{"id":42376,"date":"2021-08-17T22:10:10","date_gmt":"2021-08-17T22:10:10","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/apple-says-its-csam-scan-code-can-be-verified-by-researchers-corellium-starts-throwing-out-dollar-bills\/"},"modified":"2021-08-17T22:10:10","modified_gmt":"2021-08-17T22:10:10","slug":"apple-says-its-csam-scan-code-can-be-verified-by-researchers-corellium-starts-throwing-out-dollar-bills","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/apple-says-its-csam-scan-code-can-be-verified-by-researchers-corellium-starts-throwing-out-dollar-bills\/","title":{"rendered":"Apple says its CSAM scan code can be verified by researchers. Corellium starts throwing out dollar bills"},"content":{"rendered":"<p><span data-label=\"updated\">Updated<\/span> Last week, Apple essentially invited security researchers to probe its forthcoming technology that&#8217;s supposed to help thwart the spread of known child sexual abuse material (CSAM).<\/p>\n<p>In an attempt to clear up what it characterized as misunderstandings about its <a href=\"https:\/\/www.theregister.com\/2021\/08\/09\/apple_csam_faq\/\" target=\"_blank\" rel=\"noopener\">controversial plan<\/a> to <a href=\"https:\/\/www.apple.com\/child-safety\/\">analyze<\/a> iCloud-bound photos for this awful material, the Cupertino giant described [<a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.apple.com\/child-safety\/pdf\/Security_Threat_Model_Review_of_Apple_Child_Safety_Features.pdf\">PDF<\/a>] the systems, protections, and mechanisms involved.<\/p>\n<p>Crucially, Apple repeatedly stated that its claims about its CSAM-scanning software are &#8220;subject to code inspection by security researchers like all other iOS device-side security claims.&#8221; And its senior veep of software engineering Craig Federighi went on the record to say &#8220;security researchers are constantly able to introspect what&#8217;s happening in Apple&#8217;s [phone] software.&#8221;<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"condor\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YRyRs745EwIEiVphXXZCfAAAAII&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YRyRs745EwIEiVphXXZCfAAAAII&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>Now, Florida-based infosec outfit Corellium is taking Apple up on that assertion. And yes, that&#8217;s the same Corellium Apple tried to drag through the courts, alleging \u201cunlawful commercialization of Apple\u2019s valuable copyrighted works,\u201d until it gave up that fight last week.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xmd=\",fluid,mpu,leaderboard,\" data-lg=\",fluid,mpu,leaderboard,\" data-xlg=\",fluid,billboard,superleaderboard,mpu,leaderboard,\" data-xxlg=\",fluid,billboard,superleaderboard,brandwidth,brandimpact,leaderboard,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44YRyRs745EwIEiVphXXZCfAAAAII&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44YRyRs745EwIEiVphXXZCfAAAAII&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<div class=\"adun_eagle_desktop_story_wrapper\">\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xxlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33YRyRs745EwIEiVphXXZCfAAAAII&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33YRyRs745EwIEiVphXXZCfAAAAII&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<\/p><\/div>\n<p>With that victory, of sorts, under its belt, and Apple&#8217;s invitation to bug hunters and cryptography experts, Corellium, which previously accused Apple of trying to hinder external security research, this week heralded the iPhone maker&#8217;s \u201ccommitment to holding itself accountable&#8221; by researchers.<\/p>\n<p>We feel there may be some sarcasm in that quote.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44YRyRs745EwIEiVphXXZCfAAAAII&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44YRyRs745EwIEiVphXXZCfAAAAII&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>In any case, Corellium has launched a $15,000 initiative to encourage researchers to test Apple&#8217;s commitment to accountability. Specifically, the initiative is open to proposals for &#8220;research projects designed to validate any security and privacy claims for any mobile software vendor, whether in the operating system or third-party applications,&#8221; though it&#8217;s clear it has Apple in mind.<\/p>\n<p>That may be because, depending on <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2020\/07\/23\/apple_iphone_security_research_device\/\" rel=\"noopener\">who you are<\/a>, Apple in the past at least has either made it difficult or slightly less than difficult to pore over its low-level, proprietary code for exploitable faults.<\/p>\n<p>&#8220;We applaud Apple\u2019s commitment to holding itself accountable by third-party researchers,&#8221; <a href=\"https:\/\/www.corellium.com\/blog\/open-security-initiative\">said<\/a> Corellium, which provides among other things virtualized iOS devices for infosec types to examine and probe for holes, adding: &#8220;We believe our platform is uniquely capable of supporting researchers in that effort.&#8221;<\/p>\n<div aria-hidden=\"true\" class=\"adun\" id=\"story_eagle_xsm_sm_md_xmd_lg_xlg\" data-pos=\"mid\" data-raptor=\"eagle\" data-xsm=\",mpu,dmpu,\" data-sm=\",mpu,dmpu,\" data-md=\",mpu,dmpu,\" data-xmd=\",mpu,dmpu,\" data-lg=\",mpu,dmpu,\" data-xlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33YRyRs745EwIEiVphXXZCfAAAAII&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33YRyRs745EwIEiVphXXZCfAAAAII&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>Up to 1700 EST on October 15, Corellium says it will accept security research proposals and judge them based on technical merits, feasibility, and presumed likelihood of success. The biz said it will award a $5,000 grant and a year of free access to its mobile device virtualization platform for up to three submissions.<\/p>\n<p>The program rules require any vulnerabilities found to be reported directly to the relevant vendor, so any bug bounty award from the vendor would depend on whether that company has a vulnerability reward program and what the program covers.<\/p>\n<p>True to form, Apple did not respond to a request for comment. Neither did Corellium.<\/p>\n<p>In a phone interview, Katie Moussouris, founder of <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.lutasecurity.com\/\">Luta Security<\/a> and a pioneer in designing bug bounties, told <i>The Register<\/i> she found it noteworthy that research grant programs, which have been around for years, are moving away from vendors.<\/p>\n<blockquote class=\"pullquote\" readability=\"6\">\n<p>It&#8217;s interesting that they&#8217;re offering research grants towards doing research for any mobile devices and not just iPhones<\/p>\n<\/blockquote>\n<p>&#8220;What&#8217;s interesting about the Corellium announcement is it&#8217;s no longer the vendors themselves offering research grants, which obviously I think is a great idea, but it&#8217;s a third-party that makes a virtualization platform that makes reverse engineering easier,&#8221; she said. &#8220;I also think it&#8217;s interesting that they&#8217;re offering research grants towards doing research for any mobile devices and not just iPhones.&#8221;<\/p>\n<p>Moussouris said it&#8217;s clear Corellium&#8217;s grant program would have happened if Apple&#8217;s litigation had not concluded.<\/p>\n<p>Asked about Federighi&#8217;s characterization of Apple&#8217;s openness with regard to security research, Moussouris said Apple&#8217;s perception of openness isn&#8217;t necessarily the same as the rest of the security industry.<\/p>\n<p>&#8220;Remember, for a long time, the Apple security team couldn&#8217;t even have the word &#8216;security&#8217; on their business cards,&#8221; she said. &#8216;They couldn&#8217;t talk about security at all. So I think that for Apple, this seems very open. For the rest of the world, Apple&#8217;s still on a much more secretive and closed side of things, including for security research.&#8221;<\/p>\n<p>Citing her role in the creation of the first Microsoft bug bounty program, Moussouris said, &#8220;I am a big fan of incentive programs, smart incentive programs that don&#8217;t create perverse incentives [like] overly rewarding things that should have been found internally by the organization itself, by its own employees, and by testing and tools.&#8221; \u00ae<\/p>\n<h3 class=\"crosshead\"> <span>Updated to add<\/span><br \/>\n<\/h3>\n<p>Apple on Tuesday filed an appeal [<a target=\"_blank\" href=\"https:\/\/regmedia.co.uk\/2021\/08\/18\/corellium.pdf\" rel=\"noopener\">PDF<\/a>] in the lawsuit it brought against Corellium and then settled [<a target=\"_blank\" href=\"https:\/\/regmedia.co.uk\/2021\/08\/18\/pacer_apple_corellium_final_judgment.pdf\" rel=\"noopener\">PDF<\/a>] last week.<\/p>\n<p>As we understand it, Apple is seeking to overturn US District Judge Rodney Smith&#8217;s decision to throw out Apple&#8217;s copyright claims against Corellium over the latter&#8217;s virtualization technology.<\/p>\n<p>Some parts of Apple&#8217;s lawsuit were dismissed by the judge, some parts regarding the DMCA were settled by Apple, and now Apple would like to continue suing Corellium on the points of copyright that were dismissed.<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2021\/08\/17\/corellium_apple_bounty\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here&#8217;s $15,000 to make that third-party inspection happen, says Florida outfit Updated\u00a0 Last week, Apple essentially invited security researchers to probe its forthcoming technology that&#8217;s supposed to help thwart the spread of known child sexual abuse material (CSAM).\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-42376","post","type-post","status-publish","format-standard","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Apple says its CSAM scan code can be verified by researchers. Corellium starts throwing out dollar bills 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/apple-says-its-csam-scan-code-can-be-verified-by-researchers-corellium-starts-throwing-out-dollar-bills\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple says its CSAM scan code can be verified by researchers. Corellium starts throwing out dollar bills 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/apple-says-its-csam-scan-code-can-be-verified-by-researchers-corellium-starts-throwing-out-dollar-bills\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-17T22:10:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YRyRs745EwIEiVphXXZCfAAAAII&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-says-its-csam-scan-code-can-be-verified-by-researchers-corellium-starts-throwing-out-dollar-bills\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-says-its-csam-scan-code-can-be-verified-by-researchers-corellium-starts-throwing-out-dollar-bills\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Apple says its CSAM scan code can be verified by researchers. Corellium starts throwing out dollar bills\",\"datePublished\":\"2021-08-17T22:10:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-says-its-csam-scan-code-can-be-verified-by-researchers-corellium-starts-throwing-out-dollar-bills\\\/\"},\"wordCount\":864,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-says-its-csam-scan-code-can-be-verified-by-researchers-corellium-starts-throwing-out-dollar-bills\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YRyRs745EwIEiVphXXZCfAAAAII&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-says-its-csam-scan-code-can-be-verified-by-researchers-corellium-starts-throwing-out-dollar-bills\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-says-its-csam-scan-code-can-be-verified-by-researchers-corellium-starts-throwing-out-dollar-bills\\\/\",\"name\":\"Apple says its CSAM scan code can be verified by researchers. Corellium starts throwing out dollar bills 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-says-its-csam-scan-code-can-be-verified-by-researchers-corellium-starts-throwing-out-dollar-bills\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-says-its-csam-scan-code-can-be-verified-by-researchers-corellium-starts-throwing-out-dollar-bills\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YRyRs745EwIEiVphXXZCfAAAAII&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"datePublished\":\"2021-08-17T22:10:10+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-says-its-csam-scan-code-can-be-verified-by-researchers-corellium-starts-throwing-out-dollar-bills\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-says-its-csam-scan-code-can-be-verified-by-researchers-corellium-starts-throwing-out-dollar-bills\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-says-its-csam-scan-code-can-be-verified-by-researchers-corellium-starts-throwing-out-dollar-bills\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YRyRs745EwIEiVphXXZCfAAAAII&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"contentUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YRyRs745EwIEiVphXXZCfAAAAII&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-says-its-csam-scan-code-can-be-verified-by-researchers-corellium-starts-throwing-out-dollar-bills\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple says its CSAM scan code can be verified by researchers. Corellium starts throwing out dollar bills\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apple says its CSAM scan code can be verified by researchers. Corellium starts throwing out dollar bills 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/apple-says-its-csam-scan-code-can-be-verified-by-researchers-corellium-starts-throwing-out-dollar-bills\/","og_locale":"en_US","og_type":"article","og_title":"Apple says its CSAM scan code can be verified by researchers. Corellium starts throwing out dollar bills 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/apple-says-its-csam-scan-code-can-be-verified-by-researchers-corellium-starts-throwing-out-dollar-bills\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-08-17T22:10:10+00:00","og_image":[{"url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YRyRs745EwIEiVphXXZCfAAAAII&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/apple-says-its-csam-scan-code-can-be-verified-by-researchers-corellium-starts-throwing-out-dollar-bills\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-says-its-csam-scan-code-can-be-verified-by-researchers-corellium-starts-throwing-out-dollar-bills\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Apple says its CSAM scan code can be verified by researchers. Corellium starts throwing out dollar bills","datePublished":"2021-08-17T22:10:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-says-its-csam-scan-code-can-be-verified-by-researchers-corellium-starts-throwing-out-dollar-bills\/"},"wordCount":864,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-says-its-csam-scan-code-can-be-verified-by-researchers-corellium-starts-throwing-out-dollar-bills\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YRyRs745EwIEiVphXXZCfAAAAII&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/apple-says-its-csam-scan-code-can-be-verified-by-researchers-corellium-starts-throwing-out-dollar-bills\/","url":"https:\/\/www.threatshub.org\/blog\/apple-says-its-csam-scan-code-can-be-verified-by-researchers-corellium-starts-throwing-out-dollar-bills\/","name":"Apple says its CSAM scan code can be verified by researchers. Corellium starts throwing out dollar bills 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-says-its-csam-scan-code-can-be-verified-by-researchers-corellium-starts-throwing-out-dollar-bills\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-says-its-csam-scan-code-can-be-verified-by-researchers-corellium-starts-throwing-out-dollar-bills\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YRyRs745EwIEiVphXXZCfAAAAII&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","datePublished":"2021-08-17T22:10:10+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-says-its-csam-scan-code-can-be-verified-by-researchers-corellium-starts-throwing-out-dollar-bills\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/apple-says-its-csam-scan-code-can-be-verified-by-researchers-corellium-starts-throwing-out-dollar-bills\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/apple-says-its-csam-scan-code-can-be-verified-by-researchers-corellium-starts-throwing-out-dollar-bills\/#primaryimage","url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YRyRs745EwIEiVphXXZCfAAAAII&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","contentUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YRyRs745EwIEiVphXXZCfAAAAII&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/apple-says-its-csam-scan-code-can-be-verified-by-researchers-corellium-starts-throwing-out-dollar-bills\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Apple says its CSAM scan code can be verified by researchers. Corellium starts throwing out dollar bills"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42376","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=42376"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42376\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=42376"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=42376"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=42376"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}