AnthonyKinyon said:
Well I'm back to being a smug Mac user
AnthonyKinyon said:
He said the technique could be useful in targeting specific people or specific groups of people who are in close proximity to an attacker -- for instance, a cafe that is frequented by executives of a particular company.
A computer need not be connected to the Internet to be infected. All that's required is that it have certain wireless devices installed and that those devices be turned on.
frozencarbonite said:And I'm still confused about whether or not the native Airport drivers are affected by this.
Brian Krebs said:I stand by my own reporting, as according to Maynor and Ellch it remains a fact that the default Macbook drivers are indeed exploitable.
frozencarbonite said:Powerbook drivers? hahaha
Passante said:
What's your source that says PowerBooks (or any other machines) aren't affected?frozencarbonite said:hahaha Don't be sorry. Powerbooks not being affected by this is a good thing to me. I'm still holding tight to my PPC.
WildCowboy said:What's your source that says PowerBooks (or any other machines) aren't affected?
yellow said:I seriously doubt this is a major concern ATM for home users with secured wifi access points (and by that, I mean wifi APs that filter MAC addresses). In order for someone to use this exploit, they would undoubtedly have to be on your network..
schenz said:Well... but at least it's not Apple's fault, because they didn't produce the driver. Therefore it's actually not a concern of Apple's but of the driver's producer's.
On the other hand Apple did include it into it's OS seemingly without testing it thorougly, and that is, of course, a concern of Apple's. So they will have to work together to get rid of that - and I'm sure they will - and I may be smug again.![]()
savar said:The moral of the story is that to hack OS X you have to focus your effort on the closed-source software that's in there.
Everybody thinks Macs are safe because Darwin is open source, tried and tested. But we forget about all the closed-source software that is running with elevated privileges.
backdraft said:I wonder if this is a specific to X86 hardware... Does this effect ppc based hardware?
backdraft said:Here's a work around maybe. Under Systems Preferences > Network > Airport
Click on Configure and then Options...
I wonder if this is a specific to X86 hardware... Does this effect ppc based hardware?
Oh, probably should ask for admin psswd to change networks as well...
mkrishnan said:These options have always been there, but I'm not sure they're sufficient to divert this type of exploit (assuming it exists/works, since people are arguing fervently that it's a hoax). The way I understand it, a WiFi device looking to join a network is doing active sensing even when it will only join preferred networks -- this pretty much must be true, since it can join a preferred hidden network, which is not itself broadcasting its availability. So the problem comes when a malevolent entity responds to the ping that the WiFi card puts out. I'm not sure just telling your computer to not join open networks would make any difference at that level. For instance, in analogy, with the BT exploit, one was not required to pair with the device propagating the virus -- just be discoverable.
appleguru1 said: