MacStadium is controlled by @SummitPartners who also own jamf.

They virtualize macOS.

There is an iOS simulator in @MacStadium.

They are literally controlled by the same company, “a continued relationship with @Apple.”

Apple wants @CorelliumHQ because they want control 🥴
Have a bigger write up coming. How Apple turns a blind eye, how their research device is bogus and potentially discriminates disadvantaged researchers from ever participating in their bug bounty.

They want @CorelliumHQ so bad because.

We sent Apple a bug 4 months ago 🐌🥱⏱
MacStadium:

"iOS simulator testing

Mobile app testing uses a combination of local devices, real device clouds, and iOS simulators (which need to run on macOS instances)."

macstadium.com/qa-and-testing

Weird that they only want @CorelliumHQ...
MacStadium just chilling 20 mins away from Apple Campus, weird that they go after Corellium tho

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Sick.Codes

Sick.Codes Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @sickcodes

19 Aug
Apple was supposed to be in our @DEFCON talk.

We sent them the vulnerability 4 months ago. They contacted us before the talk assuring us that we wouldn’t mention them, and we said, “sure because it’s not fixed yet.”

The vulnerability was discovered using a virtualized MacOS
This is weird because the SRD is only for iPhones.

@Apple will you release a security research device for the desktop?

Does the Mac security not matter as much as iOS?

I used a jailbroken iPhone to verify and then on old OS via @CorelliumHQ.

Leave Corellium alone #safeharbor
Apple takes security researchers for granted. Every single CVE is discovered on non-SRD devices.

I don’t think NSO Group was in the SRD program 😂

I used my own security research tool, along with 130,000 others:
github.com/sickcodes/Dock…
Read 6 tweets
17 Aug
Umm #ChipShortage feels like it’s getting WORSE not better 😂 companies are panic buying many popular items on Mouser/Digi-Key...

Should we turn to unsafe supply-chain sourcing?

“... Expected 17/8/2023!”

Hint: good time to open a semi fab 😂!
For those who don’t understand the shortage, open up one of your least favorite smart devices, find the parts on mouser.com and see if it’s out of stock, or “On-Order”, etc.
Also, it should considered a national security risk, by all governments. Desperate companies will turn to shady markets for parts, inducing unneeded supply chain risk. Would be a great time to subsidize some home turf fabs, instead of relying on a handful.

#SinglePointOfFailure
Read 4 tweets
21 Apr
FYI: @SAP does NOT have a public bug bounty program and this weird blog post is just to solicit free research. They don’t pay.

blogs.sap.com/2021/02/23/bug…

If your BBP is private then why tf are you boasting about it on your blog 😂?
I got scammed into submitting research into their public program. Told them next time I’ll submit then through @thezdi instead.
Left a comment on the blog post:

blogs.sap.com/2021/02/23/bug…
Read 5 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!

:(