-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hello:
A lot of companies do have bounties like this. For example, the
company I worked for works on Drupal. There was a bounty offered
through the association. I report stuff like this I find when it is a
problem, not because I want to get paid but because that's the only
way to fix things. I do it because it's the right thing to do and it
helps other people. Any security holes that can be fixed, regardless
of whether or not I get paid helps me (as I'm obviously using the
product) and it helps others as well.

Thanks,
On 8/13/2015 2:27 PM, Shaf wrote:
> Why should I tell Apple of exploits if they don't pay me?? They
> should introduce a bug bounty program. Otherwise I have no
> interest in keeping their bugs confidential.
> 
> 
> On 8/13/2015 7:10 PM, 'Chris Blouch' via MacVisionaries wrote:
>> With the complexity of OSX and iOS I think if somebody figures
>> out the right combination of tweaks to bypass security they
>> should tell Apple right away and hold off a bit before telling
>> the world. At least give them a chance to fix it before giving a
>> free hand up to the bad guys. Of course that lead time needs to
>> be kinda short as the vulnerability needs to be fixed before some
>> bad folks find it and/or continue to use it. With Apple's
>> automatic updates it can also be a while before a reasonable
>> chunk of the population has installed the patch. So I'd guess 90
>> days would be pretty reasonable. If a patch hasn't been released
>> by then then it's time to put public pressure on Apple.
>> 
>> That said, the oasis of pulchritude hasn't entirely dried up.
>> Yes, there are issues and the popularity of the platform has
>> attracted unwanted attention from certain quarters but at least
>> there seems to be a reasonably good attempt to put locks on all
>> the doors. They just sometimes forget and leave a window open.
>> 
>> CB
>> 
>> On 8/13/15 1:21 PM, Sabahattin Gucukoglu wrote:
>>> I don’t agree with the author.  Of course, this is
>>> MacWorld—some amount of Apple butt-kissing is to be
>>> expected—but I find his attitude very worrying.
>>> 
>>> First, “Responsible disclosure” vs “Full disclosure” is a
>>> choice of researchers, and privileged authors of the press
>>> shouldn’t be using their personal ethical judgements about it
>>> to suppress public information about flaws simply on that
>>> basis.  That alone is reason enough to simply distrust any
>>> further writings of the author.  I am personally of the opinion
>>> that we are well past the usefulness of “Responsible
>>> disclosure” as a strategy; giving companies rope, but not quite
>>> enough to hang themselves with, isn’t moving security forward 
>>> any faster.
>>> 
>>> Second, and more important, a privilege escalation
>>> vulnerability isn’t a problem for advanced users, who already
>>> know what Glen is suggesting, i.e. don’t run dodgy software.
>>> It is precisely those people who have been trained, per the
>>> standard advice, not to type in their passwords when they are
>>> suspicious who will be most hit by the root bypass.  Obviously,
>>> better advice would be “Just don’t trust anyone”, but that’s
>>> not how the world works, sadly.  I think it’s time for us to
>>> acknowledge that the Mac, once a peaceful neighbourhood with 
>>> only the occasional bit of easily-preventable rogue badness
>>> that you could get rid of by just clicking “No” or “Cancel” or
>>> whatever, is now increasingly occupied by bad software that is
>>> well-advertised, easily installed and hard to recognise by a
>>> lot of inexperienced people, and anybody giving a Mac to
>>> somebody to keep them (the recipient) quiet and out of their
>>> (the donor’s) hair now needs to hold Apple’s once glorious
>>> patch turnaround times to account.  This is *especially* true 
>>> if the donor has delivered the Mac with a limited user account
>>> and all necessary software already installed or only accessible
>>> from the Mac App Store, because as soon as Flash becomes the
>>> vector, we’re all finished.
>>> 
>>> Microsoft have learned their security lessons the hard and
>>> painful way, and now it’s Apple’s turn.  Please don’t give
>>> apologists fodder for their absurd denials.
>>> 
>> 
> 


- -- 
Take care,
Ty
twitter: @sorressean
web:http://tysdomain.com
pubkey: http://tysdomain.com/files/pubkey.asc
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBAgAGBQJVzOOtAAoJEAdP60+BYxejrtIH/imR8NkDa+qXCsu9jMf1Tg9+
e6yhkvDuWDAE6x7irob9M8r4GFIZpORxspNmI8fyR7vlz7vzEVSewelqjAdwN5e3
fU4W4G+nUVSgY44JNn4wOdH5cgfO+WtNubMMfDtM0FKXSFkzsF6s+Rdv3DPdWAcX
N8+TiItjVFIWroeExY8tr88Gy/l+OwIEhBBcj3QuncJqaeEajVYnidvcvlw3Tq1R
RrgrIU7vXLbU1AE9tseOaRFbCySljUfQT90aKtzIczM8xAlqVfaUDEyy00hwvP6c
saPhr5xtwhT5EGDjSS4PEan4nLX5kUs2qP7aZYETu1HszfS+7lgrPg4tqQM/4Kg=
=sDTZ
-----END PGP SIGNATURE-----

-- 
You received this message because you are subscribed to the Google Groups 
"MacVisionaries" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to macvisionaries+unsubscr...@googlegroups.com.
To post to this group, send email to macvisionaries@googlegroups.com.
Visit this group at http://groups.google.com/group/macvisionaries.
For more options, visit https://groups.google.com/d/optout.

Reply via email to