|Reverse engineering the macOS High Sierra supplemental update|
|By Thom Holwerda on 2017-10-09 19:26:19|
Reported by Matheus Mariano, a Brazilian software developer, a programming error was discovered in Apple’s most recent operating system, High Sierra, that exposed passwords of encrypted volumes as password hints. A serious bug that quickly made the headlines in technology websites everywhere.
Apple was prompt to provide macOS High Sierra Supplemental Update to customers via the App Store, and ensured that every distribution of High Sierra in their servers included this update.
I decided to apply a binary diffing technique to the update to learn more about the root cause of this bug and hypothesize about how the defect could have been prevented.
- Apple releases public beta of macOS Mojave - 2018-06-26
- The future of the Mac comes from iOS apps - 2018-06-07
- Apple deprecates OpenGL, OpenCL in macOS Mojave - 2018-06-05
- Apple will let developers port iOS apps to macOS in 2019 - 2018-06-04
- More related articles