[Ti] Understanding security threats(was Re: Intel Mac Mini?)

Lists lists at tntluoma.com
Wed Mar 1 22:36:11 PST 2006


On Mar 2, 2006, at 12:29 AM, Don wrote:

> I have been following this thread and must admit I don't understand  
> most of it. As a total non-geek who uses the computer mainly for  
> web surfing, emailing, iTunes/ITMS, MS Office and occasionally  
> Filemaker, can someone tell me how I could be hurt by the OS X  
> security leaks?

Basically the thrust is this:

Whenever a browser tries to do something "automatically" for you "for  
convenience" you risk losing some security.

	- This is true for Windows, where Microsoft designed it to be  
essentially possible for a website to do whatever it wanted to  
through Internet Explorer

	- This is true, to a far lesser extent, with Mac OS X, if you use  
Safari, and if you leave the 'Open Safe Files Automatically After  
Download' option checked

The recent exploit basically pretended to be "safe" but really  
weren't, so Safari could be fooled into opening them.

You can safeguard yourself to a great extent by turning off that  
option in Safari, or by using Opera or Firefox instead.

Chris, on the other hand, claims secret knowledge of another exploit  
that he doesn't want to share too many details about.  He says this  
is because he doesn't want it too widely known.

Some people see this as evidence of Mac OS X's insecurity.

Others remain skeptical because he refuses to be open with his  
evidence, apparently only selectively sharing it with others he hand- 
selects.

Chris has very little interest in other people's opinions of him,  
which some people admire and some people don't, and makes some people  
like him and some people not.

Thus we are left to decide for ourselves whether we want to take the  
word of one individual as to whether or not there are "serious"  
problems with Mac OS X.  He has decided to keep this information in  
his own control, and therefore rob the community of the ability to  
judge for themselves.  He calls this safeguarding the community.   
Others see it as a way to get attention.  Someone suggested a piece  
of software which could solve the problem.  Chris' response was "Do  
you really want to be running a bunch of programs to protect yourself  
against malware?"

One could infer that since he did not say that the software would not  
solve the problem, it will solve it, but he has a personal moral  
objection to anti-malware software and therefore prefers that your  
system be insecure and that Apple be pressured to fix it.  Hard to  
know how we can pressure to fix an exploit we don't know about  
because the people who do have it won't say anything about it.  Then  
again it really might not be that serious.  Again, there's no way for  
us to know, because he is keeping this information he claims to have  
to himself, despite the fact that if there was more public knowledge  
and awareness of the issue, more people could put pressure on Apple  
to fix it.

He could very well be right.  He could very well be full of it.   
There's really no way to know unless you are one of the chosen few he  
deems worthy to receive his insight and information.

I have no doubt that there are remaining security holes.  What I have  
no way to judge is how severe they are and what (if anything) I can  
do (regardless of how Chris feels about the solution).  Personally I  
thought that lists like this were a place where people came together  
to help one another, not to say "Well I know something you don't know  
which puts you at risk but I'm not going to tell you what it is."

But if that's the way he wants to play, then that's what he'll do.   
Meanwhile I'll do the things that I believe safeguard me, including  
running regular backups.




More information about the Titanium mailing list