@rosyna Where is that code running? And why wouldn’t it also be able to make the app ask the user which files to destroy, as you say?
-
-
@mjtsai the malicious code runs inside the legitimate app. That's how all flash exploits work. A user would notice an unusual dialog.0 replies 1 retweet 1 like -
@rosyna So you’re saying that the reason the Mac App Store requires sandboxing is to protect against Flash, which most apps don’t use?0 replies 0 retweets 0 likes -
@mjtsai No, it's to prevent bugs in the apps from being exploited and doing harm to other parts of the system.0 replies 0 retweets 1 like -
@rosyna But, aside from your example of Flash, where is the code that’s exploiting these bugs?0 replies 0 retweets 0 likes -
@mjtsai The bugs are in the apps. The malicious code is delivered multiple ways. Wikipedia has an article on RCE. https://en.wikipedia.org/wiki/Arbitrary_code_execution …0 replies 0 retweets 1 like -
@drewthaler@mjtsai That actually happened to Twitter for Mac OS X a few years ago due to an image parsing bug.0 replies 0 retweets 1 like -
@rosyna@drewthaler If that sort of thing is a major concern, Apple should offer lots more entitlements.0 replies 0 retweets 0 likes -
@mjtsai@drewthaler In which cases are the current sandbox rules of permitting an arbitrary path not enough?0 replies 0 retweets 0 likes
@rosyna @drewthaler I’m not just talking about file system access. But, re: files, really want to be able to fix ownership/permissions.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.
Michael Tsai
Rosyna Keller
Drew Thaler