I'm so glad the Apple beta review team is rejecting my app for working instead of testing these issues. /s
You’re talking about a sandboxed app. This app is junk off the internet. It could do literally anything your user creds have the power to do.
Would have been great if he contacted Apple before the OS was released. Just looking for attention. Jerk
Yes, serious. You have to provide admin access to this application or it can’t do anything. One of the reasons why the security set up is effective and reasonable is that most things you expect to be able to do don’t require a password. The system isn’t asking you so often that entering a password becomes a common expected response.Are you serious?
You forgot the word extremely, between "That's" and "embarrassing".On release day. That's embarrassing.
Your current system is just as affected. This isn’t a new exploit introduced in High Sierra, he just waited until HS was released for maximum impact. Either way, just don’t execute and provide admin access to any file that you don’t know about and you’re fine.Just downloaded the installer....and now its deleted.
I'm going to wait till 10.13.1 is out. I had a funny feeling that High Sierra might have issues with APFS, but this is news is much worse than expected!
Your current system is just as affected. This isn’t a new exploit introduced in High Sierra, he just waited until HS was released for maximum impact. Either way, just don’t execute and provide admin access to any file that you don’t know about and you’re fine.
Its not buggy, but rather an invulnerability - something completely different.Look guys look! More buggy Apple software released to the public!
Kidding right?And Apple can do something to ensure that anything purchased through the App Store CAN’T access another app’s data. Basic security 001 is don’t install applications from outside the App Store. There’s no application that NOT on the Apple Store that has to follow basic security practices. NONE of them. In fact, some exist outside the store BECAUSE what they want to do as a basic function is something that Apple doesn’t allow. Specifically for this reason.
I still say that anytime a security exploit has to start with killing your front door guard and leaving the door wide open (bypassing GateKeeper) is not so much of a security exploit than a brain exploit. Going by this guy’s argument, the fact that I can call you on the phone to go into keychain and give me your password is asecurity exploit.
It seems you don’t know what a zero day is, technically. The “0 day” is a reference to a measurement from public or “the good guys” knowledge of the exploit, not release of the software, and not creation of an exploit privately.If the code is decades old, it's not technically zero-day.
Look guys look! More buggy Apple software released to the public!
Given Apple's past behavior, he probably did and they probably threatened to sue him into not exposing the flaw. Just like they did with the flaws exposed by Google's security research team, where Apple aligned with Microsoft to hush the discoveries instead of fixing them.Would have been great if he contacted Apple before the OS was released. Just looking for attention. Jerk
How is he a jerk ? He made YOU aware of an issue, which means YOU can hold off installing the software. Blame Apple, not him !Would have been great if he contacted Apple before the OS was released. Just looking for attention. Jerk
How much will money with this guy make for highlighting the vulnerability?
OK, I've been from the church of counting the days between the introduction of a software and disclosing the vulnerability (zero in this case), but you're obviously right.Zero-day means you have zero days' time from the day the vulnerability is disclosed to protect yourself. You're immediately affected.
sigh. don't download junk, don't jeopardize your computer. Common sense is the best anti-virus.
NopeKidding right?