Focused on the ongoing discussion and documentation of vulnerabilities and exploitation techniques. Please read the rules before posting here.
So apple has this reward system for finding vulnerabilities or gaining access to an apple users information. There are these two iPhone that keep connecting to my wifi, and I've changed the password 3 times. If I use the handshake between the phone and the wifi to gain access to their devices would that count towards the bounty?