He who is nospam said on Mon, 04 Dec 2017 09:52:47 -0500:
>> Only an Apple apologist would say that logging into ROOT sans any password
>> is "not a big deal".
>
> it has nothing to do with apple.
It has *everything* to do with lack of software testing in the real world.
The word "shoddy" shows up a lot in news articles about Apple QA testing.
So does "appalling" and "nadir" when it comes to Apple software QA testing.
This bug PROVES beyond a shadow of a doubt that Apple doesn't test for even
the *simplest* of bugs in the real world. Because being root sans password
is just about as bad as it gets when it comes to computer operating systems
security.
> most people don't spend their time around untrustworthy people who
> would be trying to log in as root, no matter what system it is.
You Apple Apologists sure are funny people.
Try telling Linux_users being root sans password is not a security threat.
You'll apologize if each Mac contained a packet of Sarin for heaven's sake.
> if you live with people who would even consider that, let alone try it,
> then have much bigger problems.
How many MILLIONS of computers did this security vulnerability affect?
You're expecting us to believe that ALL of those millions of computers are
in a locked room behind closed and locked and guarded doors?
How dumb do you think people are to believe your nonsense.
You'll apologize if each Mac contained a packet of Sarin for heaven's sake.
> for me, not a single person in my household would be trying to log into
> root no matter what system it is, and that's pretty much the case for
> most households.
And you just vouched for the MILLIONS of places where Macs are used?
You really are an idiot sometimes - your Apple Apologies span the gamut.
You'll apologize if each Mac contained a packet of Sarin for heaven's sake.
> remote access is off by default (and is usually blocked by many isps
> anyway), so that vector is not viable either.
You'll apologize if each Mac contained a packet of Sarin for heaven's sake.
> it is a potential risk for businesses, where there are many computers
> that are easily accessible, but most employees are trustworthy and
> aren't going to hack their coworker's systems and risk getting caught
> and be out of a job.
You'll apologize if each Mac contained a packet of Sarin for heaven's sake.
> it's definitely a major oops, but it's been fixed.
You do realize they screwed up the patch, right?
> what matters is the response, which was a patch within 18 hours, most
> of that time was overnight.
Um.. See above. They screwed it up too.