I see...so a company that designs and manufactures USB IC chips and then offers drivers so you can actually use those chips with a mac is doing something that generally shouldn't be done.
Precisely! If their driver requires you to allow that company access to privileged areas of your system to use it, then when you allow it, it should be with the understanding of the risks. If the risk is not understood (and generally it’s not) then it generally shouldn’t be done. There are companies making millions and billions of dollars every year without requiring admin rights for an installation (both hardware and software), so it far more the rule rather than the exception.
How does that make the system less secure? There are many such examples I use personally and thousands more I don't but others do.
A macOS system running a third party system level addition is less secure than one that isn’t. For each addition, you’re that much less secure. It may not feel like it because you feel you can trust the vendors, BUT hackers that attack developer code bases do so BECAUSE they know people trust the source... if they can get in there, they will be deployed to hundreds/thousands of computers with admin permissions.
[doublepost=1506459831][/doublepost]
I wouldn’t. I’m glad he didn’t either. He forced Apple to make a fix a priority.
Apple set the priority when he told them about it (This is assuming that it wasn’t a bug already slated to be fixed. We only have his word to go on that Apple didn’t know about it.). At that point, it was going to be fixed on their timetable. That timetable hasn’t changed, they won’t be rushing out a release for this. It’ll be covered in the release it’s already planned to be completed in. SO, him standing in a pulpit preaching about an issue that’s NOT even that severe is all about self-promotion.
Some people like to promote themselves with he pretense that “I’m doing it for YOU!” Those with integrity usually don’t. Especially not with something that is essentially clickbait.
[doublepost=1506460824][/doublepost]
This is actually a serious bug. For those of you saying it requires convoluted steps in order to exploit (disabling Gatekeeper), it doesn't.
My rule of thumb for “how serious this is” always starts with “Am I required to interact and provide my admin credentials”. If so, then it’s not serious BUT that could be because I remember stories of systems being compromised with no input from the user. That, to me, is serious. Anything that counts on a user to make it work... well, that’s ALL exploits. You wouldn’t say that being able to delete a file that your placed in the trash is a serious bug just because I could coerce a user into deleting all their photos.
Are you saying that a developer signed app downloaded from outside the App Store would NOT bring up the “This app was downloaded from the internet” dialog that has to be dealt with?
running untrusted app is always a security risk
My point exactly.
[doublepost=1506462032][/doublepost]
If you got the information that a patch is forthcoming, wouldn't it have been better to perform a responsible disclosure and not publish the details before the patch is out? For after all, Apple had less than a month to react right before a major release, so it wouldn't be unreasonable to give them at least a full month.
See, you’re thinking about this from the wrong angle. Instead of the “I am a responsible security researcher” angle think more about the “If I can get this to go viral, my name will be EVERYWHERE!” angle.
THEN it makes total sense
