{"id":2440,"date":"2011-03-18T08:48:06","date_gmt":"2011-03-18T07:48:06","guid":{"rendered":"http:\/\/blog.intego.com\/?p=2440"},"modified":"2011-03-18T08:48:06","modified_gmt":"2011-03-18T07:48:06","slug":"interview-with-charlie-miller-mac-security-specialist","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/interview-with-charlie-miller-mac-security-specialist\/","title":{"rendered":"Interview with Charlie Miller, Mac Security Specialist"},"content":{"rendered":"<p>Infosec Island has published an <a href=\"https:\/\/www.infosecisland.com\/blogview\/12526-Pwn2Own-Winner-Charlie-Miller-Discusses-OS-Security.html\">interview with Charlie Miller<\/a>, well-known Mac security specialist, who, for the third time in a row, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/iphone-hacked-on-day-2-of-pwn2own\/\">hacked an Apple device<\/a> at the Pwn2Own contest. Miller discusses Mac OS X and iOS security issues, and gives some insight into some of the new security standards that Apple has been adopting.<\/p>\n<p>While the article is heavy on acronyms (DEP, ASLR, ROP), Miller points out how some security features, such as ASLR (address space layout randomization) can make the work of hackers and malware writers much more complicated. <\/p>\n<p>Regarding the Pwn2Own contest, which some may see as simply a stunt, Miller says:<\/p>\n<blockquote><p>\nI really like the concept of Pwn2Own. It gives researchers a chance to demonstrate their skills and make some money. Since all the bugs are reported, it also gets patches produced which reduce the number of bugs in the products we all use. I really think it&#8217;s a win-win for everyone.\n<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Infosec Island has published an interview with Charlie Miller, well-known Mac security specialist, who, for the third time in a row, hacked an Apple device at the Pwn2Own contest. Miller discusses Mac OS X and iOS security issues, and gives some insight into some of the new security standards that Apple has been adopting. While [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":2441,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[3151,3154],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Infosec Island has published an interview with Charlie Miller, well-known Mac security specialist, who, for the third time in a row, hacked an Apple\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/interview-with-charlie-miller-mac-security-specialist\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Interview with Charlie Miller, Mac Security Specialist - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Infosec Island has published an interview with Charlie Miller, well-known Mac security specialist, who, for the third time in a row, hacked an Apple\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/interview-with-charlie-miller-mac-security-specialist\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2011-03-18T07:48:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/03\/charlie-miller.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"128\" \/>\n\t<meta property=\"og:image:height\" content=\"128\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/interview-with-charlie-miller-mac-security-specialist\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/03\/charlie-miller.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/03\/charlie-miller.jpg\",\"width\":\"128\",\"height\":\"128\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/interview-with-charlie-miller-mac-security-specialist\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/interview-with-charlie-miller-mac-security-specialist\/\",\"name\":\"Interview with Charlie Miller, Mac Security Specialist - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/interview-with-charlie-miller-mac-security-specialist\/#primaryimage\"},\"datePublished\":\"2011-03-18T07:48:06+00:00\",\"dateModified\":\"2011-03-18T07:48:06+00:00\",\"description\":\"Infosec Island has published an interview with Charlie Miller, well-known Mac security specialist, who, for the third time in a row, hacked an Apple\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/interview-with-charlie-miller-mac-security-specialist\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/interview-with-charlie-miller-mac-security-specialist\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/interview-with-charlie-miller-mac-security-specialist\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Interview with Charlie Miller, Mac Security Specialist\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/interview-with-charlie-miller-mac-security-specialist\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/interview-with-charlie-miller-mac-security-specialist\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Interview with Charlie Miller, Mac Security Specialist\",\"datePublished\":\"2011-03-18T07:48:06+00:00\",\"dateModified\":\"2011-03-18T07:48:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/interview-with-charlie-miller-mac-security-specialist\/#webpage\"},\"wordCount\":165,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/interview-with-charlie-miller-mac-security-specialist\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/03\/charlie-miller.jpg\",\"keywords\":[\"Apple\",\"Security &amp; Privacy\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/interview-with-charlie-miller-mac-security-specialist\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Infosec Island has published an interview with Charlie Miller, well-known Mac security specialist, who, for the third time in a row, hacked an Apple","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/interview-with-charlie-miller-mac-security-specialist\/","og_locale":"en_US","og_type":"article","og_title":"Interview with Charlie Miller, Mac Security Specialist - The Mac Security Blog","og_description":"Infosec Island has published an interview with Charlie Miller, well-known Mac security specialist, who, for the third time in a row, hacked an Apple","og_url":"https:\/\/www.intego.com\/mac-security-blog\/interview-with-charlie-miller-mac-security-specialist\/","og_site_name":"The Mac Security Blog","article_published_time":"2011-03-18T07:48:06+00:00","og_image":[{"width":"128","height":"128","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/03\/charlie-miller.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/interview-with-charlie-miller-mac-security-specialist\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/03\/charlie-miller.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/03\/charlie-miller.jpg","width":"128","height":"128"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/interview-with-charlie-miller-mac-security-specialist\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/interview-with-charlie-miller-mac-security-specialist\/","name":"Interview with Charlie Miller, Mac Security Specialist - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/interview-with-charlie-miller-mac-security-specialist\/#primaryimage"},"datePublished":"2011-03-18T07:48:06+00:00","dateModified":"2011-03-18T07:48:06+00:00","description":"Infosec Island has published an interview with Charlie Miller, well-known Mac security specialist, who, for the third time in a row, hacked an Apple","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/interview-with-charlie-miller-mac-security-specialist\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/interview-with-charlie-miller-mac-security-specialist\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/interview-with-charlie-miller-mac-security-specialist\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Interview with Charlie Miller, Mac Security Specialist"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/interview-with-charlie-miller-mac-security-specialist\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/interview-with-charlie-miller-mac-security-specialist\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Interview with Charlie Miller, Mac Security Specialist","datePublished":"2011-03-18T07:48:06+00:00","dateModified":"2011-03-18T07:48:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/interview-with-charlie-miller-mac-security-specialist\/#webpage"},"wordCount":165,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/interview-with-charlie-miller-mac-security-specialist\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/03\/charlie-miller.jpg","keywords":["Apple","Security &amp; Privacy"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/interview-with-charlie-miller-mac-security-specialist\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/03\/charlie-miller.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-Dm","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/2440"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=2440"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/2440\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/2441"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=2440"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=2440"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=2440"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}