Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
The guys knows macOS does not have a bug bounty therefore why was he bug searching in the OS that he knew would not get him any money?. This reeks of the guy having a ulterior motive for searching for macOS bugs, which is to blackmail Apple into introducing a bug bounty for macOS.
Maybe he's a Mac user and he was looking as a little side project? Doesn't matter, the fact is he's potentially found something but now has no avenue to pass that info to Apple unless he gives it to them for free and undermines the value of his time.
 
  • Like
Reactions: YaBe
Actually he already broke the german law by hacking the OS. Hacking it systems without prior ok from the owner is illegal in Germany. It's a criminal offence worthy of multiple years in prison...

It’s not a criminal offense in the US.
 
Maybe he's a Mac user and he was looking as a little side project? Doesn't matter, the fact is he's potentially found something but now has no avenue to pass that info to Apple unless he gives it to them for free and undermines the value of his time.

If you had taken the time to read the original article, you will have noticed that the man in question is a German security researcher who designed his own malicious app to extract the contents of the 'keychain'. This is not the actions of a 'Mac user looking for a little side project' but the actions of someone specifically going out of their way to find something, in this case, software bugs in macOS.

He put his time and effort into finding the bug, designing his own app to exploit the bug all whilst knowing full well there is no bug bounty that would financially reimburse him for his efforts, but he carried on anyway. This therefore implies his intentions where not honorable and thus this was proven when he said he would not release his research to Apple until they introduce a bug bounty for macOS.

It's blackmail, pure and simple.
 
Extortion implies that not informing developers of bugs is illegal, which it isn’t of course. Apple has likely “reached out” to offer a reward, but he says his motivation is to use this as an opportunity to get a reward program in place for everyone. Good for him. it will probably happen now.

Yes, no one forced him to find this vulnerability, but if you’re a macOS user you should be thankful that he did.
Thankful? Not until the flaw is patched.
Also, what is the malicious app that he used? Is it one he developed, or is it one that users may download, intentionally or not, on their own?
 
I understand that finding flaws isn't always an easy thing and can take highly educated/skilled people lots of time to find things like this however no one is forcing this guy to do it.

This sounds a bit like extortion to me.

Extortion would be to ask them directly for a payment, for the specific bug.
He asked for a general bug bounty program, which should already exist in an OS and company the size of Apple.
 
Based on...have you seen Mac OS lately?? It was a nice is back in the days...now it is just...meh.

Same thing with Windows. These companies seriously need to stop with these yearly updates. Wait 2-3 years like the old days and get the OS in good shape.
 
I don't think this is accurate. My keychain is not automatically unlocked when I log in. I know every time i want to go into keychain or look up a saved password in Safari I get prompted for my local account password. I don't run around as admin though (which you shouldn't do anyway).
The default behavior of any user account is to unlock the Login Keychain when you login. The Login Keychain or any other Keychain can be set to a different password than what you use at login.
[doublepost=1549550125][/doublepost]It's incorrect to say an Administrator password is needed to unlock the Keychain. Typically an Administrator account can only unlock the Keychain for their own account. A Standard User has their own Keychain and they do not need an administrator account to unlock their own keychain.
 
Last edited:
If you had taken the time to read the original article, you will have noticed that the man in question is a German security researcher who designed his own malicious app to extract the contents of the 'keychain'. This is not the actions of a 'Mac user looking for a little side project' but the actions of someone specifically going out of their way to find something, in this case, software bugs in macOS.

He put his time and effort into finding the bug, designing his own app to exploit the bug all whilst knowing full well there is no bug bounty that would financially reimburse him for his efforts, but he carried on anyway. This therefore implies his intentions where not honorable and thus this was proven when he said he would not release his research to Apple until they introduce a bug bounty for macOS.

It's blackmail, pure and simple.
Well the article appears to be in German so, yeah I didn't read it. Still could have been poking around just as a side project though. You know, just for the sake of learning and being inquisitive.
 
Lack of morals or need for labor to be paid for. You would probably be on the other side if this were Google.

What are you talking about? He is the guy that jumps in front of a car and starts cleaning your windshield and then demands to be paid. Nobody asked for it. End of story.
 
  • Like
Reactions: thebroz and BLite
They know they make mistakes. But only on iOS.
[doublepost=1549491101][/doublepost]

The dealer fixed it for free, but they paid the mechanic that actually did the work.

You are not paying for the bug to be fixed, but Apple should be.

On a side note the dealer didn't fix it for free they're reimbursed by the manufacturer..

---

Maybe this carrot will be enough to start a program they're really isn't a reason not to have one for any commercial software.
 
The moral and ethical attitude of the security/bug researcher needs to be questioned because he already admitted knowing that Apple does not have a bug bounty for macOS so that begs the question, why was he searching for bugs in macOS in the first place.

My answer to that is he was looking for bugs in the hope that in finding one, inform the tech community he found a bug but not provide info to Apple so he can use it to exploit Apple into forcing them to introduce a Bug Bounty for macOS.

By refusing to give Apple info about the bug, all he has done is given hackers the heads up on where to start looking, the 'keychain'.

and then pretty soon all you have is the "nefarious" folk looking for these to sell and/or use.
That, from Apple's side is pretty Darwinistic.
 
  • Like
Reactions: rjohnstone
Based on the limited information, does anybody have any ideas or theories as to how this could be delivered to your Mac?
This is essentially a "proof of concept" exploitation of a macOS vulnerability, so it's not "in the wild" where your Mac could be affected. It would most likely be delivered via a Trojan, which would require your action to be installed. So just be careful about what you install.
Another day, another security hole in the world of Apple.
Another day, another security hole in every single operating system and app in the world. It's not just Apple. Every software app has flaws.
I don't think this is accurate. My keychain is not automatically unlocked when I log in. I know every time i want to go into keychain or look up a saved password in Safari I get prompted for my local account password. I don't run around as admin though (which you shouldn't do anyway).
There is no security disadvantage in running on an admin account. That's ancient thinking.
 
Based on what? The convenience of opinionated vilification of a company for its size or success?

Nope, based on the fact that Apple cannot IMO have more than 1.5 employees involved in updating Mac Cocoa APIs. How do I know? Because using Cocoa on macOS is like programming in the stone-age compared to UIKit APIs. Everyone that is anyone at Apple works on iPhone not Mac. Mac is on life support and there seems to be, based on Apple's development progress, a concentrated effort to kill off Cocoa, or convert everyone to iOS.
 
What are you talking about? He is the guy that jumps in front of a car and starts cleaning your windshield and then demands to be paid. Nobody asked for it. End of story.

Then I'm sure you won't mind if he doesn't tell how to reproduce the issue.
 
  • Like
Reactions: dk001
This is essentially a "proof of concept" exploitation of a macOS vulnerability, so it's not "in the wild" where your Mac could be affected. It would most likely be delivered via a Trojan, which would require your action to be installed. So just be careful about what you install.

Another day, another security hole in every single operating system and app in the world. It's not just Apple. Every software app has flaws.

There is no security disadvantage in running on an admin account. That's ancient thinking.

Thanks GGJ, can you explain the admin account, zero advantages to using the internet on a non-Admin account? I have read so many articles over the years that recommended to create a non-Admin account to conduct all of your internet activities.
 
Thanks GGJ, can you explain the admin account, zero advantages to using the internet on a non-Admin account? I have read so many articles over the years that recommended to create a non-Admin account to conduct all of your internet activities.
Here's a 10-year old article that discusses the different account types, and even that article states there's no risk in running an admin account. Regardless of the account type, you should be careful when entering your password to install apps or give them permission to do certain things. In other words, think before you act.
The Bottom Line:
Overall, there is no additional risk in running as an administrator versus with a managed account, provided you are careful with your authentication credentials.
 
I think if bug bounty hunters really focused on the security vulnerabilities of macs, there would be an overwhelming number of exploits discovered. It's the only reason why they don't have a bug bounty.
[doublepost=1549576054][/doublepost]Apple is in a tough position and will likely fold and pay the bounty as they should. Their other option is facing the many lawsuits that pop-up any time there is a vulnerability.
 
That’s so unprofessional and just ends only macOS user lose out because now he has demonstrated that there is a issue it’s only a matter of time till some criminal works how to do it!

I hope he ends getting sued for every penny he has

Sued for what?
He didn’t make the vulnerability. Honestly people, get a grip.
 
That’s so unprofessional and just ends only macOS user lose out because now he has demonstrated that there is a issue it’s only a matter of time till some criminal works how to do it!

I hope he ends getting sued for every penny he has
He can't be sued. No one other than employees have any obligation to report flaws in Apple's software. It's not unprofessional to want to be compensated for work done. There are plenty of vulnerabilities in all software. That is no guarantee that an exploit will be developed for any particular vulnerability, or that an exploit would be released into the wild. Most vulnerabilities are discovered and patched before anyone exploits them, as will likely be the case here, even if Apple doesn't pay a bounty.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.