Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: LearnsFromMistakes
right, because a targetted attack could never work against a mac. See this is the crap we are talking about. Macbots just don't get it. They swear better security and make outrageious claims (like your Iranian nuke plant claim). As if using Macs would have prevented the targetted atttack. Maybe you should read about the pwn2own contest where OSX has lost the contest easily for not 2, not 3, but 4 yes 4 years in a row! Macbot excuse 1st year: Everyone wants a mac so they only focussed on cracking the mac. Macbot excuse 2nd year: Everyone wants a mac so they only focussed on cracking the mac, plus it was a pre-staged attack so that doesn't count. Macbot excuse 3rd year: It was a pre-staged attack from a computer genius and ex-NASA employee. No one else in the world could accomplish such an attack. Macbot excuse 4th year: I have yet to hear one as it was a Canadian that cracked OSX in 5 seconds.
41 posted on 06/01/2011 10:41:38 AM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 39 | View Replies ]


To: for-q-clinton
Maybe you should read about the pwn2own contest

I have seen your posts before, so I know about the contest...incessantly. Every year, 1 mac is hacked. I get it.

43 posted on 06/01/2011 11:02:38 AM PDT by LearnsFromMistakes (Yes, I am happy to see you. But that IS a gun in my pocket.)
[ Post Reply | Private Reply | To 41 | View Replies ]

To: for-q-clinton; LearnsFromMistakes
Maybe you should read about the pwn2own contest where OSX has lost the contest easily for not 2, not 3, but 4 yes 4 years in a row!

Maybe you should READ the DETAILS about the Pwn2Own contest from the interviews with the people who actually won the contest and learn that it is really NOT that "easily" won... but actually required months of work in advance of the contest by those who won... And that the winners were actually world class computer security experts, ex-NSA experts to be precise, who had prepared their exploits in advance. . . and that the second place winners had NOT prepared in advance and brought down the Windows machines, working off the cuff in real time in TWO of the four years, once almost as quickly as the prepared exploits against the Mac machines. You might ALSO learn that in TWO of the years, the exploit used against the Mac would have worked on ALL THREE of the targeted machines, because it was a JAVA exploit taking advantage of a JAVA vulnerability, not a SYSTEM vulnerability, and that the choice of target computer was dictated because the winner WANTED to win the Mac. . . and that in THREE of the years, the exploit required the active cooperation and participation of the USER of the target computer.

62 posted on 06/02/2011 12:37:48 AM PDT by Swordmaker (This tag line is a Microsoft product "insult" free zone.)
[ Post Reply | Private Reply | To 41 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson