Path: csiph.com!optima2.xanadu-bbs.net!xanadu-bbs.net!nntp.club.cc.cmu.edu!micro-heart-of-gold.mit.edu!bloom-beacon.mit.edu!bloom-beacon.mit.edu!panix!MIX!Blackbird From: billy@MIX.COM Newsgroups: comp.sys.mac.system Subject: Re: "Unhackable" Apple Confirms Malware-Infected Apps Found And Removed From Its Chinese App Store Date: Tue, 22 Sep 2015 22:11:27 +0000 (UTC) Organization: PANIX Public Access Internet and UNIX, NYC Lines: 38 Message-ID: References: <86549329f10d815d2e5922dee68cf94a@anemone.mooo.com> <210920151816339085%nospam@nospam.invalid> NNTP-Posting-Host: panix5.panix.com X-Trace: reader2.panix.com 1442959887 2095 166.84.1.5 (22 Sep 2015 22:11:27 GMT) X-Complaints-To: abuse@panix.com NNTP-Posting-Date: Tue, 22 Sep 2015 22:11:27 +0000 (UTC) Xref: csiph.com comp.sys.mac.system:80177 In comp.sys.mac.system Jolly Roger wrote: > And you are using a pirated copy of Xcode? No. > # spctl --assess --verbose /Applications/Xcode.app > /Applications/Xcode.app: accepted > source=Mac App Store Yea, but the app store blows. As but one example, last night I downloaded a copy of 10.10.5 (had to before it goes away forever). I also just happened to have a copy of the 10.10.3 GM Candidate on the same machine. Guess where the app store put 10.10.5? In the very same app dir, _without_ changing its name, and _without_ changing the comments IDing it as 10.10.3. NB this was not in the Applications dir, but a completely separate one (/Uninstalled Software). This is somewhat similar to 10.9 finding runnable programs anywhere in a filesystem, and offering to or actually running them, even when that is not the wanted behavior. If anyone's figured out how to croak that, I'd love to hear about it. So.. I get, to the fullest extent possible, all the tools I need from the developer web site. Sadly, less and less of them are being made available there. Billy Y.. -- sub #'9+1 ,r0 ; convert ascii byte add #9.+1 ,r0 ; to an integer bcc 20$ ; not a number