We have no indication of how much the machines are worth, but come on… the thinnest computer in the world or an ugly Linux box.
How exactly does the OS in the machine make it "ugly"? And the "ugly Linux-box" was a Sony Vaio VGN-TZ37. Is Sony known for making ugly computers?
You get to keep the machine that you hack. Which one would you prefer to keep?
And the person could easily sell the machine and use the money to buy that oh-so-gorgerous MacBook Air if he wants to.
The MacBook air is also pretty expensive (more than a decent PC tower)
Why are you comparing the Air to a PC-tower? Do you for some reason think that the Linux-box was some kind of generic beige-box computer or something? If your knowledge on this incident is that limited, I fail to see the point of this discussion.
so I wouldn't be surprised if it was by far the most valuable machine. As stated, it was sponsored by Microsoft
It was sponsored (among others) Microsoft and Adobe. And this test wasn't really a ringing endorsement for either of them.
I think there is no argument that the MacBook Air was the sexiest machine there for the taking. I would argue it was the most expensive too.
Sony doesn't make exactly cheap laptops....
We are yet to know if it was a bug in a 3rd party device driver for example.
Pray-tell: exactly what "3rd party device drives" would that be? Besides, it was a bug in WebKit.
All machines should have been using identical hardware, no questions asked. Same manufacturer… same hardware… different OS.
But the successful attacks were not caused by drivers. Mac was compromised by a bug in WebKit, Vista fell to a hole in Flash. How exactly would different hardware change anything?
Um yes we do… have a rough idea but not all the details? Is that what you mean?
We know what and how the systems were hacked, but we do npot know the details. The details are only known to the relevant vendors and the winners, so that they vendors can fix the holes. But we DO know that Mac fell to a hole in WebKit that was exploited by a malicious website, and Vista's downfall was a hole in Flash.
Okay wise guy, tell me how the machine was hacked. What was the exploit, and what are the exact steps that one could use to reproduce the hack?
That information is confidential (or would you like that information to be spread around the net, before Apple and Adobe could fix the hole?), but we do have general information.
Well Safari is still yet to be hacked in a real world situation. As I said, this was not a lab test, it was a competition where people wanted to win the sexiest machine.
Oh yes, this is the "they were all going after MacOS, no-one was hacking Vista or Linux!"-argument
The rules were relaxed to make hacking easier (we don't know how)
Yes we do know! Sheesh!
and after a day and 2 hours of trying the Mac was hacked. Someone won the sexiest machine and shortly after someone took home the Vista machine.
On first day, no machine was hacked. Then rules were relaxed, and on the beginning of the second day, MacOS was hacked. On the beginning of third day, again after rules were relaxed (and not right after MacOS) Vista fell.
No, it's related to a similar competition last year, where a Mac was hacked after they allowed access using a USB cable, and also allowed someone to install a 3rd party wireless card, with modified drivers, which gave it a security hole (same thing… after time they relaxed the rules and made the machines easier to hack).
Except that nothing like that happened here. they used the shiiping OS with the apps that ship with it. Only on third day (the day Vista fell) they allowed third-party apps.
Apple patched that bug… as I questioned before… is such a "bug" really a bug?
Oh yes, a bug in Safari's html-renderer that compromises the machine if the user goes to a wrong address is not really "a bug".....
I suggest you look up the definition of a straw man argument.
"A straw man argument is an informal fallacy based on misrepresentation of an opponent's position.[1] To "set up a straw man" or "set up a straw man argument" is to describe a position that superficially resembles an opponent's actual view but is easier to refute, then attribute that position to the opponent (for example, deliberately overstating the opponent's position).[1] A straw man argument can be a successful rhetorical technique (that is, it may succeed in persuading people) but it carries little or no real evidential weight, because the opponent's actual argument has not been refuted.[2]"
My example is a pretty accurate rendition of what happened.
No it's not. You made the claim that what we have here is something similar of having a UNIX-guru using your computer with all kinds of cables going to the computer, with him installing kernel-extensions for two days etc. etc.... But this was NOT like that! This was a case where the user of the Mac went to certain website using the built-in browser in OS X, and his machine was compromised!
People had complete access to 3 computers.
No they did not. Sheesh!
They could install software on all 3 machines and use all 3 machines quite freely.
No they could not!
Lets make this clear… the Mac was not hacked using factory settings.
And you base that assumption on what exactly?
The rules were relaxed and the Mac was modified. People had access to all of its (few) I/O ports, and could play around with the Mac's software.
you are completely, utterly wrong. 100% wrong.
People have access to the Ubuntu source code… all of its security flaws are out there in the open. If somebody wanted to hack it first I believe they could have
OpenBSD is considered the most secure OS out there, and it's source is available for anyone to read. Just because the source is available does not mean that the machine is easier to crack.
however it was the least valuable option.
What are you basing that assumption on?
It was probably similar to the Vista machine, however didn't come with a vista license so was less valuable.
Vista-machine was a Fujitsu Lifebook that has prices starting at around 1000 bucks. Linux-machine was a Sony Vaio, that propably costs a lot more than that.
It's becoming quite clear to me that you have exactly ZERO knowledge about the subject at hand.
EDIT: and regarding what is and isn't "physical access", the rules of the contest say this: "No physical access to the machines.".