You can search for “Beginning From Transformers” in 100 degrees to find the latest chapter!

Chen Yuan is a staff member of Apple’s China Branch Office, and is responsible for the vulnerability report review of iOS Operating System.

In Chen Yuan’s view, the above really arranged a leisure job for himself.

Yes, Apple Inc., as the world’s second to none consumer electronics giant, not only has strong hardware design capabilities, but it is definitely the best in software development.

iOS is undoubtedly the best performance of Apple’s software development capabilities. Although it was born almost at the same time as Google’s Android System, iOS has almost exploded the Android System in performance and security, becoming the world’s most popular mobile operating system.

Of course, no product is perfect, Chen Yuan also knows that iOS does have vulnerability, so apart from its own company has a dedicated team responsible for testing iOS vulnerability, Apple Inc. is also the same as ‘Facebook’, ‘Google’ and other foreign Internet Giant , Also launched its own vulnerability reporting rewards for the public – ‘White Knight Project’.

However, the strength of China’s folk technology hobby in terms of vulnerability detection is not far behind that of Europe and America.

Since the implementation of the ‘White Knight Project’ in China in 2015, only 40-50 iOS vulnerabilities have been reported and discovered by China so far, and most of them are only a few strange vulnerabilities that do not affect system stability.

In comparison, there were 7 or 8 high-risk vulnerability reported abroad last year alone.

Therefore, Chen Yuan’s work is almost the same as eating idle meals. Except that he will be busy for a while when the complaint section is turned over to vulnerability report emails, he is still in a daze and playing some small games.

No, Chen Yuan played chess for the third time today, and he was willing to try the game he just found online.

Although there are regulations in the company that prohibit playing games during working hours, simple games such as cards and chess are usually included in the computer. When not busy, the Manager usually opens his eyes and closes his eyes.

“I said you are all bored? Are you tired of playing chess with computers every day?”

Aside from the daze, another employee of Apple’s China Branch Office responsible for iOS vulnerability reporting and review, named Fu Chun.

Because the company often fails to receive a vulnerability report for 10-15 days, only two auditors are assigned to the China Branch Office.

Now it seems that there are actually 2 more people!

Chen Yuan gave him a blank look. “It’s better than you stealing the movie. Do you have to be scolded if you get caught again?”

Fu Chun chuckled: “The 100 megabyte fiber in the office is much stronger than the 4 megabyte in my house. Anyway, it is also idle. I might as well let me download a few Ultra HD movies and I can go back to watch at night!”

Chen Yuan rolled his eyes, but he played a small game that comes with the system, and he didn’t use the Internet at all, so it was only when he didn’t see it. Who made them two difficult brothers and brothers, and they were so boring at work every day.

Just opened the chessboard, because it was the red side, Chen Yuan was about to take a step first, and try to see how amazing the so-called Ming dynasty spectrum he had just seen.

Suddenly, he saw that a background processing software on the right side of his computer suddenly popped up a job processing prompt.

Chen Yuan was shocked, and soon he realized that it was a vulnerability report email forwarded by the complaint section.

Suddenly came energetic, “Yeah, there seems to be a vulnerability report, are you reviewing or I reviewing?”

“Let’s take a look at it first, and make sure it’s really a vulnerability report.”

Fu Chun also saw it, but his computer was secretly downloading the movie, so he said without looking back.

Chen Yuan nodded, directly off the chess game that didn’t take long, he immediately opened the vulnerability report email and hurriedly scanned it, Chen Yuan browed, “I found 17 vulnerability in iOS, there are still Dare to say more! “

“pu!”

Fu Chun hearing this immediately smiled, and can’t help got up and came over to joke with a joke: “Really? Come here, let me take a look, who is so capable …”

He hasn’t seen the informant’s information yet. Chen Yuan, who is fast, has already downloaded the folder attached to the email and clicked on it.

Fu Chun put his head closer together, and looked towards a detailed vulnerability analysis with Chen Yuan, and the expression slightly changed.

“You can see the deleted text messages using the search function … well, this vulnerability does exist …”

Apple Inc. has its own system vulnerability detection team, but when it finds some vulnerability in the new version, unless it has already been reported, it will choose to remain silent. It will be quietly fixed when the next version is released. After all, Apple But it’s not silly to hit your face.

However, for convenience, Apple will also regularly update some newly discovered vulnerability to the technical staff responsible for this piece internally, so that its own technical team can maintain it.

Unfortunately, Fu Chun just remembers such a newly determined vulnerability over the United States Headquarters.

Chen Yuan nodded answered, and he did know that there was such a vulnerability that had been discovered.

2 The person became serious now, after reading each and everyone word by word, brows were simultaneously frowned.

“There are 5 vulnerability headquarters that have been detected over there, and these reports are correct. As for the rest, although they are still uncertain, and so on, the probability of being correct is still very high …”

After Chen Yuan finished speaking, he bent down and took out several iPhones and detection devices for testing from the drawer under the desk and placed them on the table.

No need to ask him more, Fu Chun turned off his computer and came over to help.

After 2 people were busy and tested for a while, and finally confirmed that all of these vulnerabilities were true, Chen Yuan was in a trance for a moment, and he saw him immediately take out a USB flash drive from the drawer, and organize the report and test records. Ok, copy it to USB flash drive.

After finishing, he got up and said to Fu Chun: “I go to the copy room to print the document, Fu Chun, you go and call the Manager first.”

Fu Chun was nodded with a serious face, and was reported with so many vulnerability at once, and all proved to be true.

I am afraid that their manager is here, and they have to be shocked and continue to report to the top.

If the other party really has more iOS vulnerability, then in the end, it may be more than the China Branch Office to send an executive to personally contact the other party, maybe the Head Office may also send someone from the United States to come personally Responsible for this matter.

However, these have nothing to do with the two of them.

“When did China come up with such a good technical expert?”

Before going out, Fu Chun couldn’t help but looked back at the whistleblower information left in the report file on the computer screen.

“Cybertron Studios? Testing agency?”

With some doubts, Fu Chun shook his head and followed Chen Yuan out of the office and walked towards the Manager’s office.

Ps:

1. Opened the little black house and couldn’t get out in the afternoon.

2. Real world article will end in these 2 days.


Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like