At 11:20 AM -0500 1/27/06, Kenneth R. van Wyk wrote:
> Interesting article, I suppose, but I'm not convinced of its conclusion:
> 
> http://www.eweek.com/article2/0,1895,1915923,00.asp
> 
> The article claims that Apple's use of Intel chips will result in more 
> software exploits because, "'Attackers have been focused on the [Intel] x86 
> for over a decade. Macintosh will have a lot more exposure than when it was 
> on PowerPC,' said Oliver Friedrichs, a senior manager at Symantec Corp. 
> Security Response."
> 
> I was hoping to find some hint of a hardware architectural feature that the 
> powerpc has that provided an additional means of protection, but the article 
> mentions none.  Instead, the only reason that it cites for the (presumed) 
> increase in software exploits is attackers' knowledge and experience base.
> 
> After all, didn't attackers also have access to powerpc systems to build 
> attacks on during the same timeframe that Symantec suggests?  Does the 
> powerpc architecture provide some inherent protection against (say) stack 
> smashing than the x86 does?
> 
> Am I missing something here?

The most charitable (to the writer of the article) interpretation I can
think of is that the sociopaths have experience dealing with BIOS and
that sort of thing.

But I do not know that Intel Macintoshes boot the same way Intel PCs
do -- certainly they have aspects to support MacOS running that are
missing from Intel PCs.
-- 
Larry Kilgallen
_______________________________________________
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php

Reply via email to