Oh, let the Mac haters hate and have their fun.
I wonder how many read the article and made it to the last paragraph.
What this article doesn't do is state whether this attack requires physical access or can be performed simply by running a program from remote. It sounds like it.
They did indicate that it can take upwards of an hour to extract a key against the specific encryption program running on the machine.
Imagine that...your logged in laptop, running crypto software, in the hands of spies for an hour. That happens all the time, right?
Given these factors, I'm sure Apple just rolled their eyes and said thank you.
Still, being able to examine memory for what appears to be pointers annd specific time intervals and then fetching the contents at that memory location is an interesting technique.
Like you seem to indicate, without reading the full paper vs a magazine article summary, I'll just say..."That's nice" and go back to drinking my coffee and reading the newspaper.