On 02/07/2013 04:15 PM, Joel Esler wrote:
On Feb 7, 2013, at 5:51 PM, Al Varnell<alvarn...@mac.com> wrote:
I have read what it said on<http://evasi0n.com/> about it as well as blog
reports on:
<http://news.cnet.com/8301-13579_3-57567477-37/>
<http://www.intego.com/mac-security-blog/evasi0n-jailbreak-tool-released/>
What did I miss and how would it exploit OS X as the infection name would
seem to indicate?
I know this is on Forbes, but this is a pretty good write up.
http://www.forbes.com/sites/andygreenberg/2013/02/05/inside-evasi0n-the-most-elaborate-jailbreak-to-ever-hack-your-iphone/
--
Joel Esler
Senior Research Engineer, VRT
OpenSource Community Manager
Sourcefire
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml
While not being an iOS or programming expert, I did understand the
article referenced by Joel. WRT Al's question I would reply with this
analogy and welcome any further discussion.
Apple's App protection is analogous to running anti-virus software and
the evasi0n jailbreak the analogous of turning off the anti-virus.
My reasoning for this analogy is that all "legitimate" applications are
"tested" by Apple and therefore "safe" for users to run and do not
unduly open them to "malware" or hacking. Since the function of evasi0n
is to always report any app as approved, if the user installs an app
that is malware, there is no protection for the device. i.e. it is the
users responsibility to ensure they do not install malware apps on their
device. No different than "super" users who decide to operate their
computers / devices with no form of anti-malware protection.
--
Jim Preston
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml