Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Apple disses hackers' Black Hat convention
Scientific American ^ | 08/05/2008 | Larry Greenemeier

Posted on 08/05/2008 8:38:22 PM PDT by Swordmaker

In a move that could backfire, according to one security expert, Apple pulled out of a prominent hackers' convention taking place this week in Las Vegas.

Apple abruptly canceled what would have been its first appearance at Black Hat, an annual event in Las Vegas that features presentations from the world's most preeminent security researchers – a.k.a. hackers – according to Computerworld. Speakers typically highlight security shortcomings in a number of different technologies, including operating systems, e-mail and the Internet itself. Taking one's lumps at Black Hat is a right of passage in a technology's security evolution, as companies like Microsoft and networking equipment maker Cisco will attest.

Thanks to this move and a few other gestures of ill will toward its customers (such as dropping the price of the iPhone last year shortly after many had purchased one), says Herbert "Hugh" Thompson, chief security strategist at New York software security firm People Security, "Apple's shield of being a charmed company could be lifting." Hackers could take offense at the move and start turning their attention to the security flaws in the company's computers, software and cell phones, Thompson says.

As leaders in the software and networking markets, respectively, Microsoft and Cisco attract attention because hackers who develop attacks against these companies' products affect the most people. "Risk, in an operating systems in particular, is a function of how vulnerable you are and how much people want to attack you," Thompson says. Apple's products, in particular its QuickTime Internet media player, are not more secure than these high profile targets, but the public's sentiment has always been in their favor. "The damage is going to come now," he adds, "as people speculate as to why (they pulled out of Black Hat) and start disparaging them."

Black Hat Director Jeff Moss told Computerworld, that Apple's marketing department "got wind of" the company's planned appearance. "Nobody at Apple is ever allowed to speak publicly about anything without marketing approval," he said. The company's presentation was supposed to be "them talking about security engineering and how they take security seriously."

Apple had set unusual conditions for speaking at the event: They wouldn't have to answer questions from the audience. Apple's canceled session was titled "Meet the Apple Security Experts," according to CRN magazine, which reported Moss as saying, "We had a lot of people from government agencies saying they'd love to know more about the security engineers at Apple, because it's such an opaque company." It seems the company will remain opaque, at least for now.

Apple's already starting to look a bit bruised. Petko Petkov, founder of security research firm GNUCITIZEN, said in the description on the Black Hat Web site of his presentation today that he planned to expose a flaw in Apple QuickTime running on the Windows operating system that Apple has yet to repair (a situation known as a "zero-day" bug), which means that hackers could immediate start attacking it. "If Apple responds before the event," he wrote, "I will drop the details of a QuickTime 0day for Windows Vista and XP." ScientificAmerican.com was unable to reach anyone who knew whether Petkov had gone through with his plans.

This wouldn’t be the first time that hackers have tried to teach Apple the lesson that it should be more open with the security flaws in its products. Two hackers early last year created the "Month of Apple Bugs" project that made public a stream of security flaws in Apple's products, including the Mac OS X operating system and iChat instant messaging software.

Apple's strategy of tightly controlling its iPhone (it runs only on the AT&T wireless network) led to New Jersey teen George Hotz posting on YouTube a technique for modifying the iPhone so it can run over other wireless networks as well. This technique was not widely adopted, but it showed what happens when someone with technical skills sets their mind to picking apart Apple's technology.

Apple's absence from Black Hat had a bit of a ripple effect, as security consultant Charles Edge was forced last month, upon finding out of Apple's plans to cancel their presentation, to withdraw a session he had proposed to Black Hat organizers about flaws in Apple's FileVault encryption software, citing confidentiality agreements he had signed with the company, according to the Washington Post.

The hacker community's relentless drive to break the technology in which companies invest millions of dollars is at times sated by a good will gesture from those companies. Microsoft learned this lesson after years of battling with security researchers over flaws in its products. Since 2003 the company has held biannual BlueHat security conferences, during which Microsoft invites prominent security researchers to its offices to discuss security flaws in Microsoft products.

Thompson predicts that, if Apple doesn't learn from its mistakes the way Microsoft did, the company will start "losing that grace that customers had given them for a really long time because they have cool products. The haze is starting to lift and people are starting to asking more questions."


TOPICS: Business/Economy; Computers/Internet
KEYWORDS: applecomputer; computersecurity; hackers; maccult; macviruses
Navigation: use the links below to view more comments.
first 1-2021-32 next last
This seems to be a revision of what was originally reported. The original report of this pull-out said that the presenter was a hacker who was going to make a presentation on a previously unreported vulnerability in File Vault. Between the time he agreed to speak and his pull-out, he had been hired by Apple. In his cancellation notice, he stated that he would not "speak because would be against his employer's wishes" and that could damage his income. That is referred to in the third from last paragraph:

"Apple's absence from Black Hat had a bit of a ripple effect, as security consultant Charles Edge was forced last month, upon finding out of Apple's plans to cancel their presentation, to withdraw a session he had proposed to Black Hat organizers about flaws in Apple's FileVault encryption software, citing confidentiality agreements he had signed with the company, according to the Washington Post."

Any "security consultant" who had already signed "confidentiality agreements" would have known that discussing unpatched "flaws" in an important security aspect of OSX would not have Apple's blessings. What I infer happened is that Edge shopped his discovered flaws to Apple and they hired him to help close them and required him to sign the NDA which, consequently resulted in his canceling is scheduled presentation at Black Hat.

Somehow this has been confabulated in this article into APPLE, INC., being scheduled to discuss their commitment to security and APPLE pulling out of an agreement to speak. That just doesn't comport to Apple's history or corporate policies. It would have been a major coup to have Apple officially address the Black Hat convention. Since they were not advertising this presentation out the kazoo, I don't think it was ever scheduled.

I think this entire article is FUD.

1 posted on 08/05/2008 8:38:22 PM PDT by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: 1234; 50mm; 6SJ7; Abundy; Action-America; acoulterfan; aristotleman; af_vet_rr; Aggie Mama; ...
SCientific American Blog claims Apple has pulled out of a scheduled presentation at this week's Black Hat convention—PING!

I don't think that is what happened.

Thanks to Leonard210 for the heads up.


Mac Black Hat Ping!

If you want on or off the Mac Ping List, Freepmail me.

2 posted on 08/05/2008 8:41:01 PM PDT by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
OK, maybe I'm just some kind of nut job, but it seems to me that the last thing you would want to to is tick off a bunch of professional hackers.
3 posted on 08/05/2008 8:44:38 PM PDT by chaos_5 (Some one needs to tell the "Mad Cow" to call the House back into session!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

FUD? FUD? Who would do that to Apple???

Dija catch this gem?

“Thanks to this move and a few other gestures of ill will toward its customers (such as dropping the price of the iPhone...”

Dropping the price of a very popular product transmogrifies into a gesture of ill will towards the customers!


4 posted on 08/05/2008 8:47:10 PM PDT by null and void (Barack Obama - International Man of Mystery...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Apple is running UNIX. Gee, like that’s ever been hacked?


5 posted on 08/05/2008 8:53:35 PM PDT by byteback
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
...says Herbert "Hugh" Thompson, chief security strategist at New York software security firm People Security, "Apple's shield of being a charmed company could be lifting."
...and who are ya gonna believe, some software patch salesman, or...
6 posted on 08/05/2008 8:59:20 PM PDT by SunkenCiv (https://secure.freerepublic.com/donate/_______Profile hasn't been updated since Friday, May 30, 2008)
[ Post Reply | Private Reply | To 1 | View Replies]

To: chaos_5
OK, maybe I'm just some kind of nut job, but it seems to me that the last thing you would want to to is tick off a bunch of professional hackers.

They are already ticked off.

Last year, a couple of these Black Hatters in a video demonstrated a claimed Zero Day infiltration of an Apple MacBook Pro at the convention that gained user level access through a flaw in the MacBook's WIFI.

However, the demonstrated exploit turned out to be done by using non-Apple hardware (third party USB WIFI card) and software (third party WIFI drivers) that is NOT installed in a MacBook Pro. The demonstrated flaws were in the third party stuff that would not normally be used on a Mac because the functionality is already built in. . . but they touted it as a Mac vulnerability. It took months to clear that FUD party up and get them to admit it was NOT a flaw in OS X as shipped by Apple.

The vulnerability was much more common on Windows computers that DID use the third party stuff... but the demonstrators said they chose to use a MacBook Pro because "they wanted to stick a lit cigarette into the eyes of smug Mac users"—so they cheated to damage Apple's reputation.

7 posted on 08/05/2008 9:01:14 PM PDT by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 3 | View Replies]

To: byteback
Apple is running UNIX. Gee, like that’s ever been hacked?

Yep. UNIX has undergone a lifetime of testing by hackers... and patching by the open source community. Most of the vulnerabilities have been found and fixed long ago. There are still things that Apple has added that have vulnerabilities, but since they run on top of UNIX, they are protected from doing too much damage through those vulnerabilities.

A lot of Apple's OS X applications are also open source and the OS community also searches through them for potential vulnerabilities.

8 posted on 08/05/2008 9:06:34 PM PDT by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Swordmaker

For all the supposed smugness of Mac users, it seems to me that Mac detractors are the truly self-righteous.


9 posted on 08/05/2008 9:17:23 PM PDT by Terpfen (Romney's loss in Florida is STILL a catastrophe. Hello, McCandidate!)
[ Post Reply | Private Reply | To 7 | View Replies]

To: chaos_5

Exactly! The hackers so far showed relatively no interest in Apple due to their miniscule marketshare. And the fact they have already exploited OSX Leopard shows it isn’t some superior OS that is flawless like Apple wants people to believe.


10 posted on 08/05/2008 9:17:54 PM PDT by Blue Highway
[ Post Reply | Private Reply | To 3 | View Replies]

To: Swordmaker
Apple had set unusual conditions for speaking at the event: They wouldn't have to answer questions from the audience.

Sounds like the standard liberal tactic being used from anyone from Hilary Clinton; Nancy Pelosi; Barack Obama to people like Jesse Jackson and now Apple. They don't want to answer questions from an audience probably smarter than most of their engineers at Apple, but they snidely want to introduce the hackers to their Security Experts. I'm syre they see right through that BS and Apple probably pissed off the wrong people with this one.

11 posted on 08/05/2008 9:23:53 PM PDT by Blue Highway
[ Post Reply | Private Reply | To 2 | View Replies]

To: Blue Highway
Exactly! The hackers so far showed relatively no interest in Apple due to their miniscule marketshare.

Miniscule Market Share = 33,000,000 Mac OS X users.

And the fact they have already exploited OSX Leopard shows it isn’t some superior OS that is flawless like Apple wants people to believe.

Please provide us poor deluded Mac users the real, in the wild exploits, not mere vulnerabilities, that are plaguing Mac users today. Name them. Proof-of-concept viruses and trojans that exist only in a Security Company lab are not in the wild.

12 posted on 08/05/2008 10:25:21 PM PDT by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 10 | View Replies]

To: Vor Lady

Spot The Fed!


13 posted on 08/05/2008 10:30:13 PM PDT by LongElegantLegs (Come then, War! With hearts elated to thy standard we will fly!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Blue Highway
They don't want to answer questions from an audience probably smarter than most of their engineers at Apple, but they snidely want to introduce the hackers to their Security Experts. I'm syre they see right through that BS and Apple probably pissed off the wrong people with this one.

I can find no other primary source that says that Apple was intending to officially attend the Black Hat conference. To criticize Apple for supposed restrictions on a undocumented appearance that was not touted by the promoters in all of their promotion materials is absurd. I think the supposed appearance is bogus.

As I mentioned, this "cancellation" was reported last week and at that time involved only Edge. Not Apple.

Participants in the Black Hat conference have been known to lie about Apple before. Since Apple's non-participation fits much more the history of the company and its known reticence about talking about anything security related, I strongly doubt that Apple's security experts would have scheduled themselves to be featured at a conference with the animosity that it has shown in the past toward anything Apple. Blue, it makes no sense.

14 posted on 08/05/2008 10:34:42 PM PDT by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 11 | View Replies]

To: Swordmaker
Petko Petkov, founder of security research firm GNUCITIZEN, said in the description on the Black Hat Web site of his presentation today that he planned to expose a flaw in Apple QuickTime running on the Windows operating system that Apple has yet to repair (a situation known as a "zero-day" bug), which means that hackers could immediate start attacking it. "If Apple responds before the event," he wrote, "I will drop the details of a QuickTime 0day for Windows Vista and XP."

Sounds like blackmail to me. So which nation is going to pursue him for cyberterrorism?

15 posted on 08/05/2008 10:40:09 PM PDT by weegee (Hi there.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
I'm gonna have to make this into a "rubber stamp" comment that I can post on command: If I were a virus writer, I would target the Mac. Why? it's a totally open field, no competition from other virus writers, no protective anti-virus software, nearly every user is non-technical yet runs with full admin priv.

So I say to the FUD-spewing Win-trolls: WHERE ARE THE MAC BOTNETS???

16 posted on 08/05/2008 10:50:35 PM PDT by dayglored (Listen, strange women lying in ponds distributing swords is no basis for a system of government!)
[ Post Reply | Private Reply | To 12 | View Replies]

To: dayglored

Right on dayglored. Hackers hack ‘cause they love to hack. How stupid do they think we are? No one has tried to hack a Mac ‘cause there aren’t enough of them yet? What tripe.

“One of these days Alice. Bang! Zoom! Just as soon as there are enough of you out there, you’re goin’ to the moon!” (For the kiddies, it’s a Jackie Gleason reference. He used to say, ‘You’re goin’ to the moon Alice...’ Gleason. Jackie Gleason. Oh, never mind!)


17 posted on 08/05/2008 11:27:31 PM PDT by Leonard210 (Tagline? We don't need no stinkin' tagliine.)
[ Post Reply | Private Reply | To 16 | View Replies]

To: Swordmaker
gestures of ill will toward its customers (such as dropping the price of the iPhone last year

Either I'm missing something, or the author of this article is.

18 posted on 08/06/2008 12:43:39 AM PDT by ReignOfError
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Un-Scientific American article.

Just more crapola from a rag which evangelizes Global Warming.


19 posted on 08/06/2008 7:56:00 AM PDT by Sunnyflorida (McCain Swiftboated the Swift Boat Vets for Truth - Thomas Sowell for President.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Leonard210
Heh, good Gleason reference (I'm old enough to remember the show).

I use Win, Mac, Linux, and NetBSD computers every day. I'm in charge of System Administration at a software company.

Why are my work notebook, and all my main home computers, Macs? Because they do all of the above in one package, with a great GUI and cool hardware.

VMware Fusion on the Mac -- I run Windows, Linux, NetBSD, even MS-DOS on my MacBook. Beats the crap outta everything else out there.

20 posted on 08/06/2008 5:58:04 PM PDT by dayglored (Listen, strange women lying in ponds distributing swords is no basis for a system of government!)
[ Post Reply | Private Reply | To 17 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-32 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson