Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security Businesses Apple

Apple Hires Former OLPC Security Director 144

imamac writes "It seems Apple is seeking to beef up security by hiring Ivan Krstic, the one-time director of security architecture at One Laptop per Child. 'Krstic, a well-respected innovator who designed the Bitfrost security specification for the OLPC initiative, joined Cupertino this week and will work on core OS security. His hiring comes at a crucial time for a company that ties security to its marketing campaigns despite public knowledge that it's rather trivial to launch exploits against the Mac.'"
This discussion has been archived. No new comments can be posted.

Apple Hires Former OLPC Security Director

Comments Filter:
  • by SuperKendall ( 25149 ) on Thursday May 14, 2009 @05:04PM (#27958151)

    So trivial in fact to launch an exploit on the Mac, that there's only one in the wild - and that's a trojan in a pirated application.

    I guess the challenge of the PC ecosystem is what draws in the thousands of viruses and malware applications they get.

    • Just because there aren't many around, doesn't mean it isn't trivial, it just means there are few malware developers who think it's worth their time.

      Not entirely sure why. It may only be a 10% user base but you've more exploits being found for OSX than Linux and windows, fewer mechanisms to make it harder to infect a system through an exploit and a userbase that, is mostly connected to the internet with no anti-virus software

      • Re: (Score:3, Interesting)

        Comment removed based on user account deletion
        • by Soubrause ( 1429687 ) on Thursday May 14, 2009 @06:13PM (#27959047) Homepage

          The malware industry has barriers to entry just like anything else, until we can make $x it's not worth any investment. OSX user base isn't big enough to generate $x yet. Even after that when x is 20% of y why not get $y for the same investment.

          Microsoft & their partners also advertise bounties on exploits encouraging people to try and find them first so they can be patched, this adds to what is found considerably. I've never seen Apple pay for but have seen them deny holes that were handed to them.

          I've seen OSX exploits that didn't require any more interaction from a user than those aimed at windows in farm environments; no reason something similar isn't out there on a site we've never gone to.

          Firewalls and proxies exist because some of us know better than to think our OS is secure.

          • by Anonymous Coward on Thursday May 14, 2009 @06:27PM (#27959233)

            If the marketshare argument was true then there wouldn't have been any viruses for pre-OSX Macs either. But there were; lots of them.
            There were also viruses for the Apple IIGS, hardly a market leader.
            That's a tired old troll you have there, sir.

            • What GS viruses? I had an Apple II virus before the term was used in computers, but can't think of a GS specific virus.

            • by Phroggy ( 441 ) <slashdot3@NOsPaM.phroggy.com> on Thursday May 14, 2009 @11:23PM (#27961625) Homepage

              If the marketshare argument was true then there wouldn't have been any viruses for pre-OSX Macs either. But there were; lots of them.

              Malware was different in those days. Yes, there used to be Mac viruses. Nowhere near as many as DOS/Windows viruses, but a lot. They were mostly transmitted on physical media, not downloaded over a network; most of them were written before TCP/IP support was included in the OS. Most of the holes that allowed the old viruses to spread have been closed, and there just aren't that many holes that new viruses can take advantage of.

              Old-school Mac viruses were created by people looking for a creative way to make a virus because it was a fun challenge and it might gain them a bit of notoriety; there was never any profit in it (and most of the viruses weren't deliberately destructive, although some of them were accidentally destructive due to bugs). Modern malware authors are in it for the money.

              Since the OS itself is really pretty secure these days, the best way to spread Mac malware is to trick the user into deliberately executing your code for you, clicking through all the security warnings. If you're in it for the money, that's the approach you'll take. If you're not in it for the money, there's no technical challenge in that! Anybody could make a malicious application that looks like a fun toy, so what's the point?

              And if you're in it for the money, there's more money to be made on Windows right now. As Macs grow in popularity and Windows users start keeping their antivirus software up to date, the balance will shift, but it hasn't shifted yet.

              • Oh, the memories. I lost a few files due to viruses, but there was that great little anti-virus app that cleaned them all up.

                I can't remember its name, but the 'About' box played the Monty Python theme, as a foot came down to squash the virus names. The author stopped updating it after a while as no new Mac viruses were appearing.

                Still, I never lost more files than I did to Apple. There was a problem on the 5500/250 for which the only solution was to reformat and reinstall. That taught me to back up my file

                • by Phroggy ( 441 )

                  The free antivirus app you're referring to was called "Disinfectant".

                  The theme from Monty Python's Flying Circus is in fact The Liberty Bell March by John Philip Sousa.

            • "If the marketshare argument was true then there wouldn't have been any viruses for pre-OSX Macs either. But there were; lots of them. There were also viruses for the Apple IIGS, hardly a market leader."

              These and other inconvenient truths of the malware "market" are ignored, universally, by the industry trade press, and a surprising number of "security experts". There were worms exploiting Microsoft SQL Server on web servers when Apache + any of several other db had as much or greater market share. Th

              • by Hucko ( 998827 )

                There isn't exactly a plague of malware outside of Microsoft products. The 'something' is not necessarily because of OS X, but in spite of it.

                That said, my next machine will be a Mac. All weighed up, (I'm married, so ease of use has a significant factor for my spouse) OS X will be the center at which my computing world shall spin. Linux will be regulated back to a toy OS and if Windows appears it shall be for nostalgia --- I'm not very sentimental.

              • The market share argument might be a partial explanation, but it really cannot explain the entirety of the vacuum in the Mac OS X malware marketplace. It's been five years, and still no malware plague. How many versions, and how many years must pass, before the industry realizes that perhaps there is something to this Mac OS X thing?

                Mod waaaay up, especially after visiting your homepage.

            • The problem is, yesterdays viruses were written by spotty virgins still in high school, usually mainly for the group kudos gained from knowing that your virus is hurting others, and people knowing about it.

              Yesterdays viruses were spread via floppy or similar attack vectors, resulting in a slow spread that was pretty useless if you wished to make money from them.

              Todays viruses have the benefit of the internet - the same people are making the viruses, but they grew up and learnt the value of money and t
          • Re: (Score:3, Interesting)

            So they're only vulnerable to the hobbyist hackers... where are the successful malware examples from that group?

            If the argument is that it's not worth anyone's time, then shouldn't you say that we don't know how vulnerable it is? I don't trust Apple implicitly, given how buggy early releases of many of their product seem to be, but this unfounded speculation does seem to be a popular troll that's used equally effectively against Linux. Try being a bit more responsible.

          • Re: (Score:3, Interesting)

            by dhavleak ( 912889 )

            I totally agree with you, but
            grrr.. trust /. to degenerate the topic into "Macs are swiss cheese.." "no! widnows is swiss cheese".. etc..

            I'm really interested in hearing about Krstic's security philosophy and it's merits/demerits. I found this talk on zdnet [zdnet.com] but there's only about 5 minutes of actual security architecture info in it at around 40:00 into the video. Oh, and there's also this BitFrost overview on Wikipedia [wikipedia.org]. I think there are some cool concepts there. The idea of sandboxing all apps into con

            • by imamac ( 1083405 )

              Was hoping...we could all learn something.

              You must be new here.

            • I can give you a layman's understanding. With Windows, if I don't properly uninstall something, it breaks a bunch of other stuff. Remove the wrong .dll or screw with the registry, and your stuff breaks.

              With OSX, there are no .dlls (but I'm sure there are probably shared files that break each other, just not as deeply inbedded as the .dll dependencies in Windows) and there is no registry to screw up. For these two reasons alone, 99% of the hackers out there are out of luck when hacking a Mac, because none

              • I can give you a layman's understanding.

                Hey man -- thanks for attempting -- but that's not what I was asking for. I understand security concepts very well - I'm asking for people to discuss Krstic's take on what he will do (architecturally) for Mac security.

                I don't mean to be rude, but there are terrible flaws in your post, and you ended up posting just another one of those "windows is insecure, mac is secure" type of posts that I was hoping people would stay away from. Registry is just another configuration mechanism. Screw up your config (no

                • There's no deep/deeper/deepest dependency

                  In Windows you have to carefully "uninstall" an application, so as not to break other parts. How can there be no deep/deeper/deepest dependencies if Windows requires you to uninstall to preserve these dependencies, and there is no such requirement in OSX? You just delete the app. This alone would suggest that the Windows OS has far more dependencies on shared components.

                  Again, I'm a layman, so I'm sure somebody else can explain it better.

                  • In Windows you have to carefully "uninstall" an application, so as not to break other parts

                    Thanks for being a bleeding troll! Can you stay on point? Do you have anything you want to contribute regarding Krstic's security philosophy and what it might mean for Macs? I'm more than happy to disabuse you of this silly thinking above, but do we have to pollute every motherfucking thread on this site with these "my OS is better than yours" pissfests??

                    • Yikes, ok, thanks for the not-so-thoughtful discussion. My bad for being so dumb. I guess I'll take my people skills where they are better understood (and welcomed, and not flamed as troll, when no trolling was intended). Have a nice day!
                • I understand security concepts very well - I'm asking for people to discuss Krstic's take on what he will do (architecturally) for Mac security.

                  I've never read anything he wrote about Macs in particular, but he seems to subscribe to the security trend towards increased security granularity at the application level. SELinux, TrustedBSD, Solaris, and OS X have all moved the same direction with underlying technology but aside from locked down high security installations, have not widely deployed said technologies across the application space. Such a move requires some serious effort and, potentially both changes in the way developers work and serious

          • The malware industry has barriers to entry just like anything else, until we can make $x it's not worth any investment. OSX user base isn't big enough to generate $x yet.

            Price out botnets of a few hundred thousand nodes. Now figure there are 20-30 macs around, which are to some degree homogenous systems and thus in theory easier to target.

            Your argument goes straight to hell. When the number of intel macs in peoples homes crossed about five million, the "user base" argument went straight to hell from both

            • by Phroggy ( 441 )

              So how come no attacks to speak of? My vote is that the Russian Mafia all use macs, and they don't want to foul their own nest. :-)

              More likely the opposite is true: the Russian mafia all use PCs, and they have no idea how to write a Mac virus.

          • by Gary W. Longsine ( 124661 ) on Friday May 15, 2009 @12:23AM (#27962015) Homepage Journal
            The barrier to entry most commonly cited as the largest barrier protecting the Mac, prior to the CPU transition of the Mac platform, was Apple's use of the PowerPC, which allegedly required that malware authors know PowerPC assembly language. This argument ignored:
            1. the fact that plenty of malware existed for the old "System 7" and Mac OS 8/9,
            2. the fact that anyone who knows x86 assembly can buy a book and write a perl script to convert their egg from x86 to PowerPC, then clean the rest up by hand. They've got the skills. They've got the hubris. They've clearly got the time, particularly when so much malware was authored by people just trying to demonstrate their prowess and make pranks, and
            3. the fact that with all this malware, a small fraction of cr@X0rz are actually proficient in assembly, and the eggs are used by legion skript kiddiez who do *not* know assembly, so there was plenty of PowerPC mad skilz available.

            Those people are still around, plenty of them, even though the most widely discussed malware is now part of profit seeking black market enterprises. Some of them are writing remote systems management code which puts Tivoli to shame. (e.g. Some of them are clearly bright enough to learn Objective C in a weekend, as they already know C, C++, C#, and x86 assembly) They are writing malware for Symbian, even though the statistics indicate that iPhone dominates the mobile web market. (Symbian has more browser instances on the planet, but they are not actually used by people to access the web, so you're not going to capture many passwords infecting those phones).

            In fact, it's time to really start wondering: Where's the Mac OS X malware?

            At some point we security experts must begin to consider the possibility that Mac OS X might be protected by more than it's niche market share.

          • Have you checked apples figures recently. They are the biggest PC maker in the world. That means they sell a HELL of a lot of PC's and because of OSX nature ALL with EXACTLY the same OS. Dell sells loads of different windows versions, even linux. Apple just OSX. Talk about a mono-culture.

            I also see them more and more often in the wild. But they are to small a target.

            Tell me this, whose credit card number would you rather have. A Apple users or a Dell users. (Dell user of course, the Apple user spend all h

            • Wow. This is one of the worst posts I've seen in a long time--grammar AND content. When the most valid part of a post is the juvenile sig, you know it's a crappy post.
        • security vs. safety (Score:1, Informative)

          by Anonymous Coward

          You're right, the number of exploits doesn't necessarily mean it's a more secure system, but the fact that (as you say) there aren't a proportionate amount to the size of the userbase does seem to imply decent security.

          John Gruber had a good statement on this earlier today:

          Security is about technical measures, like the strength of the locks on your doors and windows. Safety is about the likelihood that you'll actually suffer from some sort of attack. Microsoft has in fact implemented more advanced security measures in Windows than Apple has in Mac OS X, but that's not surprising, because Windows is where nearly all the malware is.

          But it rings untrue to most ears to claim that Apple is doing a bad job with regard to security. The evidence suggests that Mac OS X has been and remains secure enough to be safe, and safety is what real people actually care about.

          http://daringfireball.net/linked/2009/05/13/security-safety

          • That's a cute semantic game he plays with security and safety. You could switch the two words around and sell the same snake oil just as well.

            John Gruber's wrong about the anchored shift selection, too.

          • by DECS ( 891519 ) on Thursday May 14, 2009 @08:38PM (#27960477) Homepage Journal

            In the dictionary that ships with Mac OS X:

            Security is defined as "the state of being free from danger or threat" and Safety is similarly defined as "the condition of being protected from or unlikely to cause danger, risk, or injury."

            Security comes from the Latin securitas or securus "free from care" while safety comes from the salvitas or salvus meaning "safe."

            So if there were any real nuance of difference between being safe and being secure, then security would have the edge in meaning over "feeling safe", while safety could be said to imply actually "being safe." But the words are really interchangeable, and how you use them can suggest either.

            The real discrepancy that needs to be pointed out between the Mac and Windows is that while Microsoft has recently invested more into building a fancy security infrastructure, Mac users continue to both feel safer and to actually be safer in the sense of being free from danger or threat.

            There is clearly no immediate or impending threat to Macs, and there is little in the way of market forces or that wishful thinking pundit invention of "hacker pride" that will result in something to turn Macs into the disaster that has dogged Windows since the late 90s.

            What pundits like to do is equate low risk, self-injury actions with high risk, difficult to escape from events. This is straight up misinformation mixed with fear, uncertainty and doubt. For example, nearly everyone is claiming that:

            * Downloading iLife warez that pretend to be stolen software
            * from a non-trusted source
            * assigning it privileges to install on your system
            * and then finding that you have installed a background process that does something ugly that you can trivially remove

            is the same as:

            * Trying to use Windows to browse the web and use email
            * finding that you've been automatically infected with adware and viral malware without knowing it
            * then finding that your PC is also self replicating attacks or sending spam on to other systems
            * then realizing that the design of Windows' registry makes it difficult to clean things out
            * then noticing how much of your CPU capacity is being used to protect you from all of these threats via malware and virus scanners
            * then finding out how expensive it is to spend hours cleaning up the mess yourself, or alternatively paying some Nerd Patrol $300 to "diagnose" that your PC is hosed.

            They are not the same, and only a liar would keep suggesting that Mac and Windows users face the same dangers and threats. If you're paying attention, you'll notice that those who keep suggesting this almost always work for an Anti-Virus company working to make money off of Mac users. This shouldn't require any help in dot connection.

            Kaspersky Sells Mac AntiVirus Fear Using Charlie Miller... Mac AntiVirus Foe [roughlydrafted.com]

        • by mdwh2 ( 535323 )

          but the fact that (as you say) there aren't a proportionate amount to the size of the userbase does seem to imply decent security.

          Not at all, that's a non-sequitur. Why are you assuming there would be a linear relationship between users and exploits?

          If anything I would think it highly likely to be non-linear - if the vast majority of virus writers prefer to target the most popular platform (which does not seem unreasonable), then that means they choose Windows. That's true whether Windows's market share is

        • Re: (Score:2, Interesting)

          by nscheffey ( 1158691 )

          I personally haven't heard of any exploit in the wild except the trojan, for which the user has to be willing to provide their password to any old bit of software with unknown providence - to be honest I don't know how one could protect against that on any system.

          Luckily, Ivan Krstic knows how. From a CNET article [cnet.com] about Bitfrost:

          Instead of blocking specific viruses, the system (Bitfrost) sequesters every program on the computer in a separate virtual operating system, preventing any program from damaging the computer, stealing files, or spying on the user. Viruses are left isolated and impotent, unable to execute their code.

          • by tenton ( 181778 )

            Viruses are left isolated and impotent, unable to execute their code.

            I have something in my inbox that can fix the impotency right up. At least that's what says it does.

          • Instead of blocking specific viruses, the system (Bitfrost) sequesters every program on the computer in a separate virtual operating system, preventing any program from damaging the computer, stealing files, or spying on the user.

            Yep. This approach is super-interesting. He also claimed that there is a 0% CPU overhead from using this approach and some ridiculously low memory overhead. I forget the number - but I promise you it was ridiculously low :).

            This approach also results in an overall reduction (cleaning up?) of IPC mechanisms. So the approach doens't sound free/easy from an engineering standpoint -- it will either require apps to be re-authored or make exceptions for apps that need to use certain IPC mechanisms (or perhaps u

            • it will either require apps to be re-authored or make exceptions for apps that need to use certain IPC mechanisms (or perhaps use heuristics to decide when to permit what).

              The heuristics in question are ACLs. Both Bitfrost on the XO and OS X have MAC style frameworks in use today. The trick is applying them well and getting software well behaved enough and with well crafted ACLs. Apple already uses this to sequester a few high risk, exposed services like ZeroConf. The next step will probably be to get it working well for high risk end user software, then all Apple software, then third party applications. The last step being the hardest, of course. Still, Apple has an advantag

      • Just because there aren't any around

        There. Fixed that for you.

        A Trojan doesn't count as a vulnerability nor as an exploit; just as user stupidity, from which NO Operating System is safe.

      • Re: (Score:3, Interesting)

        >> more exploits being found for OSX than Linux and windows

        I don't believe that for Linux, and I certainly don't believe that for Windows.

        Face it guys, OS X is built on a BSD userland with the same OpenSSH you all know and love. It uses the same owner/group/others file permissions. It ships with an excellent firewall, and no open ports by default.

        IMO, it's as safe as Linux. The smart users will only ever see trojans and home-dir-deleting "viruses", and the dumb ones that type their
      • by v1 ( 525388 )

        it just means there are few malware developers who think it's worth their time.

        Because scammers are only interested in BIG payoffs, and would rather go hungry than to merely rip off a minority?

        Last I checked, scammers aren't picky about who they take advantage of. They take advantage of anyone they can, every chance they get, however minor.

      • If it were so trivial, it wouldn't take a "malware developer" to develop an exploit. There enough Mac bigots in the world that have trivial development skills for at least SOME exploits to garner traction, yet exploits are still (20 years running) a non-issue for the general public using Macs.
      • by jo_ham ( 604554 )

        Oh come on, the old "not worth their time" excuse is as old as the hills.

        You don;t think it would be a *massive coup* for a virus/malware creator to be the first to "break ground" on the "supposedly secure" Mac platform?

        Whether you think the Mac platform itself is more secure than Windows doesn't matter - the public perception is that this is the belief.

        So while we have the odd trojan in a pirated copy of Office for Mac, there is a distinct lack of malware for the Mac in general, and it won't be for lack of

    • by ihatewinXP ( 638000 ) on Thursday May 14, 2009 @05:58PM (#27958881)

      Yeah I would say a citation is needed here. Zero day exploits exist - on every system - but as a Mac user since '99 and a Windows admin since I can tell you no matter the skill level of the user: Macs dont get viruses. Period. Full stop. Yes I saw the embedded trojan in iLife and the zero day sploit that got the guy a free laptop recently but as a person who has really seen a wide cross section of computers and users all the way up to Vista it is decidedly two different worlds.

      Im glad Apple dropped the "100% virus free" moniker from marketing as has been pointed out it makes them a target - and good job on hiring forward thinking people in _all_ facets of the business. Now just get ZFS plugged in as the default file system and I will officially drown myself in kool-aid.

      And I hate to even point this out but look at the submitters username. If you just got to /. since the mac ads came out you might want to sit back and listen for a few. Years. I know I did.

      • Re: (Score:1, Flamebait)

        by artor3 ( 1344997 )

        And I hate to even point this out but look at the submitters username. If you just got to /. since the mac ads came out you might want to sit back and listen for a few. Years. I know I did.

        Those ads started a few years ago. How much longer must he wait before he is worthy to speak in your presence, oh 6-digited one?

    • Macs simply do not have enough market penetration to be profitable. That is the only reason that they have less malware.

      • by abigor ( 540274 )

        The number of Macs out there is orders of magnitude larger than the largest botnet. Yet no Mac botnets exist. Why is that?

        • by mdwh2 ( 535323 )

          It doesn't matter, they're still harder to find due to being less common. You're also assuming that a hacker can take over 100% of machines he finds, which is unreasonable. It's not like they just round up the machines, they have to get their malware spread to machines - firstly it's easier to spread viruses with a vastly more common platform, secondly, you have much better penetration. Supposing I am only able to take over 1% of machines I attempt it on - suddenly having to find all those Macs seems a lot

          • by abigor ( 540274 )

            How is it a lot more work? You scan massive blocks of ips and run your remote exploit (which the summary assures us is trivial) against them. As the botnet grows, it joins your scanning/exploiting effort. Even if you got only 1% of all Macs, that would still be completely enormous. You'd think SOMEONE would have tried it by now. But no. So maybe remote exploits aren't so trivial after all.

            So maybe we have to resort to other malware. One of the main vectors into Windows is the classic malware-infested web pa

          • Mac are not "harder to find due to being less common". Windows malware spreads through several means, here are the three most common:
            1. sending email to everyone in your address book
              Malware could trivially examine the email headers, determine which of your friends have Macs, and attach the Mac version of itself when sending email to them.
            2. probing the network for vulnerable ports (worms)
              Malware could trivially fingerprint Macs, scan for vulnerable Mac ports, and send a custom Mac egg through the ne
        • Evidence suggests first zombie Mac botnet is active: http://arstechnica.com/apple/news/2009/04/evidence-suggests-first-zombie-mac-botnet-is-active.ars [arstechnica.com]

      • -1 redundant (how many times in this thread???), -1 not convincing, -1 perpetuating dubious myths. There, I got your score back down to zero.
    • by Mr2001 ( 90979 ) on Thursday May 14, 2009 @07:41PM (#27959933) Homepage Journal

      So trivial in fact to launch an exploit on the Mac, that there's only one in the wild - and that's a trojan in a pirated application.

      Cute. Does that mean PC defenders get to ignore all the computers that have been infected by trojans too?

      According to that logic, I think we'd find that Windows is nearly as "secure" as OS X. Most infections happen because people are stupid enough to run any program that promises them free smiley-face cursors, not because of vulnerabilities in the OS.

      • Cute. Does that mean PC defenders get to ignore all the computers that have been infected by trojans too?

        Sort of, I would excuse all of the pirated stuff or things that get in by installing codecs to watch that "Special video". It's stuff that is only going to target a small percentage of users (unless you feel like claiming more PC users pirate stuff which may or may not be true).

        Of course PC's also have categories of malware that act as desirable applications from the user to download over the web, and t

        • by Mr2001 ( 90979 )

          Of course PC's also have categories of malware that act as desirable applications from the user to download over the web

          Those are called trojans, and we're ignoring those, remember? OS X doesn't stop a user from running a "desirable application" that turns out to be malware either.

          (Frankly, I think Windows does more in that regard: you usually have to click through a warning to launch an executable that you've downloaded.)

          • (Frankly, I think Windows does more in that regard: you usually have to click through a warning to launch an executable that you've downloaded.)

            Actually, that was added in Leopard.

    • (*sigh* I hate being the pedantic one...)

      I guess the challenge of the Windows ecosystem is what draws in the thousands of viruses and malware applications they get.

      I think I fixed that for you.

      If by PC you mean x86-based computers not from Apple, then if you install OS X on a Dell box, it would suddenly become malware-ridden according to what you say, right?

      And if it's not the operating system, what's the difference---with respect to malware---between an x86 running Ubuntu and an x86 running Ubuntu (one from Apple, one from Dell)?

      The "Mac vs. PC" distinction is really about OS X vs. Windows.

  • From what was meant to be one of the cheapest available laptops, to Apple?!


    Bipolar much?
  • Flamebait summary (Score:5, Informative)

    by GreyWolf3000 ( 468618 ) on Thursday May 14, 2009 @05:10PM (#27958239) Journal

    "His hiring comes at a crucial time for a company that ties security to its marketing campaigns despite public knowledge that it's rather trivial to launch exploits against the Mac."

    Public knowledge? Public knowledge? I doubt the "public" really thinks it's trivial to launch an exploit against the PC.

    I feel like I just listened to a 5 year old arguing to another 5 year old... "EVERYONE knows that YOUR operating system IS STOOOPED."

    • by CODiNE ( 27417 )

      I feel like I just listened to a 5 year old arguing to another 5 year old... "EVERYONE knows that YOUR operating system IS STOOOPED."

      Why can't his operating system stand up straight?

  • Maybe Apple should hire a new SQA/QA director?
  • by docbrody ( 1159409 ) on Thursday May 14, 2009 @05:22PM (#27958431)
    Prediction:
    This thread will soon devolve into a flaming argument between Apple Fanbois and Apple FanBoi bashers.

    I am so tired of both sides arguing about Apple that I wish Slashdot would just remove the Apple section from the site.

    let the games begin
    • And Apple Fanboi and Apple Fanboi basher bashers, which seem to be exceptionally good at trolling below the radar. ^^

  • by dave562 ( 969951 ) on Thursday May 14, 2009 @05:25PM (#27958479) Journal
    Apple execs have put down their glasses of marketing Kool-Aid and joined the real world. They're obviously trying to get out ahead of the potential security holes in their OS, and they recognize that, despite what the fanbois will say, OSX is just as vulnerable as most other topics. Luckily for Mac users, none of the system crackers seem to care about gay porn or graphic design files.
    • by dave562 ( 969951 )
      ..vulnerable as most other OSes. (How I got "topics" out of OSes, and why I didn't preview before posting are left up to the imagination of the reader)
    • Re: (Score:3, Interesting)

      Apple execs have put down their glasses of marketing Kool-Aid and joined the real world.

      Apple has always been a bit erratic when it comes to security, owing to their odd blend of cultures. To suggest, however, that they've been ignoring security is more than a little misguided. Leopard included the addition of a MAC framework ported from TrustedBSD, an application signing framework, and ACLs restricting some exposed services (like zeroconf) that would have been vulnerabilities otherwise. Apple has done a very good job of shipping an OS hardened enough to deal with the level of worm and virus

  • Ha (Score:5, Informative)

    by bonch ( 38532 ) on Thursday May 14, 2009 @05:27PM (#27958507)

    despite public knowledge that it's rather trivial to launch exploits against the Mac.

    It's not public knowledge, and the only exploit going around recently was one you had to download in a pirated application. Nice little troll slip in the summary there.

    • Re: (Score:1, Flamebait)

      by imamac ( 1083405 )
      The trolling was a quote from TFA, actually. I happen to be be a genuine fanboi.
    • There is a difference between active exploits and security holes. There are very few known active exploits, but there are holes as far as I remember, and given a little time, a hole will be exploited if not patched. I don't think the security hole where a contestant won in a MacBook in a recent Pwn-To-Own contest got fixed. I don't recall that one as requiring the user to run as administrator or root, unlike past Pwn-To-Own contests.

  • When the competition is Windows, you don't need to be Marcus Ranum or Bruce Schnier to stroll over the hurdles... with crutches.

  • by Anonymous Coward

    Ivan is a genius! He's an engaging speaker who really knows his stuff. Kudos to apple.

  • This ain't the "old days".

    The Mac Hacker's Handbook:

    http://www.amazon.com/Mac-Hackers-Handbook-Charles-Miller/dp/0470395362 [amazon.com]

    - which should be bought, read and placed on the self next to:

    Mac OS X Internals: A Systems Approach:

    http://www.amazon.com/Mac-OS-Internals-Systems-Approach/dp/0321278542/ref=sr_1_1?ie=UTF8&s=books&qid=1242357309&sr=1-1 [amazon.com]

    Apple's security wasn't an accident, but then neither was Microsoft's - a real go-er.

    Nudge, nudge, wink, wink.

    http://www.youtube.com/watch?v=jT3_UCm1A5I [youtube.com]

    Yes.

  • Man, I'm so old school I parsed the first two words "Apple Hires" as referring to the Apple II's HGR mode.

    SLM

Don't tell me how hard you work. Tell me how much you get done. -- James J. Ling

Working...