←back to thread

796 points _Microft | 3 comments | | HN request time: 0.666s | source
Show context
lultimouomo ◴[] No.22736730[source]
I think this also shows how macOS has been training users to enter their password in random dialogs that have absolutely nothing that identifies them as being legit OS dialogs. The dialog that Zoom uses could very well be sending the credentials to a remote server, and the user would be none the wiser.
replies(2): >>22736941 #>>22742904 #
Wowfunhappy ◴[] No.22736941[source]
Note that in this case, it's still a legit OS dialog. Preflight scripts are very much built into the macOS pkg format, they're just not intended to be used like this.
replies(4): >>22737018 #>>22737061 #>>22738118 #>>22741908 #
1. lonelappde ◴[] No.22738118[source]
Incorrect. Look at the second tweet in the thread. It's a phishing popup that misidentifies itself in order to steal priveleges intended for System, not Zoom.

https://mobile.twitter.com/c1truz_/status/124473767519161958...

replies(1): >>22738224 #
2. Wowfunhappy ◴[] No.22738224[source]
That's still an OS prompt, they just put their own message at the top, as you're allowed to do.
replies(1): >>22741551 #
3. joshuaissac ◴[] No.22741551[source]
Yes, they are allowed to put a fake message (identifying the requester as System instead of Zoom), but that does not make it OK.