NEWS

Security Researcher Hands Apple Details of Keychain Bug

03/04/2019

2801

Linus Henze has informed Apple of all details regarding a bug he discovered in the macOS Keychain security software, and has done so without payment from the company. He previously withheld the information in protest of the company's lack of a Bug Bounty for Mac, but now says the problem is too important to keep to himself.


German teenager Linus Henze has sent Apple full details of a Keychain security exploit that he demonstrated in early February, and has done so despite the company ignoring his previous conditions. Henze says that he has decided to reveal the details to Apple because the bug he's found "is very critical and because the security of macOS users is important to me."


 I’ve decided to submit my keychain exploit to @Apple, even though they did not react, as it is very critical and because the security of macOS users is important to me. I’ve sent them the full details including a patch. For free of course.


Security Researcher Hands Apple Details of Keychain Bug


The 18-year-old had discovered a macOS bug that could allow apps to see passwords held in Mojave's Keychain security feature. He developed an app he called KeySteal to demonstrate it, but originally refused to inform Apple. Henze was protesting against the fact that Apple has no Bug Bounty program for macOS the way it does for iOS.


"I'm willing to immediately submit you the full details - including a patch," he said in an email to the company dated Feb. 5. "If an official Apple representative sends me an official (and reasonable!) statement why Apple does not have nor wants to create a Bug Bounty program for macOS."


Apple did reach out to Henze to ask about his discovery, but not to discuss his demands. On Feb. 8, he emailed again, re-stating his conditions, but seemingly got no response.


There have been no reports of the exploit being used by malicious apps but AppleInsider explained that concerned users can make sure they're safe by adding an extra password to the login keychain.


While Apple does have a Bug Bounty program for researchers who find security problems in iOS, even that has been called stingy compared to other firms.


Source: appleinsider

Windows
Mac OS
iOS
Linux
3uTools
Win 64-bit For this device
V9.0 2025-11-11
Download
Win 32-bit For this device
V9.0 2025-11-11
Download
3uTools V3.18
2025-09-18
Please use the 3uTools PC client to install the iOS client:
1、 Install either the Windows or Mac version of 3uTools on your computer
2、 Open the PC client and connect your device to the computer via USB cable
3、 After the connection is successful, wait for the computer to automatically install the mobile app for the device, or locate “Install Mobile App” on the computer and manually click to install.
3uTools
deb file
v3.01 2025-11-20
Download
rpm file
v3.01 2025-11-20
Download
Windows
iOS
Android
3uAirPlayer
Win 64-bit For this device
V6.0.2 2025-11-19
Download
Win 32-bit For this device
V6.0.2 2025-11-19
Download
iOS Device Mirroring (No App Required)
1、 Install 3uAirPlayer on the Windows PC
2、 Open Control Center and select Screen Mirroring
3、 From the list, choose your PC to start mirroring
4、 Or connect your iOS device to the PC via USB to begin mirroring
Scan to get "3uAirPlayer" App