First, you’re changing the subject from the challenge I posted to you.
Second, none of those is current, and none of them broke out into the wild, so what’s the point?
The MacBook Pro that the thread was originally talking about was set up with none of the available security devices enabled, and there were tons of hackers trying to beat its doors down, yet it took a very long time for it to be opened up, and even then, the rules of the challenge needed to be broken in order for the guy to get in.
Come on.
“First, youre changing the subject from the challenge I posted to you.”
What challenge?
“Second, none of those is current, and none of them broke out into the wild, so whats the point?”
The one supported by ImmunitySec is current. They were all in the wild - those are actual exploit code.
There’s a difference between an exploit and a worm or virus. They can use one to spread. In these cases no one cared enough to write one. I’m not sure what your point is here other than to carry the water for Jobs.