2 pointsby ethical2 hours ago1 comment
  • ethical2 hours ago
    Author here. Happy to answer questions about the methodology, the broader Are You There? series (16 closed findings in total), or how Apple's security response process works in practice.