ç±³Appleãã»ãã¥ãªãã£ç 究ãµã¤ããæ°è¨ããå¤é¨ã®ç 究è ã¨ã®ååé¢ä¿ãéè¦ãã姿å¢ãæã¡åºãããå社製åã®èå¼±æ§ã¸ã®å¯¾å¿ã«é¢ãã¦ç 究è ãä¸æºãåããã¦ããåé¡ãèªããå½¢ã ãããã«ã¤ãã¦æ¥çããã¯ä¸å®ã®è©ä¾¡ãããä¸æ¹ã§ãèå¼±æ§ä¿®æ£ã®æ¹éãå·¡ã£ã¦ä¾ç¶ãçåã®å£°ãããã æ°ãµã¤ãã®ãApple Security Researchãã¯ãå社ã®æå 端ã®ã»ãã¥ãªãã£æè¡ãç´¹ä»ããã¨ã¨ãã«ãå¤é¨ã®ç 究è ã«ãååãå¼ã³æããã¦ã¼ã¶ã¼ã®å®å ¨ç¢ºä¿ã«è²¢ç®ããç 究è ãèªå®ã»è¡¨å½°ããå ´ã¨ä½ç½®ä»ãã¦ããã åãµã¤ãã«ã¯10æ27æ¥ãã¾ã2æ¬ã®ããã°è¨äºãæ²è¼ãããããã®ãã¡1æ¬ã¯ãApple製åã®èå¼±æ§ãçºè¦ã»å ±åããç 究è ã«è³éãæ¯æãã»ãã¥ãªãã£ãã¦ã³ãã£ããã°ã©ã ã®ãã¢ããã°ã¬ã¼ãããç´¹ä»ããå 容ã ã£ãã ããã¾ã§Appleã®ãã¦ã³ãã£ããã°ã©ã ã«ã¤ãã¦ã¯ãç 究è ãèå¼±æ§ãå ±åãã¦ãåå¿ãéããåé¡ã¸ã®å¯¾å¿ç¶
{{#tags}}- {{label}}
{{/tags}}