say that Apple condones customers jailbreaking its devices. The tech giant has long held that “unauthorized modifications” to iOS can cause numerous performance issues, including crashes, freezes, and shortened battery life.
“Apple strongly cautions against installing any software that modifies iOS,” the iPhone User Guide said. “It is also important to note that unauthorized modification of iOS is a violation of the iOS and iPadOS Software License Agreement and because of this, Apple may deny service for an iPhone that has any unauthorized software installed.”