English/Deutsch

Who we are

We are a german company focusing on IT-Security since 2015 and mainly do security research for Apple's operating systems. By finding and reporting vulnerabilities in these systems we help to make them more secure.

All vulnerabilities are reported to Apple through the Apple Security Bounty Program. If you have any questions, feel free to contact us. You can also follow us on Twitter. Some of our work can be found on GitHub.

Services

With our expertise, we can help you to make your iOS and macOS Apps more secure. By auditing your code, vulnerabilities can be found before they are actively exploited and cause damage to you and your customers. Additionally, we also provide trainings for your developers to make them more aware of and avoid security issues.

Any Questions?

Contact us:

<

}

3

j

x

U

o

>

t

L

;

?

w

@

2

s

"

T

:

X

.

[

c

!

Y

H

W

/

N

%

K

0

q

h

2

T

6

r

o

a

M

Q

Y

N

B

f

8

Z

R

2

&

j

r

{

>

6

o

@

;

'

Y

d

g

c

s

A

9

"

b

L

e

z

4

7

O

P

3

N

_

p

X

)

n

G

^

k

,

+

M

I

J

|

y

/

U

A

2

e

Y

y

N

9

C

l

v

I

G

K

a

m

x

r

J

F

h

3

7

t

R

q

y

U

L

>

C

E

`

t

m

)

~

9

^

o

[

]

f

e

D

Y

B

"

z

&

I

T

h

8

7

{

j

6

:

v

x

X

\

k

|

Q

%

}

0

L

z

y

q

s

Q

Y

O

l

v

S

5

b

g

a

w

n

h

M

r

[

n

Z

g

"

R

,

q

O

J

u

0

e

c

U

g

H

u

h

8

R

5

n

L

t

Z

M

P

N

p

Q

z

v

L

4

@

G

j

=

5

`

g

V

'

6

a

$

_

J

b

,

q

A

2

1

r

d

W

l

D

!

t

?

#

}

8

m

{

;

z

%

K

x

(

*

9

e

f

w

U

s

I

z

L

p

J

s

&

/

e

_

u

h

k

A

m

:

g

a

`

8

6

y

.

7

~

|

\

c

,

l

B

q

)

G

R

@

'

L

r

2

=

;

T

<

1

F

Y

H

4

9

V

v

E

b

V

n

h

i

w

8

N

x

W

F

j

J

D

Z

1

e

c

4

0

U

Y

m

Q

s

M

N

X

\

c

F

S

1

7

t

:

'

;

C

?

J

f

@

+

Z

^

l

(

{

b

j

v

[

<

h

p

!

|

m

_

k

4

}

D

R

d

U

v

c

4

5

p

9

e

B

Z

y

z

s

1

b

0

I

t

e

u

E

y

L

p

M

@

:

%

v

R

f

-

F

|

G

g

\

3

"

t

1

n

c

^

W

/

q

{

L

h

2

4

9

q

b

M

w

g

E

z

d

J

U

D

G

I

V

j

W

Z

A

?

T

)

Z

;

x

W

+

B

U

>

j

X

9

!

-

C

7

"

l

L

:

H

f

a

t

8

s

c

V

7

Y

U

1

f

C

t

p

5

i

g

G

2

o

R

b

P

Q

4

T

5

U

e

s

J

n

{

L

~

[

4

P

a

j

7

l

R

u

w

F

<

Y

]

K

G

g

W

>

O

2

Q

I

p

j

i

k

w

D

Y

e

9

b

V

0

c

g

m

5

P

I

s

+

=

X

L

(

d

r

6

w

u

W

R

K

n

a

Z

l

I

x

m

N

t

w

E

q

W

t

S

;

B

`

^

a

x

2

K

6

{

0

~

e

C

z

U

9

F

!

O

Y

w

j

@

k

?

&

+

,

i

n

H

$

X

%

Z

}

8

E

H

v

I

U

6

m

D

o

a

3

2

j

}

(

q

K

f

4

v

V

2

0

c

|

R

1

y

x

U

u

3

<

%

@

h

k

Q

g

H

>

[

M

C

O

9

w

,

b

3

w

O

1

X

P

L

t

R

j

Y

H

g

U

D

Z

J

9

C

x

<

W

+

B

w

y

D

Q

c

b

a

;

u

{

v

T

>

~

p

\

s

P

g

r

^

M

&

N

%

t

$

8

2

n

0

b

m

e

l

2

w

f

R

T

3

j

9

F

U

8

a

K

i

O

g

5

y

h

o

p

z

_

i

!

K

c

,

*

T

G

V

M

8

[

{

z

U

F

s

R

q

W

Y

p

4

X

J

l

6

7

d

f

y

w

V

E

C

D

i

T

b

e

<

#

l

.

T

G

U

q

8

9

j

:

}

^

k

e

K

\

R

i

L

w

5

p

n

4

v

d

x

b

8

X

Q

a

G

W

q

O

D

z

Y

P

N

9

2

>

J

g

r

q

G

\

n

(

<

#

O

c

4

X

u

Q

|

x

b

.

_

H

v

+

F

3

l

A

k

E

e

7

o

y

R

x

I

J

h

N

j

v

3

)

J

<

@

p

C

y

d

2

x

.

,

-

(

Z

3

0

l

j

5

r

q

K

D

w

d

$

J

~

^

n

/

v

=

z

q

e

B

.

K

5

(

R

k

6

O

V

[

%

&

>

{

4

0

W

a

A

r

4

v

l

3

Q

n

7

x

5

t

P

H

1

2

m

O

q

V

N

M

K

T

J

k

o

u

d