Rocksolid Light

News from da outaworlds

mail  files  register  groups  login

Message-ID:  

You never hesitate to tackle the most difficult problems.


comp / comp.sys.mac.system / Re: Apple Addresses Critical Security Vulnerability For Windows 10 And 11 Users

SubjectAuthor
* Apple Addresses Critical Security Vulnerability For Windows 10 And 11 UsersAndrew
+* Re: Apple Addresses Critical Security Vulnerability For Windows 10 And 11 UsersJolly Roger
|`* Re: Apple Addresses Critical Security Vulnerability For Windows 10 And 11 UsersJörg Lorenz
| `* Re: Apple Addresses Critical Security Vulnerability For Windows 10 And 11 UsersHank Rogers
|  `- Re: Apple Addresses Critical Security Vulnerability For Windows 10 And 11 UsersAndrew
`* Re: Apple Addresses Critical Security Vulnerability For Windows 10 And 11 Usersgtr
 `- Re: Apple Addresses Critical Security Vulnerability For Windows 10 And 11 UsersAndrew

1
Subject: Apple Addresses Critical Security Vulnerability For Windows 10 And 11 Users
From: Andrew
Newsgroups: alt.comp.os.windows-10, alt.comp.os.windows-10, misc.phone.mobile.iphone, comp.sys.mac.system
Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com)
Date: Wed, 15 May 2024 01:17 UTC
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!border-1.nntp.ord.giganews.com!border-2.nntp.ord.giganews.com!nntp.giganews.com!weretis.net!feeder9.news.weretis.net!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!nnrp.usenet.blueworldhosting.com!.POSTED!not-for-mail
From: andrew@spam.net (Andrew)
Newsgroups: alt.comp.os.windows-10,alt.comp.os.windows-10,misc.phone.mobile.iphone,comp.sys.mac.system
Subject: Apple Addresses Critical Security Vulnerability For Windows 10 And 11 Users
Date: Wed, 15 May 2024 01:17:55 -0000 (UTC)
Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com)
Message-ID: <v212g3$28j2$1@nnrp.usenet.blueworldhosting.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 15 May 2024 01:17:55 -0000 (UTC)
Injection-Info: nnrp.usenet.blueworldhosting.com;
logging-data="74338"; mail-complaints-to="usenet@blueworldhosting.com"
Cancel-Lock: sha1:5sb+wH/nLrc3C/9BBOxsBLGlTcc= sha256:YqVh5SKhN3eJ2vRyig3BZEqWJfuO0aBrW7ngIjiPoWw=
sha1:6lUMGQN3S/RlQ0m1QtX2A9lfHCY= sha256:vqeJH4vQfJuFIaomouvSUppKWWCBfirnhDKAY4yZmL0=
X-Newsreader: Mod.PiaoHong.Usenet.Client:2.02.M16
Lines: 38
View all headers

Apple Addresses Critical Security Vulnerability For Windows 10 And 11 Users

Yet again, Apple forgot to test their software - this time in iTunes.

One of the most basic holes happened again with Apple, where a critical
security vulnerability in the iTunes application for Windows 10 and Windows
11 enables arbitrary remote code execution.

There's a reason Apple has the worst support in the industry & the most
exploits, which is basically Apple doesn't bother to sufficiently test.
<https://www.cisa.gov/known-exploited-vulnerabilities-catalog>

Apple has never caught any of their zero-day bugs, which are
twice in number than any other common consumer operating system.

CVE-2024-27793
Willy R. Vasquez, a Ph.D student and security researcher with The
University of Texas at Austin, whose sandboxing code contributions can be
found in the Firefox 117 web browser, was behind the discovery of
CVE-2024-27793. The vulnerability, rated critical using the Common
Vulnerability Scoring System v3, impacts the CoreMedia framework which
defines the media pipeline used ultimately to process media samples and
manage queues of media data, according to Apple.

CVE-2024-27793 is one of the many vulnerabilities I and my coauthors,
Stephen Checkoway and Hovav Shacham, found in our research on analyzing
H.264 video decoders," Vasquez told me. "We developed a tool called
H26Forge that generates malformed compressed videos, which can be used to
either fuzz a video decoder or exploit a vulnerability in a video decoder."

https://www.forbes.com/sites/daveywinder/2024/05/12/apple-addresses-critical-security-vulnerability-for-windows-10-11-users/

Bear in mind, another reason Apple support is the worst in the industry
is that Apple only fully supports a single release - which is unlike every
other common consumer operating system support of multiple major releases.
<https://screenrant.com/apple-product-security-update-lifespan/>
<https://support.apple.com/guide/deployment/about-software-updates-depc4c80847a/>
<https://hothardware.com/news/apple-admits-only-fully-patches-security-flaws-in-latest-os-releases>
<https://arstechnica.com/gadgets/2022/10/apple-clarifies-security-update-policy-only-the-latest-oses-are-fully-patched/>

Subject: Re: Apple Addresses Critical Security Vulnerability For Windows 10 And 11 Users
From: Jolly Roger
Newsgroups: alt.comp.os.windows-10, alt.comp.os.windows-10, misc.phone.mobile.iphone, comp.sys.mac.system
Organization: People for the Ethical Treatment of Pirates
Date: Wed, 15 May 2024 02:50 UTC
References: 1
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: jollyroger@pobox.com (Jolly Roger)
Newsgroups: alt.comp.os.windows-10,alt.comp.os.windows-10,misc.phone.mobile.iphone,comp.sys.mac.system
Subject: Re: Apple Addresses Critical Security Vulnerability For Windows 10
And 11 Users
Date: 15 May 2024 02:50:03 GMT
Organization: People for the Ethical Treatment of Pirates
Lines: 116
Message-ID: <laim6rFmkmhU2@mid.individual.net>
References: <v212g3$28j2$1@nnrp.usenet.blueworldhosting.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
X-Trace: individual.net o7QPIvIB0nirXxQXSvLQxAHHAQ/tRqVxp45nexwdDTr1EX2vtF
Cancel-Lock: sha1:1C8wPEIxAHXpL20VqS6n022J9Ps= sha256:nuTcq8IOEeP1x6PLysmT11fWtrxRcS295jAAhj4nvCE=
Mail-Copies-To: nobody
X-Face: _.g>n!a$f3/H3jA]>9pN55*5<`}Tud57>1<n@LQ!aZ7vLO_nWbK~@T'XIS0,oAJcU.qLM
dk/j8Udo?O"o9B9Jyx+ez2:B<nx(k3EdHnTvB]'eoVaR495,Rv~/vPa[e^JI+^h5Zk*i`Q;ezqDW<
ZFs6kmAJWZjOH\8[$$7jm,Ogw3C_%QM'|H6nygNGhhl+@}n30Nz(^vWo@h>Y%b|b-Y~()~\t,LZ3e
up1/bO{=-)
User-Agent: slrn/1.0.3 (Darwin)
View all headers

On 2024-05-15, Andrew <andrew@spam.net> wrote:
> Apple Addresses Critical Security Vulnerability For Windows 10 And 11 Users
>
> Yet again, Apple forgot to test their software - this time in iTunes.

Google fixes fifth Chrome zero-day exploited in attacks this year

Yet again, Google forgot to test their software - this time in Chrome:

Google has released a security update for the Chrome browser to fix the
fifth zero-day vulnerability exploited in the wild since the start of
the year.

The high-severity issue tracked as CVE-2024-4671 is a “use after free”
vulnerability in the Visuals component that handles the rendering and
display of content on the browser.

Google revealed that the vulnerability, discovered and reported by an
anonymous researcher, was exploited in attacks.

“Google is aware that an exploit for CVE-2024-4671 exists in the wild,”
reads the advisory, without providing additional information.

Use after-free flaws are security flaws that occur when a program
continues to use a pointer after the memory it points to has been freed,
following the completion of its legitimate operations on that region.

Because the freed memory could now contain different data or be used by
other software or components, accessing it could result in data leakage,
code execution, or crash.

Google addressed the problem with the release of 124.0.6367.201/.202 for
Mac/Windows and 124.0.6367.201 for Linux, with the updates rolling out
over the coming days/weeks.

For users of the ‘Extended Stable’ channel, fixes will be made available
in version 124.0.6367.201 for Mac and Windows, also to roll out later.

Chrome updates automatically when a security update is available, but
users can confirm they’re running the latest version by going to
Settings > About Chrome, letting the update finish, and then clicking on
the ‘Relaunch’ button to apply it.

Update

This latest flaw addressed in Google Chrome is the fifth this year, with
three others discovered during the March 2024 Pwn2Own hacking contest in
Vancouver.

The complete list of Chrome zero-day vulnerabilities fixed since the
start of 2024 also includes the following:

CVE-2024-0519: A high-severity out-of-bounds memory access weakness
within the Chrome V8 JavaScript engine, allowing remote attackers to
exploit heap corruption via a specially crafted HTML page, leading to
unauthorized access to sensitive information.

CVE-2024-2887: A high-severity type confusion flaw in the WebAssembly
(Wasm) standard. It could lead to remote code execution (RCE) exploits
leveraging a crafted HTML page.

CVE-2024-2886: A use-after-free vulnerability in the WebCodecs API used
by web applications to encode and decode audio and video. Remote
attackers exploited it to perform arbitrary reads and writes via crafted
HTML pages, leading to remote code execution.

CVE-2024-3159: A high-severity vulnerability caused by an out-of-bounds
read in the Chrome V8 JavaScript engine. Remote attackers exploited this
flaw using specially crafted HTML pages to access data beyond the
allocated memory buffer, resulting in heap corruption that could be
leveraged to extract sensitive information.

<https://www.bleepingcomputer.com/news/security/google-fixes-fifth-chrome-zero-day-vulnerability-exploited-in-attacks-in-2024/>

> One of the most basic holes happened again with Apple, where a critical
> security vulnerability in the iTunes application for Windows 10 and Windows
> 11 enables arbitrary remote code execution.
>
> There's a reason Apple has the worst support in the industry & the most
> exploits, which is basically Apple doesn't bother to sufficiently test.
> <https://www.cisa.gov/known-exploited-vulnerabilities-catalog>
>
> Apple has never caught any of their zero-day bugs, which are
> twice in number than any other common consumer operating system.
>
> CVE-2024-27793
> Willy R. Vasquez, a Ph.D student and security researcher with The
> University of Texas at Austin, whose sandboxing code contributions can be
> found in the Firefox 117 web browser, was behind the discovery of
> CVE-2024-27793. The vulnerability, rated critical using the Common
> Vulnerability Scoring System v3, impacts the CoreMedia framework which
> defines the media pipeline used ultimately to process media samples and
> manage queues of media data, according to Apple.
>
> CVE-2024-27793 is one of the many vulnerabilities I and my coauthors,
> Stephen Checkoway and Hovav Shacham, found in our research on analyzing
> H.264 video decoders," Vasquez told me. "We developed a tool called
> H26Forge that generates malformed compressed videos, which can be used to
> either fuzz a video decoder or exploit a vulnerability in a video decoder."
>
> https://www.forbes.com/sites/daveywinder/2024/05/12/apple-addresses-critical-security-vulnerability-for-windows-10-11-users/
>
> Bear in mind, another reason Apple support is the worst in the industry
> is that Apple only fully supports a single release - which is unlike every
> other common consumer operating system support of multiple major releases.
> <https://screenrant.com/apple-product-security-update-lifespan/>
> <https://support.apple.com/guide/deployment/about-software-updates-depc4c80847a/>
> <https://hothardware.com/news/apple-admits-only-fully-patches-security-flaws-in-latest-os-releases>
> <https://arstechnica.com/gadgets/2022/10/apple-clarifies-security-update-policy-only-the-latest-oses-are-fully-patched/>

--
E-mail sent to this address may be devoured by my ravenous SPAM filter.
I often ignore posts from Google. Use a real news client instead.

JR

Subject: Re: Apple Addresses Critical Security Vulnerability For Windows 10 And 11 Users
From: gtr
Newsgroups: alt.comp.os.windows-10, comp.sys.mac.system, misc.phone.mobile.iphone
Organization: A noiseless patient Spider
Date: Wed, 15 May 2024 05:26 UTC
References: 1
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: xxx@yyy.zzz (gtr)
Newsgroups: alt.comp.os.windows-10,comp.sys.mac.system,misc.phone.mobile.iphone
Subject: Re: Apple Addresses Critical Security Vulnerability For Windows 10 And 11 Users
Date: Wed, 15 May 2024 05:26:46 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 7
Message-ID: <v21h2m$mpfr$1@dont-email.me>
References: <v212g3$28j2$1@nnrp.usenet.blueworldhosting.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=fixed
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 15 May 2024 07:26:46 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="4951b3c27ecf02cd6200921080ddcd59";
logging-data="747003"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+oZ036gWKfKb8+PVwxfH0CHMsqCGFr8vI="
User-Agent: Usenapp for MacOS
Cancel-Lock: sha1:QQIZmM84WeU4qRevnsxwXCUDYfA=
X-Usenapp: v1.27.2/l - Full License
View all headers

On May 14, 2024 at 6:17:55 PM PDT, "Andrew" <andrew@spam.net> wrote:

> There's a reason Apple has the worst support in the industry & the most
> exploits, which is basically Apple doesn't bother to sufficiently test.

That is really hilarious! The most exploits? Why not just insist they cause
leprosy?

Subject: Re: Apple Addresses Critical Security Vulnerability For Windows 10 And 11 Users
From: Jörg Lorenz
Newsgroups: alt.comp.os.windows-10, alt.comp.os.windows-10, misc.phone.mobile.iphone, comp.sys.mac.system
Organization: Camembert Normand au Lait Cru
Date: Wed, 15 May 2024 05:41 UTC
References: 1 2
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: hugybear@gmx.net (Jörg Lorenz)
Newsgroups: alt.comp.os.windows-10,alt.comp.os.windows-10,misc.phone.mobile.iphone,comp.sys.mac.system
Subject: Re: Apple Addresses Critical Security Vulnerability For Windows 10
And 11 Users
Date: Wed, 15 May 2024 07:41:43 +0200
Organization: Camembert Normand au Lait Cru
Lines: 16
Message-ID: <v21hun$msue$1@dont-email.me>
References: <v212g3$28j2$1@nnrp.usenet.blueworldhosting.com>
<laim6rFmkmhU2@mid.individual.net>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 15 May 2024 07:41:44 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="de4e7d462515f7db9c2f02ce29051453";
logging-data="750542"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18xMwFP81VJsvwoXnoDuMyVn8oVILYxYxI="
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:115.0) Gecko/20100101
Betterbird/115.10.0
Cancel-Lock: sha1:oEhyAGZ6z4pukEN3eFXXOlhNTl8=
Content-Language: de-CH, en-GB
In-Reply-To: <laim6rFmkmhU2@mid.individual.net>
View all headers

On 15.05.24 04:50, Jolly Roger wrote:
> On 2024-05-15, Andrew <andrew@spam.net> wrote:
>> Apple Addresses Critical Security Vulnerability For Windows 10 And 11 Users
>>
>> Yet again, Apple forgot to test their software - this time in iTunes.
>
> Google fixes fifth Chrome zero-day exploited in attacks this year
>
> Yet again, Google forgot to test their software - this time in Chrome:

Do you think you will ever learn to keep your fingers still to avoid
feeding this Troll?

--
"Alea iacta est." (Julius Caesar)

Subject: Re: Apple Addresses Critical Security Vulnerability For Windows 10 And 11 Users
From: Hank Rogers
Newsgroups: alt.comp.os.windows-10, misc.phone.mobile.iphone, comp.sys.mac.system
Date: Wed, 15 May 2024 05:55 UTC
References: 1 2 3
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!border-1.nntp.ord.giganews.com!border-2.nntp.ord.giganews.com!nntp.giganews.com!news-out.netnews.com!postmaster.netnews.com!us2.netnews.com!not-for-mail
X-Trace: DXC=Z2D_T^9Dj=3XbTXBL>DDB=HWonT5<]0T=Q;nb^V>PUf65[gZBW6J?L<o>@oN;JD0Z37SXH2Fn0lZ;<UZmk?k1Pj;`TJEEfBEjR65[gZBW6J?L<1Fo0=k4Xd7=
X-Complaints-To: support@blocknews.net
User-Agent: NewsTap/5.5 (iPad)
Cancel-Lock: sha1:fJ8avgKgNRkIDfV7k32O6h4oXiQ=
Newsgroups: alt.comp.os.windows-10,misc.phone.mobile.iphone,comp.sys.mac.system
Message-ID: <66444e64$0$8474$882e4bbb@reader.netnews.com>
Subject: Re: Apple Addresses Critical Security Vulnerability For
Windows 10 And 11 Users
Content-Type: text/plain; charset=UTF-8
Mime-Version: 1.0
Content-Transfer-Encoding: 8bit
From: invalid@nospam.com (Hank Rogers)
References: <v212g3$28j2$1@nnrp.usenet.blueworldhosting.com>
<laim6rFmkmhU2@mid.individual.net>
<v21hun$msue$1@dont-email.me>
Date: 15 May 2024 05:55:49 GMT
Lines: 19
NNTP-Posting-Host: 127.0.0.1
X-Trace: 1715752549 reader.netnews.com 8474 127.0.0.1:50141
View all headers

Jörg Lorenz <hugybear@gmx.net> wrote:
> On 15.05.24 04:50, Jolly Roger wrote:
>> On 2024-05-15, Andrew <andrew@spam.net> wrote:
>>> Apple Addresses Critical Security Vulnerability For Windows 10 And 11 Users
>>>
>>> Yet again, Apple forgot to test their software - this time in iTunes.
>>
>> Google fixes fifth Chrome zero-day exploited in attacks this year
>>
>> Yet again, Google forgot to test their software - this time in Chrome:
>
> Do you think you will ever learn to keep your fingers still to avoid
> feeding this Troll?
>

Why not filter both of them, Jughead?
Instead of adding to the noise.

Subject: Re: Apple Addresses Critical Security Vulnerability For Windows 10 And 11 Users
From: Andrew
Newsgroups: alt.comp.os.windows-10, comp.sys.mac.system, misc.phone.mobile.iphone
Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com)
Date: Wed, 15 May 2024 19:04 UTC
References: 1 2
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!tncsrv06.tnetconsulting.net!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!nnrp.usenet.blueworldhosting.com!.POSTED!not-for-mail
From: andrew@spam.net (Andrew)
Newsgroups: alt.comp.os.windows-10,comp.sys.mac.system,misc.phone.mobile.iphone
Subject: Re: Apple Addresses Critical Security Vulnerability For Windows 10 And 11 Users
Date: Wed, 15 May 2024 19:04:21 -0000 (UTC)
Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com)
Message-ID: <v230vl$2iin$1@nnrp.usenet.blueworldhosting.com>
References: <v212g3$28j2$1@nnrp.usenet.blueworldhosting.com> <v21h2m$mpfr$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 15 May 2024 19:04:21 -0000 (UTC)
Injection-Info: nnrp.usenet.blueworldhosting.com;
logging-data="84567"; mail-complaints-to="usenet@blueworldhosting.com"
Cancel-Lock: sha1:3UgHusRKI98AqxrCaCowtm2hbGE= sha256:GxbQkT/6PYY/4S//sZ4c1Jd/UPhBYt7SNA1zKZSi52U=
sha1:L517HyKq3CsR3NWsjvmtbo4Hn00= sha256:HkKGwBCHT7nzVWXFa39/SNGlt5WYJ8BYNqs3bdb45ds=
X-Newsreader: Mod.PiaoHong.Usenet.Client:2.02.M16
View all headers

gtr wrote on Wed, 15 May 2024 05:26:46 -0000 (UTC) :

>> There's a reason Apple has the worst support in the industry & the most
>> exploits, which is basically Apple doesn't bother to sufficiently test.
>
> That is really hilarious! The most exploits? Why not just insist they cause
> leprosy?

What did you learn when you clicked on this link and noticed the exploits?
<https://www.cisa.gov/known-exploited-vulnerabilities-catalog>

Hint: iPhone exploits are always more than ten times those of Android.

DoubleHint: If you get all your news only from Apple advertisements,
guess what?

Apple never tells you they sell the most exploited devices in history.

There are good reasons for these exploits - as Apple only fully supports
a single release - not multiple releases which all other OS vendors support.

REFERENCES:
<https://screenrant.com/apple-product-security-update-lifespan/>
<https://support.apple.com/guide/deployment/about-software-updates-depc4c80847a/>
<https://hothardware.com/news/apple-admits-only-fully-patches-security-flaws-in-latest-os-releases>
<https://arstechnica.com/gadgets/2022/10/apple-clarifies-security-update-policy-only-the-latest-oses-are-fully-patched/>
<https://www.cnet.com/tech/mobile/samsung-extends-android-and-security-updates-to-7-years/>
<https://www.tomsguide.com/opinion/google-pixel-8-software-updates>
<https://www.androidheadlines.com/2022/01/google-monthly-changelog-play-system-updates.html>

Subject: Re: Apple Addresses Critical Security Vulnerability For Windows 10 And 11 Users
From: Andrew
Newsgroups: alt.comp.os.windows-10, misc.phone.mobile.iphone, comp.sys.mac.system
Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com)
Date: Wed, 15 May 2024 19:04 UTC
References: 1 2 3 4
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!panix!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!nnrp.usenet.blueworldhosting.com!.POSTED!not-for-mail
From: andrew@spam.net (Andrew)
Newsgroups: alt.comp.os.windows-10,misc.phone.mobile.iphone,comp.sys.mac.system
Subject: Re: Apple Addresses Critical Security Vulnerability For Windows 10 And 11 Users
Date: Wed, 15 May 2024 19:04:55 -0000 (UTC)
Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com)
Message-ID: <v2310m$2lna$1@nnrp.usenet.blueworldhosting.com>
References: <v212g3$28j2$1@nnrp.usenet.blueworldhosting.com> <laim6rFmkmhU2@mid.individual.net> <v21hun$msue$1@dont-email.me> <66444e64$0$8474$882e4bbb@reader.netnews.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 15 May 2024 19:04:55 -0000 (UTC)
Injection-Info: nnrp.usenet.blueworldhosting.com;
logging-data="87786"; mail-complaints-to="usenet@blueworldhosting.com"
Cancel-Lock: sha1:xcCpreqdFeGd7iE5FIAQXURGYZ0= sha256:6RLtoI9IYg6IC36MWKazGsW1Dmbmi68QWtTl77WtI8E=
sha1:sEeETczx/DpGNse5NZUxE69hNuw= sha256:mEj/6FcibAAK1AhllJlgRDpH63G/UDRoJAsizeGXz7o=
X-Newsreader: Mod.PiaoHong.Usenet.Client:2.02.M16
View all headers

Hank Rogers wrote on 15 May 2024 05:55:49 GMT :

>>>> Apple Addresses Critical Security Vulnerability For Windows 10 And 11 Users
>>>>
>>>> Yet again, Apple forgot to test their software - this time in iTunes.
>>>
>>> Google fixes fifth Chrome zero-day exploited in attacks this year
>>>
>>> Yet again, Google forgot to test their software - this time in Chrome:
>>
>> Do you think you will ever learn to keep your fingers still to avoid
>> feeding this Troll?
>>
>
> Why not filter both of them, Jughead?
> Instead of adding to the noise.

Bear in mind I stated a fact that was relevant to the subject line,
and which was temporal and which affected those in the newsgroup line.

You're welcome to filter me out but if you do, you lose those facts.

Jolly Roger and Joerg Lorenz only provided negative value in noise.
a. Joerg I don't see but he's nothing but a jughead of no value.
b. Jolly Roger is using classic whataboutism to deflect from the subject
<https://en.wikipedia.org/wiki/Whataboutism>
"Whataboutism or whataboutery (as in "what about...?") is a
pejorative for the strategy of responding to an accusation
with a counter-accusation instead of a defense of the
original accusation. From a logical and argumentative point
of view, whataboutism is considered a variant of the tu-quoque
pattern (Latin 'you too', term for a counter-accusation),
which is a subtype of the ad-hominem argument.
The communication intent is often to distract from the content
of a topic (red herring). "

What Jolly Roger is trying to do is distract the topic away from
the fact that this iTunes bug exists using this ad hominem attack.

It's classic because Jolly Roger has no defense to the facts.
And Joerg... well... everyone has him filtered out already, don't they?

1

rocksolid light 0.9.8
clearnet tor