No need to release new OS every year. Better release them once 2 years with better QA testing.
eah, but come on... resources are resources... at the end of the day when something this ridiculous happens it's not unreasonable for people to question some of Apple's priorities and/or allocation of resources and focus. If they hired more people to concentrate on security and testing so things like this didn't happen, and we had to wait a little longer for more emoji and other less critical features (however fun for users), would that be a bad thing?
Apple seriously needs to start hiring better QA engineers....
You can't extrapolate that from what happened. All you can extrapolate is that either no one reported it or that it was reported but not fixed.Obviously not. Seems none of the beta testers (including developers and public beta testers) bothered to try this or report an issue.
Animoji are an iOS feature. They were most likely developed by a programmer killing some time while waiting for a build or blowing off some steam. The majority of the heavy lifting was there anyway because of FaceID. It's literally a skin to the 3D mesh used for authentication. A manager probably saw it and said "Hey, that's kinda cool. Why don't we put it in as a neat trick?" Disk Utility is part of macOS. It's part of a different (albeit related) product. Taking developer away from Animoji to focus on a completely different product would likely cause resentment and not solve anything.
It would be cool if trivia night offered the answer to a question when we ask for a hintDoes showing the password itself as the hint count as a password hint?![]()
Does showing the password itself as the hint count as a password hint?![]()
Brazilian software developer Matheus Mariano appears to have discovered a significant macOS High Sierra vulnerability that exposes the passwords of encrypted Apple File System volumes in plain text in Disk Utility.
This is clearly not merely a bug in Disk Utility itself - if a password is encrypted, then NO PROGRAM CAN EVER DISPLAY IT - all you can do is encrypt a user given password and compare to see if the encrypted versions match. The fact that Disk Utility COULD show the password means it was NOT ENCRYPTED. (Or else stored somewhere, or the NSA demanded a back door or something.)
Disk Utility has actually revealed a core security issue here!
To be clear, the linked Twitter thread suggests that this is a Disk Utility bug, where if you create a password-protected volume in Disk Utility it inadvertently sets the hint to the password itself. It's not a bug that allows the password itself to be uncovered via other means, which is what I originally thought this meant and which was surprising to me since the only way to do that should be computationally expensive brute-force methods (the data itself is encrypted with the password; it's not just artificially protected by one, and it shouldn't be possible to "reverse lookup" the password by any true means).
I don't understand why Apple is so terrible at software.
For clarification: this only affects Macs running High Sierra, correct?