Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
"Rather than report the vulnerabilities to Apple, Zerodium said that it would sell the exploit to its customers, which include major technology, finance, and defense corporations, as well as government agencies."

Did anybody not see this part ?
Apple should outbid these creeps. They definitely have the cash. Or just buy them out and fold them into their own security operations.
 
Alternatively, Apple could tell the public that if you manage to get $1.5 million from this company for an exploit, they will take you to court until your money is gone.
How in the world is Apple going to know who got the bounty? Zerodium paid 3 million dollar bounties last year for 3 weaponized exploits. Who could Apple take to court in that instance?

Just going to leave these here for future reference.
Who are zerodium's customers? Are they vetted? How? What kinds of things would disqualify an extremely rich customer from purchasing an exploit?
It's pretty obvious that you don't know it, but you have no idea what's going on with this subject matter.

And you know full-well that this is an assumption without facts to back it up. Mac OS already scaled to an additional billion devices, overtook windows PCs and didn't see a corresponding explosion in malware.{snipped for clarity}
You didn't understand the quote you read. In your haste to defend, you overlooked the obvious meaning of that quote.

This should be 100% illegal. It is obtaining private information without the users permission and then brokering that information to persons unknown.
What information is being obtained by Zerodium without users permission? The hackers code?
 
  • Like
Reactions: pat500000
This should be 100% illegal. It is obtaining private information without the users permission and then brokering that information to persons unknown.

When the government wants our information they have to have a valid legal reason. This circumvents that. So how can it be legal ?

It is a really messed up world we find ourselves in my friends

The government plays by their own rules. They don't follow laws.
[doublepost=1475259220][/doublepost]
because the same people who make our laws are the same ones buying the exploits so that they can spy on their citizens and hack into their phones after crimes.

Not just after crimes. At their whim.
 
You know, if Apple played their cards right, they could contract someone to work on their behalf and get $1.5Million of of Zerodium's money and directly benefit Apple. In fact, a truly conniving company could create a hidden 'vulnerability', sell it to Zerodium, fix the code right away and sink the potentially sabotaging company.


I think this would curb Zerodiums ability to provide an award
 
And this is why having ANY sensitive information in an Internet-connected device is a risky affair.

I'll never use Apple Pay or its equivalents, and my using my mobile device for anything other than calls, chats, photos, and non-important browsing is an accepted risk I take sparingly and in full awareness of the exposure.

I like my storage local and disconnected from the Air whenever possible, I use physical credit cards, and a real computer to do and keep sensitive stuff (as opposed to an iPad and the like).

The tradeoff of convenience and security is exemplified in a scenario such as this Zerodium thing.
 
Captalism is to blame? You realize government would be the biggest customer here right?

Blame? I don't think that is the point here. We're living in a market driven economy where the invisible hand sets the market rate for any widget or service. An exploit is simply a time-limited good which is sold at the rate the market can bear. Blame? NO! God loves Capitalism.
 
How is this even legal?
Why? It's just like any other private security firm. Why would it be illegal?

-----------
Dang I guess I need to start learning how to root devices in my free time. Only need one big hit and done.
[doublepost=1475264320][/doublepost]
Captalism is to blame? You realize government would be the biggest customer here right?
The issue for many I guess is not knowing which government.
 
Could the act of selling an iPhone hack make you an accessory or accomplice to a crime if that hack was subsequently used to break the law? I confess that I am not knowledgeable enough to comment in that regard.

The closest analogy I can think of is that it would not be against the law to have the keys to your house duplicated, though it would certainly be breaking the law if I decided to use those keys to break into your house to burgle it. The only reasonable course of action you could take is to have all your locks changed.

Depending on the design of the lock and how many were sold, someone out there could very possibly already have the key to your house.

Does that immediately make them (or all the people with the same key) a suspect in the event of a break in? Nope.

Also a locksmith has the ability to make a key via numerical methods for quite a few locks without having a key and that doesn't make him a suspect.

The person using the "tool" for the illegal act is the criminal. The guy on the factory line that made the key cutter isn't responsible for the use of it.
 
How is this even legal?

How can it be, unless Apple shares source code to make lives easier for bug chasers?

Also, with Apple's wealth, how come it's resorting to taking advantage of talent out there to do their work for pennies? People should be offended, especially since the tax scandal the Apple company is mired in. Don't they believe in trickle down? Seems not...
 
There's nothing in his post to indicated any kind of a joke.
I think that was my point, that he took a phrase that is usually uttered as a joke and applied it literally.
[doublepost=1475274785][/doublepost]
Again, you fail to understand what "security through obscurity" means, and you obstinately refuse to educate yourself on the topic. It has nothing to do whatsoever with market share, and I made no reference to such a thing. For example, take Microsoft, who followed this approach for its huge market share products - with disastrous results.

So the thing you should have shot down was the mumble-jumble in your head related to software security, but you're too deep into your misconceptions to actually understand the topic at hand.
Look up "security through obscurity" at Wikipedia. It explicitly mentions "security through minority" as a variation of it.

I really find it strange that somebody who thinks a given concept doesn't work then tries to assert his or her position by declaring the whole term as actually not describing the thing. As if the ultimate rebuttal to something is to say that word itself doesn't exist. Like countering a claim that there is oil in Albania that a) there is no oil in Albania and b) no such thing as Albania even exists. Or like exercising a word like 'recession' from the vocabulary as the ultimate way of asserting that there currently is no recession, or that the word recession actually means something else.
 
It's pretty obvious that you don't know it, but you have no idea what's going on with this subject matter.

It's pretty obvious that your mental capacity can't stretch beyond a single sentence, if you want to get personal.

There are loads of extremely dangerous exploits that could occur, even offline, if a pilot's iPad was hijacked. Theoretically, they could develop a baseband firmware which jammed the on-board GPS and other communications and, since these are the backup maps, they could have the plane fly in the wrong direction to engineer a low-fuel situation either in a compromised location (taking the aircraft, crew and passengers hostage) or just in the middle of the ocean. Maybe they can transmit a convincing dummy GPS signal. The iPad doesn't even have to stay offline - the hack could potentially invisibly connect to on-board WiFi if available. Maybe they don't even have to - maybe they can just detect flight conditions in other ways and make the iPads overheat and explode. There are players out there who truly go to incredible lengths; never underestimate the lengths people will go to in order to harm others.

It's pretty obvious that you severely underestimate cybersecurity.

Relax buddy. iOS devices have been hacked/jail broken for years now. I haven't heard of any major catastrophic issues because of it, have you?

A zero-day exploit is fundamentally separate from the concept of "jailbreaking". Jailbreaking is something you do to your own device, with the intention of removing restrictions from the manufacturer. A hack is something that somebody else does to invade your computer, and their intentions can be all over the map. Both may make use of zero-days, but there is an huge distance between them.

I do remember hearing about cases where malware jailbroke peoples' phones. There are some proof-of-concepts, but I also remember about hearing one in the wild at one point (forget the name).

Here's a POC fake charger which can jailbreak your phone without you knowing: http://www.jailbreakmodo.com/3rd-party-iphone-chargers-can-install-malware-on-your-device.html

Also cases about malware targeting jailbroken phones: http://researchcenter.paloaltonetwo...000-apple-accounts-to-create-free-app-utopia/

This is why I find the idea of zero-day exploits available for anybody with enough cash abhorrent. I'm aware that such places likely exist on the darknet, but we shouldn't allow them to also openly flaunt themselves as a registered corporation. We don't have a way to regulate their use (if there are legitimate ones) by private parties, so we must consider them potentially extremely dangerous.
 
Alternatively, Apple could tell the public that if you manage to get $1.5 million from this company for an exploit, they will take you to court until your money is gone.

How would they sue over this? There's no indication of someone providing privileged information. If this person used the exploit on anyone else, they might have legal trouble. Apple wouldn't be able to do much, and it would be a stupid battle anyway.

Consider that researchers sometimes release similar information into the public domain.
 
It's pretty obvious that your mental capacity can't stretch beyond a single sentence, if you want to get personal.

There are loads of extremely dangerous exploits that could occur, even offline, if a pilot's iPad was hijacked. Theoretically, they could develop a baseband firmware which jammed the on-board GPS and other communications and, since these are the backup maps, they could have the plane fly in the wrong direction to engineer a low-fuel situation either in a compromised location (taking the aircraft, crew and passengers hostage) or just in the middle of the ocean. Maybe they can transmit a convincing dummy GPS signal. The iPad doesn't even have to stay offline - the hack could potentially invisibly connect to on-board WiFi if available. Maybe they don't even have to - maybe they can just detect flight conditions in other ways and make the iPads overheat and explode. There are players out there who truly go to incredible lengths; never underestimate the lengths people will go to in order to harm others.

It's pretty obvious that you severely underestimate cybersecurity.
Tom Clancy would be proud. He wouldn't use it, as it's too farcical. But he would be proud of your efforts. Although, the fervor with which reads, I believe you believe it to be a viable scenario which we must guard against. Who am I to throw cold water on your hypothetical. Nobody, that's who. If it does get greenlit, please for the love of Mike, don't let choose Tom Cruise as a lead actor. He's already ruining Lee Childs' Reacher character.

As for me underestimating cyber security... you might be right. I have it on very good authority that Cyber is hard.
 
It's okay. The guys from Zerodium probably use iPhones and they'll get hacked using whatever exploit they sold.
 
Could the act of selling an iPhone hack make you an accessory or accomplice to a crime if that hack was subsequently used to break the law? I confess that I am not knowledgeable enough to comment in that regard.

The closest analogy I can think of is that it would not be against the law to have the keys to your house duplicated, though it would certainly be breaking the law if I decided to use those keys to break into your house to burgle it. The only reasonable course of action you could take is to have all your locks changed.


Well, ask yourself, how many degrees of separation does there need to for anyone to be involved in any crime after a exploit of a OS. It's a tricky proposition to say that one who exploits a OS is merely responsible for what may come about after by someone else.
 
"Rather than report the vulnerabilities to Apple, Zerodium said that it would sell the exploit to its customers, which include major technology, finance, and defense corporations, as well as government agencies."

Did anybody not see this part ?

Selling to companies is what's its about anyway... Where's the harm in that? as long Zerodium is not selling direct to users, it's ok.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.