Rosyna
About
- Username
- Rosyna
- Joined
- Visits
- 13
- Last Active
- Roles
- member
- Points
- 250
- Badges
- 1
- Posts
- 87
Reactions
-
Professor proves NAND mirroring attack thwarts iPhone 5c security protocols
hungover said:foggyhill said:Didn't we ALREADY know that. I actually knew that without even trying (because I'm a computer engineer).
That; why Apple changed it later.
It's not an easy attack though; if a person is doing that to your phone, I'm guessing you can spring for an Iphone 7...
Apple could have helped the FBI and then said "sorry guys, as much as we'd like to, we can't help you with any newer handsets" . Doing so would have been likely to have strengthened their case against future law enforcement demands and saved the public purse a shed load of money.
Apple was just to set a precedent so Apple couldn't refuse to help them in the future.
That's also why the FBI used a phone in PR that they knew had absolutely nothing of value on it. -
Secure WhatsApp found to not be completely eradicating chat transcripts
The fix would be for WhatsApp to either move to encrypted CoreData (as the article suggests) or, more simply, to just use the SQLite VACUUM command (https://www.sqlite.org/lang_vacuum.html) on the app tombstoning notification (https://developer.apple.com/library/ios/documentation/iPhone/Conceptual/iPhoneOSProgrammingGuide/StrategiesforHandlingAppStateTransitions/StrategiesforHandlingAppStateTransitions.html#//apple_ref/doc/uid/TP40007072-CH8-SW24) if any chats had been deleted.
The latter fix is more likely to occur with WhatsApp because it's almost trivial to adopt. -
Apple Xcode 8 beta now secured with digital signatures in .xip format
Where both the .zip and .dmg files have rudimentary checksums to warn the user that it may have been corrupted in transit, there are no safeguards against tampering.As of Mac OS X 10.11.5, the codesign tool supports signing disk images (https://developer.apple.com/library/prerelease/content/technotes/tn2206/_index.html#//apple_ref/doc/uid/DTS40007919-CH1-TNTAG18).
The purpose of the xip format and signed disk images isn't to prevent things like XcodeGhost, which was correctly stopped by Gatekeeper because the code signature was invalid. It's to exclude an app from the new App Translocation security feature (http://lapcatsoftware.com/articles/app-translocation.html) in Sierra. App Translocation was designed to fix a Gatekeeper vulnerability (http://arstechnica.com/security/2016/01/how-malware-developers-could-bypass-macs-gatekeeper-without-really-trying/) that allowed malicious actors to hijack signed (usually by Apple) applications by forcing them to load malicious external resources that are located in specific places on disk relative to the signed binary.
That is, the ability to use signed xip archives and signed disk images is only useful on Mac OS X 10.12 or later.
The reason why Xcode 8.0 beta is shipped as a xip and not in a signed disk image is because the Xcode beta is freakin' huge! After decompressing it, Xcode 8 comes in at over 12GB! As a disk image, you'd be required to have both the disk image and Xcode exist on disk at the same time because you'd have to download it, mount it, copy Xcode to /Applications (which requires the Disk Image framework to decompress Xcode while copying it), unmount the disk image, and then delete the original image.
A xip permits Archive Utility to do the decompression and deletion for you. If your Downloads folder is on the same volume as /Applications/, then only an additional move, not a copy, it required.
-
Apple's latest software updates fix flaw resembling Android Stagefright
cali said:Wait a f**ing minute. You mean a big similar to android was capable on iOS?
Stagefright is one of the biggest reasons why I defend iOS. Tell me it isn't the same only "similar" in a clickbait manner.
Can it be triggered without opening a message like StageFright?
The "passwords" thing only applied to Safari crashing when displaying the TIFF and it only had access to data in MobileSafari's address space (or APIs Safari had access to that didn't require XPC service privilege checks). This pretty much limited it to cookies and any websites you had visited with login forms visited during that Safari session (iOS frequently tombstones Safari in the background, which purges this memory).
Either way, it was announced after Apple had pushed out the update that fixed it. -
Apple tests Google's WebP for accelerated image loads in Safari