{"id":5769,"date":"2014-10-17T16:27:13","date_gmt":"2014-10-17T23:27:13","guid":{"rendered":"http:\/\/www.podfeet.com\/blog\/?p=5769"},"modified":"2024-12-15T19:18:47","modified_gmt":"2024-12-16T03:18:47","slug":"493-move-mouse-security-of-old-mac-chronicle-poodle-vulnerability-and-security-from-a-mac-users-point-of-view-with-george-starcher","status":"publish","type":"post","link":"https:\/\/www.podfeet.com\/blog\/2014\/10\/493-move-mouse-security-of-old-mac-chronicle-poodle-vulnerability-and-security-from-a-mac-users-point-of-view-with-george-starcher\/","title":{"rendered":"#493 &#8211; Move Mouse, Security of old Mac, Chronicle, POODLE Vulnerability, and Security from a Mac User&#8217;s Point of View with George Starcher"},"content":{"rendered":"<p><a href=\"http:\/\/www.bartb.ie\" target=\"_blank\">Bart Busschots<\/a> is guest-hosting the show this week. <a href=\"https:\/\/www.podfeet.com\/blog\/2014\/10\/movemouse\/\" title=\"How Can You Move the Mouse on a Mac a Precise Distance?\" target=\"_blank\">Allison tells the story of Move Mouse<\/a> &#8211; a Mac app written for a Nosillacastaway by a Nosillacastaway! Bart answers a great dumb question from listener Lynda on the security of old Macs, Ken Wolf from the Manhattan Repertory Theatre reviews Chronicle, Bart fills us in about the POODLE vulnerability that&#8217;s been in the news this week, Allison describes how you can become a hero with Clarify, and in Chit Chat Across the Pond Bart talk to <a href=\"http:\/\/www.georgestarcher.com\" target=\"_blank\">George Starcher<\/a> about security from a Mac user&#8217;s point of view.<\/p>\n<p><audio class=\"wp-audio-shortcode\" id=\"audio-5769-1\" preload=\"none\" style=\"width: 100%;\" controls=\"controls\"><source type=\"audio\/mpeg\" src=\"http:\/\/media.blubrry.com\/nosillacast\/traffic.libsyn.com\/nosillacast\/NC_2014_10_17.mp3?_=1\" \/><a href=\"http:\/\/media.blubrry.com\/nosillacast\/traffic.libsyn.com\/nosillacast\/NC_2014_10_17.mp3\">http:\/\/media.blubrry.com\/nosillacast\/traffic.libsyn.com\/nosillacast\/NC_2014_10_17.mp3<\/a><\/audio><br \/>\n<a href=\"http:\/\/phobos.apple.com\/WebObjects\/MZStore.woa\/wa\/viewPodcast?id=81677867\"><img loading=\"lazy\" decoding=\"async\" style=\"float: none;\" src=\"https:\/\/podfeet.com\/NosillaCast\/artwork\/itunes_subscribe_button.png\" alt=\"itunes\" width=\"125\" height=\"43\" \/><\/a><br \/>\n<a title=\"mp3 download\" href=\"http:\/\/media.blubrry.com\/nosillacast\/traffic.libsyn.com\/nosillacast\/NC_2014_10_17.mp3\" target=\"_blank\">mp3 download<\/a><\/p>\n<p><!--more--><\/p>\n<p>Hi folks, welcome to the NosillaCast Mac Podcast, hosted at podfeet.com, a technology geek podcast with an ever so light Macintosh bias. Today is Friday the 17th of October, and this is show number 493. I&#8217;m your guest host, Bart Busschots.<\/p>\n<p>You&#8217;re hearing my voice instead of Allison&#8217;s because herself and Steve are away celebrating their daughter&#8217;s wedding &#8211; I&#8217;m sure I speak for all the nosillacastaways when I wish the happy couple a long and happy union!<\/p>\n<p>Allison may be away, but that doesn&#8217;t mean she didn&#8217;t record some stuff for the show! We&#8217;ll start this episode with a review from Allison of an app written by one of our very own Nosillacastaways! Next we&#8217;ll have a dumb question from listen Lynda, then a review of an app called Chronicle from listener Ken Wolf of the Manhattan Repertory Theatre. They we get an un-scheduled security lite from me on the POODLE SSL vulnerability that&#8217;s making the media this week, then we hear form Allison again with ad for her favourite tutorial app, and finally security pro and Mac geek George Starcher joins me for Chit Chat Across the pond.<\/p>\n<h3><a href=\"https:\/\/www.podfeet.com\/blog\/2014\/10\/movemouse\/\" target=\"_blank\">Move Mouse (Blog Post)<\/a><\/h3>\n<h3>Dumb Question Corner<\/h3>\n<blockquote><p>\nHi Bart,<\/p>\n<p>I\u2019ve heard you say, many times, that older OS\u2019s are not secure, because they haven\u2019t been updated against current vulnerabilities.<\/p>\n<p>Is it possible that some older Mac OS systems, i.e. the first Mac OS X versions, and\/or OS9 might actually be secure because no one has written trojans, worms, etc. that would run on them, or they might be running really old versions of s\/ware that weren\u2019t vulnerable to modern exploits?<\/p>\n<p>I ask because one of my friends advocates letting some older folks running older Macs run what they have.  It\u2019s hard for some of the older people to change.  I\u2019ve always advocated having them update, but I\u2019d be interested in your thoughts on this.<\/p>\n<p>Thanks!<\/p>\n<p>Lynda\n<\/p><\/blockquote>\n<p>Thanks for the great question Lynda!<\/p>\n<p>The short version of the answer would be &#8220;it depends&#8221;.<\/p>\n<p>Ultimately this comes down to understanding and balancing risks.<\/p>\n<p>Firstly, there is a big difference between vulnerability and risk. Old OSes, no matter how old, ARE vulnerable, but, if you go back far enough, they may be low risk. A house with an unlocked door IS vulnerable, but the risk is very different for a house in the middle of a crowded city, and a house high in the mountains 100 miles from the nearest road!<\/p>\n<p>An important fact to understand is that a surprising amount of the code in our modern OSes is old, DECADES old! There is no money in re-inventing the wheel, so if it works, it would be a waste of resources to re-write it. If a bug is discovered in old code like this, it can go WAY back! A perfectly timed example of this is BASH vulnerability discovered this month, that bug is 15 years old, so every version of OS X with BASH contains the vulnerability (very very old versions of OS X used a different shell).<\/p>\n<p>Something else to bear in mind is that the closer two OSes are in age, the more code they have in common, so recently obsoleted OSes are the most likely to also be affected by recently discovered bugs. This means that an OS that&#8217;s a little out of date probably the most dangerous one to run.<\/p>\n<p>I would say that the single most dangerous thing to do would be to advise someone to stay on OS X 10.7 or 10.8 on a computer that is connected to the internet.<\/p>\n<p>If you go WAY back in time, you start to become part of such a small minority that you are unlikely to be targeted. You become the digital version of the unlocked house 100 miles from civilisation.<\/p>\n<p>Another BIG factor when analysing risk is the question of connectivity. If a computer is not connected to the internet, it is, for all intents and purposes, safe.<\/p>\n<p>My opinion, and it is just an opinion, is that the risk is probably tolerable if your computer is so old that it pre-dates Apple&#8217;s switch to Intel chips, or, the computer has no network connection. I think advising anyone to connect an out of date Intel Mac to the internet is irresponsible.<\/p>\n<p>But &#8211; having said all that &#8211; I refuse to have any part in anyone using an out of support OS. I advise all my friends and family against it, and feel strongly that if you want to use a computer, you have to understand that computers change. It may sound harsh, but I firmly believe that if you can&#8217;t accept change, you can&#8217;t safely use an internet connected computer.<\/p>\n<h3>Chronicle from Ken Wolf<\/h3>\n<p>Hi Bart, this is Ken Wolf from Manhattan Repertory Theatre with a review of Chronicle, a bill reminder app from Little Fin Software LLC.<\/p>\n<p>But first let&#8217;s start with the infamous problem to be solved. I, like everyone else, have bills that need to be paid. Now the problem is I&#8217;m old and so I forget things, and the problem is I&#8217;m busy and I get distracted and I forget things, so I need either an application or a person who will remind me to pay my bills on time. Since I can&#8217;t afford a personal assistant, Chronicle is my application of choice.<\/p>\n<p>The first thing you need to do when you open up Chronicle is to log in the information about your bills. You need to put the due date and the amount and all those little details. Once in, Chronicle does all the work.<\/p>\n<p>The interface is simple and easy to read. On the left, you have your bills with the average paid, the amount which is due and then the next due date. On the right you have the month at a glance, and you also have a listing of the bills that are due soon, bills that are due this month in terms of how much it&#8217;s going to be, and also the bills you have already paid this month in terms of the amount that you&#8217;ve paid. Down bottom, you can also list your income.<\/p>\n<p>When you pay a bill you simply log in the amount and then your bill goes down to the bottom of the column on the left.<\/p>\n<p>Chronicle has some interesting features. In the preferences, you can set up your overview columns with the average paid, the amount due, the balance and other things. And you can also set up a &#8220;Weekend Avoidance&#8221; which means that it will show the bill is due on Friday before a weekend so you don&#8217;t have to pay a bill on the weekend.<\/p>\n<p>You can set up when it will announce that a bill is due soon. It can be in 7 days or it can be in 1 day or it can be 12. You set it up so that it works for you. Also you can set it up so that in the dock or the menu bar, there is a little number that shows you how many bills are due. You can also enable notification reminders and default reminder settings saying you want to be reminded maybe three days before your bills are due and at a specific time. Basically, you can set up reminders so that they will work for you. <\/p>\n<p>Chronicle, also has an iOS app that syncs via Dropbox and it works seamlessly.<\/p>\n<p>The one caveat I have with this application is that when you&#8217;re logging in bills paid there will be a voiceover that says: &#8220;GOOD JOB!&#8221; &#8220;TERRIFIC!&#8221; &#8220;WELL DONE!&#8221; &#8220;CONGRATULATIONS!&#8221;<\/p>\n<p>Congratulations? Seriously? You are congratulating me because I am paying my $10.88 Photoshop bill? Hey, I want congratulations when I win an Oscar! So that feature is a little annoying. I just turn the sound down when I am logging in my paid bills.<\/p>\n<p>So if you need to be reminded about your bills, please check out Chronicle. It is only $9.99 right now on the Mac App Store. I think it&#8217;s on sale, and it is a great application and the iOS app is wonderful also.<\/p>\n<p>This is Ken Wolf from Manhattan Repertory Theatre in New York City signing off, and Bart, I just want to say I think you are the greatest and unique and what you do in your work with Allison and your work on your podcasts and on the other podcasts you&#8217;re on that I have listened to, is awesome! Thanks for covering for Allison this week.<\/p>\n<h3>Bad POODLE<\/h3>\n<p>This week <a href=\"http:\/\/arstechnica.com\/security\/2014\/10\/ssl-broken-again-in-poodle-attack\/\" target=\"_blank\">a vulnerability was discovered<\/a> in version 3 of the SSL protocol.<\/p>\n<p>We all know to look for the lock icon in our browser, which signifies that we are browser over HTTPS, the secure version of the HTTP protocol. When we see that icon, we assume our data is being securely sent, because, in theory, it is.<\/p>\n<p>As users, we usually don&#8217;t care about the fact that the HTTPS protocol supports the user of many different encryption protocols, and many different encryption cyphers under the hood. Our browsers support a set of protocols and cyphers, and every web server supports a set of protocol and cyphers, and when ever we connect to a HTTPS site, our browser and the server have a little negotiation to decide which protocols and cyphers to use for that connection.<\/p>\n<p>HTTPS supports more cyphers than you can shake a stick at, but only a handful of protocols. Since HTTPS first came into use in 1994, there have been just five such protocols &#8211; SSL 2, SSL 3, TLS 1, TLS 1.1, and TLS 1.2.<\/p>\n<p>SSL 1 was effectively a test version, and was never used for real, and SSL 2 has been known to be insecure for some time now, so it&#8217;s no longer used (or at least it shouldn&#8217;t be). Until this week, SSL 3 was still considered safe, but not anymore!<\/p>\n<p>The POODLE bug is a protocol flaw that has been discovered in SSL 3, and it allows attackers to decrypt supposedly secure connections. The fact that the problem is a flaw in the protocol rather than a flaw in a particular implementation of the protocol means that all implementations of SSL 3 are now unsafe. The only safe HTTPS is HTTPS that uses TLS rather than SSL.<\/p>\n<p>The fact that all versions of SSL are now unsafe means that all old browsers without TLS support are now dead. For the most part that doesn&#8217;t matter because no one is using ancient versions of Netscape or FireFox etc., but there is one very notable exception to this &#8211; the immortal IE 6! It should have died years ago, but as of this week, you HAVE to stop using IE 6 &#8211; it cannot do TLS, it is not safe anymore!<\/p>\n<p>So &#8211; what are we all going to do about this POODLE problem?<\/p>\n<p>Because HTTPS connections are negotiations, BOTH parties to a connection, i.e. the browser and the server, have to agree that SSL is OK for it to be possible for SSL to be used for a given connection.<\/p>\n<p>Like with heart bleed earlier this year, this means that responsible sysadmins have spent the last few days fixing their web servers by removing SSL from the list of protocols their servers will accept.<\/p>\n<p>But, unlike with heart bleed, this time we, as users, have the power to protect ourselves by removing SSL support from our browsers. For instructions visit <a href=\"https:\/\/scotthelme.co.uk\/sslv3-goes-to-the-dogs-poodle-kills-off-protocol\/\" target=\"_blank\">this link<\/a> (scroll down past the sever stuff to the section on protecting your browser).<\/p>\n<p>If you disable SSL in your browser, you are safe, because unless both sites agree to SSL, there can be no SSL!<\/p>\n<h3>Clarify<\/h3>\n<p>Listen as Allison interrupts us (again) to tell the tale of how she was able to very quickly help her friend fix a problem with audio not playing inside Safari.  She claims that in 35 seconds she was able to take three screenshots (one was a pulldown menu), drop in an arrow on one, draw a box around another and copy the whole thing in an email back to her friend. She was a hero. You too can be a hero by going to <a href=\"http:\/\/clarify-it.com\">clarify-it.com<\/a> and downloading the free trial.<\/p>\n<h3>Chit Chat Across the Pond<\/h3>\n<p>Bart&#8217;s guest this week is security pro <a href=\"http:\/\/www.georgestarcher.com\" target=\"_blank\">George Starcher<\/a>. Bart and George take a big-picture look at security from a Mac user&#8217;s point of view.<\/p>\n<h3>Closing<\/h3>\n<p>And with that another Nosillacast comes to an end. <\/p>\n<p>Thanks to everyone who sent in material for the show &#8211; you made my life a lot easier &#8211; as Ken Ray would say, you rock!<\/p>\n<p>Should you want to hear more from me, you can check out podcasts over at <a href=\"http:\/\/lets-talk.ie\" target=\"_blank\">lets-talk.ie<\/a>, I do a monthly Apple show called Let&#8217;s Talk Apple, and a monthly photography show called Let&#8217;s Talk Photography (aren&#8217;t I original!). If that&#8217;s not enough to satisfy your appetite for Irish accents, you can also hear, and even see, me on the latest Mac Jury (<a href=\"http:\/\/www.macvoices.com\/macvoices-14207-macjury-judges-apple-ipad-imac-mac-mini-yosemite-event\/\" target=\"_blank\">mac voices episode 14207<\/a>) where Chuck Joiner kindly invited me to chat with himself, Don McAlister, and Dr. Mac about this week&#8217;s Apple event.<\/p>\n<p>Congratulations again to Lindsay and Nolan, and until next time, Happy Computing!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bart Busschots is guest-hosting the show this week. Allison tells the story of Move Mouse &#8211; a Mac app written for a Nosillacastaway by a Nosillacastaway! Bart answers a great dumb question from listener Lynda on the security of old Macs, Ken Wolf from the Manhattan Repertory Theatre reviews Chronicle, Bart fills us in about [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[147,173,1],"tags":[],"class_list":["post-5769","post","type-post","status-publish","format-standard","hentry","category-blog-posts","category-nosillacast","category-podcasts"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/5769","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/comments?post=5769"}],"version-history":[{"count":1,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/5769\/revisions"}],"predecessor-version":[{"id":5770,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/5769\/revisions\/5770"}],"wp:attachment":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media?parent=5769"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/categories?post=5769"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/tags?post=5769"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}