If they had stayed with the security practices of the BSD that osX is based on, there would be nearly as many vectors for malware to take root. That security has been stripped away in the name of usability, and replaced with… nothing.
Yeah, and it so hard to get it cleaned out again too. I mean, they have to run the sofware updater, let the system apply the patch, and… uh… umm… go back to whatever they were doing.
oddball: Specifics? Because that does not match my experience using various unixes (including OSX).
What security “practices” do you think they stripped out, exactly?
I’ve been running unix a long time, and I’m not noticing any missing in OSX.
Note the exploit used here – a Java exploit. That affected Sun Java and OpenJava on every platform – exploits were published against this that hit OSX, Windows, Linux and Solaris (not *BSD, because nobody gives a damn about BSDs, but a *BSD that had that version of OpenJava would be exactly as vulnerable).
Apple has, if anything, added security to what FBSD started with; they added library address randomization – FBSD still doesn’t, according to everything I can find.
April 6th, 2012 at 9:52 am
Anything can get malware. All it takes is an idiot user and there’s no shortage of those.
April 6th, 2012 at 9:57 am
If they had stayed with the security practices of the BSD that osX is based on, there would be nearly as many vectors for malware to take root. That security has been stripped away in the name of usability, and replaced with… nothing.
April 6th, 2012 at 10:15 am
Don’t surf to russian porn sites and you’re not as likely to have those problems. 😉
April 6th, 2012 at 10:24 am
“Shhhh! Just don’t say anything to our Customers for ANOTHER 8 weeks and maybe it’ll go away! Besides, it’s ALL Google’s Fault!”
April 6th, 2012 at 11:01 am
Eh, it’s already dealt with and a represents a minuscule issue compared to the problems the competing product is fraught with.
Yawn.
April 6th, 2012 at 1:16 pm
Because it’s used in miniscule numbers compared to a competing product, Sebastian.
April 6th, 2012 at 3:20 pm
Yeah, and it so hard to get it cleaned out again too. I mean, they have to run the sofware updater, let the system apply the patch, and… uh… umm… go back to whatever they were doing.
April 6th, 2012 at 3:46 pm
It was only a matter of time before someone did a Java exploit. The way Apple handled Java was abysmal.
April 6th, 2012 at 5:22 pm
oddball: Specifics? Because that does not match my experience using various unixes (including OSX).
What security “practices” do you think they stripped out, exactly?
I’ve been running unix a long time, and I’m not noticing any missing in OSX.
Note the exploit used here – a Java exploit. That affected Sun Java and OpenJava on every platform – exploits were published against this that hit OSX, Windows, Linux and Solaris (not *BSD, because nobody gives a damn about BSDs, but a *BSD that had that version of OpenJava would be exactly as vulnerable).
Apple has, if anything, added security to what FBSD started with; they added library address randomization – FBSD still doesn’t, according to everything I can find.
April 8th, 2012 at 3:40 am
You really did have to ask for it to get it on your system though. From what I understand you have to install it.