@mjtsai That Wil Shipley update misunderstands sandboxes completely. They are not designed to prevent malware. They are to mitigate exploits
@rosyna Where is that code running? And why wouldn’t it also be able to make the app ask the user which files to destroy, as you say?
-
-
@mjtsai the malicious code runs inside the legitimate app. That's how all flash exploits work. A user would notice an unusual dialog. - View other replies
-
@rosyna So you’re saying that the reason the Mac App Store requires sandboxing is to protect against Flash, which most apps don’t use? -
@mjtsai No, it's to prevent bugs in the apps from being exploited and doing harm to other parts of the system. - View other replies
-
@rosyna But, aside from your example of Flash, where is the code that’s exploiting these bugs? -
@mjtsai The bugs are in the apps. The malicious code is delivered multiple ways. Wikipedia has an article on RCE. https://en.wikipedia.org/wiki/Arbitrary_code_execution … - View other replies
-
-
@drewthaler@mjtsai That actually happened to Twitter for Mac OS X a few years ago due to an image parsing bug. - View other replies
-
@rosyna@drewthaler Even for things that would never be approved in the Mac App Store, so that every Developer ID app can be sandboxed. - View other replies
- Show more
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.
Rosyna Keller
Michael Tsai
Drew Thaler