No clue what 'clqames' means.

Either way, your argument is flawed. That's like saying everybody who
wants a job shouldn't work for the money otherwise the job market would
be overloaded and employees wouldn't be filtered by quality.


On 8/13/2015 8:25 PM, george b wrote:
> No I do not think so then all the people who need some money would be 
> reporting these things just to get funds and overload their system andthen 
> they would never be able to check the validity  of all the clqames
> 
> -----Original Message-----
> From: macvisionaries@googlegroups.com 
> [mailto:macvisionaries@googlegroups.com] On Behalf Of Shaf
> Sent: Thursday, August 13, 2015 11:53
> To: macvisionaries@googlegroups.com
> Subject: Re: Why you shouldn't freak out about scary sounding exploits
> 
> That's good for you. A wealthy company such as Apple should pay those
> who find security holes and report to them.
> 
> On 8/13/2015 7:36 PM, Littlefield, Tyler wrote:
>> Hello: A lot of companies do have bounties like this. For example,
>> the company I worked for works on Drupal. There was a bounty
>> offered through the association. I report stuff like this I find
>> when it is a problem, not because I want to get paid but because
>> that's the only way to fix things. I do it because it's the right
>> thing to do and it helps other people. Any security holes that can
>> be fixed, regardless of whether or not I get paid helps me (as I'm
>> obviously using the product) and it helps others as well.
>>
>> Thanks, On 8/13/2015 2:27 PM, Shaf wrote:
>>> Why should I tell Apple of exploits if they don't pay me?? They 
>>> should introduce a bug bounty program. Otherwise I have no 
>>> interest in keeping their bugs confidential.
>>
>>
>>> On 8/13/2015 7:10 PM, 'Chris Blouch' via MacVisionaries wrote:
>>>> With the complexity of OSX and iOS I think if somebody figures 
>>>> out the right combination of tweaks to bypass security they 
>>>> should tell Apple right away and hold off a bit before telling 
>>>> the world. At least give them a chance to fix it before giving
>>>> a free hand up to the bad guys. Of course that lead time needs
>>>> to be kinda short as the vulnerability needs to be fixed before
>>>> some bad folks find it and/or continue to use it. With Apple's 
>>>> automatic updates it can also be a while before a reasonable 
>>>> chunk of the population has installed the patch. So I'd guess
>>>> 90 days would be pretty reasonable. If a patch hasn't been
>>>> released by then then it's time to put public pressure on
>>>> Apple.
>>>>
>>>> That said, the oasis of pulchritude hasn't entirely dried up. 
>>>> Yes, there are issues and the popularity of the platform has 
>>>> attracted unwanted attention from certain quarters but at
>>>> least there seems to be a reasonably good attempt to put locks
>>>> on all the doors. They just sometimes forget and leave a window
>>>> open.
>>>>
>>>> CB
>>>>
>>>> On 8/13/15 1:21 PM, Sabahattin Gucukoglu wrote:
>>>>> I don’t agree with the author.  Of course, this is 
>>>>> MacWorld—some amount of Apple butt-kissing is to be 
>>>>> expected—but I find his attitude very worrying.
>>>>>
>>>>> First, “Responsible disclosure” vs “Full disclosure” is a 
>>>>> choice of researchers, and privileged authors of the press 
>>>>> shouldn’t be using their personal ethical judgements about
>>>>> it to suppress public information about flaws simply on that 
>>>>> basis.  That alone is reason enough to simply distrust any 
>>>>> further writings of the author.  I am personally of the
>>>>> opinion that we are well past the usefulness of “Responsible 
>>>>> disclosure” as a strategy; giving companies rope, but not
>>>>> quite enough to hang themselves with, isn’t moving security
>>>>> forward any faster.
>>>>>
>>>>> Second, and more important, a privilege escalation 
>>>>> vulnerability isn’t a problem for advanced users, who
>>>>> already know what Glen is suggesting, i.e. don’t run dodgy
>>>>> software. It is precisely those people who have been trained,
>>>>> per the standard advice, not to type in their passwords when
>>>>> they are suspicious who will be most hit by the root bypass.
>>>>> Obviously, better advice would be “Just don’t trust anyone”,
>>>>> but that’s not how the world works, sadly.  I think it’s time
>>>>> for us to acknowledge that the Mac, once a peaceful
>>>>> neighbourhood with only the occasional bit of
>>>>> easily-preventable rogue badness that you could get rid of by
>>>>> just clicking “No” or “Cancel” or whatever, is now
>>>>> increasingly occupied by bad software that is 
>>>>> well-advertised, easily installed and hard to recognise by a 
>>>>> lot of inexperienced people, and anybody giving a Mac to 
>>>>> somebody to keep them (the recipient) quiet and out of their 
>>>>> (the donor’s) hair now needs to hold Apple’s once glorious 
>>>>> patch turnaround times to account.  This is *especially* true
>>>>>  if the donor has delivered the Mac with a limited user
>>>>> account and all necessary software already installed or only
>>>>> accessible from the Mac App Store, because as soon as Flash
>>>>> becomes the vector, we’re all finished.
>>>>>
>>>>> Microsoft have learned their security lessons the hard and 
>>>>> painful way, and now it’s Apple’s turn.  Please don’t give 
>>>>> apologists fodder for their absurd denials.
>>>>>
>>>>
>>
>>
>>
>>
> 

-- 
You received this message because you are subscribed to the Google Groups 
"MacVisionaries" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to macvisionaries+unsubscr...@googlegroups.com.
To post to this group, send email to macvisionaries@googlegroups.com.
Visit this group at http://groups.google.com/group/macvisionaries.
For more options, visit https://groups.google.com/d/optout.

Reply via email to