TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Simple exploit completely bypasses Mac’s malware Gatekeeper

12 点作者 jeo1234超过 9 年前

1 comment

twoodfin超过 9 年前
Isn&#x27;t this basically &quot;working as intended&quot;?<p>Gatekeeper is not meant to eliminate security bugs in third party applications: Anyone can sign anything, there&#x27;s no review of your code by Apple. But if your app turns out to be malicious, Apple can revoke your certificate and now it&#x27;s blocked.<p>In this case, the relevant app isn&#x27;t malicious, but it will run arbitrary unsigned code that happens to be sitting next to it in its directory. It could just as well do something stupid like opening up an unprotected port and accepting shell commands.<p>It&#x27;s up to Apple to decide whether this flaw is egregious enough to add the developer to the CRL.<p>The article implies they&#x27;re investigating other mitigation strategies. I suppose there are options to block this particular scenario, but overall I can&#x27;t see how they can ensure that developer-signed code is vulnerability-free.