If only there was a way to securely distribute Mac software that was verified and came from the actual developer and customers would have some kind of assurance that it was not malware or hacked versions of legit apps...
His personal computer and work computer are probably one in the same.Not that I wish anything bad on anyone but am I the only one wondering why he was downloading a utility like Handbrake onto a machine with the company source code. Seems like that was not the wisest move.
If only there was a way to securely distribute Mac software that was verified and came from the actual developer and customers would have some kind of assurance that it was not malware or hacked versions of legit apps...
Doesn't Github use 2FA?
Hackers accessed Frank's computer through the infected HandBrake software and were able to obtain his usernames and passwords, including login information for Github.
Anyway they don't deserve this and they have my empathy and compassion for what they're going thru.
How did they "obtain" usernames and passwords without needing the password of his computer? Sounds like he was storing this information insecurely somehow. Macs have come with an encrypted password manager since the first version of OS X. There's _no_ excuse for Mac users to be storing passwords in plain-text anywhere!
If it was downloaded for legit use, how would it be ironic?
Evil people suck.
How did they "obtain" usernames and passwords without needing the password of his computer? Sounds like he was storing this information insecurely somehow. Macs have come with an encrypted password manager since the first version of OS X. There's _no_ excuse for Mac users to be storing passwords in plain-text anywhere!
They basically traded usability for security. I understand their reasoning even if I don't fully agree with it. Allowing non-sandboxed apps and warning (aka educating) the user when they load these apps would be better.I remember when there were a far greater variety of apps in the Mac App Store, then Apple tightened the policies and a bunch of app developers jumped ship, distributing directly instead. It's a shame because the store was a good idea, just poorly executed.
So I know there are legitimate reasons to use Handbrake (I used it myself to create electronic versions of physical media I own) but I also know that there are probably more Handbrake users involved in piracy than not. I just say this as it would be ironic if that leads to piracy of Panic products.
In any case, I'm a Coda owner (paid for) and user and I hope this doesn't end badly for him.
Well..... technically ripping DVDs you own that have anti-piracy software on it is also illegal.
Not by default, but they support it. But this wouldn't do any good either way. They could just clone it and copy it from his Mac using this trojan. What they could have done, which nobody really does, is keep the Keychain always locked and put a password on any git SSH keys used.Doesn't Github use 2FA?
Yes, even if Apple allowed it, I don't think GPL does.HandBrake is GPL-licensed software. Apple’s terms and conditions are at odds with this licence.
How did they "obtain" usernames and passwords without needing the password of his computer? Sounds like he was storing this information insecurely somehow. Macs have come with an encrypted password manager since the first version of OS X. There's _no_ excuse for Mac users to be storing passwords in plain-text anywhere!
Yes, even if Apple allowed it, I don't think GPL does.
It never occurred to me. If Handbrake weren't available, there are plenty of tools like VLC to do it. And VLC is also what pirates use to watch videos because people always release them in weird formats for some reason.So I know there are legitimate reasons to use Handbrake (I used it myself to create electronic versions of physical media I own) but I also know that there are probably more Handbrake users involved in piracy than not. I just say this as it would be ironic if that leads to piracy of Panic products.
In any case, I'm a Coda owner (paid for) and user and I hope this doesn't end badly for him.
What would that solve? Their source code is out. The problem isn't piracy; that could be done before. I doubt their src is safe even if they pay the ransom.Probably an idea to just give it away now. If it's free from their site it won't be downloaded elsewhere.
It's kept unlocked by default. When's the last time you entered your password to allow access to your Keychain?How did they "obtain" usernames and passwords without needing the password of his computer? Sounds like he was storing this information insecurely somehow. Macs have come with an encrypted password manager since the first version of OS X. There's _no_ excuse for Mac users to be storing passwords in plain-text anywhere!
I've enjoyed Coda in the past, but I'm curious why people continue to use it, when I think lots of competing IDEs seem to have lapped it?
If you're going with paid apps then I think JetBrains has one of the best suites.
As much as I've come to dislike Adobe, their Edge/Brackets is a nice free html/css/js lightweight editor without the creative cloud bloat.
VS Code and Atom are great overall options getting better and better.
CodeAnywhere is an awesome solution that replaced everything Coda did for me, and there are lots of visual database tools to choose from...
Doesn't Github use 2FA?
including login information for Github
Git != GitHub
The wording in the MacRumors article is incorrect. They never said they use an externally hosted Git service like GitHub, only that "git credentials" were stolen. It's extremely unlikely they're using an external Git hosting service and much more likely that they're running their own internal Git server.
I love Panic, too. But this is a good example of poor password management, and I expect better from Panic. They would not hesitate to encourage their customers to practice safe password management, so why/how were they lacking on this?
Reminds me of a situation a couple of years ago where a Git hosting provider that I was using got hacked, and their Amazon accounts were held hostage in exchange for ransom. When they didn't pay, the data was deleted. Everything was lost. Company no more. Customers left hanging. They never did reply to any of my support calls. They, too, failed to manage login credentials properly, including not using 2FA.