| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: How Apple orchestrated web attack on researchers |
From: Adam <""4thwormcastfromthemolehill\"{at}the field.near
the bridge">
Rich Gauszka wrote:
> Interesting read - details, emails etc at link
>
> http://blogs.zdnet.com/Ou/?p=451
>
> Last summer, when I wrote "Vicious orchestrated assault on MacBook wireless
> researchers," it set off a long chain of heated debates and blogs. I had
> hoped to release the information on who orchestrated the vicious assault,
> but threats of lawsuits and a spineless company that refused to defend
> itself meant I couldn't disclose the details. A lot has changed since then:
> Researcher David Maynor is no longer working for SecureWorks, and he's
> finally given me permission to publish the details.
>
>
"David,
Below is the note we drafted about the MacBook exploit confusion.
Please confirm that you've received this and will post it without text
changes on your blog and front and center on SecureWorks' news & events
page tonight. The placement of this post should be as prominent as the
initial announcement of the exploit demo at Black Hat.
You are welcome to call me on my cell at 415-###-#### if you need to
discuss any further.
Thanks,
Lynn
For the Record: MacBook is not inherently vulnerable to Black
Hat-demonstrated exploit
By David Maynor
I want to clarify something about the wifi device driver exploit we
demonstrated at Black Hat in Las Vegas a couple weeks ago.
Confusion has mounted as to whether the exploit I demoed at Black Hat and
for Brian Krebs of the Washington Post is reliant the use of a third party
driver. In short, the answer is yes. The MacBook is not inherently
vulnerable to the attack, and I never said that it was.
Part of the confusion lies in the fact that we have not specifically named
the third-party device driver; this is because we know that the vendor is
working on a patch and we don't want to release the name of the chipset
until the fix is in place.
I hope this clears up some of the confusion. Stay tuned for a live demo of
this exploit live at Toorcon."
I love the "Please confirm that you've received this and will post it
without text changes on your blog" where the "piece" reads:
"For the Record: MacBook is not inherently vulnerable to Black
Hat-demonstrated exploit
By David Maynor
"
Isn't that basic fraud on behalf of this Fox person?
Adam
--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)SEEN-BY: 633/267 @PATH: 379/45 1 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.