Safely Submitting Apple Bug Bounty Reports from a Potentially Compromised Environment
I’ve identified some potential security issues that I believe qualify for Apple’s bug bounty program.
However, my concern is that the device and network I normally use may be compromised, and I want to ensure that my submission reaches Apple securely and cannot be intercepted or tampered with in transit.
Does anyone know the safest way to:
- Prepare and send a bug bounty report from a potentially compromised environment
- Verify that the report is received directly by Apple Security without interception
- Use an alternative secure communication channel (e.g., PGP encryption, trusted relay, or other methods)
I’m not sharing any details of the exploits here—just asking for guidance on how to submit responsibly and securely.
iPhone 15 Pro Max, iOS 18