Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Apple is having its Microsoft moment... Apple products suffering glitches
WCVB ^ | 5 Jun 2015 | Jose Pagliery

Posted on 06/05/2015 6:05:07 PM PDT by for-q-clinton

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-52 last
To: for-q-clinton

Dang auto correct!!!

Worth and with are mixed up and should be met not merry and unmatched should be unpatcged.


41 posted on 06/06/2015 4:00:47 PM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 38 | View Replies]

To: for-q-clinton; Swordmaker
Well, I gotta run off to dinner. Say, how 'bout you guys get this all settled up while I'm gone, will ya? You've got a day or so, as I'm not gonna be back online until late tomorrow.

It's D-Day -- don't forget to take a few minutes off and remember the guys that gave their lives so that we could have these stupid arguments.

42 posted on 06/06/2015 4:06:15 PM PDT by dayglored (Listen, strange women lying in ponds distributing swords is...sounding pretty good about now.)
[ Post Reply | Private Reply | To 38 | View Replies]

To: for-q-clinton; dayglored
In fact I remember the excuses for malware not counting on Macs was that it only works on unmatched systems, user was required to click on link, and or machine had to be in internet. So worth those excuses out there I’d say windows had been pretty solid for the last 10 years.

Even if you count the Trojans, for-q, the total number of Trojans that have affected OS X Macs is fifty-seven including variations in eight families. The number of infections of the worst of them (not counting the so called reports of the amazing disappearing Macbots claimed by Dr. Web that turned to be hoaxes to sell their products since not a single infected Mac was ever found in the wild) were, for each of these Trojans, in each instance, were from zero to under 100 Macs, and often were listed as zero to under 50. See what the numbers were for your vaunted Windows?

43 posted on 06/06/2015 4:14:02 PM PDT by Swordmaker ( This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
[ Post Reply | Private Reply | To 38 | View Replies]

To: for-q-clinton; dayglored
Actually patch Tuesday is going away as windows becomes a service and they don’t want to wait to release patches as 0 day exploits are more common. They are getting faster and more efficient. Exactly the opposite of Apple.

You don't know what you are talking about. Apple pushes updates for portions of OS X as they are available, they don't wait for any schedule or for major update and they are installed silently in the background for the majority of most users. Security updates are mostly handled this way. A user can opt to give permission for every update, but most don't. It is only when there is a major point upgrade that Apple requires permission.

44 posted on 06/06/2015 4:21:20 PM PDT by Swordmaker ( This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
[ Post Reply | Private Reply | To 39 | View Replies]

To: dayglored

Naw, I’m on vacation for my 66th birthday today. . . Going to the Reagan Library tomorrow at 2PM. I knew Reagan personally but this will be my first visit to the Library. My girlfriend arranged this trip as my present.

I always find it easy to remember D-Day..

I’m laying back in our luxury hotel suite before dressing for my birthday dinner. . . Later.


45 posted on 06/06/2015 4:25:22 PM PDT by Swordmaker ( This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
[ Post Reply | Private Reply | To 42 | View Replies]

To: dayglored

LOL
Sometimes I read to kearn something I need to know..I am happy with Windowa...My daughter has Mac and an I phone.


46 posted on 06/06/2015 4:26:24 PM PDT by MEG33 (God Bless America And Our Troops)
[ Post Reply | Private Reply | To 40 | View Replies]

To: Swordmaker

iBrute was simply a proof of concept - that didn’t mean other implementations didn’t exist secretly for months prior to the leaking. There have been no independent investigation results released dealing with the hacking that I can find. Only vague assumptions about how it could have been done - even from Apple. That Apple’s own internal investigation says “it wasn’t our fault!” means nothing, unless you also believe the current presidential administration when they say the same thing.

In fact, leaks show that Apple knew about the exploit 6 months prior to the release of photos, and did nothing about it:

http://www.dailydot.com/technology/apple-icloud-brute-force-attack-march/

“Analysis of the photos showed that many, in fact most, of the celebrity pictures were never on iCloud and had metadata that showed they came from Windows computers, Android phones, regular digital cameras (and some even digitized from film cameras images), movie clips, and other sources, which would not have been uploaded to iCloud from an Apple device.”

Link to this analysis? I’ve been unable to find anything of the sort.

I can’t tell if you’re unwilling to admit Apple was at fault, or simply unable. You have literally no evidence for any of your assertions, only your faith.

“iBrute would not have worked on iCloud except on those two words.”

Again, iBrute was a proof of concept. If a system allows you to guess passwords infinitely (as Apple’s system apparently did, through FindMyiPhone), a brute force method will always, eventually, work. Every CISSP knows this.


47 posted on 06/07/2015 5:25:05 AM PDT by Echo4C (We have it in our power to begin the world over again. --Thomas Paine)
[ Post Reply | Private Reply | To 26 | View Replies]

To: for-q-clinton

48 posted on 06/07/2015 11:39:51 AM PDT by 2ndDivisionVet (You can help: https://donate.tedcruz.org/c/FBTX0095/)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Echo4C; for-q-clinton; Star Traveler; dayglored; Loud Mime; itsahoot; amigatec; PA Engineer; ...
iBrute was simply a proof of concept - that didn’t mean other implementations didn’t exist secretly for months prior to the leaking. There have been no independent investigation results released dealing with the hacking that I can find. Only vague assumptions about how it could have been done - even from Apple. That Apple’s own internal investigation says “it wasn’t our fault!” means nothing, unless you also believe the current presidential administration when they say the same thing.

No, you are arguing with "facts" not at all in evidence and if such an exploit was in the wild it would be known. It simply was not. iBrute was the only one for this vulnerability and iBrute used the 500 most common passwords which was coded into it to link to it. In fact the testers had to add their passwords into that dictionary for it to be able break into their own accounts.

There have been independent investigations released and I am not going to repeat what was released again here to satisfy you. . . and they were not "vague assumptions" but factual conclusions.

I posted that artlcle you linked to in March of 2014, which was not related at that time with "FindMyiPhone" but with merely logging on to Apple accounts. In fact, Apple DID fix that vulnerability that Ibraham Balic wrote to them about shortly after being notified, and Apple gave him credit for finding it. Just because an email that The Daily Dot acquired mentions something similar does not mean it is the same vulnerability. Apple closed all of those vulnerabilities quickly after that, but missed the fact that FindMyiPhone somehow was not included in the fix. That was Apple's bad.

However, Echo4C, the FindMyiPhone vulnerability was NOT the source of the celebrity photos.

The facts are that the FindMyiPhone flaw was discovered only two days before the release of iBrute (which is a very simple script exploit) and as I mentioned the "fappenening" offer of the celebrity nudes were already being offered for sale on 4Chan.com and Reddit.com for three to four weeks BEFORE the discovery of the flaw in FindMyiPhone and the release of iBrute. That is a fact. Now add that the investigations, discoveries, revelations, and complaints from he people who HAD purchased the photos revealed on 4chan and reddit afterwards about the photos' real sources gained from examining the photos' metadata make it plain the majority did not come from Apple's iCloud. The seller also finally admitted he had not really "hacked" iCloud. . . but was merely selling his collection of several years from which he had been buying and trading with other members of a clandestine group of similar sellers and traders in a private newsgroup.

The FindMyiPhone vulnerability did exist and was revealed publicly on a Friday morning, but closed quickly by Apple by Tuesday. iBrute was released on Saturday evening to early Sunday morning, depending on where in the US you live. The "Fappening" hit the news on Monday after the seller announced he'd "hacked" Apple's "un-hackable" iCloud to steal the photos. It is a truism that if you add Apple to any headline, you will gain attention. He did.

I pointed out in my coverage that while the vulnerability existed, the time frames didn't work for the theft of the celebrity photos to be true. The download times did not jibe with the discovery times and the announcements. It just did not make sense. The seller would have to have a lot more resources at his beck and call than would be normally available to even start attempting it for what he seemed to be.

I explained that while the ability to try passwords did not cut out after five attempts as it did on all other log-in attempts on other Apple account log-ins, each attempt required a new log into the entire process and you have to know the user's Apple ID to even begin. Each time to even start, that ID has to be re-entered in a browser, and then a new passcode has to be attempted. . . and then you are taken back to square one if it fails to start over. It is not a quick process. Automating it cannot speed up the process by much because of the speed of the internet is the limiting factor. Apple also included an increasing time delay between each attempt. Therefore a high velocity brute force system cannot try multiple passwords as rapidly and takes much longer than you might think.

There are 223 characters accessible from the Apple keyboard and all of them are permitted in a password. An AppleID password can be 8 to as long as 256 characters. . . but lets just limit it to 8 characters. It must included at least one upper and one lower case letter, one number, and one keyboard accessible symbol, and it cannot have more than three consecutive identical characters. The potential number of passcodes is 8223 = 2.44944165532867 X 10201 possible passcodes. That number is astronomical. If we were to just limit it to upper and lower case letters and numbers, the number is 9.80797146154169 X 1055, but that is not Apple's requirement. No brute force method can possibly break into a passcode with that many possibilities using a dictionary means. . . they'd have to be extremely lucky to even get ONE in a weekend, much less hundreds of random celebrities, AND download thousands of nude photos.

I provided links at that time and I am not interested in searching all that out again.

Fixing the FindMyiPhone vulnerability was not a device level vulnerability or problem. It was a problem at the server level and involved only changing the code at the server to include the same code already being used for log-in for all other account access to iCloud. Problem solved.

iBrute was not a "proof of concept" but was actually released into the wild. Proof of concept exploits are sent to computer security companies or shown at white hat conferences. This was not. . . it was immediately made available for anyone to use. Sorry. You are just wrong on this.

As part of that coverage, I did the analysis of the passcodes in the dictionary that iBrute linked to and posted the results on Freerepublic. Twenty-two of the 500 most commonly used passwords were long enough and included numbers and only two of those included numbers and a symbol. That was all that met Apple's requirements to be accepted as a legitimate iCloud passcode. However, in the linked dictionary were two passcodes completely unlike all the rest of the passcodes in the dictionary (I cited both in my coverage). . . those that were the passwords apparently owned and tested by the author and his tester that they obviously added so that iBrute would work on their iCloud accounts.

The fact is, that some of the celebrities photos did indeed come from iCloud. . . but everyone of them had their iCloud passwords changed so that a hacker could get access. The hacker did NOT get access through a brute force trial-and-error attempt. Instead they broke in by answering the celebrities' too easy to answer self-selected security questions. Questions such as "What was the name of the elementary school you attended in third grade?" are facts that almost impossible to determine for John and Jane Doe nobodies, but for a celebrity, that data is easily learned from the biographies generally published in fanzines. The same for such questions as "What was the name of your first pet?" That's covered in the bio, too. The group that steals these photos stated they use this technique to get into celebrity accounts all the time. . . and that they also befriend the celebrities to gain the knowledge to do it. This was all uncovered in the investigation.

The records at Apple showed that the compromised celebrity accounts ALL had their passwords CHANGED by use of "I forgot my password" and the use of the "security question" means of password changing. The celebrity had to change them back, and frequently had to have help to do that because the hacker changed their security questions as well as the password!

49 posted on 06/07/2015 1:11:05 PM PDT by Swordmaker ( This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
[ Post Reply | Private Reply | To 47 | View Replies]

To: Swordmaker

Wow someone struck a nerve to get that much damage control from you!

So to meet this out Apple has an issue where it may or may not have been exploited. And if exploited by big govt jackets we provably will never know.


50 posted on 06/07/2015 2:08:39 PM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 49 | View Replies]

To: for-q-clinton; Echo4C; Star Traveler; dayglored; Loud Mime; itsahoot; amigatec; PA Engineer; ...
Wow someone struck a nerve to get that much damage control from you!

Oh BS, for-q-clinton! I just don't like FUD, which is what all of these articles leading up to the WWDC are. I just provided the proof as I usually do.

51 posted on 06/07/2015 9:59:13 PM PDT by Swordmaker ( This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
[ Post Reply | Private Reply | To 50 | View Replies]

To: Swordmaker

Lol. Like I said. Spin please.


52 posted on 06/08/2015 5:36:55 AM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 51 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-52 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson