Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Good enough to criticize the mechanisms (Score 1) 130

Following your "logic", Best Buy is responsible for the millions of computers that get infected with shit from running copies of Windows that were purchased at Best Buy and not patched / maintained? Because Best Buy just "pays for the brains of these app developers and then they resell it" ?

Brilliant.

Comment Re:Good enough to criticize the mechanisms (Score 1) 130

In no way does what the guy is describing magically allow code to take control of the full OS. If an application is executing, and then executes a maliciously crafted dylib, that dylib is still running as the user who executed the parent application - a.k.a. not root unless you've bent over backwards to re-enable the root user and log in as root because you completely hate security and best practices. If it wants to do something outside the permissions envelope of that user, it will still have to ask permission just like anything else on the OS; even if you are running as admin - all that gets you is the ability to put in your password to allow it, rather than have to click cancel. The only way around that is to also combine a privilege elevation exploit - and now we're getting into the incredibly improbable that you could find a signed app that would do both without a user seeing anything odd.

At the end of the day, GateKeeper wasn't designed to prevent that anyway, and this guy is presenting a massive straw man. GateKeeper was designed to give you a decision point between clicking on the random thing that appeared in your downloads folder, and getting owned. That's it.

Comment Re:Dell, HP, Panasonic (Score 1) 417

1. If you are using OS X Profile Manager (or any MDM provider you probably already have to deal with iOS and Android), you don't need to maintain an "enterprise image" because you can just enroll a Mac and have it automatically become the enterprise image far quicker than you can reimage it, or pay Dell to image it by defining OS X profiles and assigning them to machine groups a la AD Group Policy.

2. You don't buy direct from Apple - even in enterprise sales they do the legwork and hand you off to a value-added reseller with the bid price in hand, and any VAR worth doing business with can give you the serial numbers and MAC addresses. Or, use the built-in Apple Remote Desktop agent to query the serial number and MAC addresses en masse from the machines when you do #1.

Macs can play nice in the enterprise, as long as you spend half an hour learning how.

Comment Re:Hi I'm Patrick (Score 1) 130

I still don't see how this is any different from just exploiting an app vulnerability, regardless of the presence of GateKeeper. What you describe is no different than the hundreds of arbitrary code execution vulnerabilities found in Flash, Java, etc. since the dawn of these frameworks.

GateKeeper was never meant to keep all malicious code from executing, ever. It was meant to give you an "are you really sure you want to run this thing that appeared in your downloads folder" chance to not screw yourself over because some git with a website thought it would be cool to force-download some garbage to your computer.

Comment Re:Good enough to criticize the mechanisms (Score 3, Interesting) 130

Yeah, my thoughts exactly. And, by the way, how is it a problem with the OS if a signed app has a vulnerability you are exploiting? That sounds like a problem with the app to me.

"Oh, I can own OS X - I just need to convince Microsoft Outlook to run arbitrary code with privilege elevation!"

*Yawn*

Slashdot Top Deals

How can you do 'New Math' problems with an 'Old Math' mind? -- Charles Schulz

Working...