quote: For apps that are distributed in retail form or over the internet, developers -- for now -- won't have to comply with the sandboxing restrictions
quote: Overall, Miller said, with Lion, Apple has raised its security game to the point where OS X is no longer the 98-pound weakling on the beach."It's always been the easiest to exploit and now it's to the point that it's not that easy anymore," he said. "OS X has always been way behind on security, but now it's more or less comparable [to Windows]. Once you have ASLR and DEP and some sandboxing, that's all anyone has."
quote: "OS X has always had this goofy ASLR implementation where the randomized the libraries but not anything else, and you could still play the games and reuse code as long as there was one thing that wasn't randomized," said Charlie Miller, principal research consultant at Accuvant, who does a lot of OS X security research. " In Lion it seems like everything is randomized and no code is loaded at a predictable address. They made it much harder to exploit things. You probably need two bugs now, one for code execution and one for information disclosure."Miller added that it's also more difficult to find information disclosure bugs because they can't be found with a fuzzer.
quote: Though this was just an example, the QuickTime Player application in Lion does, in fact, delegate video decoding to an external, sandboxed, extremely low-privileged process called VTDecoderXPCService.Another example from Lion is the Preview application, which completely isolates the PDF parsing code (another historic source of exploits) from all access to the file system.