The QA department must still be transitioning to Apple Park. I'm sure once everyone is settled in, attention to detail can resume.
Not sure if that's sarcastic or serious. Whatever the case, it's poor beyond imagination.....
The QA department must still be transitioning to Apple Park. I'm sure once everyone is settled in, attention to detail can resume.
It says it also provides access at the login screen. Is that incorrect? ...
Or is there a way to invoke the 'Name and password' dialog on the login window?
So, it's the first time that 'Display login window as : List of users' is way better than to ask for both User-'Name and password' since this will avoid the password-less root access?
Means one is still save with this setting once a login is needed, even if your machine is stolen (of course, only applies if encrypted).
Or is there a way to invoke the 'Name and password' dialog on the login window?
Timmy Cook needs to go
So it requires physical access to a Mac that's not just "unlocked" but that has the Users dialogue open with the padlock showing that the pane is unlocked as well. So, no risk if no one else has physical access to the machine or those that do don't know the password. Not exactly like anyone can log in with root, requiring no unlocking at all. So, a bug? Yes. A catastrophic and highly embarrassing failure? Not really.
I'm going to lock up my laptop until this catastrophe has passed.
All of my sensitive cat pics are backed up onto my iPhone X, and fortunately FaceID is impenetrable.
At the login screen, you can also use the root trick to gain access to a Mac after the feature has been enabled in System Preferences. At the login screen, click "Other," and then enter "root" again with no password.
This allows for admin-level access directly from the locked login screen, with the account able to see everything on the computer.
There appears to be a serious bug in macOS High Sierra that enables the root superuser on a Mac with a blank password and no security check.
The bug, discovered by developer Lemi Ergin, lets anyone log into an admin account using the username "root" with no password. This works when attempting to access an administrator's account on an unlocked Mac, and it also provides access at the login screen of a locked Mac.
![]()
To replicate, follow these steps from any kind of Mac account, admin or guest:
1. Open System Preferences
2. Choose Users & Groups
3. Click the lock to make changes
4. Type "root" in the username field
5. Move the mouse to the Password field and click there, but leave it blank
6. Click unlock, and it should allow you full access to add a new administrator account.
At the login screen, you can also use the root trick to gain access to a Mac after the feature has been enabled in System Preferences. At the login screen, click "Other," and then enter "root" again with no password.
This allows for admin-level access directly from the locked login screen, with the account able to see everything on the computer.
It appears that this bug is present in the current version of macOS High Sierra, 10.13.1, and the macOS 10.13.2 beta that is in testing at the moment. It's not clear how such a significant bug got past Apple, but it's likely this is something that the company will immediately address.
Until the issue is fixed, you can enable a root account with a password to prevent the bug from working. We have a full how to with a complete rundown on the steps available here.
Update: An Apple spokesperson told MacRumors that a fix is in the works:
Article Link: Major macOS High Sierra Bug Allows Full Admin Access Without Password - How to Fix [Updated]
Shift-Option-Enter to get name and password up.
Although by entering root as described in the article automatically enables root and shows it.
EDIT: It's a real howler! If you open Directory Utility and disable root, it enables it again automatically! Must have originally been some background process for testing
Hackers broke Face ID a week after iPhone X release. With a cheap silicone mask.
https://www.wired.com/story/hackers-say-broke-face-id-security/
Right. It's Apple - I forgot. If it was Samsung or Microsoft, it would be a whole different song, no? Face ID has issues, MacOS has issues. The issues need to be fixed. Simple and complex as that. At least Apple has sole authority on the hardware.So it requires physical access to a Mac that's not just "unlocked" but that has the Users dialogue open with the padlock showing that the pane is unlocked as well. So, no risk if no one else has physical access to the machine or those that do don't know the password. Not exactly like anyone can log in with root, requiring no unlocking at all. So, a bug? Yes. A catastrophic and highly embarrassing failure? Not really.
oh, then just switch on your mac pressing cmd+S and enjoy single user mode with full root access to your data unless you chose full encryption with firevault...
Backdoor wasn't closed before the software was pushed to the public. Extremely sloppy work by Apple software engineering. Time for Craig (Federighi) to follow Scott Forstall. And a few senior software managers as well since we've also had reports of bugs being pushed in the GM despite documented instances of the exact problems already having been identified by beta testers as well as the public beta testers. This Apple crowd is overboard arrogant...'if we didn't find a problem in house, it doesn't exist.'