The MadTechie Bloggers
Greg Kniffin
The opinions and views expressed on this blog belong to the authors alone and may not accurately reflect the views of our employers or any other company which we may discuss during the course of our blogging. The content of this blog is presented "AS IS" and confers no warranties or rights.

« Office 2007 Blog Feature | Main | Bam!!! »

August 03, 2006


Giovanni Gallucci

If you read the text from the actual demo you'll find that this actually has nothing at all to do with it being a Mac, other than an opportunity for a Windows user to crack a smirk. When that smirking guy actually reads the article, he/she/it will realize that this exploit is there for whatever operating system is running on the effected hardware. It is an exploit for specific third party hardware. I guess actually this is a testament to OS 10.4, that someone has to go to such great lengths to hack it and make it appear that it is insecure when in actuality, the "hackers" had to first already have physical access the the machine to install a root kit and THEN install a third-party wireless driver, NOT an Apple driver. Sad really.

Jason Beaudreau


If you take the time to read the text of *my* blog entry you would know that the point of the post had nothing to do with the actual merits of the attack performed by the hackers or on the relative security of OSX. In fact, I pointed this out in my original post:

"True, this exploit, as they pointed out, could be utilized against other operating systems as well, but they chose Apple. The point of this post is that they chose Apple instead of Microsoft. This means something."

The point of the post is that the Apple marketing hype is starting to grab some unwanted attention in the hacking community.

BTW, the researchers claim that the vulnerability DOES exist in the standard drivers (Airport) used by Apple as well as third party hardware manufacturers. They are reportedly working with Apple to close the hole.

Another scary element for all platforms that the hack demonstrates is that the hack was accomplished via a script. This means that script kiddies can perform this type of hack, not just the elite hackers.

So who do you believe? Passionate Apple fan boy blogs claiming the "demo" was completely unrealistic or the hackers that have the inside scoop on the actual flaw? I'll go with the hackers and take extra precautions - like disabling wireless when not in use. For my part, I am already doing this on my Dell.

The comments to this entry are closed.