Mac exploits are also not worth much on the open market. On Mon, Aug 3, 2009 at 11:17 PM, John Duncan Yoyo <johnduncany...@gmail.com>wrote:
> I think part of the reason the Mac gets taken first in PWN to OWN is that > it > is the only one worth the effort. > > On Sat, Aug 1, 2009 at 11:10 AM, mike <xha...@gmail.com> wrote: > > > Right...that's why OS X gets taken out every time first time at the pwn > to > > own. I know actual results and facts and stuff confudle you, but keep > > trying. > > > > On Sat, Aug 1, 2009 at 8:00 AM, TPiwowar <t...@tjpa.com> wrote: > > > > > On Jul 31, 2009, at 4:41 PM, mike wrote: > > > > > >> Too true. Marketshare in itself does not imply security or lack of. > > But > > >> logic does seem to dictate that those who go after the insecure OS's > go > > >> after the one with larger marketshare since they don't seem to go > after > > >> the > > >> one with smaller marketshare which has been proven to be no more > secure. > > >> As > > >> has been said time and time again, OS X is security by obscurity, not > by > > >> design. But the end result for the user is more security just the > same. > > >> > > > > > > 1) Why go for the unlikely explanation and tortuous logic when there is > a > > > direct and simple explanation? > > > > > > People find potential problems in all operating systems and > manufacturers > > > issue patches all the time. Potential is not actual. If you can't tell > > the > > > difference you are living in fantasy land. Meanwhile, Windows gets > > > compromised all the time and there are hundreds of real exploits in the > > > wild. As I mentioned earlier, the "I Love You" virus was huge and it > was > > > written by a student taking his first programming course. It takes not > > > genius to do this. Windows is exploited a lot because it is so easy. > > > > > > 2) You do your cause no credit by spouting untruths. > > > > > > Much of the Mac OS is open source UNIX. Apple's browser, Safari, is > > > open-source WebKit. Apache is open source. MySQL is open source. Etc. > > Etc. > > > Macs come loaded with open source software. It is not "security by > > > obscurity" it is security by good engineering. > > > > > > I was just reading in Politico about the con/neocon "birthers" and I > > could > > > not help making the connection with the false debating tactics and > > > obfuscations the WFBs spread in this List. Politico called it > "no-nothing > > > evasion" and "seeking shelter... behind rhetorical figments." I could > not > > > have said it better. > > > > > > > > > > > > > > > > > > > ************************************************************************* > > > ** List info, subscription management, list rules, archives, privacy > ** > > > ** policy, calmness, a member map, and more at http://www.cguys.org/** > > > > ************************************************************************* > > > > > > > > > ************************************************************************* > > ** List info, subscription management, list rules, archives, privacy ** > > ** policy, calmness, a member map, and more at http://www.cguys.org/ ** > > ************************************************************************* > > > > > > -- > John Duncan Yoyo > -------------------------------o) > > > ************************************************************************* > ** List info, subscription management, list rules, archives, privacy ** > ** policy, calmness, a member map, and more at http://www.cguys.org/ ** > ************************************************************************* > ************************************************************************* ** List info, subscription management, list rules, archives, privacy ** ** policy, calmness, a member map, and more at http://www.cguys.org/ ** *************************************************************************