	{"id":5326,"date":"2012-07-27T19:18:07","date_gmt":"2012-07-27T19:18:07","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=5326"},"modified":"2012-07-27T20:53:53","modified_gmt":"2012-07-27T20:53:53","slug":"mixed-reactions-to-apples-blackhat-security-talk","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/mixed-reactions-to-apples-blackhat-security-talk\/","title":{"rendered":"Mixed Reactions to Apple\u2019s BlackHat Security Talk"},"content":{"rendered":"<p>Well, Apple\u2019s talk at BlackHat has come and gone. The general consensus is that Dallas De Atley\u2019s talk was incredibly underwhelming \u2013 the equivalent of reciting the <a href=\"http:\/\/images.apple.com\/iphone\/business\/docs\/iOS_Security_May12.pdf\">whitepaper released earlier this year<\/a> with a slide deck. De Atley also escaped off-stage immediately after his presentation, offering no chance for questions or chatting afterwards, much to the disappointment of all the attendees. But all things considered, the response from his audience has been surprisingly neutral.<\/p>\n<p>Clearly there has been a sense of disappointment, which was cleverly described by <a href=\"http:\/\/news.cnet.com\/8301-1009_3-57480890-83\/ho-hum-first-date-with-apple-at-black-hat\/\">Elinor Mills<\/a>:<\/p>\n<blockquote><p>The vaunted Apple decided to show up after snubbing the event for 15 years. As manager of the platform security team at Apple, Dallas De Atley seemed to have everything a Black Hat attendee could want &#8212; popularity, experience, discriminating taste, a good sense of style, and a promising future. Playing hard to get only makes us want you more.<\/p>\n<p>But 15 minutes in, I was ready for the check.<em> <\/em><\/p><\/blockquote>\n<p>It seems most folks agree Apple gets points just for showing up. They made a step forward, which everyone seems to hope will be followed with yet more steps in the future. And in the grand scheme of thing, that approach will probably be more effective than excoriating Apple for not hitting a homerun on their first time out.<\/p>\n<p>That being said, Twitter was full of people\u2019s snark and disappointment rather than measured neutrality, as you might expect. It\u2019s surprisingly deflating, watching the Twittersphere\u2019s hopes being dashed in realtime.<\/p>\n<p>I\u2019m pretty sure this guy is psychic:<\/p>\n<blockquote class=\"twitter-tweet\"><p>I am picturing the Apple talk simply involving him reading the iOS whitepaper out loud and then walking off the stage. Hope not. <a href=\"https:\/\/twitter.com\/search\/%2523blackhat\">#blackhat<\/a><\/p>\n<p>\u2014 DennisF (@DennisF) <a href=\"https:\/\/twitter.com\/DennisF\/status\/228539394993319937\">July 26, 2012<\/a><\/p><\/blockquote>\n<p>Hope springs eternal:<\/p>\n<blockquote class=\"twitter-tweet\"><p>Apple&#8217;s very careful and basic <a href=\"https:\/\/twitter.com\/search\/%2523blackhat\">#blackhat<\/a> session ended with no Q&amp;A. Watching optimistic attendees swarm the stage now.<\/p>\n<p>\u2014 Stacy Cowley (@StacyCowley) <a href=\"https:\/\/twitter.com\/StacyCowley\/status\/228553430086610944\">July 26, 2012<\/a><\/p><\/blockquote>\n<p>Getting topical, with an Olympic athlete reference:<\/p>\n<blockquote class=\"twitter-tweet\"><p>Usain Bolt would be impressed with the speed of <a href=\"https:\/\/twitter.com\/search\/%2523Apple\">#Apple<\/a> security team at <a href=\"https:\/\/twitter.com\/search\/%2523BlackHat\">#BlackHat<\/a>. They bolted quickly through side door after iOS preso<\/p>\n<p>\u2014 Kevin McLaughlin (@kmclaughlin69) <a href=\"https:\/\/twitter.com\/kmclaughlin69\/status\/228611120330600448\">July 26, 2012<\/a><\/p><\/blockquote>\n<p>So very sad! No one likes being rebuffed:<\/p>\n<blockquote class=\"twitter-tweet\"><p>hackers love mac. apple cant care less and continues to give cold shoulder to hackers (again) in <a href=\"https:\/\/twitter.com\/search\/%2523blackhat\">#blackhat<\/a> 2012.<\/p>\n<p>\u2014 Gursev Kalra (@igursev) <a href=\"https:\/\/twitter.com\/igursev\/status\/228847091756191744\">July 27, 2012<\/a><\/p><\/blockquote>\n<p>You know what else Hackers love? Sarcasm.<\/p>\n<blockquote class=\"twitter-tweet\"><p>I heard the <a href=\"https:\/\/twitter.com\/search\/%2523blackhat\">#blackhat<\/a> presentation of <a href=\"https:\/\/twitter.com\/search\/%2523apple\">#apple<\/a> was a great success &#8211; when you call it a success to lecture an old whitepaper <a href=\"https:\/\/twitter.com\/search\/%2523sarcasm\">#sarcasm<\/a><\/p>\n<p>\u2014 sigi714 (@sigi714) <a href=\"https:\/\/twitter.com\/sigi714\/status\/228853461419188224\">July 27, 2012<\/a><\/p><\/blockquote>\n<p>And of course, a pop-culture reference (for you Futurama fans):<\/p>\n<blockquote class=\"twitter-tweet\"><p>That Apple Blackhat talk lowered the bar so much even Hermes Conrad wouldn&#8217;t touch it.<\/p>\n<p>\u2014 Chris Boyd (@paperghost) <a href=\"https:\/\/twitter.com\/paperghost\/status\/228865754609627136\">July 27, 2012<\/a><\/p><\/blockquote>\n<p>Those of us in the security industry still have hope that this is just a slow start to what could be a very productive cooperation with Apple\u2019s security team. Perhaps next year Apple will return to BlackHat with fresh material, and more importantly, they will allow discussion from the community about how we can work together to improve security. It will decidedly not be an easy or smooth road for them to allow this sort of openness, but then security never is an easy job.<\/p>\n<p>What are your thoughts about Apple&#8217;s presentation? Do you expect they will continue to keep a tight rein on security information, or do you still hope this is only the beginning?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Well, Apple\u2019s talk at BlackHat has come and gone. The general consensus is that Dallas De Atley\u2019s talk was incredibly underwhelming \u2013 the equivalent of reciting the whitepaper released earlier this year with a slide deck.<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Well, Apple\u2019s talk at BlackHat has come and gone. The general consensus is that Dallas De Atley\u2019s talk was incredibly underwhelming \u2013 the equivalent of reciting the whitepaper released earlier this year with a slide deck.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/mixed-reactions-to-apples-blackhat-security-talk\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mixed Reactions to Apple\u2019s BlackHat Security Talk - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Well, Apple\u2019s talk at BlackHat has come and gone. The general consensus is that Dallas De Atley\u2019s talk was incredibly underwhelming \u2013 the equivalent of reciting the whitepaper released earlier this year with a slide deck.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/mixed-reactions-to-apples-blackhat-security-talk\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-07-27T19:18:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2012-07-27T20:53:53+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mixed-reactions-to-apples-blackhat-security-talk\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/mixed-reactions-to-apples-blackhat-security-talk\/\",\"name\":\"Mixed Reactions to Apple\\u2019s BlackHat Security Talk - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"datePublished\":\"2012-07-27T19:18:07+00:00\",\"dateModified\":\"2012-07-27T20:53:53+00:00\",\"description\":\"Well, Apple\\u2019s talk at BlackHat has come and gone. The general consensus is that Dallas De Atley\\u2019s talk was incredibly underwhelming \\u2013 the equivalent of reciting the whitepaper released earlier this year with a slide deck.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mixed-reactions-to-apples-blackhat-security-talk\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/mixed-reactions-to-apples-blackhat-security-talk\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mixed-reactions-to-apples-blackhat-security-talk\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mixed Reactions to Apple\\u2019s BlackHat Security Talk\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mixed-reactions-to-apples-blackhat-security-talk\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mixed-reactions-to-apples-blackhat-security-talk\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Mixed Reactions to Apple\\u2019s BlackHat Security Talk\",\"datePublished\":\"2012-07-27T19:18:07+00:00\",\"dateModified\":\"2012-07-27T20:53:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mixed-reactions-to-apples-blackhat-security-talk\/#webpage\"},\"wordCount\":564,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/mixed-reactions-to-apples-blackhat-security-talk\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Well, Apple\u2019s talk at BlackHat has come and gone. The general consensus is that Dallas De Atley\u2019s talk was incredibly underwhelming \u2013 the equivalent of reciting the whitepaper released earlier this year with a slide deck.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/mixed-reactions-to-apples-blackhat-security-talk\/","og_locale":"en_US","og_type":"article","og_title":"Mixed Reactions to Apple\u2019s BlackHat Security Talk - The Mac Security Blog","og_description":"Well, Apple\u2019s talk at BlackHat has come and gone. The general consensus is that Dallas De Atley\u2019s talk was incredibly underwhelming \u2013 the equivalent of reciting the whitepaper released earlier this year with a slide deck.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/mixed-reactions-to-apples-blackhat-security-talk\/","og_site_name":"The Mac Security Blog","article_published_time":"2012-07-27T19:18:07+00:00","article_modified_time":"2012-07-27T20:53:53+00:00","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/mixed-reactions-to-apples-blackhat-security-talk\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/mixed-reactions-to-apples-blackhat-security-talk\/","name":"Mixed Reactions to Apple\u2019s BlackHat Security Talk - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"datePublished":"2012-07-27T19:18:07+00:00","dateModified":"2012-07-27T20:53:53+00:00","description":"Well, Apple\u2019s talk at BlackHat has come and gone. The general consensus is that Dallas De Atley\u2019s talk was incredibly underwhelming \u2013 the equivalent of reciting the whitepaper released earlier this year with a slide deck.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mixed-reactions-to-apples-blackhat-security-talk\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/mixed-reactions-to-apples-blackhat-security-talk\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/mixed-reactions-to-apples-blackhat-security-talk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Mixed Reactions to Apple\u2019s BlackHat Security Talk"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/mixed-reactions-to-apples-blackhat-security-talk\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mixed-reactions-to-apples-blackhat-security-talk\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Mixed Reactions to Apple\u2019s BlackHat Security Talk","datePublished":"2012-07-27T19:18:07+00:00","dateModified":"2012-07-27T20:53:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mixed-reactions-to-apples-blackhat-security-talk\/#webpage"},"wordCount":564,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/mixed-reactions-to-apples-blackhat-security-talk\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-1nU","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/5326"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=5326"}],"version-history":[{"count":5,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/5326\/revisions"}],"predecessor-version":[{"id":5332,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/5326\/revisions\/5332"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=5326"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=5326"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=5326"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}