Episode 65: Sensitive To Security

Manton and Daniel discuss the handling of critical App Store bug fixes, the evolution of App.net, and the challenge of preventing and detecting server-side hacking.

Download (MP3, 41 minutes, 19 MB)

Links for this show:

  • Stream Marker – New Tweet Marker-style timeline sync service from App.net.
  • Netbot – App.net client app from Tapbots.
  • Dropbox, Evernote, Google Drive – Cloud-based storage services.
  • Tripwire – Unix-based security tool for detecting changes to files.
  • My Epic Hacking – Mat Honan’s terrible ordeal being hacked on many fronts.

Sponsored by Mutual Mobile: Want to bring stunning iOS interfaces to life? We’re hiring in Austin, TX.

November 14, 2012 at 3:00 pm. permalink.--> 3 comments

3 Responses to “Episode 65: Sensitive To Security”

  1. spacer Thomas Edelmann says:
    November 15, 2012 at 7:45 am

    Congrats for your “expedited review” ;)

    I can’t speak of MacOS, but for iOS I think it’s a little different. If a customer updated one device before your “app store removal”, it is also available for his other devices (iPhones/iPads).

    Greetings from Germany,
    Thomas

  2. spacer Joe Manich says:
    November 16, 2012 at 12:32 pm

    Guys, thanks for a great podcast. I manage developers and I’m confronted right now with the situation that the IT department, in order to better protect us, installed software that allows you to run only executables that are in a whitelist of approved.

    Side effect of this is that they are are perplexed at the number of open source tools used by us in our daily work. They sited for example that we have 15 different DIFF programs (we really do not, but BIT9 things that DIFF 1.0 is different from 1.1, which from a threat level perspective maybe so, but….

    My point to them was: do we have a documented instance when the root source of an infection was an open source tool?

    Can you guys comment on how credible this threat is?

  3. spacer Manton Reece says:
    November 18, 2012 at 1:34 pm

    Thanks Thomas! That’s closer to what I was remembering, too. So maybe it’s different on the Mac, or there is something subtle about new versions vs. installing an existing version on other devices. (Neither makes much sense, but nothing would surprise me about this either.)

    I remembered reading a blog post that covered some of this, and just found it. It’s by David Smith and what’s especially interesting is the updated text. Apparently Apple has changed this behavior. david-smith.org/blog/2012/06/20/hacking-paid-upgrades/

Leave a Reply

Click here to cancel reply.

Subscribe to the comments RSS feed for this entry.

gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.