Once a year I fall for an Apple security threat story, and think "this is finally the one that matters" to me. Then I learn the reality of the details and forget about it.
But yet again, this one DOES feel like the one that matters to me. As for the time--sure, it might take more than 6 months to fix a complex enough problem and be sure of not breaking something else. But then, answer the people who are threatening to expose the bugs. Try to negotiate! (Or maybe Apple did so--we don't have proof.)
I'm glad researchers are finding stuff to fix, but I really hate the ransom-and-publicity model. Set a deadline—goals are great—but dont' expose the public if the deadline needs to be extended. Which they KNOW it does because they can see that the vulnerability remains. It's like they're little children, lashing out because Apple didn't answer them back--or a publicity stunt.
Cost vs. benefits: what's the cost of the researchers going public now instead of waiting? What's the benefit? If the goal is to shame Apple into fixing deep/complex things faster, then you still should wait: and then AFTER the fix, shame Apple by revealing how long it took. In short: use PR against Apple. Don't use the security of real people against Apple.
My main Q: defense in the short-term. Don't use apps from the vulnerable list (including Mail)? And don't give any new apps Keychain access? What's the best current practice, and how much does it help?
okay... ? those are all inconclusive fictional search results.
we have had huge security breaches that occured w/ celeb picture hacking/ leaks, Sony server compromised all BYOD's, so they had to dust off the old BlackBerrys because their BES was the only server running...
BlackBerry has a history of being secure. new threats will ALWAYS come out. so nothing can be instantaneous. thats why we have to look at history.
The Apple celeb picture hack was a fiction. A bunch of pictures had been stolen over YEARS from MANY different platforms by many different means. It wasn't a recent, single event. It wasn't Apple-specific. And Apple's systems were not breached (other companies' may have been--a lot of techniques were used). Rather, the passwords were guessed. Celebs who will be targeted should use better passwords AND 2-factor authentication. The first, Apple helped with TouchID (although you can still CHOOSE a weak password, something I expect to be disallowed one day); the second Apple helped by expansing 2-factor auth. But you can't retroactively help all the people who over the years never appreciated the need for strong passwords.