Mr. Maynor told Mr. Krebs that they opted for a video version of their demonstration “because of the possibility that someone in the audience could intercept the traffic sent to a potentially live target and deconstruct the attack — possibly to use the exploit in the wild against other MacBook users,” the columnist wrote.
Mr. Maynor and Mr. Ellch said that the exploit doesnit require the laptop in question to be connected to a network. It simply has to have its wireless card turned on. In the video, Mr. Maynor turned the Dell laptop into a computer-to-computer wireless access point and then connected the MacBook to it via a third-party wireless card, not Appleis AirPort Extreme technology, although he told Mr. Krebs that the flaw exists there, too. He then took over the Mac, creating and deleting files on the desktop to show that he had access to it.
While Mr. Maynor was bothered by what he called the “Mac user base aura of smugness on security,” he told Mr. Krebs that they hadnit set out to pick on Macs specifically. He said that he and Mr. Ellch have been in contact with Apple, Microsoft and third party wireless card vendors on fixes for the problem. He told Mr. Krebs that “had leaned on [them] pretty hard not to make this an issue about the Mac drivers — mainly because Apple had not fixed the problem yet.”