Each of these Mac OS exploits require that the end user install something on 
their computer, or allow it. As far as the doorstop comparison, well that 
comment is a bit of a red herring now isn't it? Brand new computers with 
current AV definitions and a completely updated OS involves "some degree of 
risk". 

My point is that if you use a computer in such a way that it performs it's job 
as it always has, an internal SQL server with no exposure to the internet for 
example, then all other things being equal, it's not obsolete by a certain 
definition. 

I guess I am saying that what different people mean by obsolete varies 
depending on the application. A developer who wants to continue using a 
workstation that no longer runs the current version of LC, but that developer 
wants the new features of said current version, could be said to be running an 
obsolete OS. If he doesn't need those new features, the device can be said to 
be viable. 

Bob S

> On Jul 11, 2018, at 17:54 , Richard Gaskin via use-livecode 
> <use-livecode@lists.runrev.com> wrote:
> 
>   But Wardle has shown that the vulnerability allows an attacker
>   to grab and steal every password in plain-text using an unsigned
>   app downloaded from the internet, without needing that password.


_______________________________________________
use-livecode mailing list
use-livecode@lists.runrev.com
Please visit this url to subscribe, unsubscribe and manage your subscription 
preferences:
http://lists.runrev.com/mailman/listinfo/use-livecode

Reply via email to