by zalmoxes on 5/6/17, 7:23 PM with 211 comments
by rasmi on 5/6/17, 7:45 PM
by vomitcuddle on 5/6/17, 8:36 PM
It can work as a universal homebrew replacement (works on MacOS, Linux, WSL and can be easily ported to most BSD variants), comes with a huge collection of packages[2] and produces its own reproducible source builds. Like homebrew, it's a hybrid source and binary based package manager (if you haven't done anything to modify the build, it will likely be downloaded from a cache of pre-built binaries[3]). Unlike something like homebrew-cask, it will never download the pre-built .dmg file from the developer's website - with the obvious exception of proprietary software.
It can also work as a great AUR/ports replacement on Linux systems. Fedora doesn't provide FFmpeg or an up-to-date version of a package you need? No problem, just get it from Nix! All the advantages of a rolling release distro, without actually having to use one.
Due to its functional nature, it comes with a wealth of advantages over homebrew and other traditional package managers[4]. Once you get past the learning curve, creating your own packages or modifying existing ones is a breeze. It can create disposable development environments with dependencies of whatever project you're working on, without having to install them in your system or user profile! Check out the Nix manual[5] for more information.
It's so flexible that people have built a Linux distribution where your entire system configuration is a Nix derivation (package) - with atomic upgrades, rollbacks, reproducible configuration and much more! [6]
[2] https://nixos.org/nixos/packages.html
[4] https://nixos.org/nix/about.html
by abalone on 5/7/17, 1:34 AM
Is it really just because of the $99/yr developer program fee? And if so.. is it starting to sound like a better value now?
[1] https://developer.apple.com/library/content/documentation/Se...
by oceanghost on 5/6/17, 10:39 PM
Is there a security product on OSX that would have prevented this?
by asmosoinio on 5/6/17, 7:43 PM
Based on the information we have, you must also change all the passwords that may reside in your OSX KeyChain or any browser password stores."
That sounds like a very large exercise...
by theunixbeard on 5/7/17, 2:37 AM
Full description here:
https://www.cybersixgill.com/wp-content/uploads/2017/02/0207...
by plg on 5/6/17, 7:45 PM
by soraminazuki on 5/7/17, 4:32 AM
by ricardobeat on 5/6/17, 7:39 PM
by noobermin on 5/6/17, 7:55 PM
by leonroy on 5/7/17, 2:25 PM
If I understand correctly even if I had in fact downloaded the compromised version ClamXav wouldn't have detected the malware?
This kind of stuff is extremely worrying and really strengthens Apple's case for signed application binaries across the board.
Are package managers like Homebrew and MacPorts not also susceptible to this kind of binary poisoning?
by atmosx on 5/6/17, 7:54 PM
by JohnTHaller on 5/7/17, 4:07 AM
Along with the fact that Apple updated the built-in sorta-antivirus in MacOS to detect it. But it only detects an SHA1 hash on the original DMG. If someone rebuilds the DMG or puts the malware with another app and builds a DMG, it'll bypass the MacOS sorta-antivirus.
by nly on 5/6/17, 8:06 PM
by PhantomGremlin on 5/6/17, 10:46 PM
Why shouldn't I create a "Tommy Transcoder" user on my system? That user would have the Handbrake app in his own Application folder. I assume that Handbrake will run correctly without needing to be installed in the system /Applications?
I already do this for a few items of software. Maybe it should be SOP to do this for most/all software?
Or what about installing most apps into virtual machines and using VMWare to run them?
I do recognize that such an approach couldn't be used universally. E.g. VMWare itself must run on the native machine, and with elevated privileges.
I'm interested in "defense in depth". No single technique can defend against all possible exploits.
by riobard on 5/7/17, 5:53 AM
by joshua_wold on 5/9/17, 1:37 AM
by nnutter on 5/6/17, 7:45 PM
by HedleyLamar on 5/7/17, 3:54 AM
by Angostura on 5/7/17, 5:40 AM
To coin a phrase - oh shit
by mikewhy on 5/6/17, 9:36 PM
Am I alone in thinking that this is irresponsible? Why not move releases to github?
Why aren't you going to start signing macOS binaries? I find this offensive. Thanks for potentially compromising users because you couldn't be arsed to pay for a certificate.
by kefka on 5/6/17, 8:03 PM
Any one client that's been hacked or infected would show up as an improper hash and easily spotted.