TIP: Click on subject to list as thread! ANSI
echo: osdebate
to: Adam
from: Rich Gauszka
date: 2007-03-21 15:55:08
subject: Re: How Apple orchestrated web attack on researchers

From: "Rich Gauszka" 


"Adam" <""4thwormcastfromthemolehill\"{at}the
field.near the bridge"> wrote in message
news:46018a65$1{at}w3.nls.net...
> Rich Gauszka wrote:
>> Interesting read - details, emails etc at link
>>
>> http://blogs.zdnet.com/Ou/?p=451
>>
>> Last summer, when I wrote "Vicious orchestrated assault on MacBook
>> wireless
>> researchers," it set off a long chain of heated debates and
blogs. I had
>> hoped to release the information on who orchestrated the vicious assault,
>> but threats of lawsuits and a spineless company that refused to defend
>> itself meant I couldn't disclose the details. A lot has changed since
>> then:
>> Researcher David Maynor is no longer working for SecureWorks, and he's
>> finally given me permission to publish the details.
>>
>>
>
> "David,
>
> Below is the note we drafted about the MacBook exploit confusion.
>
> Please confirm that you've received this and will post it without text
> changes on your blog and front and center on SecureWorks' news & events
> page tonight. The placement of this post should be as prominent as the
> initial announcement of the exploit demo at Black Hat.
>
> You are welcome to call me on my cell at 415-###-#### if you need to
> discuss any further.
>
> Thanks,
> Lynn
>
> For the Record: MacBook is not inherently vulnerable to Black
> Hat-demonstrated exploit
> By David Maynor
>
> I want to clarify something about the wifi device driver exploit we
> demonstrated at Black Hat in Las Vegas a couple weeks ago.
>
> Confusion has mounted as to whether the exploit I demoed at Black Hat
> and for Brian Krebs of the Washington Post is reliant the use of a third
> party driver. In short, the answer is yes. The MacBook is not inherently
> vulnerable to the attack, and I never said that it was.
>
> Part of the confusion lies in the fact that we have not specifically
> named the third-party device driver; this is because we know that the
> vendor is working on a patch and we don't want to release the name of
> the chipset until the fix is in place.
>
> I hope this clears up some of the confusion. Stay tuned for a live demo
> of this exploit live at Toorcon."
>
> I love the "Please confirm that you've received this and will post it
> without text changes on your blog" where the "piece" reads:
>
> "For the Record: MacBook is not inherently vulnerable to Black
> Hat-demonstrated exploit
> By David Maynor
> "
>
> Isn't that basic fraud on behalf of this Fox person?
>
> Adam

I'm sure Apple will conduct an internal investigation and clear themselves
of all wrong doing just as they did with the falsification of stock options
for Jobs.

And if you believe that Apple has an iBridge for sale

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267
@PATH: 379/45 1 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.