Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Desktops (Apple) Operating Systems Security Software

An Ex-NSA Hacker Who Has Organized the First-Ever Mac Security Conference (vice.com) 46

Motherboard's Lorenzo Franceschi-Bicchierai spoke with Patrick Wardle, the ex-NSA hacker who's organizing a security conference exclusively dedicated to Macs. Despite what Apple has famously promoted in the mid 2000s that Macs don't get "PC viruses," Mac computers do in fact have bugs, vulnerabilities, and even malware targeted at them. From the report: "People are peeking behind the curtain and realizing that the facade of Mac security is not always what it's cracked to be," Wardle told Motherboard in a phone interview. "Any company that designs software is going to have issues -- but Apple has perfected the art of a flawless public facade that masks many security issues." Wardle would know. After hacking primarily Windows computers at Fort Meade, for the last few years Wardle been finding several issues in MacOS, so many that he considers himself a "thorn" on Apple's side. But his conference is not an exercise in shaming or finger pointing, Wardle said he hopes to educate and teach people about Mac security, especially now that so many companies are using Macs as their corporate computers.

The conference is called Objective By the Sea, a wordplay on Objective-See, the name of Wardle's suite of free Mac security products (which is itself a wordplay on Apple's main programming language called Objective-C.) It will be held in Maui, Hawaii on November 3 and 4. The conference will be free for residents of Hawaii, and for patrons of Objective-See. That's why Wardle said he can't afford to pay for all speakers to attend, but he had no trouble finding people who wanted to participate. One group that doesn't want to come to Maui, at least for now, is Apple. Wardle said he reached out to the company, essentially offering it carte blanche to talk about whatever it wanted. But the company, so far, has not responded, according to him.

This discussion has been archived. No new comments can be posted.

An Ex-NSA Hacker Who Has Organized the First-Ever Mac Security Conference

Comments Filter:
  • ...and you can basically use the same "god mode" hack as with any other "Pc".

    Check this video out for details, but..ahem, use responsibly: https://www.youtube.com/watch?... [youtube.com]

    • by JBMcB ( 73720 ) on Friday September 28, 2018 @10:41PM (#57393600)

      ...and you can basically use the same "god mode" hack as with any other "Pc".

      Any other VIA C3 based PC, you mean. This hack was possible because the C3 has an embedded low power RISC core, probably for some kind of sleep state managed mode or something. With a "hidden," or possibly malformed instruction, you can wake it up and access protected memory by sending it instructions.

      The ostensible analog on the Mac side is the Intel MME. Only issue with that is the MME isn't really used on the Mac platform. It's included, but the Mac platform doesn't enable any of it's features (vPro management, mainly.)

      • by tlhIngan ( 30335 )

        Any other VIA C3 based PC, you mean. This hack was possible because the C3 has an embedded low power RISC core, probably for some kind of sleep state managed mode or something. With a "hidden," or possibly malformed instruction, you can wake it up and access protected memory by sending it instructions.

        The ostensible analog on the Mac side is the Intel MME. Only issue with that is the MME isn't really used on the Mac platform. It's included, but the Mac platform doesn't enable any of it's features (vPro mana

        • by JBMcB ( 73720 )

          Not likely. Likely it's access to the real CPU core, not some hidden management processor.

          Yep you're right. The C3 is a RISC core with a microcoded x86 frontend. The "backdoor" was an undocumented routine left in to debug the x86 front-end.

          So there could theoretically be an undocumented opcode on Intel/AMD that gets you into the underlying execution units. I'm on the fence as to whether or not AMD/Intel would leave something like that in. The C3 situation seemed to be out of laziness, they just left the instructions open on the underlying silicon. AMD and Intel seem to hold their CPU firmware fa

    • by Megol ( 3135005 )

      No!
      VIA isn't Intel. The design of VIA C3 isn't the design of Intel processors nor AMD processors.

  • Just for the record, a complete Objective-C toolchain was an installable package with Slackware 95, one of the Slackware distros of the Linux 1.x era. Objective C existed long before Steve Job's NeXT bought Apple.

    • Apple bought NeXT, not the other way around.

      Objective-C was NeXTStep's primary supported language, and NeXT is the one who implemented the compiler in gcc to begin with (in the late 80's) which is why it was in Slackware in 1995.

      • In terms of the software culture predominant after the transaction, NeXT bought Apple. Apple had frittered away millions on a next gen Mac OS, and gotten nowhere.

    • Comment removed based on user account deletion
  • That hasn’t been Apple’s “main programming language” for some time now.

    • by dgatwood ( 11270 )

      I'd be shocked if any significant percentage of Apple's immense codebase has been rewritten in Swift. So at least from the perspective of what language Apple uses to write its software, it almost certainly is Apple's main programming language. Well, that and C and C++.

  • At work we're expanding our support for Mac in our vulnerability scanner, over the next month or two. (Last month I wrote a bunch of code to find more Cisco vulnerabilities.)

    We have out usual sources of vulnerability data, but does anyone happen to know any the are particularly good for Mac specifically? We aim to cover every CVE ever issued.

    • by AHuxley ( 892839 )
      Re "Mac specifically"
      The https://objective-see.com/inde... [objective-see.com] site has some in the blog, talks sections.
      • Thanks. I'll look that over and maybe use some of the stuff their to make a presentation for my team.

        The job I really want is to be *teaching* security programmers while making very good money doing it. Nobody has that job advertised, so I'm creating it by doing weekly or twicd-weekly presentations for my time, with other people from the company also invited. Eventually people will figure out that whenever you need your security programmers trained in something, Ray does that well. :)

  • Someone spoke to hacker who organized...

    Could someone shoot that hanging title?

To stay youthful, stay useful.

Working...