Yesterday there was a
story about hacking a MacBook remotely by manipulating its wireless drivers that
Slashdot picked up today.
I was dubious, so I found
the video. As I expected the story is
a little misleading. The demonstration video that the articles mention starts with the researcher adding a third-party USB card that looks a lot like a
(
Read more... )
Comments 12
--Corprew (or at least news at the same surprise level.)
Reply
(The comment has been removed)
Even after seeing the video it's still unclear how repeatable the exploit is. The main advantage of video is that it lets you show a completely controlled success instead of the hundreds of tests that didn't work or a single repeatable event in the field. That, coupled with dr_strych9's quasi-authoritative denials makes me still think something is fishy about this.
Reply
(The comment has been removed)
That was referencing the last "OMG OSX IS DOOMED" exploit where someone managed to elevate an unprivileged user to root, but it was reported to appear that an outside attacker was able to get root without any assistance from the administrator of the machine. That's why I used a boolean 'or'.
If you want to keep your system secure, regardless of which operating system you use, don't give evil people accounts on your system or install untrusted third party hardware, drivers, or applications.
Reply
Maybe they're protecting themselves from Apple.
Reply
Reply
The whole scenario seems doubtful. Threatening corporations don't provide specific instructions and guidelines to guarantee the safety of the groups they threaten. They say vague things like "we've got a whole team of lawyers who do nothing all day but make lives miserable for people who malign our brand". No middle manager or junior lawyer wants to sign off on what sort of criticisms are acceptable or beyond reprisal when it blows up big enough that the higher-ups start hearing about it.
I can't find anything in the Apple Developer Terms and Conditions ( ... )
Reply
That's plausible in the broad sense of, "A corporation may sue for defamation based on true allegations (eg, SLAPP)," but I have no recollection of Apple specifically doing this. Irrelevant but interesting: Notable litigation of Apple Computers.
Reply
Leave a comment