
If you want on or off the Mac Ping List, Freepmail me.
So the standard is that a security feature is "rendered useless" because of one proof-of-concept exploit. As though anything less than 100% effective is 0% effective. Keeping out all the malwares but one has no value? Really? A defense has to be absolutely perfect or else it's worthless?
Nobody has ever judged Windows anti-malware features like that. They range from 70% to 95% effective -- none are 100%.
That's not to excuse the weakness in the defense. Just sayin'...
Tech writers WHORES are so f**kin' corrupt. ANYTHING for a page hit. ANYTHING.
More than that, Swordmaker, the legit application has to invoke the non-legit application, and not use the system’s application launcher to do so (using something like fork() or exec() instead). Remember that Gatekeeper fires when the application is executed, not when it’s installed.
Of course, there’s no need for the developer to do that, because they could easily embed malicious code in the original signed application. All application signing and Gatekeeper does is identify who distributed the application, it makes no guarantee as to the application’s safety. So whether it’s in the main application or a helper application distributed alongside, the developer is still going to be identified and blacklisted if they distribute malware.
The only real attack vector here is to find non-App Store software that is developer signed and uses additional helper applications launched with the likes of fork() and exec(). The attacker can modify/replace the helper application(s) and redistribute the bundle as if it’s the original distribution. A legitimate threat but very limited; downloading from reputable sites/mirrors and validating checksums will avoid any issues.