My security research PoC was confirming exploits that didn't exist
stuart-thomas.comAuthor here. Happy to answer questions about the methodology, the broader Are You There? series (16 closed findings in total), or how Apple's security response process works in practice.