Sure *that* web page was clear. What about other web pages that used this bug for more malicious intents ?That's the point, the PDF bug was not a jailbreakme.com exclusive that could only be triggered by their site.
And frankly, why boo Apple for fixing such a nasty bug for all of us who are not interested in jailbreaking our devices ? Apple did the right thing in fixing it, breaking jailbreaking was a side effect of having a secure device, and I'm all for it. People who boo Apple for fixing this stuff have no grasp on the issues.
Booing Apple for fixing the PDF was stupid -- I totally agree. But folks probably felt pretty safe in their ability to avoid the PDF exploit by simply surfing on more trusted Internet sites and did not mind waiting the period for Apple to fix the bug. Or perhaps they felt the odds of stumbling on a malicious PDF were low. Its a different mind set than having downloaded an app and later discovering it could have been snooping through all of your stuff. Those who were really concerned by the PDF bug could have jail broken their phone that day and download the fix because it was being provided on Cydia -- however, this is clearly not a great option for most folks.
Why would they hire him now ? It's not the first time he's found exploits for OS X or iOS.
That's true, but I think if he had contacted Eddy Cue about the approval process and demonstrated that he could get an "Easter Egg" app through he could have made a case for such a thing if he desired it. Certainly Apple should be planting "bad apps" in the process (perhaps they do), but the hacker community is certainly more sophisticated in hiding their easter eggs. Apple should open up channels to the white-hat community to submit booby-trapped apps that will never see the light of day but will help Apple train its approvers in spotting "bad apps". Apple should even pay the white hat guys who submit these "bad apps" to give quarterly training on how to spot malicious attempts from their apps.