Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

iPhone, IE, Firefox, Safari get stomped at hacker contest
The Register ^ | 25 March 2010 | Dan Goodin

Posted on 03/25/2010 10:42:55 AM PDT by ShadowAce

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041 next last
To: ShadowAce

“Safari was also part of the spoils, making this the third consecutive year contestant Charlie Miller has compromised the Apple browser. Miller, 36, who is principal security analyst at Independent Security Evaluators, said he came to this year’s contest armed with close to 20 working attacks that in virtually every case allow him to seize control of the Mac running the program.”

AH HAHAHAHAHAHA!!!!! Where are all of the devout Mac users who say that it is invulnerable????? 20 “holes”?????


21 posted on 03/25/2010 12:28:59 PM PDT by El Gran Salseron
[ Post Reply | Private Reply | To 1 | View Replies]

To: WinMod70
I don’t recall seeing the results for the latest chop shop contest;

Wasn't that a show called Junkyard Wars?
22 posted on 03/25/2010 12:35:41 PM PDT by Ellendra (Can't starve us out, and you can't make us run. . . -Hank Jr.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: gjones77; JimRed
"It’s people like them that help to find and fix security holes, they’re referred to as “White Hat Hackers”, they’re the good guys."


Not only that, but the makers of the products don't hesitate to trumpet any success they may have fending off the solicited attacks on their products at these types of competitions. (Not that they are very often successful at that. These kinds of puzzles tend to attract some pretty serious talent.)
23 posted on 03/25/2010 1:01:25 PM PDT by EasySt ( Join Free Republic Folders - A tribute to Ronald Reagan)
[ Post Reply | Private Reply | To 16 | View Replies]

To: El Gran Salseron
Even one of the winners say the same thing we read on these PC vs. Mac threads:

The genius of a contest like Pwn2Own is that it exposes the insecurity of software that rarely gets exploited by criminals. Plenty of Linux and Mac fans cite the absence of real-world exploits on those platforms as proof positive that they are inherently safer than the prevailing Microsoft operating system. It's an argument that carried little weight in Vancouver.

"The problem Microsoft has is they have a big market share, said Vreugdenhil, the hacker who attacked IE. "I use Opera, but that's basically because it has a tiny market share and as far as I know, nobody is really interested in creating a drive-by download for opera. The web at the moment is pretty scary, actually."

24 posted on 03/25/2010 1:01:47 PM PDT by Ol' Dan Tucker (People should not be afraid of the government. Governement should be afraid of the people)
[ Post Reply | Private Reply | To 21 | View Replies]

To: El Gran Salseron
AH HAHAHAHAHAHA!!!!! Where are all of the devout Mac users who say that it is invulnerable????? 20 “holes”?????

I don't know. Perhaps you could find us an example of one of those posts by a "devout Mac users who say that it is invulnerable".

No software is invulnerable. Some (OSX/Linux) is more resistant to such attacks than others (MS-Windows).

I did not see indications that any of the hacks displayed here were able to escalate the privilages of the attackers. That makes a big difference as to whether the attack is useful to criminals and those who run botnets.  being able to dump some of your personal information is bad enough. Having your computer turn into a zombie is something entirely different.

25 posted on 03/25/2010 1:23:00 PM PDT by zeugma (Proofread a page a day: http://www.pgdp.net/)
[ Post Reply | Private Reply | To 21 | View Replies]

To: zeugma

You must not be around here much. For years that what Mac users claim. If you really want to find them look way way back in my post history.


26 posted on 03/25/2010 1:31:11 PM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 25 | View Replies]

To: JimRed
WHY WERE THESE INDIVIDUALS NOT ALL ARRESTED? A convention of criminals, and no one paid attention? Oh, I see; it’s Canada. Thanks, Hosers!

That's the mac security model. Just keep people from knowing about it and you'll be secure. But many of these guys are white hats where they find holes and then tell the companies about them so they can make the product secure.

27 posted on 03/25/2010 1:32:13 PM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 15 | View Replies]

To: zeugma; for-q-clinton

“I don’t know. Perhaps you could find us an example of one of those posts by a “devout Mac users who say that it is invulnerable”.”

As for-q-clinton said in post # 26, although you have been a member since ‘98, you mustn’t visit the site very much.

There have been marathon threads about how wonderful Mac is and Microsoft Windows is trash. :-)

All of the rest that you have said is true. I know this because I have been in the computer business since 1962. :-)


28 posted on 03/25/2010 2:11:07 PM PDT by El Gran Salseron
[ Post Reply | Private Reply | To 25 | View Replies]

To: El Gran Salseron
I guess I'll have to repeat myself. Surely you noticed that I put your exact words in quotes.

Please post an example of one of those posts by a “devout Mac users who say that it is invulnerable”.”

I thought that was fairly specific. You made the claim, I asked for proof of same. You respond with generalities. Try again.

29 posted on 03/25/2010 4:18:11 PM PDT by zeugma (Proofread a page a day: http://www.pgdp.net/)
[ Post Reply | Private Reply | To 28 | View Replies]

To: for-q-clinton
You must not be around here much. For years that what Mac users claim. If you really want to find them look way way back in my post history.

Sure. Feel free to post any comments  as I said in my original post

I don't know. Perhaps you could find us an example of one of those posts by a "devout Mac users who say that it is invulnerable".

Surely if it's as common as you think, you should be able to find lots of them.

30 posted on 03/25/2010 4:20:46 PM PDT by zeugma (Proofread a page a day: http://www.pgdp.net/)
[ Post Reply | Private Reply | To 26 | View Replies]

To: zeugma

If you think that I am going to back track over years of posts to give you one example you are very sadly mistaken.


31 posted on 03/25/2010 5:14:24 PM PDT by El Gran Salseron
[ Post Reply | Private Reply | To 29 | View Replies]

To: zeugma

I believe I played this game with you once before (but I may be mistaken and it may have been a different Mac zealot).

But I did provide a post and the response was well he was wrong or he isn’t really a Mac zealot and was just someone who didn’t know what he was talking about.

So instead of wasting my time proving my point again...let’s just cut to the case and pretend you saw such a post. What would your response be? Give me your response then I will see if it’s worth proving my point.


32 posted on 03/25/2010 5:35:24 PM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 30 | View Replies]

To: El Gran Salseron
If you think that I am going to back track over years of posts to give you one example you are very sadly mistaken.

Thought so. 

If it were as common as you were claiming, it'd take you 5 minutes.

You lose.

33 posted on 03/25/2010 6:10:10 PM PDT by zeugma (Proofread a page a day: http://www.pgdp.net/)
[ Post Reply | Private Reply | To 31 | View Replies]

To: for-q-clinton
See post 33. You folks got nothing. Admit it and move on. I'm sure if you dig long and hard enough you might find such a post by someone really clueless about how computer software works.

As I said in an earlier post on this very thread - No software is invulnerable. Some (OSX/Linux) is more resistant to such attacks than others (MS-Windows).

The sad thing is, you guys have to invent some mythical "all Macs are invulnerable" straw man to make the same point. I'm merely asking you to put up or shut up.  This claim is repeated on almost every thread, along with the insults against both Linux and Mac users. 

I suppose, though, it makes sense that someone who is a strong proponent of MS-Windows would be defensive, what with thousands of known and active threats to their operating system of choice.

As I've said before on other threads here, I don't even own a Mac. My MIL recently bought a Mac Mini so I guess I'll probably be able to beat off the keyboard someday to get some time to play with it. I just get tired of the insults and strawmen thrown at fellow freepers just because they choose something different that works well for them.



34 posted on 03/25/2010 6:24:04 PM PDT by zeugma (Proofread a page a day: http://www.pgdp.net/)
[ Post Reply | Private Reply | To 32 | View Replies]

To: zeugma

I don’t lose anything. You have three years seniority on me on FR and know how to use the search engine. USE IT! I’m not going to do your legwork for you. :-)


35 posted on 03/25/2010 8:12:46 PM PDT by El Gran Salseron
[ Post Reply | Private Reply | To 33 | View Replies]

To: El Gran Salseron

Sorry, you still lose. You’re the one who made the claim, not me. If you can’t search by now, perhaps you really shouldn’t be posting here. :-)


36 posted on 03/25/2010 8:40:08 PM PDT by zeugma (Proofread a page a day: http://www.pgdp.net/)
[ Post Reply | Private Reply | To 35 | View Replies]

To: zeugma

So you’re going with the...even if you find it the guy doesn’t know what he’s saying. Although earlier you said no such idiot exists.

Ahhh...I see you can’t lose with that type of “logic”. Plus all this proves is that since OS X has such a small user base the OS isn’t attacked as much as it would be if it was #1 by a huge margin.


37 posted on 03/25/2010 9:08:05 PM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 34 | View Replies]

To: for-q-clinton

How utterly predictable y’all are.


38 posted on 03/25/2010 9:33:37 PM PDT by zeugma (Proofread a page a day: http://www.pgdp.net/)
[ Post Reply | Private Reply | To 37 | View Replies]

To: zeugma

Well here’s a thread. And there are many more:
http://www.freerepublic.com/focus/f-chat/2352669/posts

But you already gave me your answer..that guy wasn’t a knowledgable mac zealot so he doesn’t count. Just like the known vulnerabilities don’t count until someone in the wild uses it to exploit a system with no user interaction and it must be a well maintained system with all patches applied and only plugged into the network when needing networked resources and the moon must not be full and Steve Jobs must be healthy. But once you find that then it will count.


39 posted on 03/25/2010 9:45:25 PM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 38 | View Replies]

To: zeugma

Yes, I made a claim. Isn’t it wonderful that we live in a country where you get to read something, form an opinion and reach a conclusion.

You can then decide whether or not that person is telling the truth or lying. I don’t care at all as to whether or not you believe me.

Besides, I didn’t post to you. I posted to the person who started the thread. Therefore, I wasn’t obligated to answer you and I certainly am not going to do your searching for you.

Only democrats want everything to be handed to them and to be spoon-fed. Are you a democrat? :-)


40 posted on 03/26/2010 10:10:48 AM PDT by El Gran Salseron
[ Post Reply | Private Reply | To 36 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson