But at the same time he only did it after Apple refused to address the rather massive bug.
He gave them one month?!
I brought up Google long after Google was introduced into the discussion with the following post
There is much more efficient ways to collect email addresses.
Why go after a relatively tiny number of mobile phones, when you can go after a large number of computers running much easier to exploit OSs, such as Windows XP?
Actually read the developer agreement, he completely violated Apples terms and should be removed. He could have easily told Apple without putting a malicious app on the app store.
Will glasses magically make Android 3.5 exist?
The latest version of Honeycomb is 3.2. I was questioning their findings on a non-existant version of Android.
http://developer.android.com/resources/dashboard/platform-versions.html
http://en.m.wikipedia.org/wiki/Android_version_history
onth without any reaction from Apple. No "yup, will check", nada.
he did tell Apple. Apple did nothing.
You are certainly not suppose to expose a company's customers to an exploit the way he did. I would not be surprised if federal charges are not brought against him. This is almost as stupid as the guys who posted the email addresses of iPad owners that they lifted from AT&T's original iPad data subscription web service.
he did tell Apple. Apple did nothing.
The first time I ever heard of this guy was 2 (or 3?) years ago when he went public about a hole in OX, 9 months after he had informed Apple.
Of course after it was approved. When the app gets sorted out by the app-review, there would be no problem. Geez...He told Apple only after the app was approved. http://twitter.com/#!/0xcharlie/status/133901782169550848
Apple had to revoke his license as he knowingly submitted an App that allowed this potentially malicious access.
So then he doesn't have an obligation to report it either? He could just keep quite about it and wait until some criminal discovers it and exploits it. Why not avoid that instead?Apple's not obligation to give him a response. Not a 'we'll check', not a 'yeah we fixed that in 4.3.2 you idiot" or whatever.
----------
Based on what, his say so.
For all we know, they did do something. they just aren't going to advertise that the flaw existed because they don't want anyone getting sneaky and thinking there might be a few folks that won't bother to update their software and will be perfect victims.
But at the same time he only did it after Apple refused to address the rather massive bug.
As others already pointed out with out proof of concept this would of been denied as ever being as issue because Apple would never "aprove" such an app, clearly that is not the case.
Really his app does as little as possible to be bad. It only checks when it is opened for the first time. Someone who wanted to do damage would have it check every time it ran not just the first time. This would force apple to use the nuclear options of remote deleting apps.
Typical Apple response in my book. Do not prove we have holes as we are going to ban you.
Of course after it was approved. When the app gets sorted out by the app-review, there would be no problem. Geez...
Hey, the guy wanted to be famous, now he's famous.
Publicity is often considered the greatest tool in security and secrecy is just security by obscurity. When the holes are in the open, people know how and have the motivation to fix them.
Now it would be completely another thing if he would exploit the bug in practice to reach other people's data - that certainly could and would be illegal.
Knowing about a bug and finding a way to exploit it are two different pair of shoes.You're missing the point.
He knew about the vulnerability since March ... he developed an exploit, wrote an app, put it in the app store, and then told Apple that a vulnerability existed. He had 8 months. Apple has had 3 weeks. Do you really believe he told them exactly where to look?
So now they have to find and patch the vulnerability without breaking other things, and he wants them to do it on his timeline - when he took months to develop the exploit.
Boy lots of people are missing the point. Charlie Miller doesnt care about the developers account. It's just needed to prove his concept and show a compromised app could be uploaded via regular channels. He disclosed it to apple long before he made it public to give them time to fix it. He wasn't planning on making money off this. It's a throwaway account. he makes his money from private consulting and talks.
Yeah, why go after 200 million devices ? And what about going after iOS means you don't also get to go after Windows XP or Windows 7 or Android ?
That's the thing, more vectors you can go after with your infrastructure for collecting the data, why wouldn't you use them ?
Yes, but short term, only. Like, a couple days. Long term, more recognition for him, and we'll just have to see what happens. Becomes win/win.It's a lose/lose for Charlie. I applaud his effort and Apple should have had more class. Now they need to get on the ball and actually fix this before some malicious hackers get on it. Apple is a big corporation. Open source projects that have serious security flaws can usually get a fix out within a day or 2, there's no reason Apple can't do it. Much less in a few weeks.