IPhone Screengrab Issues

This is unfortunately another story we missed out on while we were trying to keep things from burning down. We told you that [Jonathan Zdziarski] was going to demonstrate iPhone lock code bypassing in a webcast. The real surprise came when he pointed out that the iPhone takes a screenshot every time you use the home button. It does this so it can do the scaling animation. The image files are presumably deleted immediately, but as we’ve seen before it’s nearly impossible to guarantee deletion on a solid state device. There’s currently no way to disable this behavior. So, even privacy conscious people have no way to prevent their iPhone from filling up storage with screenshots of all their text message, email, and browsing activities. Hopefully Apple will address this problem just like they did with the previous secure erase issue. O’Reilly promises to publish the full webcast soon.

[via Gizmodo]

IPhone 2.1 Firmware Jailbroken

The iphone-dev team seems to still be on top of their game. Only a day after the iPhone 2.1 firmware update was released, they’ve updated both the PwnageTool and QuickPwn to deal with the release. They haven’t begun work on the iPod Touch 2G yet, since no one on the team has one yet.

We tend to agree with Engadget; jailbreaking is becoming less and less important to casual users. Now average users can buy an iPhone in their own country and run apps from the official store. A much different place than we were only a year ago. We know most of our audience are power users though and definitely want out of Apple’s walled garden, but that’s only a small percentage of iPhone users.

EFiX USB Dongle Off To A Rocky Start

According to InsanelyMac forum member [qbattersby] the EFiX USB dongle he just received doesn’t seem to live up to expectations. We covered the EFiX when it was announced back in June. It’s designed to let you install OSX unmodified on commodity hardware. While using a MSI G965M motherboard, instead of installing OSX [qbattersby] was greeted with a flashing cursor with no option to continue onward.

A quick glance at the EFiX hardware compatibility chart does not list the MSI G965M as a board verified to work with the dongle and could explain [qbattersby] results. To his defense, he does explain that he will be testing it on a supported motherboard along with a retail copy of Leopard in the future. Hopefully, he will be able to post back that it works and his experience with the installation of Leopard.

While the EFiX seems to be shipping in some countries, enthusiasts in the US will have to wait a bit longer till distribution channels can be worked out.

One thing is for sure, if you do plan on going the EFiX route, make sure that the hardware you plan on using is listed on their site.

[via Engadget]

Mac Tablets Made By Fans


Macintosh makes a lot of wonderful pieces of technology, but they do not make a tablet. Pictured above is the Modbook, the closest you can currently get to a Mac tablet. Though not officially built by Apple, they are an Apple Premier Developer and that isn’t too shabby.

Several people have taken it upon themselves to fashion Mac tablets of their own, varying from extremely professional looking finishes down to duct tape and wire. Lets take a look at some of the more popular ones out there.

Continue reading “Mac Tablets Made By Fans”

ARDAgent.app Still Vulnerable


When Apple pushed their most recent security update, the first thing we checked was whether the ARDAgent issue was fixed. It’s not. This vulnerability lets anyone execute code as a privileged user and versions of this attack have already been found in the wild. While several Ruby, SMB, and WebKit issues were addressed it, ARDAgent is still unpatched. [Dino Dai Zovi] has published the method by which ARDAgent actually becomes vulnerable: when it starts, it installs its own Apple Event handlers and calls AESetInteractionAllowed() with kAEInteractWithSelf. This should restrict it only to its own events, but for some reason that’s not the resulting behavior. He also pointed out that SecurityAgent has displayed similar weirdness; it is vulnerable to Apple Events even though it doesn’t calls an Apple Events function. We can see how this unexpected behavior could make patch development take much longer and may end up uncovering an even bigger problem. Check out [Dino]’s post for more information.

Build A Twitter Client With Fluid


The Fluid Site Specific Browser (SSB) is one of our favorite pieces of kit for Leopard. You can use Fluid to give web services you use constantly like Gmail, Facebook, Wikipedia, or Pandora their own icon and a browser tailored to that site’s specific workflow. Fluid based on WebKit and has plugin support among many other features. Embedded above is [Eric Eggert] showing how to create a reasonable Twitter client using it. The initial setup is identical to any other Fluid app: point it at https://twitter.com/. The clever bit is leveraging Fluid’s GreaseMonkey style userscripting support. He created a userscript to autorefresh. A second userscript is used to strip off all of the extraneous page elements leaving just the text field and the timeline. Every time you get a new message it generates a growl notification and you can even attach it to the status bar. Best of all: it avoids all API limitations since you’re accessing through the web interface.

Neutering The Apple Remote Desktop Exploit


Yesterday, Slashdot reported a privilege escalation vulnerability in OSX. Using AppleScript you can tell the ARDAgent to execute arbitrary shell script. Since, ARDAgent is running as root, all child processes inherit root privleges. Intego points out that if the user has activated Apple Remote Desktop sharing the ARDAgent can’t be exploited in this fashion. So, the short term solution is to turn on ARD, which you can do without giving any accounts access privileges. TUAW has an illustrated guide to doing this in 10.4 and 10.5.