b'Seth and Ken dig into strange requests when running bug bounty programs, recent revelations on Apple security research, and detection as code.'