Apple has unveiled a bug bounty program offering rewards of up to $1 million for those who successfully hack into the servers behind its upcoming Apple Intelligence service. Announced last week, the initiative is designed to rigorously assess the security of the servers that will process certain Apple Intelligence requests, a key component of the AI-powered service set to officially launch next week.
To strengthen the security of its Private Cloud Compute (PCC) servers, which handle data processing when requests exceed a device’s capabilities, Apple is inviting security experts, hackers, and researchers to find potential vulnerabilities. These proactive measures include making the servers accessible to privacy experts for inspection and launching a Virtual Research Environment (VRE) for in-depth security analysis.
Also Read: Apple Launches iOS 18.1 with New AI Platform ‘Apple Intelligence’ for iPhone 16 and 15 Pro
In support of this initiative, Apple has also published a Private Cloud Compute Security Guide. This comprehensive document outlines the architecture of the PCC, detailing how requests are authenticated, how software runs securely within Apple’s data centers, and the defenses in place to protect against cyberattacks. It provides essential insights into Apple’s data-handling protocols, all aimed at preventing unauthorized access and safeguarding sensitive user information.
Apple’s VRE offers participants a closer look into PCC’s software, running in a Mac-based environment. Researchers can inspect each software release, analyze security updates, and interact with parts of the source code, some of which Apple has made available on GitHub.
The million-dollar bounty is structured around identifying vulnerabilities in three critical areas:
- Accidental Data Disclosure: Identifying flaws that could lead to unintended data exposure due to server misconfiguration or design errors.
- External Compromise from User Requests: Finding vulnerabilities that could allow attackers to exploit user requests and gain unauthorized access to PCC.
- Physical or Internal Access Breaches: Discovering flaws in PCC’s internal interfaces that could enable unauthorized individuals to compromise the system.
Apple has also stated that it will consider rewarding significant security issues that may not fall under these categories. Reports will be evaluated based on the quality of the presentation, proof of exploitation, and the potential impact on users.