Links...
 
Tighten Pro
C/C++/Cocoa tool for codesign security, Developer ID, & Mac App Store Receipt Validation

Tighten Pro - in the Mac App Store

Tighten Pro is now available in the Mac App Store. Simply click on the icon to the left to purchase directly from Apple. Or choose PKCS#7Viewer.app by clicking the image to the right.

8.31.2014
Mac Developer: 9to5Mac: Apple iPhone, Mac and iPad News Breaking All Day

9to5Mac: Apple iPhone, Mac and iPad News Breaking All Day: "As noticed by Apfelpage, Apple has published a new page to be more open about why it rejects apps. A chart at the bottom of the page shows the top ten reasons for app rejection in the last seven days; such as lack of information, crashes or bugs encountered, complicated user interfaces."
"Watch your parking meters." - Bob Dylan

Labels:

By : Tighten 9to5Mac: Apple iPhone, Mac and iPad News Breaking All Day 0 comments

8.23.2014
Mac Developer: BBC News - Gmail smartphone app hacked by researchers

BBC News - Gmail smartphone app hacked by researchers: "This shared memory is used by all apps, and by analysing its use the researchers were able to tell when a user was logging into apps such as Gmail, giving them the opportunity to steal login details and passwords."
Sounds like everyone is going to have zero memory when it's deallocated.

Labels:

By : Tighten BBC News - Gmail smartphone app hacked by researchers 0 comments

8.22.2014
Mac Developer: 9to5Mac: Apple iPhone, Mac and iPad News Breaking All Day

9to5Mac: Apple iPhone, Mac and iPad News Breaking All Day: "Following a recent ruling that Apple would have ten days to remove the anonymous social app Secret from its Brazilian App Store, Apple has complied with the order. The"
Ah, the benefits of centralized control.

Labels: ,

By : Tighten 9to5Mac: Apple iPhone, Mac and iPad News Breaking All Day 0 comments

8.19.2014
Mac Developer: Confirmed: Security breach is not reason for Gatekeeper app signing changes | 9to5Mac

Confirmed: Security breach is not reason for Gatekeeper app signing changes | 9to5Mac
We’ve now confirmed with sources close to the situation that there is no truth to the rumors and that a Dev Center breach was not the reason behind the Gatekeeper app signing changes.


In other words, it's just a worthless change (read: everybody churn!) aimed at making life difficult for 3rd party ISV's which, unlike Apple, do not have unlimited capital with which to hire engineers, do testing and so forth. Should be very popular with enterprise developers.

By : Tighten Confirmed: Security breach is not reason for Gatekeeper app signing changes | 9to5Mac 0 comments

Mac Developer: Spies used YouTube videos and Microsoft log-ins to take over devices

Spies used YouTube videos and Microsoft log-ins to take over devices: "The study names Hacking Team and FinFisher as two of the companies that sell law enforcement agencies 'network-injection' technologies like this for around $1 million dollars. In fact, Italian company Hacking Team is known for developing software to spy on people's emails, phone calls and the like specifically for sale to law enforcement in countries not blacklisted by NATO."
Like a blacklist is going to prevent the movement of software!

Labels: ,

By : Tighten Spies used YouTube videos and Microsoft log-ins to take over devices 0 comments

8.13.2014
Mac Developer: Surveillance leak shows spyware loves Android, but can't infect Apple's iPhones without jailbreak

Surveillance leak shows spyware loves Android, but can't infect Apple's iPhones without jailbreak: "The regularly updated software tool supports all releases of Android, devices running BlackBerry OS prior to the newest BB10, Symbian and Windows Mobile phones, but notes that in order to spy on an iPhone, the user must jailbreak their device, a step that disables Apple's security. "
At last, some good news.

Labels:

By : Tighten Surveillance leak shows spyware loves Android, but can't infect Apple's iPhones without jailbreak 0 comments

8.08.2014
Mac Developer: BBC News - US should pay hackers who find threats, says analyst

BBC News - US should pay hackers who find threats, says analyst
Dan Geer said large bounties would prevent the vulnerabilities from ending up in the hands of criminal gangs or hostile authorities.


Have hackers ever been motivated by money?

Labels:

By : Tighten BBC News - US should pay hackers who find threats, says analyst 0 comments

8.06.2014
Mac Developer: 'Canvas fingerprinting' has a new enemy, and its name is Ghostery | VentureBeat | Security | by Richard Byrne Reilly

'Canvas fingerprinting' has a new enemy, and its name is Ghostery | VentureBeat | Security | by Richard Byrne Reilly: "Critically, canvas fingerprinting cannot be blocked by refusing or deleting browser cookies, which is what most tracking tools use. Although canvas fingerprinting works on both desktop and mobile, it thrives in the former, because the technology is older."
All signs point to the browser as the main security vulnerability.

Labels:

By : Tighten 'Canvas fingerprinting' has a new enemy, and its name is Ghostery | VentureBeat | Security | by Richard Byrne Reilly 0 comments

8.05.2014
Mac Developer: Master Control Program

Are you sure it's what you want? A centralized control of everything in the system? Such a thing is necessarily brittle. Nothing can stop open systems: like water, it will flow into the future regardless as to the barriers.

By : Tighten Master Control Program 0 comments

8.04.2014
Mac Developer: Apple changing Gatekeeper app signing rules in OS X 10.9.5 & Yosemite, could break some apps | 9to5Mac

Apple changing Gatekeeper app signing rules in OS X 10.9.5 & Yosemite, could break some apps | 9to5Mac: "For users, this will add an extra layer of annoyance when dealing with certain third-party apps, especially those downloaded from the web rather than through the Mac App Store."
Pretty soon, dealing with publishing requirements will take more time than developing applications. Great news for crap developers that wrap HTML5 in WebViews!

Labels: ,

By : Tighten Apple changing Gatekeeper app signing rules in OS X 10.9.5 & Yosemite, could break some apps | 9to5Mac 0 comments

8.03.2014
Mac Developer: BBC News - Wearable users tracked with Raspberry Pi

BBC News - Wearable users tracked with Raspberry Pi: People who use wearable gadgets to monitor their health or activity can be tracked with only $70 (£40) of hardware, research suggests. The work, carried out by security firm Symantec, used a Raspberry Pi computer to grab data broadcast by the gadgets. The snooping Pi was taken to parks and sporting events where it was able to pick out individuals in the crowds.
I'm sure the situation is much worse than you'd expect because embedded systems on these kinds of devices are rarely scrutinized like desktop and mobile operating systems.

Labels: , ,

By : Tighten BBC News - Wearable users tracked with Raspberry Pi 0 comments

Mac Developer: 'BadUSB' malware lives in USB firmware to remain undetected, unfixable

'BadUSB' malware lives in USB firmware to remain undetected, unfixable: "As there is no easy fix to malware like BadUSB, the researchers suggest users adopt a new way of thinking about USB hardware. Instead of thoughtlessly transporting files and other data back and forth between machines, Nohl and Lell recommend connecting only to known devices that are user-owned or trusted. "
Goodbye USB, hello my old friend FireWire.

Labels: ,

By : Tighten 'BadUSB' malware lives in USB firmware to remain undetected, unfixable 0 comments

7.30.2014
Mac Developer: Russia requests Apple provide access to source code | 9to5Mac

Russia requests Apple provide access to source code | 9to5Mac: "Reuters reports that Russia has asked Apple to provide the government with access to the company’s source code to make sure its iOS devices and Macs aren’t used for spying.
This is weirdly hilarious and disturbing at the same time.

Labels:

By : Tighten Russia requests Apple provide access to source code | 9to5Mac 0 comments

7.29.2014
Mac Developer: BBC News - Android Fake ID bug exposes smartphones and tablets

BBC News - Android Fake ID bug exposes smartphones and tablets
BlueBox Labs said it was particularly concerning as phone and tablet owners did not need to grant the malware special permissions for it to act.


If this is true, then essentially Android devices do not have codesigning protection. Sounds like any app can use a self-signed certificate chain to spoof the identifier of a well-known manufacturer. I guess the good news is they are fixing the bug.

Labels: , , , ,

By : Tighten BBC News - Android Fake ID bug exposes smartphones and tablets 0 comments

7.15.2014
Mac Developer: Apple begins encrypting iCloud email sent between providers | 9to5Mac

Apple begins encrypting iCloud email sent between providers | 9to5Mac
The change is documented on Google’s transparency website that shows the percentage of emails encrypted in transit for both inbound and outbound email exchanges


I can't tell if the world is changing or if we all simply woke up and smelled the malware.

Labels:

By : Tighten Apple begins encrypting iCloud email sent between providers | 9to5Mac 0 comments

7.13.2014
Mac Developer: Crypto certificates impersonating Google and Yahoo pose threat to Windows users | Ars Technica

Crypto certificates impersonating Google and Yahoo pose threat to Windows users | Ars Technica: "A blog post published Tuesday by Google security engineer Adam Langley said the fraudulent transport layer security (TLS) certificates were issued by the National Informatics Centre (NIC) of India, an intermediate certificate authority that is trusted and overseen by India's Controller of Certifying Authorities (CCA)."
My personal opinion is that many of the so-called trusted technologies that are in use on the internet have never really been properly audited or stress-tested. It's only as the malware networks reap their rewards that anyone is paying any real attention to exploits. Software is complex and hard to debug and it gets much worse when you consider a heterogenous system such as the global internet. On the plus side, a truly heterogenous system based on standards says that someone is going to emerge as a clear leader in this area.

I personally think the monolithic bloatware OS is going to be superseded in the coming years by something very minimalistic. Maybe a hypervisor. Something so small it can be completely tested and debugged.

This mad race to add OS features isn't really serving anyone. Except the marketers. In other words, people who don't have any vested long-term interest in the integrity of a user's experience. Just as long as the gloss is still the most prevalent consideration.

Oh, wait. Icon gloss has been deprecated for flat minimalistic design. By design I mean fashion fad.

Labels: , ,

By : Tighten Crypto certificates impersonating Google and Yahoo pose threat to Windows users | Ars Technica 0 comments

7.11.2014
Mac Developer: Malwarebytes takes in $30M, its first round since launching in 2008 | VentureBeat | Deals | by Richard Byrne Reilly

Malwarebytes takes in $30M, its first round since launching in 2008 | VentureBeat | Deals | by Richard Byrne Reilly: "It is an astonishing tale that continues to amaze. Today, Malwarebytes’ anti-virus security software protects the computers and mobile devices of more than 206 million clients who are fiercely loyal, employs 140 — 90 of whom occupy R&D roles — and will soon begin acquiring smaller players in the space."
The number of malware attacks per minute is troubling.

Labels:

By : Tighten Malwarebytes takes in $30M, its first round since launching in 2008 | VentureBeat | Deals | by Richard Byrne Reilly 0 comments

7.05.2014
Mac Developer: Inside App Extensions: the Cloud Kit-savvy Photos future of Apple's iPhoto & Aperture

Inside App Extensions: the Cloud Kit-savvy Photos future of Apple's iPhoto & Aperture
At the same time, the fact that Extensions are always bundled in an app means that developers can deploy new Extensions as an app update (allowing Instagram to make its filters available in Photos, for example), and sell Extensions as an additional feature for their existing apps.


Even though everyone is articulating the idea that XPC is some new technology, it's really just a security-wise reworking of distributed objects. Which is great. Because DO is a terrific tool for Objective-C developers. The fact that it is coming to iOS is awesome. It signals the end of the era of monolithic iOS apps and the beginning of something entirely new.

Labels: , ,

By : Tighten Inside App Extensions: the Cloud Kit-savvy Photos future of Apple's iPhoto & Aperture 0 comments

6.28.2014
Mac Developer: genkiyooka/MacRuntimeSandboxDetection

genkiyooka/MacRuntimeSandboxDetection
For CFPlugIn and AudioUnit developers - how to check Mac App Store sandbox capabilities at runtime.


If you write system components (i.e. CoreAudio AudioUnit), CFPlugIn bundles or loadable Cocoa frameworks which are shared among applications (like haxies), you may wish to detect the capabilities of the sandbox environment into which you've been loaded so you can gracefully disable features and so forth.

Naive implementations of such loadable code often dump huge volumes of system messages into the Console.log - not useful to anyone.

Labels: , , , , , ,

By : Tighten genkiyooka/MacRuntimeSandboxDetection 0 comments

Mac Developer: Secure Coding Guide: Introduction to Secure Coding Guide

Secure Coding Guide: Introduction to Secure Coding Guide
The document begins with “Types of Security Vulnerabilities,” which gives a brief introduction to the nature of each of the types of security vulnerability commonly found in software. This chapter provides background information that you should understand before reading the other chapters in the document. If you’re not sure what a race condition is, for example, or why it poses a security risk, this chapter is the place to start.


A good overview that just popped up on my radar.

Labels: , ,

By : Tighten Secure Coding Guide: Introduction to Secure Coding Guide 0 comments

6.16.2014
Mac Developer: Fully Countering Trusting Trust through Diverse Double-Compiling (DDC) - Countering Trojan Horse attacks on Compilers

Fully Countering Trusting Trust through Diverse Double-Compiling (DDC) - Countering Trojan Horse attacks on Compilers
In the DDC technique, source code is compiled twice: once with a second (trusted) compiler (using the source code of the compiler’s parent), and then the compiler source code is compiled using the result of the first compilation. If the result is bit-for-bit identical with the untrusted executable, then the source code accurately represents the executable.


You are in a maze of twisty passages, all alike.

Labels:

By : Tighten Fully Countering Trusting Trust through Diverse Double-Compiling (DDC) - Countering Trojan Horse attacks on Compilers 0 comments

Mac Developer: Who Is Paunch? — Krebs on Security

Who Is Paunch? — Krebs on Security
“As I have done before, I am asking all the users as well as IT Security professionals to disable all plug-ins and add-ons in their browsers,” Fedotov warned forum members. “Do not think that if you are not users of Internet money (web money), there is no danger of being infected. In this case, the infected PCs are turned into socks proxies, spam/ddos bots and all the bad activity is done under your name, so that law enforcement can place all the blame on your shoulders. Safe surfing and good luck to you.”


I think this means you.

Labels: ,

By : Tighten Who Is Paunch? — Krebs on Security 0 comments

Mac Developer: Open Threat Exchange (OTX) | AlienVault

Open Threat Exchange (OTX) | AlienVault
AlienVault Open Threat Exchange (OTX™) is an open threat information sharing and analysis network, created to put effective security measures within the reach of all organizations.


This is a terrific idea.

Labels:

By : Tighten Open Threat Exchange (OTX) | AlienVault 0 comments

6.12.2014
Mac Developer: Russian malware creators rule. Here's how they got so good | VentureBeat | Security | by Richard Byrne Reilly

Russian malware creators rule. Here's how they got so good | VentureBeat | Security | by Richard Byrne Reilly: "Eastern Europe, in particular Russia, is the malware capital of the world. That’s the assertion of Adam Kujawa, a former Navy cryptologist and head of malware intelligence for Malwarebytes, a growing San Jose security outfit that has 100 employees and was originally founded in the windswept Baltic country of Estonia."
Interesting read.

Labels: ,

By : Tighten Russian malware creators rule. Here's how they got so good | VentureBeat | Security | by Richard Byrne Reilly 0 comments

6.08.2014
Mac Developer: A programmer's view of Apple's new Swift language | VentureBeat | Dev | by Richard Byrne Reilly

A programmer's view of Apple's new Swift language | VentureBeat | Dev | by Richard Byrne Reilly
Objective-C is great and really powerful. It has served Apple well for a really long time. It’s older than the web though. It is pretty awkward to learn – especially for someone new to programming.

No real plans to change to Swift here, but Metal is definitely on the whiteboard. Of course, at same time, love them tuples and other innovative new language features (Yay! I watched the Advanced Swift WWDC talk). And I will much enjoy watching new programmers getting very confused over the difference between structs and classes.

I will use Swift for small tasks. Although I suppose if I'm going to learn a new language it might as well be C#. That mono runtime is really slutty.

Although I do think there are some merits to eliminating header files (Modula-2 "Interface"), I think it would be good to have an option. Really the last thing I want to do when studying a module's interface is read implementation details.

Labels: ,

By : Tighten A programmer's view of Apple's new Swift language | VentureBeat | Dev | by Richard Byrne Reilly 0 comments

6.06.2014
Mac Developer: Apple, Inc. opens up access to its WWDC developer utopia

Apple, Inc. opens up access to its WWDC developer utopia: "Another reason why the hands-on labs are seen by developers as being a priority at WWDC is that Apple now makes the videos of its technical sessions available almost immediately, through either the WWDC app or iTunes. "
Favorite aspect of the new WWDC. Although everyone, I'm sure, would love to attend, it's just not feasible.

Labels:

By : Tighten Apple, Inc. opens up access to its WWDC developer utopia 0 comments

6.05.2014
Mac Developer: Marc Andreessen & Bill Gates agree with Fox News on this: Snowden is a traitor | VentureBeat | Security | by Harrison Weber

Marc Andreessen & Bill Gates agree with Fox News on this: Snowden is a traitor | VentureBeat | Security | by Harrison Weber: "Silicon Valley investor and technologist Marc Andreessen today declared NSA whistleblower Ed Snowden a traitor on national television."

It's true that he spoke up. Who he betrayed is entirely dependent on your interpretation of the purpose of the Constitution of the United States of America.
"When they came for my friend I did not talk, when they came for my brother I did not talk, when they came for my neighbor I did not talk, soon they will come for me and there will be no one to speak for me".

I think he spoke for a lot of Americans.

Labels:

By : Tighten Marc Andreessen & Bill Gates agree with Fox News on this: Snowden is a traitor | VentureBeat | Security | by Harrison Weber 0 comments

 

 
 
 

 Tighten    
 Generate    
 Secure    
 Inspect    
 Download    
 Support    
 Documentation    
 Tighten App.app    
 Tighten Pro.app    
 PKCS#7Viewer.app    
 About    
 Hire    
 Contact    
 Blogger    
 FaceBook    
 iTunes Direct Link    
 Hollywood CA    
 spctl --assess -vvv    
 spctl --master-enable    
 spctl --master-disable    
 Mac App Store Receipt Validation    
 Apple Code Signing Certificates    
 Gatekeeper Developer ID Apple    
 Xcode codesign tutorial    
 [Site Map]    
 


Copyright © 2005-2012
All Rights Reserved
Tighten Pro