Aloha Steve,
I order to protect Mac users I did not publish any technical details of the vulnerability. The video simply illustrates the impact of that flaw, and shows that contrary to Apple's claims, Mojave does not protect user data (in a sufficient way).
IMHO this is something important that Mac users should be made aware of (while yes, not providing any details that hackers could (ab)use to exploit the bug).
Aloha "Patrick"
If you really are who you say you are, (skeptical) then I have some words for you. You have shown that there is a vulnerability in a brand new feature of an operating system on release day. No doubt, you timed this information release with the consumer release. If you had posted this information a week ago, in the format that you did, I would not have posted such a scathing assessment of your motives. However instead you have diverted the publicity of the release of a brand new operating system to your address book security bypass exploit. Congratulations on your media storm, this serves nothing but yourself.
There are reasons why ethical security researchers post information to the public. Those reasons include:
Active exploitation (i.e. malware found in the wild)
Refusal from the vendor to fix a known vulnerability
Edit: Also to provide mitigation instructions, which you have not.
None of these cases are true, unless you can show us an email from Apple stating they do not consider what you did a vulnerability. There is no reason why you could not sit on your hands, or assist Apple in developing a fix (they pay double for this, in their insider program I will mention later) while Apple included their fix in 10.14.1 or 10.14.0.1. This has minimal risk of being actively exploited, especially since you obviously knew of this flaw during beta. The whole point of the beta program is for testers and professionals to find bugs and fix them before they go live. By posting in the format you did, all you have done is make the security industry look bad.
Apple does have a bug bounty program, they just offer it to researchers that have a track record with them. If you wanted to get paid for your vulnerabilities, either work with Apple to get on that list, or send your vulnerabilities to the Zero Day Initiative.
I ask you to question yourself if you really did this to help the public, or to draw attention to yourself. Thank you for reading my lengthy response.