Free Republic
Browse · Search
Smoky Backroom
Topics · Post Article

To: Swordmaker
Apple did indeed close this supposed "vulnerability" forever by instituting validation routines to assure the user was actually connected to the Apple Server and that the System Update Routines on the computer to be updated had not been modified.

Wait if it wasn't a real threat why did they fix it? You can't have it both ways.

509 posted on 01/14/2007 1:24:59 PM PST by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 489 | View Replies ]


To: for-q-clinton
Wait if it wasn't a real threat why did they fix it? You can't have it both ways.

Can't you read? Do you not understand basic English?

Russell Harding pointed out that there was a possibility that it COULD be done... not that it was being done or had been done... so Apple made it so it couldn't be done.

Was it a threat? Only in the sense that any thing not thought of could be a potential threat in the future. Was it a vulnerability? Yes, if you don't trust the Administrator level users on your own Mac... but then if they have physical access and administrator permissions on your Mac they can do ANYTHING including activate Root if you haven't already locked it out with your own secret password. Was it ever exploited? NO.

It would NOT have been a threat to 99.9999% of Mac users.

513 posted on 01/14/2007 2:18:53 PM PST by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 509 | View Replies ]

Free Republic
Browse · Search
Smoky Backroom
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson