Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: antiRepublicrat
... only because Charlie Miller is better at weaponizing his exploits than the people who were going after other systems. He is able to package an exploit so that it can be deployed in seconds. The guy is good.

So let me get this straight. Charlie Miller is so good he is able to attack a system and make it fall faster than any other system. Even though the system he is attacking is "inherently secure" (as stated by you) and the other is just dumb old windows.

He is so smart that not a single person in the world can attack windows faster than he can attack the "inherently secure" system of OSX. Three years in a row!

Something isn't adding up.

Oh and in 2010's contest he was able to get read and write access where as the windows system attack only got read access. Didn't Charlie also attack windows as well? Why didn't he get write access to windows as well?

41 posted on 07/22/2010 9:20:24 AM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 40 | View Replies ]


To: for-q-clinton
So let me get this straight. Charlie Miller is so good he is able to attack a system and make it fall faster than any other system. Even though the system he is attacking is "inherently secure" (as stated by you) and the other is just dumb old windows.

No. Charlie Miller is not your everyday computer hacker. He is an Ex-NSA security expert who concentrates on Macs. He, and his two associates, also ex-NSA security experts, worked weeks on finding the vulnerability in the Mac applications he attacked. He did not concentrate any attention at all on Windows, although he did state that the vulnerability he found and exploited in Java would work just as well in Windows and Linux, working through any browser.

He prior prepared the exploit, which took two seconds to execute once he started his attack... He did not start from scratch as you deliberately imply in your comments. The prep time took weeks.

Oh and in 2010's contest he was able to get read and write access where as the windows system attack only got read access.

In the last Pwn2Own contest, the Windows system fell 20 minutes after the Mac, in a non-prepared, start from scratch attack... which meant the hack met the contest's requirements, which was to place a file on the desktop. That meant they got write access. I am not sure where you heard they only got read access.

Didn't Charlie also attack windows as well? Why didn't he get write access to windows as well?

No, he did not. He attacked only the Mac.

137 posted on 07/22/2010 3:32:02 PM PDT by Swordmaker (Remember, the proper pronunciation of IE is AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 41 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson