{"id":4027,"date":"2006-08-24T17:51:30","date_gmt":"2006-08-25T00:51:30","guid":{"rendered":"http:\/\/bennett.com\/blog\/index.php\/archives\/2006\/08\/24\/speaking-of-cults\/"},"modified":"2006-08-24T17:51:30","modified_gmt":"2006-08-25T00:51:30","slug":"speaking-of-cults","status":"publish","type":"post","link":"https:\/\/bennett.com\/blog\/2006\/08\/24\/speaking-of-cults\/","title":{"rendered":"Speaking of Cults&#8230;"},"content":{"rendered":"<p>\t\t\t\tThe reaction of the Apple faithful to the disclosure of a security hole in the design of Apple OSX was amazing. A couple of guys figured out that you could trick OSX into executing some foreign code with root privilege by sending a malformed packet to a third-party wireless LAN card. The guys &#8211; David Maynor and Johnny Ellch &#8211; have been viciously attacked by the <a href=\"http:\/\/blogs.zdnet.com\/Ou\/?p=300\">Kool-Aid drinking Apple faithful:<\/a><\/p>\n<blockquote><p>\nI was absolutely shocked when I ran across these stories on Digg.  I had personally video interviewed Maynor and his partner Jon &#8220;Johnny Cache&#8221; Ellch and these two gentlemen were very honest and straightforward.  But as soon as I read the stories, the stench began to rise.  Maynor and SecureWorks had been telling the truth the entire time and they had falsified nothing.  The only falsification going on was the stories themselves!  Not only did Dalrymple and Chartier and others like them not follow the most basic of journalism principles to at least check with the source, they apparently didn&#8217;t even bother looking at the original video of David Manor released by SecureWorks.<\/p><\/blockquote>\n<p>The Faithful claim Maynor and Ellch alleged something they didn&#8217;t allege, and are therefore out to get Apple.<\/p>\n<p>The saga continues on <a href=\"http:\/\/blogs.zdnet.com\/Ou\/?p=304\">George Ou&#8217;s ZDNet blog today<\/a>. It seems to me that the flaw the dudes found depends on bad behavior from both the driver and the OS, and if it exists on one vendor&#8217;s product, it certainly can exist on others as well. So Apple and its faithful should simply fix the problem and stop smearing people.<\/p>\n<p>Is that too much to ask?\t\t<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The reaction of the Apple faithful to the disclosure of a security hole in the design of Apple OSX was amazing. A couple of guys figured out that you could trick OSX into executing some foreign code with root privilege by sending a malformed packet to a third-party wireless LAN card. The guys &#8211; David &hellip; <a href=\"https:\/\/bennett.com\/blog\/2006\/08\/24\/speaking-of-cults\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Speaking of Cults&#8230;&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[34],"tags":[],"class_list":["post-4027","post","type-post","status-publish","format-standard","hentry","category-home-networks"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbifyw-12X","_links":{"self":[{"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/posts\/4027","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/comments?post=4027"}],"version-history":[{"count":0,"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/posts\/4027\/revisions"}],"wp:attachment":[{"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/media?parent=4027"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/categories?post=4027"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/tags?post=4027"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}