First off, to those claiming that Charlie is an attention-whore, or trying to get a job at Apple
One thing that does alarm me about OS X is that the typical user (on single-user Macs) generally runs as an administrator. There's no good reason for this, especially on OS X. If you're not running as an admin, then the absolute worst thing you can do at that privilege level is hose your own stuff. As an admin, you can hose the system.
Thing is, OS X makes it so painless to run as a "standard" user that there's no tradeoff in terms of usability. If some task requires admin-level access, you are automatically prompted to enter an admin username and password. It's almost completely transparent, and quite painless.
I know sometimes people say "what's the big deal, you get that login prompt anyway for admin-level tasks" - but that's not actually true. You get that prompt for well-behaved admin tasks, but it's quite possible to circumvent that using a little bit of Applescript and a small amount of bash scripting knowledge. With that, anything writable to the admin group can be manipulated or deleted without any prompting at all (note that it doesn't require sudo to do that, if it's group writable).
So folks - please do this. 1) Create another account, and make it an admin - I just take whatever the computer name is and add "admin" to it (e.g. if your computer is named "joe", call the account "joe admin"). 2) Log into that new account, and change your day-to-day account to "standard" - uncheck the "allow .... to administer" box in other words. 3) Be sure to do those first two steps in the order presented here!Don't demote your existing account until you have an admin account set up! 4) There is no step 4.
I already did read a few posts up. I never once said OSX is less secure than Windows that would be a stupid statement. I said OSX isn't perfect. Read the posts I have made other than the ones responding to you. I've provided real life information... you have provided smilies XP
On a related note Symantec has just released SEP 11 for Mac. I must say its pretty impressive.
ARRGGHH please... that would never make it on my mac...
I don't care how big of an OSX fan he is. If he is withholding exploits* so he can publicly demonstrate them at CanSecWest, he is an attention-whore.
*if he has offered disclose these to Apple, then I applaud his efforts...
I basically provided proof that it isn't just because OS X has "less market share".
IMHO those aren't "smilies" (whatever the heck you mean by that)
If you made points, sorry I didn't get to read them. But for the record, I get everything about it. Its just annoying how people think its just because OS X has less marketshare. Again, OS 9 had less and had viruses. Which debunks the marketshare theory as far as it being the only reason OS X doesn't have viruses.
I will never go back to Windows!!![]()
First off, to those claiming that Charlie is an attention-whore, or trying to get a job at Apple:
This isn't about that. This isn't about Mac>Windows or go back to a PC. This is simply pointing out that the Mac isn't immune how dense are you people. Most of us agreeing with this article are Mac owners and lover, I've even seen some of the typical fan boys submitting to this article. This is all about making OSX better.
Every year he pops up on some web site before this contest and states he is the king of OS X hacking. This to me makes him a media whore that tries to get his name all over the news waves.![]()
This isn't about that. This isn't about Mac>Windows or go back to a PC. This is simply pointing out that the Mac isn't immune how dense are you people. Most of us agreeing with this article are Mac owners and lover, I've even seen some of the typical fan boys submitting to this article. This is all about making OSX better.
Contrary to the headline of the article, he is not releasing the exploits at CanSecWest. He's giving a talk about how he found the exploits, which at a security conference, is much more useful.
And as for the contest that is mentioned from the conference (Pwn2Own), the researchers who win the contest give up their vulnerabilities to Tipping Point, who works with the vendor to get them re-mediated, and does not release them into the wild.
Historically, people have been submitting exploits to the vendor when they discover them. That's the basis for the "responsible disclosure" movement within the security community. The problem is that many vendors don't respond to them, wait a ridiculous amount of time before releasing a fix (years in some cases), or even threaten to sue the security researchers.
Many security researchers are tired of doing QA work for vendors for free, as the reality is that they should be the ones fixing their own vulnerabilities. This is somewhat the impetus for the "no more free bugs" movement. Honestly, I'm not sure yet how I feel about it.
"It's more secure because it's UNIX!
Now, he does do something useful once in a while, but Apple usually drops an update within a few weeks of this yearly hacking contest.
Every year he pops up on some web site before this contest and states he is the king of OS X hacking. This to me makes him a media whore that tries to get his name all over the news waves.![]()
You don't understand though, its not that its not easy to break in, its just there is no need for it. Why break into 1000 macs when I can have 100000000 PC's. The object of these organized crime rings is numbers, not glory.
Charlie Miller is not running a charity. He's a professional security guy that makes money by finding vulnerabilities.
That's good to hear.
For the record I have no problem with releasing the details of an exploit given that a vendor has had a reasonable amount of time to react. Sometimes lighting a fire under the vendor is the only way to get a fix.
That's my favorite. Based off of UNIX and IS UNIX are two different things. OSX is still a closed system and when outside people point out its shortcomings Apple should do what MS has been doing lately and jumping on it, not ignoring it.