Please note this is NOT a remote exploit, and also note it is a proof-of-concept demonstration, not an exploit that is in the wild, at this point. To be able to use this exploit, a malicious intruder MUST have physical access to the computer and plug in a Thunderbolt Device with a maliciously crafted ROM installed in it. This can be accomplished by persuading the user to install the device himself. . . but at this time, there are none in the wild. Swordmaker
To: Swordmaker
Swordmaker, those in the wild may be enough or are we bidding our time, twiddling our thumbs (so to speak)? Unknown here. Know you are knowledgeable of those in the wild ... Any thoughts? If and perhaps does involve National Security, please disregard my post.
2 posted on
01/08/2015 7:26:04 PM PST by
no-to-illegals
(Scrutinize our government and Secure the Blessing of Freedom and Justice)
To: ~Kim4VRWC's~; 1234; Abundy; Action-America; acoulterfan; AFreeBird; Airwinger; Aliska; altair; ...
Serious Proofof-Concept Exploit in Mac Thunderbolt port demonstrated at White Hat Hacking conference allows complete take over of the Mac operating system. . . undetectable, unrecoverable. Requires physical possession of the computer to accomplish or persuading the user to plug in an malicious Thunderbolt device. NOTE: this is a PROOF-OF-CONCEPT and is not in the WILD! Apple has already closed part of the vulnerability that allows this exploit in the latest Mac Minis and the new 5K iMacs, but older Macs are at risk. AGAIN NOT IN THE WILD and REQUIRES physical access of your computer to accomplish! PING!

Apple THUNDERBOLT SECURITY EXPLOIT DANGER Ping!
If you want on or off the Mac Ping List, Freepmail me.
3 posted on
01/08/2015 7:27:23 PM PST by
Swordmaker
(This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
To: Swordmaker
We have all known for years that physical access to a machine is generally game over.
Greater functionality (like loading code through a port) is always paired with potential security issues. Sounds like Apple is addressing them.
It's an interesting demo, but I wouldn't spend a millisecond worrying about it, as long as the machine isn't being physically attacked.
4 posted on
01/08/2015 7:29:22 PM PST by
dayglored
(Listen, strange women lying in ponds distributing swords is...sounding pretty good about now.)
To: Swordmaker
i’m good.....:o)
Stay Safe ........
16 posted on
01/08/2015 8:04:19 PM PST by
Squantos
( Be polite, be professional, but have a plan to kill everyone you meet ...)
To: Swordmaker
To: Swordmaker
34 posted on
04/10/2015 8:40:33 AM PDT by
TEXOKIE
(We must surrender only to our Holy God and never to the evil that has befallen us.)
To: Swordmaker; Star Traveler
Hi guys! Just dropping in to touch base.
A few weeks ago, we purchased the MacPro laptop and had a devil of a time getting it up and running. HOWEVER, we called the customer service, and were greatly impressed, because they actually DO give service.
Our situation was screened by a number of automated menu questions and apparently we were judged as to having genuine need for serious help. The guy who was head of the department helped us! He got us up and running.
There have been a few other questions, but largely have been able to surmount them, if they are apple issue. Otherwise, on some programs, I’m having to contact the program writers to get assistance.
Right now I’m wondering what to do to get my apple hooked up to my printer. The little I’ve been able to surmise is that the easiest thing I can do to get printed material is to directly hook it up to my printer, which I’m happy to do do. Only problem, is I don’t know what kind of wire or cable equipment I need to get to have that happen.
I was hoping one of you guys could advise me!
Thanks!
PS... today, when I was plunking around, I noticed a black dot under some of the icons on the bottom of what I think is called the “dock.” What are those?
37 posted on
05/02/2015 5:02:20 PM PDT by
TEXOKIE
(We must surrender only to our Holy God and never to the evil that has befallen us.)
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson