On 02/07/2013 04:15 PM, Joel Esler wrote:
On Feb 7, 2013, at 5:51 PM, Al Varnell<alvarn...@mac.com>  wrote:

I have read what it said on<http://evasi0n.com/>  about it as well as blog
reports on:
<http://news.cnet.com/8301-13579_3-57567477-37/>
<http://www.intego.com/mac-security-blog/evasi0n-jailbreak-tool-released/>

What did I miss and how would it exploit OS X as the infection name would
seem to indicate?
I know this is on Forbes, but this is a pretty good write up.

http://www.forbes.com/sites/andygreenberg/2013/02/05/inside-evasi0n-the-most-elaborate-jailbreak-to-ever-hack-your-iphone/

--
Joel Esler
Senior Research Engineer, VRT
OpenSource Community Manager
Sourcefire
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

While not being an iOS or programming expert, I did understand the article referenced by Joel. WRT Al's question I would reply with this analogy and welcome any further discussion.

Apple's App protection is analogous to running anti-virus software and the evasi0n jailbreak the analogous of turning off the anti-virus.

My reasoning for this analogy is that all "legitimate" applications are "tested" by Apple and therefore "safe" for users to run and do not unduly open them to "malware" or hacking. Since the function of evasi0n is to always report any app as approved, if the user installs an app that is malware, there is no protection for the device. i.e. it is the users responsibility to ensure they do not install malware apps on their device. No different than "super" users who decide to operate their computers / devices with no form of anti-malware protection.

--
Jim Preston



_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to