I think it was intentional.i'm sorry but how can a developer be such an idiot (please don't ban me, there's no other word to describe patient's condition) to download Xcode from a chinese cloud file sharing service????
I think it was intentional.i'm sorry but how can a developer be such an idiot (please don't ban me, there's no other word to describe patient's condition) to download Xcode from a chinese cloud file sharing service????
Apple Inc's chief marketing executive Phil Schiller said on Tuesday that the company plans steps to prevent further attacks on its App Store.
He said that Apple will offer domestic downloads of its developer toolkit from China, according to an interview with Chinese news site Sina.com.
Schiller also said that the company knows of no cases where tainted apps have been used to transmit customer data.
Apple plans to warn of 25 tainted apps that the company has identified so that customers can delete and update them, he said in the interview.
You forget one thing: 3rd-party libraries and frameworks, such as Unity. If the developer had included any breached 3rd party library, his App would still be injected.
There're hundreds of thousands of user created libraries out there and it's virtually impossible for Apple to prepare all these libraries on its cloud compiler. It's not even possible for Apple to make a whitelist for these 3rd party components.
It's not the first time that some 3rd party libraries were found to be vulnerable, or even breached, and a bunch of Apps were affected. Basically XcodeGhost is also a 3rd party library attack, since the hacker had done nothing but modified the default project template, to preload a block of codes before the "real" codes being executed.
Technically, XcodeGhost doesn't do anything "bad". An App is supposed to collect user data and send back for analyzing, especially for these which use internet services extensively. The only problem is that the customers, as well as creators, were unaware of such behavior.
Thanks to Apple's hysteria on privacy, these "malicious code" must still follow Apple's rule. It still can't savage your system, insert any executable. nor access anything you have not permitted. It can only collect very restricted, semi-anonymous information from your phone, without further permission. Now we all know why Apple behaved such a control freak.
Quote below from a Reuters article today.
He said that Apple will offer domestic downloads of its developer toolkit from China, according to an interview with Chinese news site Sina.com.
France, and that was like 6 years ago? iPhone 3G or 3GS back then, can't remember.What country and what version of Xcode? I recently switched, though I still develop for Android. So while I grant you Xcode is pretty damn slow to download, my SWAG is about an hour more. However the Android SDK is separate from Eclipse/IntelliJ, and that's taken a good deal of time on release days.
So that explains stories after stories about Android exploits and fixes while almost none about iOS ones, right?(# of total vulnerabilities, least to most)
Microsoft Windows : < 50
RIM Blackberry: ~ 60
Google Android: 54
Apple IOS: 692
sources: https://www.cvedetails.com/product/19997/Google-Android.html?vendor_id=1224
https://www.cvedetails.com/product/15556/Apple-Iphone-Os.html?vendor_id=49
![]()
That is precisely why I hate looking for some guides on iOS development and they say "use this, get this library, do that blah blah". I am the type of coder that wants to do everything myself. For many reasons.
The only thing I use like that is MonoGame and Xamarin. Everything else I do by hand.
You must be on yourself or doing only independent projects, or you're a C-family programmer.
I'd also had the same habit like you when I was a young programmer, until I found it ultimately stupid to reinvent the wheel from ground zero.
You don't learn if you use somebody else's code. For example, I recently started learning Direct X. There are A LOT of guides out there that use libraries that do everything for you. You don't get to learn about how to create a graphics device, or swap chains, or any of the necessary tasks.
Good for you. Maybe you could start creating alternatives to Boost, OpenSSL, zlib, libcurl, lighthttpd, fastcgi, libpng and libmysqlclient.
I had winzip in my iPhone and iPad, but didnt use it.
I deleted the app as soon as I came to know about the risk.
Am I safe as I didnt open the app or I have to change all passwords entered in the iphone or ipad?
Possibly it's like Angry Birds 2 where only certain Asian versions were affected but they pushed a update to fix it across all territories.It is still on the App Store, so it was probably safe from this anyway.
So... It begins.
iOS has been breached through the one thing that kept us safe. The App Store.
It is still on the App Store, so it was probably safe from this anyway.
Infected iOS apps
CamCard
Quite a bit if this thread addresses those types of questions.why did apple not recognize the malware during the review process? Is it a tough task to do every app?