Draft:Jonathan Bar Or
Israeli–American security researcher
From Wikipedia, the free encyclopedia
Jonathan Bar Or is an Israeli–American security researcher known for his work in vulnerability research, offensive security, and reverse engineering. He has been credited with the discovery of multiple security vulnerabilities (CVEs) affecting operating systems, bootloaders, mobile platforms, and widely deployed software components.
Submission declined on 14 April 2026 by Idoghor Melody (talk). This draft's references do not show that the person meets Wikipedia's criteria for inclusion for people. The draft requires multiple published secondary sources that:
Where to get help
How to improve a draft
You can also browse Wikipedia:Featured articles and Wikipedia:Good articles to find examples of Wikipedia's best writing on topics similar to your proposed article. Improving your odds of a speedy review To improve your odds of a faster review, tag your draft with relevant WikiProject tags using the button below. This will let reviewers know a new draft has been submitted in their area of interest. For instance, if you wrote about a female astronomer, you would want to add the Biography, Astronomy, and Women scientists tags. Editor resources
|
Career
Bar Or has worked as a security researcher in the technology industry, including as part of the Microsoft 365 Defender Research Team. His work focuses on identifying and analyzing vulnerabilities across platforms such as macOS, Linux, Android, ChromeOS, and embedded systems.[1]
His research has contributed to vulnerability disclosures affecting major vendors including Apple, Microsoft, Google, and network device manufacturers.
Research and vulnerability disclosures
Bar Or has been credited with discovering or co-discovering numerous vulnerabilities assigned Common Vulnerabilities and Exposures (CVE) identifiers.
macOS and Apple ecosystem
Bar Or was credited for discovering CVE-2021-30970, a vulnerability in macOS’s Transparency, Consent, and Control (TCC) framework that could allow unauthorized access to sensitive user data.[2]
He also reported CVE-2021-30892, a vulnerability affecting System Integrity Protection (SIP), which could allow attackers to bypass system protections.[3]
His research has also included vulnerabilities affecting macOS Gatekeeper, demonstrating methods of bypassing file quarantine and execution controls, as well as multiple sandbox escape techniques.
ChromeOS and browser security
Bar Or co-discovered a critical ChromeOS vulnerability involving remote memory corruption that could potentially lead to code execution. The vulnerability was disclosed in coordination with Google and subsequently patched.[4]
Linux and open-source software
Bar Or has contributed to vulnerability disclosures in Linux and related ecosystems, including memory corruption issues in widely used libraries such as ncurses.[5]
He has also participated in coordinated disclosure efforts through public security mailing lists such as oss-security.[6]
Android and telecommunications
Bar Or has identified high-severity vulnerabilities in Android applications and mobile ecosystems, including issues affecting applications with large user bases and telecommunications-related attack surfaces. His research demonstrated how flaws in mobile applications could expose sensitive user data or enable privilege escalation across devices.[7]
Network devices and routers
Bar Or has reported vulnerabilities in network infrastructure devices, including router firmware flaws that could lead to full system compromise or identity theft if exploited.[8]
Whisper Leak and LLM side-channel attacks
Bar Or co-authored research describing Whisper Leak, a side-channel attack against large language models (LLMs) that infers user prompt topics by analyzing encrypted network traffic patterns such as packet size and timing.[9]
The research demonstrated that attackers observing encrypted TLS traffic could classify sensitive topics in AI chatbot conversations despite encryption protections.[10]
The work received coverage in major media outlets. Forbes reported that the vulnerability could expose user interactions with AI systems and raised concerns about privacy risks in encrypted communications.[11]
Other platforms
Bar Or reported CVE-2022-2587, a memory corruption vulnerability in ChromeOS that could potentially allow remote code execution.[12]
His work spans additional domains including bootloaders, sandbox escapes, and cross-platform exploitation techniques.
Publications and speaking
Bar Or has contributed to the cybersecurity community through technical publications, vendor security research blogs, and academic work, including co-authoring research on LLM side-channel attacks.
He is also a public speaker and has presented at security conferences such as DEF CON, BlueHat, AVAR, and Nullcon, covering topics including macOS security, vulnerability research methodologies, and exploitation techniques.
Awards and recognition
Bar Or was awarded the Israel Defense Prize in 2014, one of Israel’s highest honors for contributions to national security.
See also
- Common Vulnerabilities and Exposures
- Offensive security
- Reverse engineering
- Computer security

- Reliable sources include: reputable newspapers, magazines, academic journals, and books from respected publishers.
- Unacceptable sources include: personal blogs, social media, predatory publishers, most tabloids, and websites where anyone can contribute.
Replace any unreliable sources with high-quality sources. If you cannot find a reliable source for the material, it should be removed.