SIPRNet has been compromised many times in the past and still has issues with OPSEC regarding its users. If you're an AKO-S/DKO-S user, that system has been rated piss poor by NSA, who's the Tier 1 entity for COMSEC.
Good will like making sure vendors actually fix flaws before they get exploited for malicious intent ?![]()
Cult comes to mind some times. I like Apple products but it feels like a cult sometimes and not a grown up company.![]()
He did it for the notoriety and exposure. Perhaps he felt it could help get a software security gig.Wirelessly posted (Mozilla/5.0 (iPhone; U; CPU iPhone OS 4_2_1 like Mac OS X; en-gb) AppleWebKit/533.17.9 (KHTML, like Gecko) Version/5.0.2 Mobile/8C148 Safari/6533.18.5)
I guess he should have told apple about it instead of submitting that app
He did it for the notoriety and exposure. Perhaps he felt it could help get a software security gig.
This is NOT good... let's hope Apple releases a fix soon.
Which he did, read the links in the very MR-article. Yeah, a lot to ask.Wirelessly posted (Mozilla/5.0 (iPhone; U; CPU iPhone OS 4_2_1 like Mac OS X; en-gb) AppleWebKit/533.17.9 (KHTML, like Gecko) Version/5.0.2 Mobile/8C148 Safari/6533.18.5)
I guess he should have told apple about it instead of submitting that app
Of course he had to submit it before reporting it to Apple, to see if the (automatic?) app-review detects the exploit. Because then the bug would just be of academic nature.I'm not sure if this was mentioned, but his latest tweet says that he pushed the app out to the store in SEPTEMBER, this is well before he notified Apple of the exploit.
He already has a software security gig, he did it for the attention.
Which he did, read the links in the very MR-article. Yeah, a lot to ask.
----------
Of course he had to submit it before reporting it to Apple, to see if the (automatic?) app-review detects the exploit. Because then the bug would just be of academic nature.
He already has attention. He did it because that's what security researchers do.
And just to finalize these thoughts. I'd much rather have a spotlight-seeking analyst find these holes then a Russian (no offense to Russianshacker trying to actually utilize this.
T.
Security researchers also gave us the now disproven random 8 character password with upper and lower case, number and symbol, change it every few months and don't write it down on a sticky note security method.
They understand security, they don't understand people. There is a reason most security exploits "break" the people running the computer.
Well, the guy did violate the developer agreement. What he could have done instead would be to inform Apple of the bug he discovered so that it could be patched. Bug would get squashed, and he'd still have his developer agreement intact.
Android phone ? Look at my sig. I never owned an Android phone.I'm not upselling anything, I'm trying to downplay your downplaying. Why do you feel Apple needs you to intervene in their favor ?
Sorry if my post hurt your feelings.
This iOS issue isn't as serious as the article makes it out to be.
This bug doesn't include privilege escalation so it doesn't allow apps to be installed. It also doesn't have access to protected data storage and protected data entry.
This bug has no value in relation to mass automated malware. Computer criminals don't care about your photos and access to contacts is only meaningful to spread automated mass malware if a vector to make that malware profitable is present, which isn't the case with this bug.
__________
Google Android has a similar bug but the bug in Android does allow for privilege escalation.
The two Android vulnerabilities, which have been reported to Google but not yet patched, shown in this video are:
- A permission escalation allowing the installation of applications with arbitrary permissions without user approval.
- A privilege escalation targeting Androids Linux kernel that allows an unprivileged application to gain root access.
http://blog.duosecurity.com/2011/09/android-vulnerabilities-and-source-barcelona/
The kernel vulnerability in Android presented in the article above is patched but the other issue is still unpatched. These threats were publicly disclosed on Sept. 20, 2011 and were most likely reported to Google prior to being publicly disclosed.
More information about these Android issues is found in the following link:
http://www.securityfocus.com/bid/49709
__________
Apple's response time to fix critical iOS vulnerabilities has been much better than that of Google. Especially for critical bugs which include privilege escalation.
He already has attention. He did it because that's what security researchers do.
I'm not downplaying the issue; I'm being objective.
I'm not downplaying the issue; I'm being objective.
This isn't the type of threat that manifests as anything significant in the wild.
for the last decade the way to do these things has been to quietly contact the company who then promises to fix the bug within a few months and only go public if the said company ignores the warning
Of course he had to submit it before reporting it to Apple, to see if the (automatic?) app-review detects the exploit. Because then the bug would just be of academic nature.
............ He didn't tell Apple until iOS 5 was finalized... because it was unfinalized, and there was a chance they were working on it...
So am I. This is the type of threat that can be used in the wild to mostly collect data in order to then proceed to annoying people.
I think your accusation of "being an Android owner" was quite ludicrous and doesn't help your credibility in this case. You're usually much more level headed.
Your pointing out Android was also not objective, "being not as worse as the other guys" is not a good method of securing your stuff.