Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

iPhone, IE, Firefox, Safari get stomped at hacker contest
The Register ^ | 25 March 2010 | Dan Goodin

Posted on 03/25/2010 10:42:55 AM PDT by ShadowAce

click here to read article


Navigation: use the links below to view more comments.
first 1-2021-4041 next last

1 posted on 03/25/2010 10:42:55 AM PDT by ShadowAce
[ Post Reply | Private Reply | View Replies]

To: rdb3; Calvinist_Dark_Lord; GodGunsandGuts; CyberCowboy777; Salo; Bobsat; JosephW; ...

2 posted on 03/25/2010 10:43:15 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

In China, every day is Pwn2Own Hacker Contest Day.


3 posted on 03/25/2010 10:45:08 AM PDT by Question Liberal Authority ("We can't control nature" - Barack Obama, Feb 27, 2010)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Hackers should be shot. That’s a “fire wall” I’d support.


4 posted on 03/25/2010 10:45:47 AM PDT by Lee'sGhost (Johnny Rico picked the wrong girl!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce
As market share increases for Apple, watch as more hackers exploit them.

Those issues have always been there, it's just that almost no one cared.

5 posted on 03/25/2010 10:48:27 AM PDT by Dead Corpse (III, Oathkeeper)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce
The web at the moment is pretty scary, actually.

Sobering stuff.

If you have information of value to someone, they will probably be able to get it if they try hard enough.

6 posted on 03/25/2010 10:49:52 AM PDT by TChris ("Hello", the politician lied.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce
"Tomorrow, I'm going to describe exactly how I found them, so hopefully that means Apple will replicate what I did and they'll find my 20 [bugs] and probably a lot more," Miller said. "Hopefully, they'll keep doing that and improve their mechanisms of finding bugs as opposed to just slapping band-aids every time I send them email about what bug I have."

Say wha????...

You'll smoke a turd in hell for that buddy....!!!!

7 posted on 03/25/2010 10:50:15 AM PDT by TomServo
[ Post Reply | Private Reply | To 1 | View Replies]

To: Lee'sGhost

Yes but I like this contest. This is designed to help the end user have a better product.


8 posted on 03/25/2010 10:55:02 AM PDT by the long march
[ Post Reply | Private Reply | To 4 | View Replies]

To: the long march
This is designed to help the end user have a better product.

Exactly. The more this is published, and the more products involved, the better we all are.

9 posted on 03/25/2010 10:57:14 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 8 | View Replies]

To: ShadowAce

Isn’t computer hacking a criminal activity? I don’t recall seeing the results for the latest chop shop contest; safe cracking; most efficient meth lab contest; etc. Just saying.


10 posted on 03/25/2010 10:58:06 AM PDT by WinMod70
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

I also use Opera. Firefox has better features, but Opera is more secure and stable.


11 posted on 03/25/2010 10:59:33 AM PDT by Retired Greyhound
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

The practice leading up to the contest is what worries me.


12 posted on 03/25/2010 10:59:36 AM PDT by WinMod70
[ Post Reply | Private Reply | To 9 | View Replies]

To: WinMod70

Hacking in and of itself isn’t illegal, it’s hacking into computers that you don’t have permission to access and are not yours is the illegal part.

Walking on your own property isn’t trespassing, walking on some one’s property without permission is.


13 posted on 03/25/2010 11:00:22 AM PDT by gjones77
[ Post Reply | Private Reply | To 10 | View Replies]

To: Question Liberal Authority
In China,
every day
is Pwn2Own Hacker
Contest Day.

AGAINST
a long list
of American targets
--probably even at
globalists' invitations.

14 posted on 03/25/2010 11:02:38 AM PDT by Quix (BLOKES who got us where we R: http://www.freerepublic.com/focus/religion/2130557/posts?page=81#81)
[ Post Reply | Private Reply | To 3 | View Replies]

To: ShadowAce

WHY WERE THESE INDIVIDUALS NOT ALL ARRESTED? A convention of criminals, and no one paid attention? Oh, I see; it’s Canada. Thanks, Hosers!


15 posted on 03/25/2010 11:03:08 AM PDT by JimRed ("Hey, hey, Teddy K., hot enough down there today?" TERM LIMITS, NOW AND FOREVER!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: JimRed

Take a deep breath...

Many of those “hackers” work for global security firms, it’s their job to find exploits.

And as for the students, it’s basically the same thing, they work to find and expose exploits to force the company that made the software to tighten it’s security.

It’s people like them that help to find and fix security holes, they’re referred to as “White Hat Hackers”, they’re the good guys.


16 posted on 03/25/2010 11:05:47 AM PDT by gjones77
[ Post Reply | Private Reply | To 15 | View Replies]

To: JimRed

Because they didn’t launch any attacks on other people’s systems. They developed the exploits on their own time and their own dime, and merely showcased them at this event in an effort to win a prize.

Charlie Miller, who attacks OS X for his prize money, used to be an NSA employee.


17 posted on 03/25/2010 11:09:25 AM PDT by NVDave
[ Post Reply | Private Reply | To 15 | View Replies]

To: JimRed

There’s nothing illegal about hacking your own computer, or a computer offered up openly for hacking. They’re only breaking the law if they hack a computer against the owner’s wishes. You can bust the software on your own machine all you want.


18 posted on 03/25/2010 11:12:16 AM PDT by discostu (wanted: brick, must be thick and well kept)
[ Post Reply | Private Reply | To 15 | View Replies]

To: WinMod70

“Computer hacking” is criminal only when you attack other people’s systems with the exploit.

Developing an exploit on your own systems is not a criminal activity, and if it were, then a whole lot of software developers would end up being shuffled off to jail, because the sort of testing these people engage in is routinely used by software developers who want to make a robust product.

Those software developers wishing to make a robust product, unfortunately, don’t work for major software or hardware vendors, because middle management can’t see the profit margin in closing vulnerabilities unless the vulnerability has been exploited “in the wild.”


19 posted on 03/25/2010 11:12:26 AM PDT by NVDave
[ Post Reply | Private Reply | To 10 | View Replies]

To: gjones77

Deep breath taken- thanks!

8^)


20 posted on 03/25/2010 11:30:04 AM PDT by JimRed ("Hey, hey, Teddy K., hot enough down there today?" TERM LIMITS, NOW AND FOREVER!)
[ Post Reply | Private Reply | To 16 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson