Macs and the Pwn2Own contest

To counter a post by someone I respect is hard, but given the subject I thought it best to throw in my hat.  The recent CanSecWest conference has a contest where security experts are given monetary incentive to break into three separate systems – Linux, Vista, OS X.  Now the rules are to use a non-published vulnerability.  The MacBook air was the first one down, using an already published Safari bug.  So, in my remote mind (and not actually at the conference) the hack was not pure or new.

Beyond general denial, I thought it important to point out that EVERYONE of the attackers (at least in the picture) are running Macbooks!  So, while there may exist a vulnerability… if it is good enough for the Leet it should be good enough for the common people.

Just a thought…

Advertisements

About J.D.

Passionate about CrossFit, mindset, bettering each other, technology, and the intersection of cybersecurity with products. The online views and posts represent my journey of discovery and learning.
This entry was posted in Mac, Technology and Gadgets. Bookmark the permalink.

2 Responses to Macs and the Pwn2Own contest

  1. Pingback: JJD on Mac | Security Balance

  2. Seth says:

    Where did you hear he used a published vulnerability? It would have to be a new bug to qualify and from the sound of it, there were others there with different findings that would have qualified even if that one had not (someone just demo’ed a QT 0day during a lightning talk I read), so I doubt they’d let a published bug win when it wasn’t allowed.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s