What are the first and last Apps in his alt-tab App switcher:
View attachment 721048
The last one is Sublime Text 3 (https://www.sublimetext.com/)
What are the first and last Apps in his alt-tab App switcher:
View attachment 721048
What about when a legitimate app provider gets hacked on the server side and their binary gets replaced with malware? It happened to the Transmission team.sigh. don't download junk, don't jeopardize your computer. Common sense is the best anti-virus.
On release day. That's embarrassing.
Unfortunately, there are plenty of bugs in any OS. And sometimes, they aren't found until the last moment.
There is nothing to apologize for. People can blame and mock Apple over this if they want. However, Apple has never claimed to release perfect software. And neither has any other OS developer.
Yea, he is one of the good guys.Do people realize he's the fellow behind BlockBlock and ransomwhere? etc at Objective-See? it's not like he's some random Mac-basher.
I think he would have crowed about doing that if he had...Do we know that they didn't do that?
No, it's the OS.“For this vulnerability to work, a user needs to download malicious third-party code from an unknown source, something Apple actively discourages with warnings about apps downloaded outside of the Mac App Store or from non-trusted developers. In fact, Apple does not even allow apps from non-trusted developers to be downloaded without explicitly overriding security settings.”
So basically, the ‘issue’ is the user, not macOS. Anyone affected by this ‘issue’ shouldn’t be using computers in the first place.
Basic security 001 is don’t install applications from outside the App Store. There’s no application that NOT on the Apple Store that has to follow basic security practices. NONE of them. In fact, some exist outside the store BECAUSE what they want to do as a basic function is something that Apple doesn’t allow. Specifically for this reason.
...of Applications that appear on the App Store. Every valid developer that has their eyes set on a Non-App Store model has to include instructions on their website telling people to do something that makes their system less secure for a moment to let their app do what it needs to do.the entire reason for having an industry-standard platform is to encourage third-party app development.
Patrick says he did contact Apple as soon as he found it.
I did! pretty much as soon as I found the bug...along with a detailed description and even PoC exploit code![]()
![]()
patrick wardle added,
To my knowledge, Patrick has not given a specific timeline as to when he acted.Fair enough, but when did he notify them? Today? Yesterday? Last Week? It is normal for companies not to respond to these submissions(at least on the record) for many reasons but how long did he give Apple to fix this issue before going public? If we find out it was 2-3 months ago this is fair.
Very true, exploiting companies to get malicious code into official releases is increasing, the most famous example probably being when Juniper Networks firewall code was found to have been compromised: https://www.wired.com/2015/12/junip...kdoors-show-the-risk-of-government-backdoors/What about when a legitimate app provider gets hacked on the server side and their binary gets replaced with malware? It happened to the Transmission team.
Why are some of you acting like security vulnerabilities have never happened before this? This isn't the end of the world, and if you've followed Apple's advice (which is plastered all over the place), you won't have anything to worry about.
It affects Sierra too.
We differentiate between bugs and vulnerabilities.We need to stop apologising for Apple all the time, I feel.
I know I've entered my admin password to install software before. Heck, Adobe makes you do it for the flash plugin. I'm sure I've had to dl software outside the app store on many occasions (e.g., printer software, steam, malwarebytes, etc...). Having to do this doesn't make the user an idiot. It simply means not every valid SW provider gets identified.“For this vulnerability to work, a user needs to download malicious third-party code from an unknown source, something Apple actively discourages with warnings about apps downloaded outside of the Mac App Store or from non-trusted developers. In fact, Apple does not even allow apps from non-trusted developers to be downloaded without explicitly overriding security settings.”
So basically, the ‘issue’ is the user, not macOS. Anyone affected by this ‘issue’ shouldn’t be using computers in the first place.
I know I've entered my admin password to install software before. Heck, Adobe makes you do it for the flash plugin. I'm sure I've had to dl software outside the app store on many occasions (e.g., printer software, steam, malwarebytes, etc...). Having to do this doesn't make the user an idiot. It simply means not every valid SW provider gets identified.
Apple's advice is only use software that Apple approves of, sells you, and takes a 30% cut of.
If you think it's okay to use a computer that way, the iPhones are over there ---->.
For the majority of OSX users (you know, the ones that surf the web, check email, and play a few games) it’s ENTIRELY realistic. And it’s not like what Apple asks from Developers is onerous, it’s that what the developers have decided to do as a business model is do something that generally shouldn’t be done.Unfortunately, this isn't realistic. There are many applications that simply cannot abide by apple's rules.
...of Applications that appear on the App Store. Every valid developer that has their eyes set on a Non-App Store model has to include instructions on their website telling people to do something that makes their system less secure for a moment to let their app do what it needs to do.
Those engaging in social engineering are doing the same thing, trying to get you to manually lower the security of your system so that they can do what they need to do. In both cases, it’s the users fault if they can now use Sketch OR if they just sent all their account and financial information to a scammer.