"Security researcher" Yeah, that's it. Is the guy "testing" my front door with a crowbar also a security researcher?
It is nice that he gave apple a couple of hours to respond. Classy of 'im.
So basically you're saying the ends justify the means?
I'm really happy about the way @ibrahimbalic handled the situation. As an Apple Developer. This things must happen in today's world, the way that Apple is handling this is very strange indeed though.
When a storage company loses your property due to their poor security practices, do you get angry at the burglar?
He will now spend the next 15 years in court.
I don't think Apple is handling it strangely though. In Apple's view, data went out of the company into unauthorized hands (even though no malice was intended), so they have to report it that way.
.
Well quite. Even if his intentions were honorable, how can he be sure he hasn't leaked any of Apple's data himself? Is his own system secure?
I agree...
1) the guy does security research and transparently identified himself on the public FB's 'Whitehat' list.
2) he reported the bugs and asked Apple if he should stop doing this (ie research). Although he maybe should have given Apple more time to respond.
3) it was only after lack of response did he go deeper (which maybe wasn't too wise)
4) he reported back his findings to Apple, and did not tell the public of the existence of the bugs or his findings. Keeping a log of his actions, evidence and communications with Apple.
5) he went public, distraught that Apple said their site got 'hacked' (which is true); just in case Apple goes after him.
I don't think Apple is handling it strangely though. In Apple's view, data went out of the company into unauthorized hands (even though no malice was intended), so they have to report it that way.
.
Well quite. Even if his intentions were honorable, how can he be sure he hasn't leaked any of Apple's data himself? Is his own system secure?
You're equating a physical break in to a house being the same as a breach of online security... That is nearly as moronic as the car analogies computer enthusiasts try to use all the time while comparing hardware.
Actually, I would be angry at both the business for not taking precautions, and the burglar because he/she committed a crime and stole my stuff......
They haven't responded because their lawyers will have told them not to. Now they will sue him for costing Apple and possibly the developers money (ironically by showing them how they could lose money from being hacked).
It's good that he is helping to highlight flaws but is there not a less havoc wreaking way of doing so?
What's the big deal about a name and email address?
Under most state data breach statutes, that information does not even count as "personal information" and does not trigger notification obligations.
The only piece of info that really matters is a social security number and/or credit card numbers.
And credit card numbers are worse for the credit card company than the consumer. Since you can easily dispute fraudulent card charges.
The term "security breach" is thrown around way too easily.
What's the big deal about a name and email address?
Under most state data breach statutes, that information does not even count as "personal information" and does not trigger notification obligations.
The only piece of info that really matters is a social security number and/or credit card numbers.
And credit card numbers are worse for the credit card company than the consumer. Since you can easily dispute fraudulent card charges.
The term "security breach" is thrown around way too easily.
Anyone getting beta 4 ? i checked for update but nothing
They usually release updates at 10AM so if not now then not today
A front door, or another example used a safe, are not the same. When you start delving into analogies like this you get really weird conclusions that lead to bad occurrences or just plain understanding of what is going on.
Seriously, guys, you sound like you don't even know what the word analogy means, certainly not the purpose of them. Gnomepatrol, neither does your source, that first link lists a bunch of things which aren't even analogies. More akin to poetic license than actual analogy.Breaking into a private home is a bad analogy.
This is an international corporation who is responsible for keeping its customer's information secure.
You've been using a developer portal that has a security flaw. You've been at risk all this time. You'd still be at risk today if it weren't for this researcher.
Because Apple is clearly not keeping it's security systems up to par, and it's better for someone to do this and make it public, than for someone to do this and steal and sell as much information as he could.