Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Yes, you used the words "guess" and "I think" in your comment. However, despite the use of those words, you actually made two unqualified factual claims in your statement. I'll go ahead and bold it for you below.



The first makes a completely unfounded assumption about the methodology used to get the data in question. The second is nearly true (assuming that the first, unsupported, statement is correct), but misses the mark, because you would *also* have had to add the qualifier that he had an unpatched, active Java environment that was susceptible to the bug in question (which most Macs *don't* have, because it didn't effect the Java 1.6 run-time.

Just *having* the words "guess" and "I think" in your comment doesn't excuse you from having made unsupported assumptions and stated them as facts. (It might have, had you actually claimed your entire *post* as "guess" and/or "I think". Unfortunately, you didn't.)

It was a Java vulnerability that was exploited according to the story:

Story
...Team was breached using the AtomicReferenceArray vulnerability on Java

Therefore, my comments had support towards my assumptions. This vulnerability can affect OS X as a potential target according this site.
 
What is the FBI doing with that info?

What do you think? You're guilty in this country until proven innocent, remember? :rolleyes:

Seriously, we live in the Corporate States of America these days where big business pretty much OWNS the government and so one shouldn't be surprised to find the government spying on its citizens for economic interests to the big corporations (advertising, demographics, etc.; census data is required by law in a country that supposedly has a privacy amendment; what a joke).
 
So...

The government is collecting info knew that

The government isn't warning people about a threat that personal information can be leaked yep yep. Obviously

The government doesn't properly secure files? apparently not

Why can't we just live in a world where private things are... well private?

I just don't understand what the FBI needs to do with my grandmas iPhone info. God I hate the government.

Well, I doubt it likes you in return... since we're told we are a "Christian nation", the phrase "Do unto others as you'd have them done unto you" now becomes an appropriate saying, given that phrase's origins being Old Testament and all...

P.S. Government is just buying the info from these companies. It's just business. Do you not like capitalism? Or do you just hate it when somebody freely engages in it at your expense?



Um, unless government tells private industry what to do... and it's usually private industry lobbyists that do the telling (all government does is accept their 'investment')... don't blame government for all ills when it's private industry that decides what jobs are needed and what wages they're set at, since it's wages people earn that have more say in what sorts of things, nice or otherwise, people buy...


Seriously, people really don't know how much of your data is seen by the government. The NSA works with AT&T and other carriers to spy on your data. Big brother has been prying on your online activities for years now. Glad this violation of rights is getting more exposure now.

The same ATT that gets lots of taxpayer-funded entitlement?

http://www.ctj.org/html/layoffs.htm

Also, is Big Brother "government", or the company/companies that do all the work that government merely buys from them? Maybe I missed 10 pages worth of posts, but nobody seems to mind ATT, banks, and others compiling lists... only that government gets them... seems a tad unfair and/or nearsighted...

It drives me crazy when people talk badly about the people who keep us safe. Are there problems with the system? Absolutely. But some numbers that identify our cell phones gets out and everybody flies off the handle? Guess what, there is a different set of numbers that identifies our cell phones... they're called phone numbers, and they're publicly available everywhere.

I have absolutely no connection to the FBI or the federal government, but god dammit I respect them and know that they work hard to keep us safe every day.

I respect them as well.

If our government was just as bad as the middle east or China or anyone else and to be oh-so-evil as the rest, then those detracting wouldn't be here right now. It's that simple. Unless they have a deeper, causal explanation - but right now I've only read gripes about government about being a symptom rather than the core cause of all things bad...

Oh, one can also say the FBI lacks the funds to do proper defenses, since most anti-government types freely say we're broke and owe money thanks to the actions of the last 5 presidents (never mind it's Congress that votes on what gets spent, with the President signing or vetoing that Congress decides)...

Or, even in the best of times, stuff gets hacked.. even unjailbroken iPhones, thanks to PWN2OWN and other sources...
 
Obamas UDID? So are they tracking us or perhaps their own staff?
12million is quite alot of devices.. I'd say Obama more then likely has more then on iPad, heck lots of freaks here do lol
 
Indeed

Just two strips of duct tape is all one needs if they are truly paranoid

Well that can be bypassed. There are are two cables that can be snipped to render the devices useless and it cannot be repaired.
 
A hacker CLAIMS they got the info off an unprotected laptop, and an FBI one at that.

And you buy it hook line and sinker, just like they wanted.

Now you'll go to their website to check you UDID and give them who knows what info. Which might be their real game

After all, the best hacks are social

The info is legit and the hackers themselves didn't provide a website to check if your UDID, they just provided the text file.
 
Hence the iron fist silk glove joke. We all know the West is slightly better than North Korea, but then again it seems we only know what these totalitarian countries are like through Western propaganda and media. The fact of the matter is the US and the UK have come to be police states in the last 10-15 years. Time you took those blinkers off.......another sheeple that thinks he's free :rolleyes:

If that was meant as a joke it didn't come off as one. It read as a subtile difference without much distinction kind, of like if a convicted thief could choose their final fate either by stoning or a sniper bullet between the eyes. Of course no western nation kills people for stealing. We do know what happens in countries like North Korea, China, Saudi Arabia...

And I own zero pair of blinkers, but I do think you might own a tinfoil hat.
 
Is it me or is nobody in this thread blaming Apple for their flawed approach to UDIDs?

Quote from the article:
By designing an API to expose UDIDs and encouraging developers to use it, Apple has ensured that there are literally thousands of databases linking UDIDs to sensitive user information on the net. A leak from any one of these - or worse a large-scale de-anonymization like the OpenFeint one - inevitably has serious consequences for user privacy.
 
A Dell laptop? Oh now I see why it got hacked.

The AtomicReferenceArray exploit in Java also worked on OS X.

But, this data could have easily been encrypted using a sparse bundle disk image made via Disk Utility to prevent compromise with user level access to the system.
 
Is it possible that the FBI retrieve the data from some other sources as evidence of some investigation?

Sure. We only have the hackers word the laptop belonged to an FBI agent. Or that they got the information from that laptop.

For all we know, the laptop was actually a seized item and they got the list off an offsite backup, acquired during the days before Apple cut off using the UDID in apps. Back in the day it would be child's play to create a little free game with some hidden harvesting in it.
 
Well that can be bypassed. There are are two cables that can be snipped to render the devices useless and it cannot be repaired.

How would you be able to tell if the cables have been snipped or not? Which is why the devices have to be removed, and then there's the further problem to easily check if the camera and microphone have been removed.

This isn't about a DOD employee spying and bringing in a microphone/camera/etc, this is about a DOD employee bringing in a computer that has been hacked by someone else.

So, maybe even physically removing the devices will be enough, I can't find any more recent directives from the DOD than the one I read a couple of years ago.
 
If we can let the Government get away with reading all of our email, what else will we allow them to do? Will we say "put camera's in our houses because we cant take care of our children"? Will we say "Tell us what to do because we cannot think for ourselves"? You give the Government an inch and they take a mile, and that is why letting them spy on us is not freedom

Ah yes, the classic scaremonger tactics, and the 'give them an inch' argument. Take something relatively minor like data monitoring and suddenly paint a bleak picture of the near future where the government closely controls all of our actions, and even goes as far as to tell us 'what to think'. Bonus points for any 1984 references...

Of course the fact that micro-managing the population is completely stupid and non-managable doesn't come into it, it helps to prove your point and so run with it!
 
Remember when Obama wanted to keep his Blackberry? He had to be issued the NSA version with the back door closed so foreign surveillance was not total. That was totallly phunnie.

After the buzz wore down in a year he did everything off-grid like all the other Presidents which didn't even use a computer, leaving all that to staff and trusted systems.
 
Remember when Obama wanted to keep his Blackberry? He had to be issued the NSA version with the back door closed so foreign surveillance was not total. That was totallly phunnie.

The backdoor would be in BIS, not the devices themselves, and Obama's one probably uses (used?) BES anyway.
 
This is exactly why I would love to find out if we can find an app, that all people on the list have in common.

Alex

Too easy. IF they were harvesting via apps and are lying about the FBI part then it's likely a half dozen or more apps released under a handful of developer names and probably either cheap or 99 cents at most. They would be simple things like flashlight apps and only got updated when the iOS was. Especially if the update might break their harvesting

I wonder how many devices on that list are folks that used that in app purchase hack from a few weeks ago. Especially when it asked you to put in your apple ID password
 
Last edited:
Is it me or is nobody in this thread blaming Apple for their flawed approach to UDIDs?

Quote from the article:

Here's a post by Aldo Cortesi discussing what he found that you could do with just an UDID.

Among other things:

In September 2011, I published the most troubling news so far, which paradoxically also got the least coverage in the press. I looked at all the gaming social networks on IOS - basically OpenFeint and its competitors - and found catastrophic mismanagement by nearly everyone. The vulnerabilities ranged from de-anonymization, to takeover of the user's gaming social network account, to the ability to completely take over the user's Facebook and Twitter accounts using just a UDID.

Eight days to Apple's event and this happens.
 
Mine is also in the list. I'd be interested to find out why they have it... What's the point of the FBI having this data? Why did apple give it to them? I don't really like this.

Again, the only 'proof' this came from the FBI is the hackers, who could be lying.

And we don't know that Apple gave it to them.
 
Well, of the million my iPad and iPhone UDIDs aren't listed; however, I do not blame the FBI as much as I blame Apple and how easy it seems for anyone to collect the information.
 
Well it turns out not only can't the FBI crack TrueCrypt, they can't use it either :p

TrueCrypt doesn't provide any protection once a user is logged in and using the system.

This is because the data is unencrypted and mounted when the user is logged in.

A remote exploit, such as the AtomicReferenceArray in Java, requires the target user to be logged in to be used against the system.

Sparse bundle disk images made via Disk Utility remain unmounted and encrypted after the user logs in unless the user manually mounts and unencrypts the data.
 
Last edited:
TrueCrypt doesn't provide any protection once a user is logged in and using the system.

This is because the data is unencrypted and mounted when the user is logged in.

A remote exploit, such as the AtomicReferenceArray in Java, requires the target user to be logged in to be used against the system.

Sparse bundle disk images made via Disk Utility remain mounted and encrypted after the user logs in unless the user manually mounts and unencrypts the data.

No, you can make a TrueCrypt image which you mount separately from the system too. As long as it wasn't mounted during the hack, it'd be pretty much impossible to steal that data.
 
A hacker CLAIMS they got the info off an unprotected laptop, and an FBI one at that.

And you buy it hook line and sinker, just like they wanted.

Now you'll go to their website to check you UDID and give them who knows what info. Which might be their real game

After all, the best hacks are social

Something tells me you didn't read the entire article and don't understand how all this works.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.