Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Looks like he was looking for his 15min., he got it. If he really wanted to help, let apple know there is an issue and let them deal with it. I wouldn't be surprised if there is legal repercussions.
 
Looks like he was looking for his 15min., he got it. If he really wanted to help, let apple know there is an issue and let them deal with it. I wouldn't be surprised if there is legal repercussions.
Another one, who didn't read the linked articles and the comments. Excellent. :D:apple:

Miller has found and reported dozens of bugs to Apple in the last few years, and had alerted Apple to this latest flaw on October 14th.
http://www.forbes.com/sites/andygre...per-program-for-proof-of-concept-exploit-app/
 
Looks like he was looking for his 15min., he got it. If he really wanted to help, let apple know there is an issue and let them deal with it. I wouldn't be surprised if there is legal repercussions.

stop wasting everyone's time, please.
 
except that this could be used to steal your data and then wipe your phone.

----------



Removing the app makes sense. Removing him as a developer not so much.

He is a security researcher who is basically helping apple and giving them time to fix it before he exposes it next week. Expect them to include a fix in 5.0.1
before it is released.

Actually read the developer agreement, he completely violated Apples terms and should be removed. He could have easily told Apple without putting a malicious app on the app store.
 
He is a security researcher who is basically helping apple and giving them time to fix it before he exposes it next week. Expect them to include a fix in 5.0.1
before it is released.

He's a security researcher who violated the terms of his agreement in order to make a bunch of money and get his face posted on blogs like this one. He's not trying to "help" anyone. :rolleyes:

He got what he wanted and Apple bounced him. That gave him even more publicity. He's a pretty happy guy right now.
 
I am actually glad he went all public with this.

I would rather have him discover this than some secretive hacker that will actually maliciously exploit the iOS system.

I like Apple products but I won't be on the side of the company, I am on the side of the consumer. From the information I gathered, I think Apple shouldnt have taken away his developer license.
 
Well, the guy did violate the developer agreement. What he could have done instead would be to inform Apple of the bug he discovered so that it could be patched. Bug would get squashed, and he'd still have his developer agreement intact.

For reporting a bug you need a proof. Nobody will listen to you if you claim just on a chance for an issue. And if you are serious into research you work on facts, not hypothesis, because it's simply better for your reputation.
Submitting the app in the way it was done was a requirement for bringing proof.

He could have handled it differently after that, but I guess that's a personal thing.
Apple banned him for rule violation when submitting the app, not for the publicity.

Two weeks notice is a pretty long time. Other companies go publicly busted if not responding within a week or even shorter. This is a very common and accepted pattern.

The ban and what you are asking for is a clear signal for researchers not to investigate into this space. This can't be good.
It is a well known dilemma in the security research space, of course. Bottom line is that violation of terms and conditions has to be accepted when done for research purposes, for reason.
 
This. You can't just say "Oh, I'm a researcher" and submit malware to the app store. It shows really poor judgement. Of course, they did hire they guy from the jailbreaking community. But the big difference is that he had no prior agreements with Apple which he broke, and he wasn't actually doing anything illegal. I don't know what Miller was expecting, losing his developer license was inevitable. It's kind of sad, no doubt he's a smart guy ...in the ways of programming.

What he should have done was release it to the app store, wait for it to be approved, then immediately remove it from the app store and notify Apple that they approved this dangerous application.

Or he should have found someone at Apple to send it to outside of the normal submission process, informing them that he thinks their systems would approve the app, but that it exploits a security flaw. (In fact, maybe Apple should setup a security department much like credit card companies have where people can submit security issues.)

Both of those would have been responsible ways of handling the situation.
 
I guess he should have told apple about it instead of submitting that app


...Miller should have revealed the findings instead of trying to take advantage of the flaw.

Previous exploits that have been identified and (only) reported took a very long time to be addressed by Apple.

Actually showing that this exploit urgently needs to be addressed is meant to speed things up.

He didn't "benefit" from the exploit...he showed that he was right and that it needed to be addressed.

His actions should be rewarded. Punishing an individual who had good intentions and didn't hurt anyone will not benefit Apple.

Next time, maybe this guy (or others like him) will just say "screw it...let Apple figure it out"...and by that time, some actual damage might get done.

Poor handling by Apple.
 
Who cares what “people” would say? He’s in this to improve security, not just for attention, right?

He needs to communicate the bug to Apple, not to the public, and putting an malicious test app out to people via the App Store is unnecessary for that—and he most certainly know he was violating the terms when he did so.

He also gave potential malware-writers a big hand by his choices. He should have waited for a fix, and then he could brag all he likes about how he helped make that fix happen. He gave them one month?! At a time when iOS 5, iCloud, and the iPhone 4S are all new? Not all fixes are equally easy. Maybe it takes two months this time. Is he really helping the platform and us users by deciding that one month is the deadline, and giving malware writers a heads-up? (Not as bad as giving them full details, but he’s set them on the track.)

And should Apple let him get away with the submission, when that sends a message to the next person who decides to pull a similar stunt?

It’s good that he caught this. But his actions, timing and choices almost make me think he wants attention first, and security a distant second....
 
Last edited:
His action may have been a lot of things, but malicious? Far from it. :D:apple:

Lookup the legal definition of malice ... he submitted the app knowing that later his announcement would cause embarrassment to Apple and (likely) damage to stock.

He was depending on the harm of his action to motivate Apple to action ... that is malice.
 

They likely have. He was looking at 4.3 and perhaps even on the base version of it. there were like 2 point releases plus iOS 5 since that initial release.

So really the only folks affected by this would be that small group of less aware users that never updated their software. But that's a tiny group that gets smaller all the time cause the moment they have an issue and go to the Apple store the first thing that happens is their software is updated.
 
So, Apple should just let people breech contracts?

Miller did it maliciously, and Apple should look the other way.

:rolleyes:

There is no evidence that CM did this out of malice. To state otherwise has no basis in terms of the facts. His job is to find flaws and report them, he's done this and felt that Apple have dragged their heels. Personally, I reckon he had this teed up for the Syscan event and hoped that Apple would sort it first before others used it more widely, and is now trying to pressure Apple to sort it.

As I said before, full disclosure is a very emotive subject; there is no right or wrong, only strong opinions and solid arguments on both sides.
 
He is a security researcher

More like, he is a self proclaimed security researcher who abused the terms of being a developer to submit an app he knew was a security risk and would possibly be downloaded and used by people that don't read the blogs and don't know the danger and he could exploit that to harvest their information.

That deserves getting canned from the program.
 
Lookup the legal definition of malice ... he submitted the app knowing that later his announcement would cause embarrassment to Apple and (likely) damage to stock.

He was depending on the harm of his action to motivate Apple to action ... that is malice.

But at the same time he only did it after Apple refused to address the rather massive bug.
As others already pointed out with out proof of concept this would of been denied as ever being as issue because Apple would never "aprove" such an app, clearly that is not the case.

Really his app does as little as possible to be bad. It only checks when it is opened for the first time. Someone who wanted to do damage would have it check every time it ran not just the first time. This would force apple to use the nuclear options of remote deleting apps.
Typical Apple response in my book. Do not prove we have holes as we are going to ban you.
 
What does Android have to do with any of this? "We've got bugs? Well the other guys have WORSE bugs" isn't exactly an argument that makes anyone look good.

Your pointing out Android was also not objective, "being not as worse as the other guys" is not a good method of securing your stuff.

I brought up Google long after Google was introduced into the discussion with the following post:

Meanwhile Google is handing out bounties for stuff like this. Because why would you want to get (almost) free help from industry-leading professionals? Submitting it to the App Store probably wasn't the way to go, though.

So am I. This is the type of threat that can be used in the wild to mostly collect data in order to then proceed to annoying people.

There is much more efficient ways to collect email addresses.

Why go after a relatively tiny number of mobile phones, when you can go after a large number of computers running much easier to exploit OSs, such as Windows XP?

It is much easier to turn these easier targets into mass mailers as well. Turning machines into mass mailers is even more important to profitability because the lower rate of spam from each machine reduces the likelihood of the activity being detected. It is also easier to collect protected data and storage from PC hosts as well.

It doesn't make sense to go after iOS devices unless the monetary gain is more direct, such as with the inclusion of privilege escalation.

I think your accusation of "being an Android owner" was quite ludicrous and doesn't help your credibility in this case. You're usually much more level headed.

You seem to be showing reactivity toward my posts when the discussion involves mobile OS security.

https://forums.macrumors.com/threads/1236870/

I'd also say that anyone who thinks that this vulnerablity isn't being exploited at the moment is dellusional. This isn't scaremongering, simply reality (albeit that the likelihood of being impacted is very slight) as cybercriminals are actively targetting the mobile device ecosystem.

I think that a guy that focuses on finding Apple vulnerabilities would find this long before anybody else.

Cybercriminals employ a measure of cost benefit analysis on there activities because their revenue comes from not attracting attention to themselves.

Remember, Charlie Miller wasn't able to submit an app to the App Store anonymously.

It takes much less effort to anonymously distribute malware for other platforms than iOS.

The key here is to ensure that you're using apps from established companies within the app store.

But, I agree this is always good advice.
 
More like, he is a self proclaimed security researcher who abused the terms of being a developer to submit an app he knew was a security risk and would possibly be downloaded and used by people that don't read the blogs and don't know the danger and he could exploit that to harvest their information.

That deserves getting canned from the program.

You're only self-proclaimed if no-one else believes that you are. He submitted an app that he controlled and quite simply he wouldn't work in the industry again if he were to be found to using the weakness to harvest any information. Let's stop the hyperbole and stick to the facts?
 
Reading a lot of posts here virusses and malware shouldn't be any problem any more....we just have to tell the producers of this stuff they are violating a TOS..that must be enough to stop them ;)

That this guy wanted his piece of attention is absolutely irrelevant. Relevant is that the App Store has some flaws that need to be fixed.
 
He needs to communicate the bug to Apple,
Did.
and putting an malicious test app out to people via the App Store is unnecessary for that
The payload, which he has to enable to be downloaded by the app, is, not the app itself.
He also gave potential malware-writers a big hand by his choices.
Didn't.
He gave them one month?!
One month without any reaction from Apple. No "yup, will check", nada. The kicking was quick though. At least that works. :D
and giving malware writers a heads-up?
Again, didn't.

Lookup the legal definition of malice ... he submitted the app knowing that later his announcement would cause embarrassment to Apple and (likely) damage to stock.
Every security-related bug is embarrassment. So people should stop checking for security-bugs now? That's rich. And what's with that obsession with stocks? :D:apple:
 
His job is to find flaws and report them,

Report them to the software company not to the world. For all we know he skipped over telling Apple about this until he had submitted the app (which isn't part of his job), allowed it to be downloaded who knows how many times, possibly used the exploit for his own gain ("I had to prove it would work") and then announced it to the public. That's when Apple found out that he had found this flaw. The whole big announcement game is class fame whore tricks.

But in the end, Apple likely has their own 'security researchers' and may have already found this and the guy could be using an outdated version of 4.3. Just like the kids at the various conferences with old version so Safari etc that find bugs that are already patched.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.