{"id":10058,"date":"2014-02-25T17:35:26","date_gmt":"2014-02-25T17:35:26","guid":{"rendered":""},"modified":"2014-02-25T17:35:26","modified_gmt":"2014-02-25T17:35:26","slug":"explaining_the_apple_security_flaw","status":"publish","type":"post","link":"https:\/\/admin.rushlimbaugh.com\/daily\/2014\/02\/25\/explaining_the_apple_security_flaw\/","title":{"rendered":"Explaining the Apple Security Flaw"},"content":{"rendered":"<p><a href=\"\/\/videos\/37\/56029\" target=\"_blank\"><img class=\"alignright\" src=\"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/listentoit.jpg\" alt=\"Listen to it Button\"><\/a><\/p>\n<p>RUSH: I\u2019m gonna give you the short version right now because my e-mail is overflowing. <a href=\"https:\/\/live-rush-limbaugh.pantheonsite.io\/?p=3429\"> &#8220;You said you were gonna explain this Apple security thing!&#8221; <\/a> Here it is, in a nutshell, folks.  It\u2019s not time to panic.  There\u2019s so much media on it. In the tech media and in the standard news media, think of Apple as the Republicans.  They\u2019re despised and they\u2019re hated. <\/p>\n<p>The only difference is, Apple is number one and very successful and knows exactly what they\u2019re doing.  The Republicans don\u2019t.  There\u2019s no comparison between Apple and Republicans in terms of achievement, accomplishment, but in terms of being hated and despised, they\u2019re very close.  What this security flaw is &#8212; and it primarily would affect you if you\u2019re on a public Wi-Fi network, like at an airport or a Starbucks or any other kind of Internet cafe.<\/p>\n<p>If you are on your home network, make sure it\u2019s password protected, but even then, nobody\u2019s gonna target your home network. They can\u2019t get to it. It\u2019s too small. Don\u2019t worry about hackers.  Maybe your corporate network, it\u2019s the same thing.  Really vulnerable&#8230; Well, I don\u2019t want to even put it that way.  Your biggest vulnerability is on a private network, and what\u2019s happened is, there is a line of code that doesn\u2019t exist that enables&#8230; It\u2019s called a man-in-the-middle attack.<\/p>\n<p>The way to visualize this is you\u2019re in Starbucks and you\u2019re on your Mac, and you\u2019re using the Web browser Safari, and there\u2019s a hacker in there, and he\u2019s able to follow everything you do.  That\u2019s the security flaw.  Therefore, if you go online to pay a bill, the hacker sees your data and everything you need to get online and connect to your bank.  Now, there are no reports of this exploit having been used yet.  It\u2019s not easy to do.  The hacker would have to be extremely proficient.<\/p>\n<p>But the vulnerability is there. <\/p>\n<p><img id=\"eZObject_87679\" class=\"aligncenter\" align=\"middle\" src=\"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/RushAppleSecurity.jpg\"\/><BR\/>That is the simplest way to explain it.  It enables hackers to eavesdrop on online interactions.  When you log on to another website, that website has a certificate of authenticity that is signed that talks to your browser. That\u2019s all encrypted, and every website you log on to sends an encrypted confirmation back to your browser that it is the website your browser thinks you\u2019re talking to. <\/line><\/p>\n<p>If you\u2019re online at Bank of America, Bank of America has a certificate on their website, it\u2019s signed, and it sends back a confirmation to your browser that, yep, you indeed are talking to the Bank of America website.  The hacker is able to get in and emulate the website and tell your computer that it\u2019s Bank of America, or whatever other website that you\u2019re talking to.  You have to be on a public network for this to even be applicable &#8212; and even then, there are ways around it. <\/p>\n<p>You can use the Chrome or Firefox browsers.  They are not vulnerable.  So this vulnerability existed on iPhones and iPads, and that was patched on Friday afternoon.  They\u2019re now secure.  The media is scratching its head over why Apple has not patched the Mac OS X.  Now, the sideline interesting thing about this is, is this an actual bug (\u2019cause it\u2019s just one line of code), or is this something done on purpose to allow the NSA in?  &#8216;Cause it is said that this bug existed with the introduction of I think OS 10.8. <\/p>\n<p>The NSA\u2019s PRISM system is what was revealed by Edward Snowden. They put out a PowerPoint chart of Snowden\u2019s leaks, and indicated that the NSA claimed that they were able to tap into Apple in October of 2012.  This bug occurred September 2012, and so some people are asking if this was actually a bug or actually a door left open for the NSA.  Apple isn\u2019t saying anything, and Apple hasn\u2019t patched the Mac, and people are wondering why, \u2019cause it\u2019s just one line of code.<\/p>\n<p>Now, here\u2019s one of the reasons why they may not have patched it.  The delivery system for software updates comes from the Mac App Store.  That\u2019s where the software update is.  It is also vulnerable in addition to the browser.  So they might have the fix, but they might not have a secure way of getting the fix to you.  There is also a new software upgrade coming for Mavericks, 10.9.2.  It\u2019s imminent. <\/p>\n<p>Apple could be waiting to roll the patch into that update, and they might not want to do two updates separately.  All of this is speculation, \u2019cause Apple isn\u2019t talking.  But the bottom line is, if you\u2019re on a Wi-Fi network at home, and it\u2019s password protected, the odds of this man-in-the-middle attack being able to get into your system are practically nil.  If your Wi-Fi system at home cannot be accessed outside your home or outside your property, you\u2019re good.<\/p>\n<p>That\u2019s such a small network, and, especially, if it\u2019s password protected, a hacker\u2019s not even gonna waste his time.  They\u2019re gonna go after as many users as they can get at one time, and that\u2019s why they target public networks.  Now, this is really, folks, the bare essence of this.  You can find, if you want to go onto various blogs, all kinds of detailed technical explanations for what SSL means and TLS means.  Those are the two areas where the bug is. <\/p>\n<p>But it all has to do with encrypted links between your browser and the website you\u2019re visiting and the signed certificates of authenticity that those websites send back to tell your browser that, yep, it is indeed Bank of America you\u2019re talking to.  A hacker can get in there and pretend &#8212; well, make your browser think and make you think &#8212; that you\u2019re talking to Bank of America when you\u2019re not.  The fix is gonna be here soon.<\/p>\n<p><img id=\"eZObject_87669\" class=\"aligncenter\" align=\"middle\" src=\"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/RushAppleLogo.jpg\"\/><\/p>\n<p>I mean, it has to be imminent.  It\u2019s just one line of code. <\/p>\n<p>The curiosity about whether this was done to enable the NSA, or, there\u2019s a body of thought out there that thinks the NSA is responsible for this.  Let me try to explain one more element of this.  Hackers are everywhere and they\u2019re constantly testing operating systems for vulnerabilities and ways in.  The Mac traditionally has been the safest and most secure operating system going, for viruses and bugs like this.  The NSA has automated attack programs.  They\u2019re constantly attacking any computer network they can find to find out if there is a bug. <\/p>\n<p>This bug would show up in an automated attack. The NSA tries to find a vulnerability in OS 10.9 they would find it right away, they would see it, they\u2019d say, &#8220;A-ha.&#8221; If they didn\u2019t see it they might see the vulnerability, be able to write the hack themselves.  The NSA has some of the sharpest software engineer, code breakers the world has produced.  So it\u2019s multilayered in terms of unanswered questions.  It\u2019s really pretty simple to explain what\u2019s happened.  What\u2019s not known, it\u2019s just one line of code, it\u2019s called &#8220;goto fail.&#8221;  One word is in the line of code twice, and the second appearance embedded on its own line is the bug, and it\u2019d be easy to take it out. <\/p>\n<p>There\u2019s a school of thought that says, no, it\u2019s not just that simple.  In iOS, iPhone, iPad, it was easy, but the Mac OS is much more complicated, it may be more than just one line of code.  Nobody knows because Apple isn\u2019t talking.  So does that help explain it?  Let me ask Dawn, \u2019cause Dawn doesn\u2019t care about this.  Did I explain it?  I don\u2019t mean to be insulting, but most people don\u2019t care about this stuff.  As long as it works, that\u2019s cool.  And if there\u2019s a potential for harassment, they want to know. I\u2019m not trying to be critical of any of these public networks, but I\u2019m just telling you, if you use a Mac and Safari, you\u2019re gonna be using 10.9 for this, by the way, maybe parts of 10.8. <\/p>\n<p>But the point is, just stay away from public networks for awhile.  Stay away from untrusted networks.  &#8220;Well, what\u2019s untrusted?&#8221;  It means if you can\u2019t, in your own mind, trust the network that you\u2019re on to be secure, don\u2019t use it.  If you have to, use cellular data.  Get a hot spot and use AT&amp;T or Verizon cellular data on your Mac for a while, or use Ethernet, connected by wire, if you have a chance to do that.  There are any number of ways around this.<\/p>\n<p>BREAK TRANSCRIPT<\/p>\n<p>RUSH:  Now, let me add one thing to this Apple security bug.  Any time technical matters are discussed, the people hearing it routinely don\u2019t understand what they\u2019re hearing and get it wrong and start spreading rumors based on what they are sure they heard.  In this case, me.  I just want to be very clear about something.  In order for the hacker, the attacker, the man in the middle to fool you into thinking that you are talking to Bank of America, and you\u2019re not, you\u2019re talking to him, the hacker, he has to be on the same Wi-Fi network you\u2019re on. <\/p>\n<p><img id=\"eZObject_87677\" class=\"alignright\" align=\"right\" src=\"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/Rush-backpage_large.jpg\"\/><BR\/>So if you are on your home Wi-Fi network, the Wi-Fi network that your router uses in your house or in your apartment, the hacker has to be on that network, which means the hacker would practically have to be within your eyesight.  But a public network like Starbucks, where anybody can get into it, and it knows no limits or size, that\u2019s a whole different matter.  That is a ripe target for a hacker.  Your home network or anything else similarly small is not going to be worth the effort. <\/line><\/p>\n<p>If you\u2019re on a secure network, a hacker cannot pull any of this off.  He has to be on the same network you are on.  So I don\u2019t want anybody misunderstanding, thinking you go online, you talk to your bank, and that any hacker anywhere in the world can get in and hack you. This security flaw does not permit that.  All of this must happen on the same network that you are on.  If you have a password protected network &#8212; and most people do &#8212; that\u2019s generally gonna be enough to send some hacker somewhere else easier.  And again, there are no reported hacks. <\/p>\n<p>Now, that doesn\u2019t mean there haven\u2019t been.  The hacker might not brag about it.  But there haven\u2019t been any reports of identity theft or anything of the sort since this all was first learned on Friday.  This hack, this bug has been in existence for over a year.  I don\u2019t know who all has known about it.  I don\u2019t know if anybody has successfully exploited it. <\/p>\n<p>Another question, how was it discovered?  Was it discovered with a routine quality control check by Apple software engineers?  Was it discovered by somebody attempting to exploit it?  There\u2019s a lot of unanswered questions here about it.  But, yeah, for example, it\u2019s not just your browser. It\u2019s your mail program, Facebook, a hacker could exploit this bug and get in the middle of any of those website links if, again, the hacker is on the same network you are on. <\/p>\n<p>If you\u2019ve got a little router at home or in your home office or whatever, the hacker has to be within range of your network, your Wi-Fi network, and the odds of that are very small.  So you\u2019re not wide open and there are things you can do to button up your security until this is patched, which it will be.  Some people thought it would happen over the weekend.  Some thought certainly yesterday.  That\u2019s why people are wondering, &#8220;What\u2019s Apple waiting for?&#8221;  Well, there is this new software upgrade, 10.9.2, that\u2019s coming.  They may roll it into that.  Who knows.  But we\u2019ll all find out soon enough.<\/p>\n<p>BREAK TRANSCRIPT<\/p>\n<p>RUSH:  Just one more thing on this and then we\u2019ll be done with it.  Apple\u2019s getting a lot of grief for not making a big deal out of this.  They sent the software patch for the iPhones and the iPads out on Friday at four o\u2019clock in the afternoon when nobody notices anything.  I actually think that it was wise for Apple not to make a big to-do about this because all that would have done would have been waving a big, white flag or red flag to the bull, to the hackers, to have been trumpeting some vulnerability.  I think they played it just right.  Besides, the media\u2019s gonna do that anyway, which they are in the process of doing.  Which is why I wanted to bring a little bit of proportion and reason to it. <\/p>\n<p>BREAK TRANSCRIPT<\/p>\n<p>RUSH:  (interruption)What do you mean, what is my theory? (interruption) Oh, you want to know what I think, how it happened?  (interruption) Oh.  Oh.  Okay.  I don\u2019t think this is complicated at all.  Snerdley wants to know how I think this whole thing with the security flaw occurred. I think the NSA found it.  That\u2019s what they\u2019re paid to do.  Ladies and gentlemen, the National Security Agency or whatever it is&#8230;<\/p>\n<p>The NSA is constantly looking and trying to find vulnerability in every computer operating system there is in their charted effort to track down bad guys who intend to do harm to the United States.  So Apple announces a new operating system.  It was iOS 6 for the iPhone, and about the same time, I think, it was Mountain Lion for the Mac, 10.8.  So what the NSA does is, they\u2019ve got an automated program.<\/p>\n<p>Every time a new OS hits, they bombard it, looking for ways into it &#8212; and they found one with iOS 6.  They found this security flaw.  They found this one line of code that was there.  What nobody knows is, was it an accident or a quality control fail, or was it purposely done to let the NSA into your computer? Nobody knows. Nobody will ever know that.  But I think it was the NSA that found it.  This is what they do.<\/p>\n<p>So a month after they found it, they then went public &#8212; well, they didn\u2019t go public.  Snowden took it public.  When Snowden announced the existence of the PRISM system, which is the NSA\u2019s&#8230; Remember when the news came out and the NSA said that these companies were participating with them?  I think the news was that these companies had allowed the NSA into their servers through the back door, and Microsoft was one of the companies.<\/p>\n<p>Google was one of the companies, too, and they said that Apple was added in October of 2012.  Well, the exploit has been traced back to September of 2012, and that kind of looks interesting to people following this. But I think the Apple OS is the most secure operating system for consumers that there ever has been.  It\u2019s not even comparable to Windows.  The hackers that do viruses don\u2019t even try with Apple.  The most success they have is with what are called &#8220;phishing attacks.&#8221; That\u2019s when you get an e-mail that looks official from, name it, could be anybody.  ExxonMobil, Apple itself. <\/p>\n<p>These people come up with fake e-mails with a link that you are to click. <\/p>\n<p>Usually it\u2019s some kind of crisis bit of news, a question about your bank account, a question about this or that. You click the link to either solve the problems or to find out what it is.  You click the link, and they\u2019ve got you.  That\u2019s about the extent of it, and even those are covered well.  I think the NSA found this, pure and simple.  Now, it took a while for it to be discovered, and they\u2019re gonna patch it.  It\u2019s that simple.  That\u2019s my theory.  But that\u2019s all it is: A theory. <\/p>\n<p>BREAK TRANSCRIPT<\/p>\n<p>RUSH:  Well, well, well, no sooner, ladies and gentlemen, than do I explain to you the security flaw, Apple just dropped the patch.  Apple just dropped an update to Mavericks 10.9.2 now available via software update, and it\u2019s got the SSL patch in it. So all you gotta do is go to software update, Mavericks on your Mac and upgrade to &#8212; (interruption) No, no, no.  I\u2019m not working the inside.  No, of course not.  I\u2019m not working on the inside with Apple.  This is just one of the strangest coincidences out there.  Well, it is imminent because it\u2019s like the seventh beta.  I do beta testing.  We\u2019ve been on seven betas of this thing since December.  Anyway, it dropped.  The patch is there. <\/p>\n<p>I\u2019ve got Kristen here from Lexington, Kentucky, who wants to take me to task over some of this.  Hi, Kristen.<\/p>\n<p>CALLER:  Hi.  How are you?<\/p>\n<p>RUSH:  Good.  Very good.  Thank you.<\/p>\n<p><img id=\"eZObject_87682\" class=\"aligncenter\" align=\"middle\" src=\"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/RushPhonesWeGo.jpg\"\/><BR\/>CALLER:  Actually, I just want to make one correction to what you are saying.  I work in IT security, and I think it\u2019s a little bit dangerous to tell people that it\u2019s okay, that their home networks won\u2019t be targeted in an attack like this and that they would have to see people physically who might be the attacker. Because if you go to a conference like DEFCON you\u2019ll see antennas that are specially made to go after home networks and to broadcast them from large distances, and people do get targeted on their home networks.  So I just wanted to make that clear.<\/line><\/p>\n<p>RUSH:  Okay, fair enough.  But the odds of that &#8212;<\/p>\n<p>CALLER:  The odds do go down, but if you think about somebody strolling a neighborhood in a large city, they can grab quite a few wireless networks and make quite a few attacks to a small &#8212;<\/p>\n<p>RUSH:  That\u2019s a good point, I have to confess that you could troll Manhattan and pick up quite a few, especially if they\u2019re not password protected, the vulnerability would be huge.  You\u2019re absolutely right.<\/p>\n<p>CALLER:  Absolutely.  So that was my only comment.  Other than that, I enjoy your show.<\/p>\n<p>RUSH:  Well, I appreciate that.  You know, normally &#8212; let me tell, Kristen, what happens, if I start talking, let\u2019s say &#8212; you know, I\u2019m a radio talk show.  So I start talking about any scientific subject, the experts will call me and tell me, &#8220;You idiot! You buffoon! You don\u2019t know what you\u2019re talking about, shut up. You don\u2019t know anything. You\u2019re just giving people all kinds of&#8230;&#8221; but you didn\u2019t do that.  You said the only thing you got wrong was it\u2019s not so much safe for small networks.  Other than that you didn\u2019t rip into me.<\/p>\n<p>CALLER:  No, I don\u2019t tend to rip into people, but at the same time I don\u2019t like people to get a false sense of security, either.<\/p>\n<p>RUSH:  Well, I wasn\u2019t trying to promote a false sent of security.  I was trying to avoid people panicking over this.<\/p>\n<p>CALLER:  Right.  And I don\u2019t disagree.  Fear and doubt are not good things to spread around, but, no, I wasn\u2019t gonna rip into you by any stretch of the imagination.<\/p>\n<p>RUSH:  Well, that just means I didn\u2019t say much wrong.  If I had of, you would have.<\/p>\n<p>CALLER:  Yes.<\/p>\n<p>RUSH:  All right.  Are you gonna upgrade, go do the patch, or do you use Mac?<\/p>\n<p>CALLER:  I have already patched all my devices and I don\u2019t have a Mac itself, but I have an iPad and an iPhone.<\/p>\n<p>RUSH:  Oh, so you did that on Friday, then?  Okay.<\/p>\n<p>CALLER:  Yes.<\/p>\n<p>RUSH:  All right.  Well, I appreciate the call, Kristen.  That\u2019s a good point.  The trolls could easily drive around an average city block in Manhattan where you could run into a whole host of private networks that would extend outside the building, if they\u2019re not password protected.  That is a good point. (interruption)  Satellite.  The Wi-Fi that you have on an airplane when you\u2019re flying is satellite. It\u2019s beaming down to you, and that\u2019s why it\u2019s slow.  Yeah, the aircraft has all the equipment. Usually some aircraft are incapable of it because the tail fin has to be wide enough at the top for a miniature satellite dish in there to get the signal, and if it\u2019s not modified, then they can\u2019t do it.<\/p>\n<p>So all the hardware is on board the airplane.  There is a network called Aircell which does beam up, and they use the cell tower network and somehow beam up, but it\u2019s not in use by that many. Normally ocean liners and aircraft are serviced by satellite.  (interruption)  Well, yeah, you\u2019d have to just double up.  I don\u2019t really know how they would go about increasing the speed on a Wi-Fi network in the air. (interruption)  No.  You don\u2019t have enough bandwidth to stream video.  Well, I shouldn\u2019t say.  Actually, it can be done, but I don\u2019t think on an airliner.<\/p>\n<p>Sometimes certain places I can do it.  It depends on the connection.  It really is weird.  You ought to see the map, you ought to see the coverage map, it\u2019s called BBML, Broad Band Multi-Link.  That\u2019s what Wi-Fi in airplanes is called, BBML, and they got their own coverage map. When you leave one satellite coverage area, go to another, you\u2019ll lose service for a minute, maybe two, while it catches up.  And if you don\u2019t know that, you think, &#8220;Oh, my God, my Internet\u2019s down, oh, no.&#8221;  You start panicking and you get mad and you call people. <\/p>\n<p>Nope.  Gotta look at the satellite coverage map. It takes awhile for the system to handshake with the new satellite.  And that may not be as fast a connection.  So whereas you might be able to stream Netflix while you\u2019re flying over St. Louis, by the time you get to Kansas City, you can\u2019t, \u2019cause you\u2019re on a different satellite, speaking theoretically here. It all has to do with speed and packet loss, packet drop.  Now, look, enough of this.  People don\u2019t care about this.  I\u2019m off track here.  Besides, they\u2019ve issued the patch. <\/p>\n<p>BREAK TRANSCRIPT<\/p>\n<p>RUSH: Keith in Westfield, Indiana, welcome to the EIB Network.  Hello.<\/p>\n<p>CALLER:  Hello.  Nice to talk to you.  Honor.<\/p>\n<p>RUSH:  Thank you, sir.<\/p>\n<p>CALLER:  I\u2019ve been listening about what you\u2019ve been saying about the Apple thing, and sounds to me like you know a lot.  I would not call you uneducated about that.  One of the things that people might like to know. Maybe you should remind your users &#8212; I appreciate you not wanting to scare people &#8212; is that they really should know how their websites flow, how they progress from screen to screen.  There\u2019s a lot of websites now, especially you mentioned Bank of America, that specifically use a multifactor authentication.<\/p>\n<p>That\u2019s where it\u2019s actually something that\u2019s brought back from the bank or whatever the business is that they should recognize as, like, their security image or sometimes they call it something else, like a passphrase, and that they should recognize that before they type in their password. So it will be on the password screen, and they want to make sure that, like, it\u2019s a picture of a dog or a picture of a cat, that that\u2019s your picture before you type in your password, \u2019cause the hackers can\u2019t get that information.  They can\u2019t go to the bank and say, &#8220;Hey, what\u2019s the security image for this particular user.<\/p>\n<p>RUSH:  Yeah.  Right.  If you see a screen that they ask you to type what you see, and it looks like elongated, stretched-out letters of the alphabet, you\u2019re right. That\u2019s a form of security protection.  Look, the websites engage in all kinds of encryption and the way they communicate with each other, with signed certificates to prove authenticity.  I mean, it is serious business, and the people that are trying to exploit that are also very serious, and it\u2019s tough work staying ahead of \u2019em.  People who do this are amazing.  The code guys, these people that do this are just great. They have my profound, utmost respect.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>RUSH: I\u2019m gonna give you the short version right now because my e-mail is overflowing. &#8220;You said you were gonna explain this Apple security thing!&#8221; Here it is, in a nutshell, folks. It\u2019s not time to panic. There\u2019s so much media on it. In the tech media and in the standard news media, think of [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","ngg_post_thumbnail":0},"categories":[],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Explaining the Apple Security Flaw - The Rush Limbaugh Show<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rushlimbaugh.com\/daily\/2014\/02\/25\/explaining_the_apple_security_flaw\/\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:title\" content=\"Explaining the Apple Security Flaw - The Rush Limbaugh Show\" \/>\n<meta name=\"twitter:description\" content=\"RUSH: I\u2019m gonna give you the short version right now because my e-mail is overflowing. &#8220;You said you were gonna explain this Apple security thing!&#8221; Here it is, in a nutshell, folks. It\u2019s not time to panic. There\u2019s so much media on it. In the tech media and in the standard news media, think of [&hellip;]\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/listentoit.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"GeorgePrayias\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"20 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.rushlimbaugh.com\/#website\",\"url\":\"https:\/\/www.rushlimbaugh.com\/\",\"name\":\"The Rush Limbaugh Show\",\"description\":\"Excellence In Broadcasting\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.rushlimbaugh.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.rushlimbaugh.com\/daily\/2014\/02\/25\/explaining_the_apple_security_flaw\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/listentoit.jpg\",\"contentUrl\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/listentoit.jpg\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.rushlimbaugh.com\/daily\/2014\/02\/25\/explaining_the_apple_security_flaw\/#webpage\",\"url\":\"https:\/\/www.rushlimbaugh.com\/daily\/2014\/02\/25\/explaining_the_apple_security_flaw\/\",\"name\":\"Explaining the Apple Security Flaw - The Rush Limbaugh Show\",\"isPartOf\":{\"@id\":\"https:\/\/www.rushlimbaugh.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.rushlimbaugh.com\/daily\/2014\/02\/25\/explaining_the_apple_security_flaw\/#primaryimage\"},\"datePublished\":\"2014-02-25T17:35:26+00:00\",\"dateModified\":\"2014-02-25T17:35:26+00:00\",\"author\":{\"@id\":\"https:\/\/www.rushlimbaugh.com\/#\/schema\/person\/9a33276eb9dc5b6d3f8218957f30e6b4\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.rushlimbaugh.com\/daily\/2014\/02\/25\/explaining_the_apple_security_flaw\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.rushlimbaugh.com\/daily\/2014\/02\/25\/explaining_the_apple_security_flaw\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.rushlimbaugh.com\/daily\/2014\/02\/25\/explaining_the_apple_security_flaw\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.rushlimbaugh.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Explaining the Apple Security Flaw\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.rushlimbaugh.com\/#\/schema\/person\/9a33276eb9dc5b6d3f8218957f30e6b4\",\"name\":\"GeorgePrayias\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.rushlimbaugh.com\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d290ab65e2eaca3719268528f83b85bf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d290ab65e2eaca3719268528f83b85bf?s=96&d=mm&r=g\",\"caption\":\"GeorgePrayias\"},\"url\":\"https:\/\/admin.rushlimbaugh.com\/daily\/author\/GeorgePrayias\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Explaining the Apple Security Flaw - The Rush Limbaugh Show","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rushlimbaugh.com\/daily\/2014\/02\/25\/explaining_the_apple_security_flaw\/","twitter_card":"summary","twitter_title":"Explaining the Apple Security Flaw - The Rush Limbaugh Show","twitter_description":"RUSH: I\u2019m gonna give you the short version right now because my e-mail is overflowing. &#8220;You said you were gonna explain this Apple security thing!&#8221; Here it is, in a nutshell, folks. It\u2019s not time to panic. There\u2019s so much media on it. In the tech media and in the standard news media, think of [&hellip;]","twitter_image":"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/listentoit.jpg","twitter_misc":{"Written by":"GeorgePrayias","Est. reading time":"20 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.rushlimbaugh.com\/#website","url":"https:\/\/www.rushlimbaugh.com\/","name":"The Rush Limbaugh Show","description":"Excellence In Broadcasting","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rushlimbaugh.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.rushlimbaugh.com\/daily\/2014\/02\/25\/explaining_the_apple_security_flaw\/#primaryimage","inLanguage":"en-US","url":"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/listentoit.jpg","contentUrl":"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/listentoit.jpg"},{"@type":"WebPage","@id":"https:\/\/www.rushlimbaugh.com\/daily\/2014\/02\/25\/explaining_the_apple_security_flaw\/#webpage","url":"https:\/\/www.rushlimbaugh.com\/daily\/2014\/02\/25\/explaining_the_apple_security_flaw\/","name":"Explaining the Apple Security Flaw - The Rush Limbaugh Show","isPartOf":{"@id":"https:\/\/www.rushlimbaugh.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rushlimbaugh.com\/daily\/2014\/02\/25\/explaining_the_apple_security_flaw\/#primaryimage"},"datePublished":"2014-02-25T17:35:26+00:00","dateModified":"2014-02-25T17:35:26+00:00","author":{"@id":"https:\/\/www.rushlimbaugh.com\/#\/schema\/person\/9a33276eb9dc5b6d3f8218957f30e6b4"},"breadcrumb":{"@id":"https:\/\/www.rushlimbaugh.com\/daily\/2014\/02\/25\/explaining_the_apple_security_flaw\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rushlimbaugh.com\/daily\/2014\/02\/25\/explaining_the_apple_security_flaw\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.rushlimbaugh.com\/daily\/2014\/02\/25\/explaining_the_apple_security_flaw\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rushlimbaugh.com\/"},{"@type":"ListItem","position":2,"name":"Explaining the Apple Security Flaw"}]},{"@type":"Person","@id":"https:\/\/www.rushlimbaugh.com\/#\/schema\/person\/9a33276eb9dc5b6d3f8218957f30e6b4","name":"GeorgePrayias","image":{"@type":"ImageObject","@id":"https:\/\/www.rushlimbaugh.com\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/d290ab65e2eaca3719268528f83b85bf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d290ab65e2eaca3719268528f83b85bf?s=96&d=mm&r=g","caption":"GeorgePrayias"},"url":"https:\/\/admin.rushlimbaugh.com\/daily\/author\/GeorgePrayias\/"}]}},"_links":{"self":[{"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/posts\/10058"}],"collection":[{"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/comments?post=10058"}],"version-history":[{"count":0,"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/posts\/10058\/revisions"}],"wp:attachment":[{"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/media?parent=10058"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/categories?post=10058"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/tags?post=10058"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}