(no title)
samyk | 11 years ago
In my example, we interestingly see how by default, OS X does not require additional permissions in this unique scenario. Crazy!
samyk | 11 years ago
In my example, we interestingly see how by default, OS X does not require additional permissions in this unique scenario. Crazy!
totony|11 years ago
The exploits that could lead to privilege escalation are a different matter (imo they should be fixed).
This hack is very relevent for personal computers, where the user account (in windows i.e.) is an admin and plugging in a USB device does not seem as dangerous as you demonstrated it is.
lukeholder|11 years ago
samyk|11 years ago