Another one, who didn't read the linked articles and the comments. Excellent.Looks like he was looking for his 15min., he got it. If he really wanted to help, let apple know there is an issue and let them deal with it. I wouldn't be surprised if there is legal repercussions.
http://www.forbes.com/sites/andygre...per-program-for-proof-of-concept-exploit-app/Miller has found and reported dozens of bugs to Apple in the last few years, and had alerted Apple to this latest flaw on October 14th.
Looks like he was looking for his 15min., he got it. If he really wanted to help, let apple know there is an issue and let them deal with it. I wouldn't be surprised if there is legal repercussions.
except that this could be used to steal your data and then wipe your phone.
----------
Removing the app makes sense. Removing him as a developer not so much.
He is a security researcher who is basically helping apple and giving them time to fix it before he exposes it next week. Expect them to include a fix in 5.0.1
before it is released.
Looks like he was looking for his 15min., he got it.
He is a security researcher who is basically helping apple and giving them time to fix it before he exposes it next week. Expect them to include a fix in 5.0.1
before it is released.
Well, the guy did violate the developer agreement. What he could have done instead would be to inform Apple of the bug he discovered so that it could be patched. Bug would get squashed, and he'd still have his developer agreement intact.
From the information I gathered, I think Apple shouldnt have taken away his developer license.
This. You can't just say "Oh, I'm a researcher" and submit malware to the app store. It shows really poor judgement. Of course, they did hire they guy from the jailbreaking community. But the big difference is that he had no prior agreements with Apple which he broke, and he wasn't actually doing anything illegal. I don't know what Miller was expecting, losing his developer license was inevitable. It's kind of sad, no doubt he's a smart guy ...in the ways of programming.
I guess he should have told apple about it instead of submitting that app
...Miller should have revealed the findings instead of trying to take advantage of the flaw.
So, Apple should just let people breech contracts?
Miller did it maliciously, and Apple should look the other way.
![]()
His action may have been a lot of things, but malicious? Far from it.![]()
http://www.forbes.com/sites/andygre...curity-bug-lets-innocent-looking-apps-go-bad/
This is NOT good... let's hope Apple releases a fix soon.
So, Apple should just let people breech contracts?
Miller did it maliciously, and Apple should look the other way.
![]()
He is a security researcher
Lookup the legal definition of malice ... he submitted the app knowing that later his announcement would cause embarrassment to Apple and (likely) damage to stock.
He was depending on the harm of his action to motivate Apple to action ... that is malice.
What does Android have to do with any of this? "We've got bugs? Well the other guys have WORSE bugs" isn't exactly an argument that makes anyone look good.
Your pointing out Android was also not objective, "being not as worse as the other guys" is not a good method of securing your stuff.
Meanwhile Google is handing out bounties for stuff like this. Because why would you want to get (almost) free help from industry-leading professionals? Submitting it to the App Store probably wasn't the way to go, though.
So am I. This is the type of threat that can be used in the wild to mostly collect data in order to then proceed to annoying people.
I think your accusation of "being an Android owner" was quite ludicrous and doesn't help your credibility in this case. You're usually much more level headed.
I'd also say that anyone who thinks that this vulnerablity isn't being exploited at the moment is dellusional. This isn't scaremongering, simply reality (albeit that the likelihood of being impacted is very slight) as cybercriminals are actively targetting the mobile device ecosystem.
The key here is to ensure that you're using apps from established companies within the app store.
More like, he is a self proclaimed security researcher who abused the terms of being a developer to submit an app he knew was a security risk and would possibly be downloaded and used by people that don't read the blogs and don't know the danger and he could exploit that to harvest their information.
That deserves getting canned from the program.
Did.He needs to communicate the bug to Apple,
The payload, which he has to enable to be downloaded by the app, is, not the app itself.and putting an malicious test app out to people via the App Store is unnecessary for that
Didn't.He also gave potential malware-writers a big hand by his choices.
One month without any reaction from Apple. No "yup, will check", nada. The kicking was quick though. At least that works.He gave them one month?!
Again, didn't.and giving malware writers a heads-up?
Every security-related bug is embarrassment. So people should stop checking for security-bugs now? That's rich. And what's with that obsession with stocks?Lookup the legal definition of malice ... he submitted the app knowing that later his announcement would cause embarrassment to Apple and (likely) damage to stock.
His job is to find flaws and report them,