{"id":36221,"date":"2020-07-22T22:53:31","date_gmt":"2020-07-22T22:53:31","guid":{"rendered":"http:\/\/5eb87ef5-bb21-4802-820a-9c6e6d344b0e"},"modified":"2020-07-22T22:53:31","modified_gmt":"2020-07-22T22:53:31","slug":"googles-project-zero-team-wont-be-applying-for-apples-srd-program","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/googles-project-zero-team-wont-be-applying-for-apples-srd-program\/","title":{"rendered":"Google&#8217;s Project Zero team won&#8217;t be applying for Apple&#8217;s SRD program"},"content":{"rendered":"<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2020\/07\/22\/8358b923-9615-4d83-84b7-739d05850ffb\/apple-srd.png\" class alt=\"Apple SRD\"><\/span><figcaption><span class=\"caption\"><\/span><span class=\"credit\"> Image: Apple <\/span><\/figcaption><\/figure>\n<div class=\"relatedContent alignRight\" readability=\"9.5135135135135\">\n<h3 class=\"heading\"> <span class=\"int\">special feature<\/span> <\/h3>\n<div class=\"thumb\"> <a href=\"https:\/\/www.zdnet.com\/topic\/securing-your-mobile-enterprise\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\" data-vanity-rewritten=\"true\"> <span class=\"img \"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/r\/2016\/06\/30\/91c9a3dc-977e-4860-96e4-2b7a8f09ad12\/resize\/220x165\/29141746b92408569acf6c91863e4efb\/sf-mobilesecurity2.jpg\" class alt=\"Securing Your Mobile Enterprise\" height=\"165\" width=\"220\"><\/span> <\/a> <\/div>\n<p class=\"title\"> <a href=\"https:\/\/www.zdnet.com\/topic\/securing-your-mobile-enterprise\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\" data-vanity-rewritten=\"true\"> Securing Your Mobile Enterprise <\/a> <\/p>\n<p class=\"dek\">Mobile devices continue their march toward becoming powerful productivity machines. But they are also major security risks if they aren&#8217;t managed properly. We look at the latest wisdom and best practices for securing the mobile workforce.<\/p>\n<p class=\"read-more\"> <a href=\"https:\/\/www.zdnet.com\/topic\/securing-your-mobile-enterprise\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\" data-vanity-rewritten=\"true\">Read More<\/a> <\/p>\n<\/p><\/div>\n<p>Some of the biggest names in the iPhone vulnerability research field have announced plans today to skip Apple&#8217;s new Security Research Device (SRD) program due to Apple&#8217;s restrictive rules surrounding the vulnerability disclosure process that effectively muzzles security researchers.<\/p>\n<p>The list includes Project Zero (Google&#8217;s elite bug-hunting team), Will Strafach (CEO of mobile security company Guardian), ZecOps (mobile security firm who recently discovered <a href=\"https:\/\/www.zdnet.com\/article\/apple-investigating-report-of-a-new-ios-exploit-being-used-in-the-wild\/\" target=\"_blank\" rel=\"noopener noreferrer\">a series of iOS attacks<\/a>), and Axi0mX (iOS vulnerability researcher and the author of the <a href=\"https:\/\/www.zdnet.com\/article\/new-checkm8-jailbreak-released-for-all-ios-devices-running-a5-to-a11-chips\/\" target=\"_blank\" rel=\"noopener noreferrer\">Checkm8 iOS exploit<\/a>).<\/p>\n<h3>What is the Apple SRD program<\/h3>\n<p>The Security Research Device (SRD) program is unique among smartphone makers. Through the SRD program, Apple has promised to provide pre-sale iPhones to security researchers.<\/p>\n<p>These iPhones are modified to have fewer restrictions and allow deeper access to the iOS operating system and the device&#8217;s hardware, so security researchers can probe for bugs that they normally wouldn&#8217;t be able to discover on standard iPhones where the phone&#8217;s default security features prevent security tools from seeing deeper into the phone.<\/p>\n<p>Apple officially announced the SRD program in December 2019, when the company also <a href=\"https:\/\/www.zdnet.com\/article\/apple-expands-bug-bounty-to-macos-raises-bug-rewards\/\" target=\"_blank\" rel=\"noopener noreferrer\">expanded its bug bounty program<\/a> to include more of its operating systems and platforms.<\/p>\n<p>However, while the company teased the program last year, it wasn&#8217;t until today <a href=\"https:\/\/www.techmeme.com\/200722\/p26#a200722p26\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">that Apple actually launched it<\/a> by publishing an <a href=\"https:\/\/developer.apple.com\/programs\/security-research-device\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">official SRD website<\/a> and emailing selected security researchers and bug hunters to invite them to apply for the vetting process needed to receive an untethered iPhone.<\/p>\n<h3>Restrictive new rule<\/h3>\n<p>This new website also contained the SRD program&#8217;s official rules, which security researchers haven&#8217;t had a chance to review in great detail.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\"> <\/section>\n<p>But while the security community greeted Apple&#8217;s SRD announcement last year with joy, considering it a first step in the right direction, they weren&#8217;t very happy with Apple today.<\/p>\n<p>According to complaints shared on social media, it was one particular clause that rubbed most security researchers the wrong way:<\/p>\n<p><em>&#8220;If you report a vulnerability affecting Apple products, Apple will provide you with a publication date (usually the date on which Apple releases the update to resolve the issue). Apple will work in good faith to resolve each vulnerability as soon as practical. Until the publication date, you cannot discuss the vulnerability with others.&#8221;<\/em><\/p>\n<p>The clause effectively allows Apple to muzzle security researchers.<\/p>\n<p>The clause gives Apple full control of the vulnerability disclosure process. It allows the iPhone maker to set the publication date when security researchers are allowed to talk or publish anything about vulnerabilities they discover in iOS and the iPhone, while part of the SRD program.<\/p>\n<p>Many security researchers are now afraid that Apple will abuse this clause to delay important patches and drag its feet on delivering much-needed security updates by postponing the publication date after which they&#8217;re allowed to talk about iOS bugs.<\/p>\n<p>Others are afraid that Apple will use this clause to silence their work and prevent them from even publishing about their work.<\/p>\n<h3>Project Zero and others decide not to apply<\/h3>\n<p>The first to notice this clause and understand its implications was Ben Hawkers, the Google Project Zero team lead.<\/p>\n<p>&#8220;It looks like we won&#8217;t be able to use the Apple &#8216;Security Research Device&#8217; due to the vulnerability disclosure restrictions, which seem specifically designed to exclude Project Zero and other researchers who use a 90-day policy,&#8221; <a href=\"https:\/\/twitter.com\/benhawkes\/status\/1286021329246801921\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Hawkes said on Twitter today<\/a>.<\/p>\n<p>Hawkes tweet garnered a lot of attention in the infosec community, and other security researchers soon followed the team&#8217;s decision. <a href=\"https:\/\/www.cnet.com\/news\/apples-new-security-program-puts-special-iphone-hardware-into-researchers-hands\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Speaking to ZDNet sister-site CNET<\/a>, Will Strafach also said he won&#8217;t be joining the program because of this very same clause.<\/p>\n<p>On Twitter, cyber-security firm ZecOps also announced it would skip the SRD program and continue hacking iPhones the old fashion way.<\/p>\n<figure class=\"media-source\">\n<div class=\"twitterContainer\" readability=\"7.5096774193548\">\n<blockquote class=\"twitter-tweet\" readability=\"8.4483870967742\">\n<p lang=\"en\" dir=\"ltr\">ZecOps will not use the &#8220;dedicated research device&#8221; released by <a href=\"https:\/\/twitter.com\/Apple?ref_src=twsrc%5Etfw\" rel=\"noopener noreferrer\" target=\"_blank\" data-component=\"externalLink\">@Apple<\/a> due to the program&#8217;s restrictions and minimal benefits. We will continue to report bugs to Apple because it&#8217;s the right thing to do. <\/p>\n<p>Instead of releasing dedicated research device we encourage Apple to &#8230;<\/p>\n<p>\u2014 ZecOps (@ZecOps) <a href=\"https:\/\/twitter.com\/ZecOps\/status\/1286023732616507398?ref_src=twsrc%5Etfw\" rel=\"noopener noreferrer\" target=\"_blank\" data-component=\"externalLink\">July 22, 2020<\/a><\/p><\/blockquote><\/div>\n<\/figure>\n<p>In a conversation with ZDNet, security researcher Axi0mX said they were thinking about not participating as well.<\/p>\n<p>&#8220;Disclosure deadlines are standard practice in the industry. They are necessary,&#8221; the researcher said.<\/p>\n<p>&#8220;Apple is requiring researchers to wait for an unlimited amount of time, at Apple&#8217;s discretion, before they can disclose any bugs found with Security Research Device Program. There is no deadline. This is a poison pill,&#8221; he added.<\/p>\n<p>Alex Stamos, Facebook&#8217;s former Chief Information Security Officers, also criticized Apple&#8217;s move, which was part of a larger set of decisions the company has taken in recent months against the cyber-security and vulnerability research community &#8212; which also included <a href=\"https:\/\/www.zdnet.com\/article\/corellium-hits-back-against-apple-lawsuit-claims-ios-virtualization-is-for-the-common-good\/\" target=\"_blank\" rel=\"noopener noreferrer\">a lawsuit against a mobile device virtualization company<\/a> that aided security researchers track down iOS bugs.<\/p>\n<figure class=\"media-source\">\n<div class=\"twitterContainer\" readability=\"6.7073954983923\">\n<blockquote class=\"twitter-tweet\" readability=\"6.7073954983923\">\n<p lang=\"en\" dir=\"ltr\">If Apple wins this battle (which includes their lawsuit against virtualization platforms) then we can kiss impactful public security research in the US goodbye. Only private bounty participants and lawsuit-proof foreign adversaries will be able to do OS security work.<\/p>\n<p>\u2014 Alex Stamos (@alexstamos) <a href=\"https:\/\/twitter.com\/alexstamos\/status\/1286024963510607877?ref_src=twsrc%5Etfw\" rel=\"noopener noreferrer\" target=\"_blank\" data-component=\"externalLink\">July 22, 2020<\/a><\/p><\/blockquote><\/div>\n<\/figure>\n<p>It&#8217;s one thing to see no-name security researchers talk down a security program, but it&#8217;s another thing to see the biggest names in the industry attacking one.<\/p>\n<h3>Apple&#8217;s security programs are not well viewed<\/h3>\n<p>The fears that Apple might abuse the SRD program rules to bury important iOS bugs and research are justified, for those who followed Apple&#8217;s security programs. Apple has been accused of the exact same practice before.<\/p>\n<p>In a series of tweets posted in April, macOS and iOS developer Jeff Johnson attacked the company for not being serious enough about its security work.<\/p>\n<p>&#8220;I&#8217;m thinking about withdrawing from the Apple Security Bounty program,&#8221; <a href=\"https:\/\/twitter.com\/lapcatsoftware\/status\/1252561366080278529\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Johnson said<\/a>. &#8220;I see no evidence that Apple is serious about the program. I&#8217;ve heard of only 1 bounty payment, and the bug wasn&#8217;t even Mac-specific. Also, Apple Product Security has ignored my last email to them for weeks.<\/p>\n<p>&#8220;Apple announced the program in August, didn&#8217;t open it until a few days before Christmas, and now still have not paid a single Mac security researcher to my knowledge. It&#8217;s a joke. I think the goal is just to keep researchers quiet about bugs for as long as possible,&#8221; Johnson said.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/googles-project-zero-team-wont-be-applying-for-apples-srd-program\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Other security researchers have expressed similar intentions to skip the Apple SRD program after the program rules give Apple full control of the vulnerability disclosure process.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":36222,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-36221","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Google&#039;s Project Zero team won&#039;t be applying for Apple&#039;s SRD program 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/googles-project-zero-team-wont-be-applying-for-apples-srd-program\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Google&#039;s Project Zero team won&#039;t be applying for Apple&#039;s SRD program 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/googles-project-zero-team-wont-be-applying-for-apples-srd-program\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-22T22:53:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/googles-project-zero-team-wont-be-applying-for-apples-srd-program.png\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-project-zero-team-wont-be-applying-for-apples-srd-program\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-project-zero-team-wont-be-applying-for-apples-srd-program\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Google&#8217;s Project Zero team won&#8217;t be applying for Apple&#8217;s SRD program\",\"datePublished\":\"2020-07-22T22:53:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-project-zero-team-wont-be-applying-for-apples-srd-program\\\/\"},\"wordCount\":1118,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-project-zero-team-wont-be-applying-for-apples-srd-program\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/googles-project-zero-team-wont-be-applying-for-apples-srd-program.png\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-project-zero-team-wont-be-applying-for-apples-srd-program\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-project-zero-team-wont-be-applying-for-apples-srd-program\\\/\",\"name\":\"Google's Project Zero team won't be applying for Apple's SRD program 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-project-zero-team-wont-be-applying-for-apples-srd-program\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-project-zero-team-wont-be-applying-for-apples-srd-program\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/googles-project-zero-team-wont-be-applying-for-apples-srd-program.png\",\"datePublished\":\"2020-07-22T22:53:31+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-project-zero-team-wont-be-applying-for-apples-srd-program\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-project-zero-team-wont-be-applying-for-apples-srd-program\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-project-zero-team-wont-be-applying-for-apples-srd-program\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/googles-project-zero-team-wont-be-applying-for-apples-srd-program.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/googles-project-zero-team-wont-be-applying-for-apples-srd-program.png\",\"width\":770,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-project-zero-team-wont-be-applying-for-apples-srd-program\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Google&#8217;s Project Zero team won&#8217;t be applying for Apple&#8217;s SRD program\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Google's Project Zero team won't be applying for Apple's SRD program 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/googles-project-zero-team-wont-be-applying-for-apples-srd-program\/","og_locale":"en_US","og_type":"article","og_title":"Google's Project Zero team won't be applying for Apple's SRD program 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/googles-project-zero-team-wont-be-applying-for-apples-srd-program\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-07-22T22:53:31+00:00","og_image":[{"width":770,"height":500,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/googles-project-zero-team-wont-be-applying-for-apples-srd-program.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/googles-project-zero-team-wont-be-applying-for-apples-srd-program\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/googles-project-zero-team-wont-be-applying-for-apples-srd-program\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Google&#8217;s Project Zero team won&#8217;t be applying for Apple&#8217;s SRD program","datePublished":"2020-07-22T22:53:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/googles-project-zero-team-wont-be-applying-for-apples-srd-program\/"},"wordCount":1118,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/googles-project-zero-team-wont-be-applying-for-apples-srd-program\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/googles-project-zero-team-wont-be-applying-for-apples-srd-program.png","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/googles-project-zero-team-wont-be-applying-for-apples-srd-program\/","url":"https:\/\/www.threatshub.org\/blog\/googles-project-zero-team-wont-be-applying-for-apples-srd-program\/","name":"Google's Project Zero team won't be applying for Apple's SRD program 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/googles-project-zero-team-wont-be-applying-for-apples-srd-program\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/googles-project-zero-team-wont-be-applying-for-apples-srd-program\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/googles-project-zero-team-wont-be-applying-for-apples-srd-program.png","datePublished":"2020-07-22T22:53:31+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/googles-project-zero-team-wont-be-applying-for-apples-srd-program\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/googles-project-zero-team-wont-be-applying-for-apples-srd-program\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/googles-project-zero-team-wont-be-applying-for-apples-srd-program\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/googles-project-zero-team-wont-be-applying-for-apples-srd-program.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/googles-project-zero-team-wont-be-applying-for-apples-srd-program.png","width":770,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/googles-project-zero-team-wont-be-applying-for-apples-srd-program\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Google&#8217;s Project Zero team won&#8217;t be applying for Apple&#8217;s SRD program"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36221","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=36221"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36221\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/36222"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=36221"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=36221"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=36221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}