{"id":5794,"date":"2019-03-05T09:00:06","date_gmt":"2019-03-05T09:00:06","guid":{"rendered":"http:\/\/howk.de\/w1\/researcher-shares-macos-keychain-exploit-with-apple-despite-bug-bounty-shutout\/"},"modified":"2019-03-05T09:00:06","modified_gmt":"2019-03-05T09:00:06","slug":"researcher-shares-macos-keychain-exploit-with-apple-despite-bug-bounty-shutout","status":"publish","type":"post","link":"https:\/\/howk.de\/?p=5794","title":{"rendered":"Researcher Shares macOS Keychain Exploit With Apple Despite Bug Bounty Shutout"},"content":{"rendered":"<p><a href=\"https:\/\/hothardware.com\/news\/researcher-shares-macos-bug\"><img decoding=\"async\" src=\"https:\/\/hothardware.com\/ContentImages\/NewsItem\/47381\/thumbnail\/default\/bigth.jpg\" alt=\"Researcher Shares macOS Keychain Exploit With Apple Despite Bug Bounty Shutout\" align=\"left\" border=\"0\" hspace=\"10\" vspace=\"5\"><\/a><br \/>\nEarly last month a security researcher announced that he had discovered a severe bug in macOS that left passwords stored in keychain vulnerable. The catch was that the researcher, Linuz Henze, refused to share the flaw with Apple because he was unable to get paid for his work. While Apple operates a bug bounty program for iOS where finding <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Early last month a security researcher announced that he had discovered a severe bug in macOS that left passwords stored in keychain vulnerable. The catch was that the researcher, Linuz Henze, refused to share the flaw with Apple because he was unable to get paid for his work. While Apple operates a bug bounty program [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.9.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Researcher Shares macOS Keychain Exploit With Apple Despite Bug Bounty Shutout - Howk IT-Dienstleistungen<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/howk.de\/?p=5794\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Researcher Shares macOS Keychain Exploit With Apple Despite Bug Bounty Shutout - Howk IT-Dienstleistungen\" \/>\n<meta property=\"og:description\" content=\"Early last month a security researcher announced that he had discovered a severe bug in macOS that left passwords stored in keychain vulnerable. The catch was that the researcher, Linuz Henze, refused to share the flaw with Apple because he was unable to get paid for his work. While Apple operates a bug bounty program [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/howk.de\/?p=5794\" \/>\n<meta property=\"og:site_name\" content=\"Howk IT-Dienstleistungen\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/howk.de\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-05T09:00:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hothardware.com\/ContentImages\/NewsItem\/47381\/thumbnail\/default\/bigth.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/howk.de\/?p=5794#article\",\"isPartOf\":{\"@id\":\"https:\/\/howk.de\/?p=5794\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/howk.de\/#\/schema\/person\/b029bd02d4f35dce869ef54c81a100c5\"},\"headline\":\"Researcher Shares macOS Keychain Exploit With Apple Despite Bug Bounty Shutout\",\"datePublished\":\"2019-03-05T09:00:06+00:00\",\"dateModified\":\"2019-03-05T09:00:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/howk.de\/?p=5794\"},\"wordCount\":70,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/howk.de\/#organization\"},\"articleSection\":[\"Hi Tech\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/howk.de\/?p=5794#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/howk.de\/?p=5794\",\"url\":\"https:\/\/howk.de\/?p=5794\",\"name\":\"Researcher Shares macOS Keychain Exploit With Apple Despite Bug Bounty Shutout - Howk IT-Dienstleistungen\",\"isPartOf\":{\"@id\":\"https:\/\/howk.de\/#website\"},\"datePublished\":\"2019-03-05T09:00:06+00:00\",\"dateModified\":\"2019-03-05T09:00:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/howk.de\/?p=5794#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/howk.de\/?p=5794\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/howk.de\/?p=5794#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/howk.de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Researcher Shares macOS Keychain Exploit With Apple Despite Bug Bounty Shutout\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/howk.de\/#website\",\"url\":\"https:\/\/howk.de\/\",\"name\":\"Howk IT-Dienstleistungen\",\"description\":\"Howk IT Services - Howk IT-Dienstleistungen\",\"publisher\":{\"@id\":\"https:\/\/howk.de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/howk.de\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/howk.de\/#organization\",\"name\":\"HowK\",\"url\":\"https:\/\/howk.de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/howk.de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/howk.de\/w1\/wp-content\/uploads\/2013\/12\/howk-logo.png\",\"contentUrl\":\"https:\/\/howk.de\/w1\/wp-content\/uploads\/2013\/12\/howk-logo.png\",\"width\":170,\"height\":170,\"caption\":\"HowK\"},\"image\":{\"@id\":\"https:\/\/howk.de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/howk.de\",\"http:\/\/de.linkedin.com\/in\/howkde\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/howk.de\/#\/schema\/person\/b029bd02d4f35dce869ef54c81a100c5\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/howk.de\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b5a20f4d07bca1b73f25cff58a1116c4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b5a20f4d07bca1b73f25cff58a1116c4?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/howk.de\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Researcher Shares macOS Keychain Exploit With Apple Despite Bug Bounty Shutout - Howk IT-Dienstleistungen","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/howk.de\/?p=5794","og_locale":"en_US","og_type":"article","og_title":"Researcher Shares macOS Keychain Exploit With Apple Despite Bug Bounty Shutout - Howk IT-Dienstleistungen","og_description":"Early last month a security researcher announced that he had discovered a severe bug in macOS that left passwords stored in keychain vulnerable. The catch was that the researcher, Linuz Henze, refused to share the flaw with Apple because he was unable to get paid for his work. While Apple operates a bug bounty program [&hellip;]","og_url":"https:\/\/howk.de\/?p=5794","og_site_name":"Howk IT-Dienstleistungen","article_publisher":"https:\/\/www.facebook.com\/howk.de","article_published_time":"2019-03-05T09:00:06+00:00","og_image":[{"url":"https:\/\/hothardware.com\/ContentImages\/NewsItem\/47381\/thumbnail\/default\/bigth.jpg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/howk.de\/?p=5794#article","isPartOf":{"@id":"https:\/\/howk.de\/?p=5794"},"author":{"name":"admin","@id":"https:\/\/howk.de\/#\/schema\/person\/b029bd02d4f35dce869ef54c81a100c5"},"headline":"Researcher Shares macOS Keychain Exploit With Apple Despite Bug Bounty Shutout","datePublished":"2019-03-05T09:00:06+00:00","dateModified":"2019-03-05T09:00:06+00:00","mainEntityOfPage":{"@id":"https:\/\/howk.de\/?p=5794"},"wordCount":70,"commentCount":0,"publisher":{"@id":"https:\/\/howk.de\/#organization"},"articleSection":["Hi Tech"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/howk.de\/?p=5794#respond"]}]},{"@type":"WebPage","@id":"https:\/\/howk.de\/?p=5794","url":"https:\/\/howk.de\/?p=5794","name":"Researcher Shares macOS Keychain Exploit With Apple Despite Bug Bounty Shutout - Howk IT-Dienstleistungen","isPartOf":{"@id":"https:\/\/howk.de\/#website"},"datePublished":"2019-03-05T09:00:06+00:00","dateModified":"2019-03-05T09:00:06+00:00","breadcrumb":{"@id":"https:\/\/howk.de\/?p=5794#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/howk.de\/?p=5794"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/howk.de\/?p=5794#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/howk.de\/"},{"@type":"ListItem","position":2,"name":"Researcher Shares macOS Keychain Exploit With Apple Despite Bug Bounty Shutout"}]},{"@type":"WebSite","@id":"https:\/\/howk.de\/#website","url":"https:\/\/howk.de\/","name":"Howk IT-Dienstleistungen","description":"Howk IT Services - Howk IT-Dienstleistungen","publisher":{"@id":"https:\/\/howk.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/howk.de\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/howk.de\/#organization","name":"HowK","url":"https:\/\/howk.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/howk.de\/#\/schema\/logo\/image\/","url":"https:\/\/howk.de\/w1\/wp-content\/uploads\/2013\/12\/howk-logo.png","contentUrl":"https:\/\/howk.de\/w1\/wp-content\/uploads\/2013\/12\/howk-logo.png","width":170,"height":170,"caption":"HowK"},"image":{"@id":"https:\/\/howk.de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/howk.de","http:\/\/de.linkedin.com\/in\/howkde"]},{"@type":"Person","@id":"https:\/\/howk.de\/#\/schema\/person\/b029bd02d4f35dce869ef54c81a100c5","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/howk.de\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b5a20f4d07bca1b73f25cff58a1116c4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b5a20f4d07bca1b73f25cff58a1116c4?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/howk.de\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/howk.de\/index.php?rest_route=\/wp\/v2\/posts\/5794"}],"collection":[{"href":"https:\/\/howk.de\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/howk.de\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/howk.de\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/howk.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5794"}],"version-history":[{"count":0,"href":"https:\/\/howk.de\/index.php?rest_route=\/wp\/v2\/posts\/5794\/revisions"}],"wp:attachment":[{"href":"https:\/\/howk.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5794"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/howk.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5794"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/howk.de\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5794"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}