Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
It was a Java vulnerability that was exploited according to the story:

Therefore, my comments had support towards my assumptions. This vulnerability can affect OS X as a potential target according this site.

BUT it does not in practice effect very many Macs. There's a difference between could effect and does effect. In this case the difference is enormous because the ratio of effected to unaffected is, at a minimum, many thousands to one.
 
I have no beef with the FBI doing their job, but I do have a major concern with monitoring activities that are not sanctioned by legal means. .

Who says its not sanctioned.

It could be that AntiSec is lying about this source of this info to embarrass the FBI and stir up a **** because they don't like that such things can be legal. Such social protests can be used to have it seem like the hackers arent so evil after all.
 
No, you can make a TrueCrypt image which you mount separately from the system too. As long as it wasn't mounted during the hack, it'd be pretty much impossible to steal that data.

Ok, thought you were referring to using TrueCrypt for full disk encryption and not just using it for encrypting a partition to secure data on the partition.

I find using sparse bundle disk images much easier. It is good that this capability is included in OS X by default. The function of the disk images also integrates with keychain to provide an easy method to secure data while logged in.
 
Well, of the million my iPad and iPhone UDIDs aren't listed; however, I do not blame the FBI as much as I blame Apple and how easy it seems for anyone to collect the information.

Do you understand that dramatically more detailed information is collected about you by marketing agencies and credit reports? For $50 on the internet you can by a 10 page dossier on anyone.

The standout in this area is Facebook who have hundreds of pages of data on each person instead of just a few pages.
 
BUT it does not in practice effect very many Macs. There's a difference between could effect and does effect. In this case the difference is enormous because the ratio of effected to unaffected is, at a minimum, many thousands to one.

You're right, it doesn't affect many Mac's. However, I am of the belief that in this particular case, the FBI agent could have been targeted by the hackers in order to mine either the specific information on it or just anything they could find on it. I say that because what are the odds of random hacks on the Internet finding an FBI agents laptop and getting such a jackpot?
 
Given that:

1) Obama was in the list,

2) this type of data often collected by popular games,

3) Angry Birds is a popular game,

4) and I think I heard somewhere that Obama plays Angry Birds,

It is possible that the data is from Angry Birds.

Damn you Angry Birds!

Maybe only a game developers system was compromised and the whole FBI scenario was added just to provide a more headline grabbing story.

Regardless, this is still somewhat concerning.
 
wow. Bitlocker anyone?

Can Bitlocker be used to encrypt just a data partition?

I think it can only be used to encrypt the volume containing the operating system. This type of protection provides no mitigation from data compromises, such as a remote exploit, while the user is logged in.
 
Given that:

1) Obama was in the list,

2) this type of data often collected by popular games,

3) Angry Birds is a popular game,

4) and I think I heard somewhere that Obama plays Angry Birds,

It is possible that the data is from Angry Birds.

Damn you Angry Birds!

Maybe only a game developers system was compromised and the whole FBI scenario was added just to provide a more headline grabbing story.

Regardless, this is still somewhat concerning.

How would Angry Birds get that level of personal information? UDIDs I understand, but how would it get names, addresses, and phone numbers?
 
Sparse bundle disk images made via Disk Utility remain mounted and encrypted after the user logs in unless the user manually mounts and unencrypts the data.

I don't understand that. Could you explain it to me?
 
Do you understand that dramatically more detailed information is collected about you by marketing agencies and credit reports? For $50 on the internet you can by a 10 page dossier on anyone.

The standout in this area is Facebook who have hundreds of pages of data on each person instead of just a few pages.

Yes I am fully aware but the story has nothing to do with FB or anything like that. The article and my comment is directly related to the UDIDs, how easy they are to get, and what information is associated with them.
 
Again, the only 'proof' this came from the FBI is the hackers, who could be lying.
And we don't know that Apple gave it to them.

This could also be not from hackers at all, but from others like the FBI or NSA who want to track who goes to the download sites. There may be a DNS exploit in place to take you to another website entirely.

Those UDIDs may in fact be bogus.
 
How would Angry Birds get that level of personal information? UDIDs I understand, but how would it get names, addresses, and phone numbers?

I was being facetious.

But, other gaming related networks, such a OpenFeint, collect that scope of data or at least allow that type of data to be collected.

At least, other articles related to this story are leading readers to believe that such level of data collection is possible via networked games.

No evidence has been provided that proves the data came from an FBI computer, AFAIK. It is possible that a iOS developers was hacked and the FBI element of the story is a fabrication to fit an agenda.

I don't understand that. Could you explain it to me?

See #18 in the link in my sig.
 
It was a Java vulnerability that was exploited according to the story:



Therefore, my comments had support towards my assumptions. This vulnerability can affect OS X as a potential target according this site.

My bad. I completely missed the Java reference when I read the MacRumors summary. (Doh!)

That doesn't excuse the second, improperly qualified, statement of fact, however.
 
The info is legit and the hackers themselves didn't provide a website to check if your UDID, they just provided the text file.

Unless of course there were no hackers involved at all, and this is faked by the FBI or NSA in order to track who downloads the file of UDIDs.

----------

The problem with this is that no matter what evidence comes to light you will always have the same position no matter what. You are not interested in the truth; you are interested in fitting anything you can anyway to your own point of view.

Nope. Wrong. The science shows beyond a doubt that it was an inside job. I used to believe the govt story, but I accept SCIENCE before politics.

You're engaging in the Appeal to Authority fallacy. "I believe, because they're the government". Contrary evidence is abhorent to you, because you are a follower of authority.

United 93 Still Airborne After Alleged Crash - According To ATC/Radar
http://pilotsfor911truth.org/united-93-still-airborne.html
 
Hmm.

If Apple had given the FBI the information, there wouldn't be mostly empty sections for the personal data; it would be complete.

It seems far more likely that the FBI had captured the info from one or more hacker computers, and was using it at security conferences as part of a presentation on how easy it is to gather personal info from people using everyday apps.

(Years ago I pointed out that sending the UDID was a mistake, and a major reason why iOS was less secure with personal data than other systems. All it takes is for a single app to associate you with that UDID... such as signing up for something... and suddenly all your other normally anonymous uses become clear to someone who has a collection of UDID visitor info from multiple sources.)

Nowadays even Apple creates a temporary ID for use with iAds, instead of using our UDID.
 
Hell, these are the same people who couldn't even pull off a burglary of a hotel in the 70s!

Your logic is 100% bogus. You reason like a kid who doesn't know anything about anything.

Explosives experts in the military were clearly involved because there was NANO-THERMITE, which is only available to the US military and its close allies like Israel.

The presence of nano-thermite in WTC dust is scientifically proven and peer reviewed.

If you were ever informed or anti-authoritarian it does not show one bit now.

You're an FBI stooge.

If not, watch this: http://www.youtube.com/watch?v=LwayjX4ipFc
 
I'm familiar with them and use sparse bundle images all the time .. just not sure what you meant by saying that they "remain mounted and encrypted"

Remove keychain entry for disk image from the default keychain to a keychain that remains lock until manually unlocked.

Once in that keychain, the disk images remain unmounted and encrypted until you manually access the disk image by entering the keychain's password.
 
Um, why are you assuming that, asking what the FBI is doing with particular information is "trying to pretend that you dont know that the govt os watching everything everyone does"? :rolleyes:

Oh, and if the Government *is* watching everything everyone does, then they're violating about half a million laws in the process, and need to be called on it. :cool:

Cause it is... and they are.. cause they can..:rolleyes:
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.