<article>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#article10_02_02_1827219</id>
	<title>New iPhone Attack Kills Apps, Reroutes Web Traffic</title>
	<author>kdawson</author>
	<datestamp>1265101860000</datestamp>
	<htmltext>Trailrunner7 sends in a threatpost.com article on exploiting <a href="http://threatpost.com/en\_us/blogs/iphones-vulnerable-new-remote-attack-020210">flaws in the way the iPhone handles digital certificates</a>. <i>"[Several flaws] could lead to an attacker being able to create his own trusted certificate and entice users into downloading malicious files onto their iPhones. The result of the attack is that a remote hacker is able to change some settings on the iPhone and force all of the user's Web traffic to run through any server he chooses, and also to change the root certificate on the phone, enabling him to man-in-the-middle SSL traffic from that phone. ... Charlie Miller, an Apple security researcher at Independent Security Evaluators, said that the attack works, although it would not lead to remote code execution on the iPhone. 'It definitely works. I downloaded the file and ran it and it worked,' Miller said. 'The only thing is that it warns you that the file will change your phone, but it also says that the certificate is from Apple and it's been verified.'"</i></htmltext>
<tokenext>Trailrunner7 sends in a threatpost.com article on exploiting flaws in the way the iPhone handles digital certificates .
" [ Several flaws ] could lead to an attacker being able to create his own trusted certificate and entice users into downloading malicious files onto their iPhones .
The result of the attack is that a remote hacker is able to change some settings on the iPhone and force all of the user 's Web traffic to run through any server he chooses , and also to change the root certificate on the phone , enabling him to man-in-the-middle SSL traffic from that phone .
... Charlie Miller , an Apple security researcher at Independent Security Evaluators , said that the attack works , although it would not lead to remote code execution on the iPhone .
'It definitely works .
I downloaded the file and ran it and it worked, ' Miller said .
'The only thing is that it warns you that the file will change your phone , but it also says that the certificate is from Apple and it 's been verified .
' "</tokentext>
<sentencetext>Trailrunner7 sends in a threatpost.com article on exploiting flaws in the way the iPhone handles digital certificates.
"[Several flaws] could lead to an attacker being able to create his own trusted certificate and entice users into downloading malicious files onto their iPhones.
The result of the attack is that a remote hacker is able to change some settings on the iPhone and force all of the user's Web traffic to run through any server he chooses, and also to change the root certificate on the phone, enabling him to man-in-the-middle SSL traffic from that phone.
... Charlie Miller, an Apple security researcher at Independent Security Evaluators, said that the attack works, although it would not lead to remote code execution on the iPhone.
'It definitely works.
I downloaded the file and ran it and it worked,' Miller said.
'The only thing is that it warns you that the file will change your phone, but it also says that the certificate is from Apple and it's been verified.
'"</sentencetext>
</article>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001480</id>
	<title>Re:Heh</title>
	<author>Anonymous</author>
	<datestamp>1265106600000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>5</modscore>
	<htmltext>Certain settings can be changed on an iPhone just based on links/downloads clicked on from within Safari (on the device).  That is how iphone os 3.0.x users could enable tethering without jailbreaking their phones.  It was just a settings file that could be downloaded.  I believe it was unsigned, but now, apparently it would be easy to make it look like an apple signed file.</htmltext>
<tokenext>Certain settings can be changed on an iPhone just based on links/downloads clicked on from within Safari ( on the device ) .
That is how iphone os 3.0.x users could enable tethering without jailbreaking their phones .
It was just a settings file that could be downloaded .
I believe it was unsigned , but now , apparently it would be easy to make it look like an apple signed file .</tokentext>
<sentencetext>Certain settings can be changed on an iPhone just based on links/downloads clicked on from within Safari (on the device).
That is how iphone os 3.0.x users could enable tethering without jailbreaking their phones.
It was just a settings file that could be downloaded.
I believe it was unsigned, but now, apparently it would be easy to make it look like an apple signed file.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001400</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001470</id>
	<title>Re:IMPOSSIBLE</title>
	<author>Anonymous</author>
	<datestamp>1265106480000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>So you don't know the difference between a falsified PKI certificate and a virus...typical for a<nobr> <wbr></nobr>.Net programmer, I guess, but still disappointingly stupid.</p></htmltext>
<tokenext>So you do n't know the difference between a falsified PKI certificate and a virus...typical for a .Net programmer , I guess , but still disappointingly stupid .</tokentext>
<sentencetext>So you don't know the difference between a falsified PKI certificate and a virus...typical for a .Net programmer, I guess, but still disappointingly stupid.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001274</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31002174</id>
	<title>Is this really an SSL attack?</title>
	<author>Anonymous</author>
	<datestamp>1265110380000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext><p>I'm getting a little uneasy with SSL.  Nothing is safe.</p></htmltext>
<tokenext>I 'm getting a little uneasy with SSL .
Nothing is safe .</tokentext>
<sentencetext>I'm getting a little uneasy with SSL.
Nothing is safe.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31003196</id>
	<title>Re:Heh</title>
	<author>Kitkoan</author>
	<datestamp>1265116200000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>Its not who is better then the other, it's which one is the biggest player in the market which will get the most recognition. All software can be hacked, even locked ones. Just have to find the weak link and have an interest to do so</htmltext>
<tokenext>Its not who is better then the other , it 's which one is the biggest player in the market which will get the most recognition .
All software can be hacked , even locked ones .
Just have to find the weak link and have an interest to do so</tokentext>
<sentencetext>Its not who is better then the other, it's which one is the biggest player in the market which will get the most recognition.
All software can be hacked, even locked ones.
Just have to find the weak link and have an interest to do so</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001240</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31007244</id>
	<title>MD5 certs ...</title>
	<author>satyamcomments</author>
	<datestamp>1264930080000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Interestingly checked out the link lot of these certs are MD5

<a href="http://support.apple.com/kb/HT3580" title="apple.com" rel="nofollow">http://support.apple.com/kb/HT3580</a> [apple.com]</htmltext>
<tokenext>Interestingly checked out the link lot of these certs are MD5 http : //support.apple.com/kb/HT3580 [ apple.com ]</tokentext>
<sentencetext>Interestingly checked out the link lot of these certs are MD5

http://support.apple.com/kb/HT3580 [apple.com]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001314</id>
	<title>yikes!</title>
	<author>dropadrop</author>
	<datestamp>1265105820000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p> <i>"You can make any part of the phone not work. You definitely don't get to run code, but there's lots of nasty things you can do. You can make applications not work, make it so that you can't remove this config file. At the very least, you can make someone's day miserable."</i> </p><p>Sounds terrible<nobr> <wbr></nobr>:)</p><p>Seriously though, I've been wondering why there have been so few vulnerabilities on the iphone.</p></htmltext>
<tokenext>" You can make any part of the phone not work .
You definitely do n't get to run code , but there 's lots of nasty things you can do .
You can make applications not work , make it so that you ca n't remove this config file .
At the very least , you can make someone 's day miserable .
" Sounds terrible : ) Seriously though , I 've been wondering why there have been so few vulnerabilities on the iphone .</tokentext>
<sentencetext> "You can make any part of the phone not work.
You definitely don't get to run code, but there's lots of nasty things you can do.
You can make applications not work, make it so that you can't remove this config file.
At the very least, you can make someone's day miserable.
" Sounds terrible :)Seriously though, I've been wondering why there have been so few vulnerabilities on the iphone.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001728</id>
	<title>Re:Don't worry</title>
	<author>sopssa</author>
	<datestamp>1265108100000</datestamp>
	<modclass>Redundant</modclass>
	<modscore>0</modscore>
	<htmltext><p>Norton needs more processing power than <i>anything</i> could provide.</p></htmltext>
<tokenext>Norton needs more processing power than anything could provide .</tokentext>
<sentencetext>Norton needs more processing power than anything could provide.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001624</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31006556</id>
	<title>Re:Don't worry</title>
	<author>gemada</author>
	<datestamp>1265139480000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>Nortan Anti-Virus software is now available for iPhone too. I was wondering when it will become available.

Thanks now my iPhone works the same way as PC with Windows<nobr> <wbr></nobr>:)</p></div><p>i am not sure if you intentionally or unintentionally spelled Norton wrong. Either way your comment is still funny.</p></div>
	</htmltext>
<tokenext>Nortan Anti-Virus software is now available for iPhone too .
I was wondering when it will become available .
Thanks now my iPhone works the same way as PC with Windows : ) i am not sure if you intentionally or unintentionally spelled Norton wrong .
Either way your comment is still funny .</tokentext>
<sentencetext>Nortan Anti-Virus software is now available for iPhone too.
I was wondering when it will become available.
Thanks now my iPhone works the same way as PC with Windows :)i am not sure if you intentionally or unintentionally spelled Norton wrong.
Either way your comment is still funny.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001514</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001460</id>
	<title>Obligatory Blame Part 2</title>
	<author>Anonymous</author>
	<datestamp>1265106480000</datestamp>
	<modclass>Troll</modclass>
	<modscore>-1</modscore>
	<htmltext><p><a href="http://www.youtube.com/watch?v=5TEvacFETvM" title="youtube.com" rel="nofollow">North Korea or China</a> [youtube.com].</p><p>Yours In Vilnius,<br>Kilgore T.</p></htmltext>
<tokenext>North Korea or China [ youtube.com ] .Yours In Vilnius,Kilgore T .</tokentext>
<sentencetext>North Korea or China [youtube.com].Yours In Vilnius,Kilgore T.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001454</id>
	<title>No danger...</title>
	<author>Pedrito</author>
	<datestamp>1265106420000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><i>'It definitely works. I downloaded the file and ran it and it worked,' Miller said. 'The only thing is that it warns you that the file will change your phone, but it also says that the certificate is from Apple and it's been verified.'"</i> <br> <br>

That's it? Who'd be dumb enough to fall for t#1$j213!\%<br>
NO CARRIER</htmltext>
<tokenext>'It definitely works .
I downloaded the file and ran it and it worked, ' Miller said .
'The only thing is that it warns you that the file will change your phone , but it also says that the certificate is from Apple and it 's been verified .
' " That 's it ?
Who 'd be dumb enough to fall for t # 1 $ j213 ! \ % NO CARRIER</tokentext>
<sentencetext>'It definitely works.
I downloaded the file and ran it and it worked,' Miller said.
'The only thing is that it warns you that the file will change your phone, but it also says that the certificate is from Apple and it's been verified.
'"  

That's it?
Who'd be dumb enough to fall for t#1$j213!\%
NO CARRIER</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31027270</id>
	<title>"No Chatter"</title>
	<author>Swift2001</author>
	<datestamp>1265279220000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>The chatter about how "insecure" the Mac is, supposedly, is deafening in the pro-Windows and pro-Linux circles. Since 99.99\% of Mac, iPhone, etc., users have never experienced this horrible invasion by malware, they think you're nuts.</p><p>Security is a huge problem for anyone using the Internet. It seems that Windows, after years of utter nightmare, may be locking things up, though each month, it seems, there's new updates. But the biggest vector this year is expected to be Adobe: Flash and Reader are incredibly vulnerable, apps and plugins, and the company seems to be asleep at the switch about issuing security upgrades.</p><p>The fundamental problem here is with Verisign and the other certificate issuers. Any evidence that this kind of hack, resulting in a man in the middle attack and a degradation of the use of certificates in general, is not possible in other OSes?</p></htmltext>
<tokenext>The chatter about how " insecure " the Mac is , supposedly , is deafening in the pro-Windows and pro-Linux circles .
Since 99.99 \ % of Mac , iPhone , etc. , users have never experienced this horrible invasion by malware , they think you 're nuts.Security is a huge problem for anyone using the Internet .
It seems that Windows , after years of utter nightmare , may be locking things up , though each month , it seems , there 's new updates .
But the biggest vector this year is expected to be Adobe : Flash and Reader are incredibly vulnerable , apps and plugins , and the company seems to be asleep at the switch about issuing security upgrades.The fundamental problem here is with Verisign and the other certificate issuers .
Any evidence that this kind of hack , resulting in a man in the middle attack and a degradation of the use of certificates in general , is not possible in other OSes ?</tokentext>
<sentencetext>The chatter about how "insecure" the Mac is, supposedly, is deafening in the pro-Windows and pro-Linux circles.
Since 99.99\% of Mac, iPhone, etc., users have never experienced this horrible invasion by malware, they think you're nuts.Security is a huge problem for anyone using the Internet.
It seems that Windows, after years of utter nightmare, may be locking things up, though each month, it seems, there's new updates.
But the biggest vector this year is expected to be Adobe: Flash and Reader are incredibly vulnerable, apps and plugins, and the company seems to be asleep at the switch about issuing security upgrades.The fundamental problem here is with Verisign and the other certificate issuers.
Any evidence that this kind of hack, resulting in a man in the middle attack and a degradation of the use of certificates in general, is not possible in other OSes?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31002266</id>
	<title>Too much sensationalism?</title>
	<author>kryptopath</author>
	<datestamp>1265111100000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext>Initial (anonymous) author of TFA here:

<p>Do not blame Verisign for issuing a temporary signature certificate without verification: this is stated clearly in their Level 1 certificate statuses and will sure be found with many other certificate issuers. The issue is completely on Apple for trusting a certificate of that kind for an over-the-air update. That kind of certificate is issued without any verification so you could have it delivered to any name you wanted, including your target's IT department. As mentioned in the article Apple should not use Safari's keychain to check the trust chain.</p><p>As mentioned in one of the posts below, this is a chicken-and-egg issue that has no obvious solutions. While making an OTA update process secure is a really hard problem, I do believe that Apple has not really looked into all the consequences of their choices. They have released a newer OTA protocol version with iPhone OS 3 which may be harder to subvert than this one.</p></htmltext>
<tokenext>Initial ( anonymous ) author of TFA here : Do not blame Verisign for issuing a temporary signature certificate without verification : this is stated clearly in their Level 1 certificate statuses and will sure be found with many other certificate issuers .
The issue is completely on Apple for trusting a certificate of that kind for an over-the-air update .
That kind of certificate is issued without any verification so you could have it delivered to any name you wanted , including your target 's IT department .
As mentioned in the article Apple should not use Safari 's keychain to check the trust chain.As mentioned in one of the posts below , this is a chicken-and-egg issue that has no obvious solutions .
While making an OTA update process secure is a really hard problem , I do believe that Apple has not really looked into all the consequences of their choices .
They have released a newer OTA protocol version with iPhone OS 3 which may be harder to subvert than this one .</tokentext>
<sentencetext>Initial (anonymous) author of TFA here:

Do not blame Verisign for issuing a temporary signature certificate without verification: this is stated clearly in their Level 1 certificate statuses and will sure be found with many other certificate issuers.
The issue is completely on Apple for trusting a certificate of that kind for an over-the-air update.
That kind of certificate is issued without any verification so you could have it delivered to any name you wanted, including your target's IT department.
As mentioned in the article Apple should not use Safari's keychain to check the trust chain.As mentioned in one of the posts below, this is a chicken-and-egg issue that has no obvious solutions.
While making an OTA update process secure is a really hard problem, I do believe that Apple has not really looked into all the consequences of their choices.
They have released a newer OTA protocol version with iPhone OS 3 which may be harder to subvert than this one.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31008302</id>
	<title>Why not bigger news?</title>
	<author>hysonmb</author>
	<datestamp>1264942860000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>So now I guess everyone is going to talk about how secure Windows Mobile is because there aren't so many exploits targeting it? It's simply a matter of marketshare.
In the PC space, Windows is #1 so there are more high profile attacks against it.
In the mobile space, the iPhone is killing the competition so people are attacking it.
The only thing surprising about these types of attacks to me is that they only seem to make headlines in the geek press. An issue like this targeting a desktop (no matter who makes it) would be all over the news since they seem to enjoy spreading FUD. If they broadcast this, they'll have people cancelling data plans and buying Tracphones by the end of the day. But, it's rare to ever hear about mobile vulnerabilities outside of the tech circles even though the mobile market is huge.</htmltext>
<tokenext>So now I guess everyone is going to talk about how secure Windows Mobile is because there are n't so many exploits targeting it ?
It 's simply a matter of marketshare .
In the PC space , Windows is # 1 so there are more high profile attacks against it .
In the mobile space , the iPhone is killing the competition so people are attacking it .
The only thing surprising about these types of attacks to me is that they only seem to make headlines in the geek press .
An issue like this targeting a desktop ( no matter who makes it ) would be all over the news since they seem to enjoy spreading FUD .
If they broadcast this , they 'll have people cancelling data plans and buying Tracphones by the end of the day .
But , it 's rare to ever hear about mobile vulnerabilities outside of the tech circles even though the mobile market is huge .</tokentext>
<sentencetext>So now I guess everyone is going to talk about how secure Windows Mobile is because there aren't so many exploits targeting it?
It's simply a matter of marketshare.
In the PC space, Windows is #1 so there are more high profile attacks against it.
In the mobile space, the iPhone is killing the competition so people are attacking it.
The only thing surprising about these types of attacks to me is that they only seem to make headlines in the geek press.
An issue like this targeting a desktop (no matter who makes it) would be all over the news since they seem to enjoy spreading FUD.
If they broadcast this, they'll have people cancelling data plans and buying Tracphones by the end of the day.
But, it's rare to ever hear about mobile vulnerabilities outside of the tech circles even though the mobile market is huge.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31002256</id>
	<title>Re:Don't worry</title>
	<author>Anonymous</author>
	<datestamp>1265111040000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><blockquote><div><p>Nortan Anti-Virus software is now available for iPhone too. I was wondering when it will become available. Thanks now my iPhone works the same way as PC with Windows<nobr> <wbr></nobr>:)</p></div></blockquote><p>Good thing the iPhone doesn't have user multitasking or backgrounding (yet), or the only way to stop it would be to restore the device from scratch!</p><p>Imagine you Android and Palm Pre users with an app you can't kill - you try, and it just restarts itself in the background...</p></div>
	</htmltext>
<tokenext>Nortan Anti-Virus software is now available for iPhone too .
I was wondering when it will become available .
Thanks now my iPhone works the same way as PC with Windows : ) Good thing the iPhone does n't have user multitasking or backgrounding ( yet ) , or the only way to stop it would be to restore the device from scratch ! Imagine you Android and Palm Pre users with an app you ca n't kill - you try , and it just restarts itself in the background.. .</tokentext>
<sentencetext>Nortan Anti-Virus software is now available for iPhone too.
I was wondering when it will become available.
Thanks now my iPhone works the same way as PC with Windows :)Good thing the iPhone doesn't have user multitasking or backgrounding (yet), or the only way to stop it would be to restore the device from scratch!Imagine you Android and Palm Pre users with an app you can't kill - you try, and it just restarts itself in the background...
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001514</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001968</id>
	<title>How is this related to the iPhone?</title>
	<author>Anonymous</author>
	<datestamp>1265109360000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>3</modscore>
	<htmltext>The "attack" in TFA doesn't mention anything necessarily specific to the iPhone. The attackers got Verisign to sign a cert with the name "Apple Computer." That is a social engineering problem, not a security implementation flaw of the iPhone.<br> <br>
I bet the headline would get even more pageviews if they claimed this was an iPad flaw instead of iPhone.</htmltext>
<tokenext>The " attack " in TFA does n't mention anything necessarily specific to the iPhone .
The attackers got Verisign to sign a cert with the name " Apple Computer .
" That is a social engineering problem , not a security implementation flaw of the iPhone .
I bet the headline would get even more pageviews if they claimed this was an iPad flaw instead of iPhone .</tokentext>
<sentencetext>The "attack" in TFA doesn't mention anything necessarily specific to the iPhone.
The attackers got Verisign to sign a cert with the name "Apple Computer.
" That is a social engineering problem, not a security implementation flaw of the iPhone.
I bet the headline would get even more pageviews if they claimed this was an iPad flaw instead of iPhone.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001556</id>
	<title>Re:Don't worry</title>
	<author>Anonymous</author>
	<datestamp>1265107200000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>1</modscore>
	<htmltext><p>Are you sure that's a <em>good</em> thing?</p></htmltext>
<tokenext>Are you sure that 's a good thing ?</tokentext>
<sentencetext>Are you sure that's a good thing?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001514</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001786</id>
	<title>expand every post...?</title>
	<author>Anonymous</author>
	<datestamp>1265108400000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Wow!! every comment modded down to 2 or below except for 2 posts.Both of them modded informative and interesting because they claimed the iphone was safe. Apple fanboies are out in force today.</p></htmltext>
<tokenext>Wow ! !
every comment modded down to 2 or below except for 2 posts.Both of them modded informative and interesting because they claimed the iphone was safe .
Apple fanboies are out in force today .</tokentext>
<sentencetext>Wow!!
every comment modded down to 2 or below except for 2 posts.Both of them modded informative and interesting because they claimed the iphone was safe.
Apple fanboies are out in force today.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001934</id>
	<title>Re:Don't worry</title>
	<author>greyline</author>
	<datestamp>1265109240000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Sounds like Norton is the Chuck Norris of AV software.</htmltext>
<tokenext>Sounds like Norton is the Chuck Norris of AV software .</tokentext>
<sentencetext>Sounds like Norton is the Chuck Norris of AV software.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001624</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31019214</id>
	<title>Proof of escalation</title>
	<author>ALeader71</author>
	<datestamp>1264963200000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>In any war, escalation is inevitable.  First we had spyware that took over your browser.  Next spyware silently monitored your actions.  Today spyware removes competing or incompatible spyware prior to installation.  We've seen the future and it requires no local code execution.</p></htmltext>
<tokenext>In any war , escalation is inevitable .
First we had spyware that took over your browser .
Next spyware silently monitored your actions .
Today spyware removes competing or incompatible spyware prior to installation .
We 've seen the future and it requires no local code execution .</tokentext>
<sentencetext>In any war, escalation is inevitable.
First we had spyware that took over your browser.
Next spyware silently monitored your actions.
Today spyware removes competing or incompatible spyware prior to installation.
We've seen the future and it requires no local code execution.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31004714</id>
	<title>Re:yikes!</title>
	<author>BitZtream</author>
	<datestamp>1265125860000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>The part you quoted is rather untrue.</p><blockquote><div><p>You can make applications not work, make it so that you can't remove this config file. At the very least, you can make someone's day miserable.</p></div></blockquote><p>Right up until they old down the power and home button for a few seconds and wipe the device.  Plug it in to the PC, restore, done.</p><p>This isn't a vulnerability in the phone, it is be design.</p><p>You can argue that its a design flaw, but its a direct result of features requested by users.  Everything about this exploit is a direct result of requests from businesses and users.  If Apple 'locked it down' to make it safer, we'd end up with everyone bitching about it being closed and under apples control like the AppStore whining.</p></div>
	</htmltext>
<tokenext>The part you quoted is rather untrue.You can make applications not work , make it so that you ca n't remove this config file .
At the very least , you can make someone 's day miserable.Right up until they old down the power and home button for a few seconds and wipe the device .
Plug it in to the PC , restore , done.This is n't a vulnerability in the phone , it is be design.You can argue that its a design flaw , but its a direct result of features requested by users .
Everything about this exploit is a direct result of requests from businesses and users .
If Apple 'locked it down ' to make it safer , we 'd end up with everyone bitching about it being closed and under apples control like the AppStore whining .</tokentext>
<sentencetext>The part you quoted is rather untrue.You can make applications not work, make it so that you can't remove this config file.
At the very least, you can make someone's day miserable.Right up until they old down the power and home button for a few seconds and wipe the device.
Plug it in to the PC, restore, done.This isn't a vulnerability in the phone, it is be design.You can argue that its a design flaw, but its a direct result of features requested by users.
Everything about this exploit is a direct result of requests from businesses and users.
If Apple 'locked it down' to make it safer, we'd end up with everyone bitching about it being closed and under apples control like the AppStore whining.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001314</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001378</id>
	<title>Re:IMPOSSIBLE</title>
	<author>Ziwcam</author>
	<datestamp>1265106060000</datestamp>
	<modclass>Troll</modclass>
	<modscore>0</modscore>
	<htmltext>Still not a virus
Fake edit: Bah, beat by someone who didn't bother to log in.</htmltext>
<tokenext>Still not a virus Fake edit : Bah , beat by someone who did n't bother to log in .</tokentext>
<sentencetext>Still not a virus
Fake edit: Bah, beat by someone who didn't bother to log in.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001274</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001956</id>
	<title>and why not...</title>
	<author>Anonymous</author>
	<datestamp>1265109360000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>There's an app for THAT??</p></htmltext>
<tokenext>There 's an app for THAT ?
?</tokentext>
<sentencetext>There's an app for THAT?
?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001784</id>
	<title>Re:No danger...</title>
	<author>Anonymous</author>
	<datestamp>1265108400000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>5</modscore>
	<htmltext><p>I don't think there's really any security check that Apple could have performed on an over-the-air configuration profile that would not defeat the purpose of having such a profile.  The idea is to make it as painless as possible for users to sign up for custom settings specific to a company where they work or whatever (e.g. adding corporate firewall keys, that sort of thing).  As soon as you limit who can sign the profiles, they become useless, and if Apple required everyone to sign up for a signing cert through them, everyone would be jumping up and down screaming that Apple is being too controlling.  It's truly a no-win.</p><p>Even if they added an extra check to make sure the signing cert doesn't have<nobr> <wbr></nobr>/^\s*Apple\s*$/i or<nobr> <wbr></nobr>/^\s*Apple\s*Computer\s*$/i as the company name, that still doesn't fully solve the problem.  Many users would just as quickly tap "OK" for an update that claimed to be from any company they trust---their bank, Google, Yahoo, PayPal, AT&amp;T, etc.  And making the warning sterner only helps if people read it and understand it.  I'm just not convinced that this problem has a solution short of not trusting incompetent cert providers with a history of issuing certs in the name of other companies.</p><p>The real security flaw here, IMHO, is that Verisign issued this company a signing certificate with the name Apple Computer.  And this <a href="http://www.amug.org/~glguerin/opinion/revocation.html" title="amug.org">isn't the first time Verisign has done something stupid like that</a> [amug.org].  They've repeatedly shown themselves completely incapable of doing even basic sanity checking before handing out signing certificates, SSL certificates, etc.  Thus, IMHO, their code signing certs are inherently no more trustworthy than a self-signed cert or someone typing the name of a company into a field in a plist file.  As far as I'm concerned, they should be dropped from the list of trusted roots.  If Safari and Firefox both did this, they would eventually shrivel up and die like the inept hack of a company they are.</p></htmltext>
<tokenext>I do n't think there 's really any security check that Apple could have performed on an over-the-air configuration profile that would not defeat the purpose of having such a profile .
The idea is to make it as painless as possible for users to sign up for custom settings specific to a company where they work or whatever ( e.g .
adding corporate firewall keys , that sort of thing ) .
As soon as you limit who can sign the profiles , they become useless , and if Apple required everyone to sign up for a signing cert through them , everyone would be jumping up and down screaming that Apple is being too controlling .
It 's truly a no-win.Even if they added an extra check to make sure the signing cert does n't have / ^ \ s * Apple \ s * $ /i or / ^ \ s * Apple \ s * Computer \ s * $ /i as the company name , that still does n't fully solve the problem .
Many users would just as quickly tap " OK " for an update that claimed to be from any company they trust---their bank , Google , Yahoo , PayPal , AT&amp;T , etc .
And making the warning sterner only helps if people read it and understand it .
I 'm just not convinced that this problem has a solution short of not trusting incompetent cert providers with a history of issuing certs in the name of other companies.The real security flaw here , IMHO , is that Verisign issued this company a signing certificate with the name Apple Computer .
And this is n't the first time Verisign has done something stupid like that [ amug.org ] .
They 've repeatedly shown themselves completely incapable of doing even basic sanity checking before handing out signing certificates , SSL certificates , etc .
Thus , IMHO , their code signing certs are inherently no more trustworthy than a self-signed cert or someone typing the name of a company into a field in a plist file .
As far as I 'm concerned , they should be dropped from the list of trusted roots .
If Safari and Firefox both did this , they would eventually shrivel up and die like the inept hack of a company they are .</tokentext>
<sentencetext>I don't think there's really any security check that Apple could have performed on an over-the-air configuration profile that would not defeat the purpose of having such a profile.
The idea is to make it as painless as possible for users to sign up for custom settings specific to a company where they work or whatever (e.g.
adding corporate firewall keys, that sort of thing).
As soon as you limit who can sign the profiles, they become useless, and if Apple required everyone to sign up for a signing cert through them, everyone would be jumping up and down screaming that Apple is being too controlling.
It's truly a no-win.Even if they added an extra check to make sure the signing cert doesn't have /^\s*Apple\s*$/i or /^\s*Apple\s*Computer\s*$/i as the company name, that still doesn't fully solve the problem.
Many users would just as quickly tap "OK" for an update that claimed to be from any company they trust---their bank, Google, Yahoo, PayPal, AT&amp;T, etc.
And making the warning sterner only helps if people read it and understand it.
I'm just not convinced that this problem has a solution short of not trusting incompetent cert providers with a history of issuing certs in the name of other companies.The real security flaw here, IMHO, is that Verisign issued this company a signing certificate with the name Apple Computer.
And this isn't the first time Verisign has done something stupid like that [amug.org].
They've repeatedly shown themselves completely incapable of doing even basic sanity checking before handing out signing certificates, SSL certificates, etc.
Thus, IMHO, their code signing certs are inherently no more trustworthy than a self-signed cert or someone typing the name of a company into a field in a plist file.
As far as I'm concerned, they should be dropped from the list of trusted roots.
If Safari and Firefox both did this, they would eventually shrivel up and die like the inept hack of a company they are.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001454</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31003200</id>
	<title>Re:How is this related to the iPhone?</title>
	<author>exomondo</author>
	<datestamp>1265116200000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>4</modscore>
	<htmltext><p><div class="quote"><p>The "attack" in TFA doesn't mention anything necessarily specific to the iPhone.</p></div><p>Yes it does:</p><p><div class="quote"><p>The iPhone by default will trust configuration files that it receives over the air or while connected to a PC, as long as the file is signed by a trusted implementation of the iPhone Configuration Utility, a desktop application used to create config files for iPhones. However, the iPhone also will accept a file that is signed by a signature-only certificate</p></div></div>
	</htmltext>
<tokenext>The " attack " in TFA does n't mention anything necessarily specific to the iPhone.Yes it does : The iPhone by default will trust configuration files that it receives over the air or while connected to a PC , as long as the file is signed by a trusted implementation of the iPhone Configuration Utility , a desktop application used to create config files for iPhones .
However , the iPhone also will accept a file that is signed by a signature-only certificate</tokentext>
<sentencetext>The "attack" in TFA doesn't mention anything necessarily specific to the iPhone.Yes it does:The iPhone by default will trust configuration files that it receives over the air or while connected to a PC, as long as the file is signed by a trusted implementation of the iPhone Configuration Utility, a desktop application used to create config files for iPhones.
However, the iPhone also will accept a file that is signed by a signature-only certificate
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001968</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31002898</id>
	<title>MITM</title>
	<author>amicusNYCL</author>
	<datestamp>1265114640000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>enabling him to man-in-the-middle SSL traffic from that phone</p></div><p>So "man-in-the-middle" is a verb now, huh?</p></div>
	</htmltext>
<tokenext>enabling him to man-in-the-middle SSL traffic from that phoneSo " man-in-the-middle " is a verb now , huh ?</tokentext>
<sentencetext>enabling him to man-in-the-middle SSL traffic from that phoneSo "man-in-the-middle" is a verb now, huh?
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31002604</id>
	<title>Re:No danger...</title>
	<author>Anonymous</author>
	<datestamp>1265113080000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>2</modscore>
	<htmltext>Hello, my name is Steve Jobs and I would like to thank you for defending my honour.</htmltext>
<tokenext>Hello , my name is Steve Jobs and I would like to thank you for defending my honour .</tokentext>
<sentencetext>Hello, my name is Steve Jobs and I would like to thank you for defending my honour.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001784</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001374</id>
	<title>Re:IMPOSSIBLE</title>
	<author>Anonymous</author>
	<datestamp>1265106060000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><div class="quote"><p>The iPhone by default will trust configuration files that it receives over the air or while connected to a <b>PC</b>...</p></div><p>There you have it, it's Microsoft's fault. </p><p>Apple's in the clear.</p></div>
	</htmltext>
<tokenext>The iPhone by default will trust configuration files that it receives over the air or while connected to a PC...There you have it , it 's Microsoft 's fault .
Apple 's in the clear .</tokentext>
<sentencetext>The iPhone by default will trust configuration files that it receives over the air or while connected to a PC...There you have it, it's Microsoft's fault.
Apple's in the clear.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001274</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31003902</id>
	<title>Re:yikes!</title>
	<author>TrancePhreak</author>
	<datestamp>1265120520000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>The SMS vulnerability makes up for it in my opinion.</htmltext>
<tokenext>The SMS vulnerability makes up for it in my opinion .</tokentext>
<sentencetext>The SMS vulnerability makes up for it in my opinion.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001314</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31005456</id>
	<title>App lockdown and security</title>
	<author>physburn</author>
	<datestamp>1265130060000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>  This goes to show that Apple's policy of lockdown down
applications only to come from Apple's own store has
down nothing to make its iPhone more secure. Its perphaps
unlucky that a white hat researcher found the flaw first, as
Apple needs someone to shock it out of its Apple applicances
only use Apple allowed code policy.
<p>
---
</p><p>
<a href="http://www.feeddistiller.com/blogs/Mobile\%20Phones/feed.html" title="feeddistiller.com">Mobile Phones</a> [feeddistiller.com] Feed @ <a href="http://www.feeddistiller.com/" title="feeddistiller.com">Feed Distiller</a> [feeddistiller.com]</p></htmltext>
<tokenext>This goes to show that Apple 's policy of lockdown down applications only to come from Apple 's own store has down nothing to make its iPhone more secure .
Its perphaps unlucky that a white hat researcher found the flaw first , as Apple needs someone to shock it out of its Apple applicances only use Apple allowed code policy .
--- Mobile Phones [ feeddistiller.com ] Feed @ Feed Distiller [ feeddistiller.com ]</tokentext>
<sentencetext>  This goes to show that Apple's policy of lockdown down
applications only to come from Apple's own store has
down nothing to make its iPhone more secure.
Its perphaps
unlucky that a white hat researcher found the flaw first, as
Apple needs someone to shock it out of its Apple applicances
only use Apple allowed code policy.
---

Mobile Phones [feeddistiller.com] Feed @ Feed Distiller [feeddistiller.com]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31004514</id>
	<title>Re:Don't worry</title>
	<author>Anonymous</author>
	<datestamp>1265124660000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Too bad you can't run multiple apps. That means you can't run your crappy AV at the same time as your crappy browser. YOU CAN ONLY USE YOUR ANTIVIRUS WHEN YOU DO NOT NEED IT.</p><p>That would be effing brilliant.</p></htmltext>
<tokenext>Too bad you ca n't run multiple apps .
That means you ca n't run your crappy AV at the same time as your crappy browser .
YOU CAN ONLY USE YOUR ANTIVIRUS WHEN YOU DO NOT NEED IT.That would be effing brilliant .</tokentext>
<sentencetext>Too bad you can't run multiple apps.
That means you can't run your crappy AV at the same time as your crappy browser.
YOU CAN ONLY USE YOUR ANTIVIRUS WHEN YOU DO NOT NEED IT.That would be effing brilliant.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001514</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001266</id>
	<title>Thank Ghod I run Windows</title>
	<author>Anonymous</author>
	<datestamp>1265105640000</datestamp>
	<modclass>Funny</modclass>
	<modscore>5</modscore>
	<htmltext><p>Oh my!  These repeated iPhone &amp; Mac attacks are making me happy I run MS-Windows on my *(@&amp;!)Sw2<br>***NO CARRIER***</p></htmltext>
<tokenext>Oh my !
These repeated iPhone &amp; Mac attacks are making me happy I run MS-Windows on my * ( @ &amp; !
) Sw2 * * * NO CARRIER * * *</tokentext>
<sentencetext>Oh my!
These repeated iPhone &amp; Mac attacks are making me happy I run MS-Windows on my *(@&amp;!
)Sw2***NO CARRIER***</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001624</id>
	<title>Re:Don't worry</title>
	<author>Anonymous</author>
	<datestamp>1265107620000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I was under the impression that Norton needed more processing power than the iPhone could provide.</htmltext>
<tokenext>I was under the impression that Norton needed more processing power than the iPhone could provide .</tokentext>
<sentencetext>I was under the impression that Norton needed more processing power than the iPhone could provide.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001514</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001722</id>
	<title>Now that...</title>
	<author>Anonymous</author>
	<datestamp>1265108100000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Now that...</p><p>Is a killer app.</p></htmltext>
<tokenext>Now that...Is a killer app .</tokentext>
<sentencetext>Now that...Is a killer app.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31002738</id>
	<title>Re:Heh</title>
	<author>Anonymous</author>
	<datestamp>1265113800000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>You probably wouldn't even need to make it look like Apple signed it. How many people do you think would tap OK even if it said the file came from "Bubbles O'Rly"?</p><p>Apple supposedly set up a walled garden for apps to prevent people from doing stupid stuff to their phone, and then left in such a simple way to do something stupid to the phone. My reaction to this is somewhere between a sarcastic oops and a complete facepalm.</p></htmltext>
<tokenext>You probably would n't even need to make it look like Apple signed it .
How many people do you think would tap OK even if it said the file came from " Bubbles O'Rly " ? Apple supposedly set up a walled garden for apps to prevent people from doing stupid stuff to their phone , and then left in such a simple way to do something stupid to the phone .
My reaction to this is somewhere between a sarcastic oops and a complete facepalm .</tokentext>
<sentencetext>You probably wouldn't even need to make it look like Apple signed it.
How many people do you think would tap OK even if it said the file came from "Bubbles O'Rly"?Apple supposedly set up a walled garden for apps to prevent people from doing stupid stuff to their phone, and then left in such a simple way to do something stupid to the phone.
My reaction to this is somewhere between a sarcastic oops and a complete facepalm.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001480</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001274</id>
	<title>IMPOSSIBLE</title>
	<author>Anonymous</author>
	<datestamp>1265105640000</datestamp>
	<modclass>Funny</modclass>
	<modscore>1</modscore>
	<htmltext>Cmon, everyone knows that Apple products are impervious to viruses.<nobr> <wbr></nobr>....bahahahahaha</htmltext>
<tokenext>Cmon , everyone knows that Apple products are impervious to viruses .
....bahahahahaha</tokentext>
<sentencetext>Cmon, everyone knows that Apple products are impervious to viruses.
....bahahahahaha</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31003488</id>
	<title>Wrong title?</title>
	<author>jma05</author>
	<datestamp>1265117700000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>1</modscore>
	<htmltext>This is a vulnerability, not an attack that has happened. Vulnerabilities can *potentially* lead to attacks. The title implies that it had already happened.
AFAIK, testing vulnerabilities is not termed an attack; only when they are exploited by a malicious third party.</htmltext>
<tokenext>This is a vulnerability , not an attack that has happened .
Vulnerabilities can * potentially * lead to attacks .
The title implies that it had already happened .
AFAIK , testing vulnerabilities is not termed an attack ; only when they are exploited by a malicious third party .</tokentext>
<sentencetext>This is a vulnerability, not an attack that has happened.
Vulnerabilities can *potentially* lead to attacks.
The title implies that it had already happened.
AFAIK, testing vulnerabilities is not termed an attack; only when they are exploited by a malicious third party.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001240</id>
	<title>Heh</title>
	<author>Anonymous</author>
	<datestamp>1265105520000</datestamp>
	<modclass>Funny</modclass>
	<modscore>4</modscore>
	<htmltext><p>::cue "see, Apple isn't perfect" comments::</p><p>See?  Apple isn't perfect!</p></htmltext>
<tokenext>: : cue " see , Apple is n't perfect " comments : : See ?
Apple is n't perfect !</tokentext>
<sentencetext>::cue "see, Apple isn't perfect" comments::See?
Apple isn't perfect!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31003016</id>
	<title>Um maybe not Apples problem....</title>
	<author>sbeckstead</author>
	<datestamp>1265115180000</datestamp>
	<modclass>Troll</modclass>
	<modscore>0</modscore>
	<htmltext><i>the anonymous researchers obtained a signature certificate from VeriSign for a company named Apple Computer. </i> <br>
From the article it looks like Verisign is the problem here.</htmltext>
<tokenext>the anonymous researchers obtained a signature certificate from VeriSign for a company named Apple Computer .
From the article it looks like Verisign is the problem here .</tokentext>
<sentencetext>the anonymous researchers obtained a signature certificate from VeriSign for a company named Apple Computer.
From the article it looks like Verisign is the problem here.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001790</id>
	<title>Thank goodness...</title>
	<author>metamatic</author>
	<datestamp>1265108400000</datestamp>
	<modclass>Funny</modclass>
	<modscore>3</modscore>
	<htmltext><p>...the iPhone controls what software you're allowed to run, to keep it secure. Otherwise it would suffer from exploits like this one.</p></htmltext>
<tokenext>...the iPhone controls what software you 're allowed to run , to keep it secure .
Otherwise it would suffer from exploits like this one .</tokentext>
<sentencetext>...the iPhone controls what software you're allowed to run, to keep it secure.
Otherwise it would suffer from exploits like this one.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31005340</id>
	<title>Re:2/2/2010 iPhone Patch</title>
	<author>gyrogeerloose</author>
	<datestamp>1265129460000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>Apple released a security update for the <a href="http://support.apple.com/kb/HT4013" title="apple.com">iPhone and iPod Touch</a> [apple.com] today.</p><p>Anyone know if this was addressed in that update?  There are a few Webkit updates in there (mostly multimedia exploits).</p></div><p>Nothing about malicious OTP files in there anywhere, I don't think this latest thing has been addressed. It would surprise me of Apple (or any other computer company) could move that fast to fix a vulnerability.</p></div>
	</htmltext>
<tokenext>Apple released a security update for the iPhone and iPod Touch [ apple.com ] today.Anyone know if this was addressed in that update ?
There are a few Webkit updates in there ( mostly multimedia exploits ) .Nothing about malicious OTP files in there anywhere , I do n't think this latest thing has been addressed .
It would surprise me of Apple ( or any other computer company ) could move that fast to fix a vulnerability .</tokentext>
<sentencetext>Apple released a security update for the iPhone and iPod Touch [apple.com] today.Anyone know if this was addressed in that update?
There are a few Webkit updates in there (mostly multimedia exploits).Nothing about malicious OTP files in there anywhere, I don't think this latest thing has been addressed.
It would surprise me of Apple (or any other computer company) could move that fast to fix a vulnerability.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001888</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001888</id>
	<title>2/2/2010 iPhone Patch</title>
	<author>Anonymous</author>
	<datestamp>1265109000000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Apple released a security update for the <a href="http://support.apple.com/kb/HT4013" title="apple.com" rel="nofollow">iPhone and iPod Touch</a> [apple.com] today.</p><p>Anyone know if this was addressed in that update?  There are a few Webkit updates in there (mostly multimedia exploits).</p></htmltext>
<tokenext>Apple released a security update for the iPhone and iPod Touch [ apple.com ] today.Anyone know if this was addressed in that update ?
There are a few Webkit updates in there ( mostly multimedia exploits ) .</tokentext>
<sentencetext>Apple released a security update for the iPhone and iPod Touch [apple.com] today.Anyone know if this was addressed in that update?
There are a few Webkit updates in there (mostly multimedia exploits).</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001710</id>
	<title>Re:Don't worry</title>
	<author>Monkeedude1212</author>
	<datestamp>1265108040000</datestamp>
	<modclass>Redundant</modclass>
	<modscore>0</modscore>
	<htmltext><p>Norton needs more processing power than <i>any PC</i> could provide.</p></htmltext>
<tokenext>Norton needs more processing power than any PC could provide .</tokentext>
<sentencetext>Norton needs more processing power than any PC could provide.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001624</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001424</id>
	<title>Re:Heh</title>
	<author>interkin3tic</author>
	<datestamp>1265106300000</datestamp>
	<modclass>Flamebait</modclass>
	<modscore>0</modscore>
	<htmltext><p><nobr> <wbr></nobr></p><div class="quote"><p>::cue "see, Apple isn't perfect" comments::</p><p>See? Apple isn't perfect!</p></div><p>Now cue "It's not a bug / a missing feature / an intentionally and pointlessly broken function / restriction put there by business interests to get you to spend more money for shit you already own, it's a feature" in 3...2...1...</p></div>
	</htmltext>
<tokenext>: : cue " see , Apple is n't perfect " comments : : See ?
Apple is n't perfect ! Now cue " It 's not a bug / a missing feature / an intentionally and pointlessly broken function / restriction put there by business interests to get you to spend more money for shit you already own , it 's a feature " in 3...2...1.. .</tokentext>
<sentencetext> ::cue "see, Apple isn't perfect" comments::See?
Apple isn't perfect!Now cue "It's not a bug / a missing feature / an intentionally and pointlessly broken function / restriction put there by business interests to get you to spend more money for shit you already own, it's a feature" in 3...2...1...
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001240</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31004722</id>
	<title>Apple doesn't take certificates seriously</title>
	<author>Boltronics</author>
	<datestamp>1265125860000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I've configured our local office WAP with WPA2-Enterprise and PEAP. I have to support this setup  on a variety of machines.</p><p>Windows machines (depending on the configuration) typically refuse to connect unless the root certificate presented is trusted first. Unfortunately the error is typically quite unhelpful, but at least it operates in a safe way. It's also not too obvious how to import certificates for non-techies.</p><p>GNU/Linux machines running NetworkManager such as Ubuntu IMHO do the right thing - warn if the root certificate is not trusted, but allow you to bypass the warning and connect if for whatever reason you want to. You are prompted to upload the root certificate file right on the connection box, so it's very user friendly and encourages secure behavior.</p><p>iPod Touch/iPhones don't offer any obvious way to import the certificate! Upon connection they do present you the certificate and ask if you would like to trust it... however when you scroll down to the fingerprint, half of it doesn't fit on the screen and you can't scroll to the right to see the rest of it! The most important thing you need to see and half of it's missing! What were they thinking?</p><p>I'm not surprised by this news at all.</p></htmltext>
<tokenext>I 've configured our local office WAP with WPA2-Enterprise and PEAP .
I have to support this setup on a variety of machines.Windows machines ( depending on the configuration ) typically refuse to connect unless the root certificate presented is trusted first .
Unfortunately the error is typically quite unhelpful , but at least it operates in a safe way .
It 's also not too obvious how to import certificates for non-techies.GNU/Linux machines running NetworkManager such as Ubuntu IMHO do the right thing - warn if the root certificate is not trusted , but allow you to bypass the warning and connect if for whatever reason you want to .
You are prompted to upload the root certificate file right on the connection box , so it 's very user friendly and encourages secure behavior.iPod Touch/iPhones do n't offer any obvious way to import the certificate !
Upon connection they do present you the certificate and ask if you would like to trust it... however when you scroll down to the fingerprint , half of it does n't fit on the screen and you ca n't scroll to the right to see the rest of it !
The most important thing you need to see and half of it 's missing !
What were they thinking ? I 'm not surprised by this news at all .</tokentext>
<sentencetext>I've configured our local office WAP with WPA2-Enterprise and PEAP.
I have to support this setup  on a variety of machines.Windows machines (depending on the configuration) typically refuse to connect unless the root certificate presented is trusted first.
Unfortunately the error is typically quite unhelpful, but at least it operates in a safe way.
It's also not too obvious how to import certificates for non-techies.GNU/Linux machines running NetworkManager such as Ubuntu IMHO do the right thing - warn if the root certificate is not trusted, but allow you to bypass the warning and connect if for whatever reason you want to.
You are prompted to upload the root certificate file right on the connection box, so it's very user friendly and encourages secure behavior.iPod Touch/iPhones don't offer any obvious way to import the certificate!
Upon connection they do present you the certificate and ask if you would like to trust it... however when you scroll down to the fingerprint, half of it doesn't fit on the screen and you can't scroll to the right to see the rest of it!
The most important thing you need to see and half of it's missing!
What were they thinking?I'm not surprised by this news at all.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001514</id>
	<title>Don't worry</title>
	<author>Anonymous</author>
	<datestamp>1265106900000</datestamp>
	<modclass>Funny</modclass>
	<modscore>3</modscore>
	<htmltext>Nortan Anti-Virus software is now available for iPhone too. I was wondering when it will become available.

Thanks now my iPhone works the same way as PC with Windows<nobr> <wbr></nobr>:)</htmltext>
<tokenext>Nortan Anti-Virus software is now available for iPhone too .
I was wondering when it will become available .
Thanks now my iPhone works the same way as PC with Windows : )</tokentext>
<sentencetext>Nortan Anti-Virus software is now available for iPhone too.
I was wondering when it will become available.
Thanks now my iPhone works the same way as PC with Windows :)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31009532</id>
	<title>So it is true....</title>
	<author>Anonymous</author>
	<datestamp>1264952400000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>.... if you can think of it, there's already an iPhone App for it.... hehe</p></htmltext>
<tokenext>.... if you can think of it , there 's already an iPhone App for it.... hehe</tokentext>
<sentencetext>.... if you can think of it, there's already an iPhone App for it.... hehe</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001400</id>
	<title>Re:Heh</title>
	<author>ijitjuice</author>
	<datestamp>1265106180000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>3</modscore>
	<htmltext>If you get apps from the app store how would this get installed?  If Im about n about this would just pop up on my screen?  I guess Im lost as to how it would get on my phone in the first place?</htmltext>
<tokenext>If you get apps from the app store how would this get installed ?
If Im about n about this would just pop up on my screen ?
I guess Im lost as to how it would get on my phone in the first place ?</tokentext>
<sentencetext>If you get apps from the app store how would this get installed?
If Im about n about this would just pop up on my screen?
I guess Im lost as to how it would get on my phone in the first place?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001240</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31016810</id>
	<title>iPad?</title>
	<author>commodoresloat</author>
	<datestamp>1264941720000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>I bet the headline would get even more pageviews if they claimed this was an iPad flaw instead of iPhone.</p></div><p>what the hell's an iPad?  an iPod from Boston?</p></div>
	</htmltext>
<tokenext>I bet the headline would get even more pageviews if they claimed this was an iPad flaw instead of iPhone.what the hell 's an iPad ?
an iPod from Boston ?</tokentext>
<sentencetext>I bet the headline would get even more pageviews if they claimed this was an iPad flaw instead of iPhone.what the hell's an iPad?
an iPod from Boston?
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001968</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31002288</id>
	<title>Re:No danger...</title>
	<author>Nerdfest</author>
	<datestamp>1265111160000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>everyone would be jumping up and down screaming that Apple is being too controlling. It's truly a no-win.</p></div><p>Yeah, because nobody would tolerate that.</p></div>
	</htmltext>
<tokenext>everyone would be jumping up and down screaming that Apple is being too controlling .
It 's truly a no-win.Yeah , because nobody would tolerate that .</tokentext>
<sentencetext>everyone would be jumping up and down screaming that Apple is being too controlling.
It's truly a no-win.Yeah, because nobody would tolerate that.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001784</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001766</id>
	<title>Re:Don't worry</title>
	<author>Anonymous</author>
	<datestamp>1265108280000</datestamp>
	<modclass>Funny</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>Nort<b>a</b>n Anti-Virus software is now available for iPhone too.</p></div><p>Buying knock offs again, eh?</p></div>
	</htmltext>
<tokenext>Nortan Anti-Virus software is now available for iPhone too.Buying knock offs again , eh ?</tokentext>
<sentencetext>Nortan Anti-Virus software is now available for iPhone too.Buying knock offs again, eh?
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001514</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001462</id>
	<title>Can that be used to sign ipcc and enable tethering</title>
	<author>darp</author>
	<datestamp>1265106480000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>2</modscore>
	<htmltext><p>Wasn't that the problems with tethering non-jailbroken phones?</p></htmltext>
<tokenext>Was n't that the problems with tethering non-jailbroken phones ?</tokentext>
<sentencetext>Wasn't that the problems with tethering non-jailbroken phones?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001904</id>
	<title>Re:Don't worry</title>
	<author>bjb\_admin</author>
	<datestamp>1265109120000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>As long as the virus database has only one entry in it Norton will be fine.</htmltext>
<tokenext>As long as the virus database has only one entry in it Norton will be fine .</tokentext>
<sentencetext>As long as the virus database has only one entry in it Norton will be fine.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001624</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31002290</id>
	<title>You don't need an iPad, iPod, or iPhone.</title>
	<author>Anonymous</author>
	<datestamp>1265111160000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Get a PC already.</p></htmltext>
<tokenext>Get a PC already .</tokentext>
<sentencetext>Get a PC already.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001568</id>
	<title>Re:yikes!</title>
	<author>interkin3tic</author>
	<datestamp>1265107260000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>Seriously though, I've been wondering why there have been so few vulnerabilities on the iphone.</p></div><p>Me too.  I guess my days of carelessly visiting untrustworthy but hott websites on my iphone and then clicking on whatever popups came up without bothering to read it are over.</p><p>It's a fetish, alright?  I like clicking on buttons while looking at pictures of goats.  Don't judge me.</p></div>
	</htmltext>
<tokenext>Seriously though , I 've been wondering why there have been so few vulnerabilities on the iphone.Me too .
I guess my days of carelessly visiting untrustworthy but hott websites on my iphone and then clicking on whatever popups came up without bothering to read it are over.It 's a fetish , alright ?
I like clicking on buttons while looking at pictures of goats .
Do n't judge me .</tokentext>
<sentencetext>Seriously though, I've been wondering why there have been so few vulnerabilities on the iphone.Me too.
I guess my days of carelessly visiting untrustworthy but hott websites on my iphone and then clicking on whatever popups came up without bothering to read it are over.It's a fetish, alright?
I like clicking on buttons while looking at pictures of goats.
Don't judge me.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001314</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001446</id>
	<title>you FaiL It</title>
	<author>Anonymous</author>
	<datestamp>1265106420000</datestamp>
	<modclass>Offtopic</modclass>
	<modscore>-1</modscore>
	<htmltext><A HREF="http://goat.cx/" title="goat.cx" rel="nofollow">su8e that by the Similarly grisly yea[r contract.</a> [goat.cx]</htmltext>
<tokenext>su8e that by the Similarly grisly yea [ r contract .
[ goat.cx ]</tokentext>
<sentencetext>su8e that by the Similarly grisly yea[r contract.
[goat.cx]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31003102</id>
	<title>Re:Don't worry</title>
	<author>sbeckstead</author>
	<datestamp>1265115600000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Closer to the Ron Popeil!</htmltext>
<tokenext>Closer to the Ron Popeil !</tokentext>
<sentencetext>Closer to the Ron Popeil!</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001934</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001422</id>
	<title>Phishing</title>
	<author>goldaryn</author>
	<datestamp>1265106300000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>So I guess that if you can route outbound web traffic through any server you like, you can phish login detail and who knows what else?</htmltext>
<tokenext>So I guess that if you can route outbound web traffic through any server you like , you can phish login detail and who knows what else ?</tokentext>
<sentencetext>So I guess that if you can route outbound web traffic through any server you like, you can phish login detail and who knows what else?</sentencetext>
</comment>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_02_1827219_15</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31006556
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001514
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_02_1827219_21</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001766
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001514
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_02_1827219_19</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001374
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001274
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_02_1827219_16</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31002738
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001480
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001400
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001240
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_02_1827219_13</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31004514
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001514
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_02_1827219_22</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001556
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001514
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_02_1827219_17</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31003102
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001934
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001624
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001514
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_02_1827219_20</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001710
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001624
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001514
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_02_1827219_3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31016810
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001968
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_02_1827219_0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001378
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001274
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_02_1827219_7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001424
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001240
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_02_1827219_1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31003902
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001314
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_02_1827219_4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31004714
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001314
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_02_1827219_10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31002256
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001514
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_02_1827219_8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31002288
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001784
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001454
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_02_1827219_5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001568
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001314
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_02_1827219_14</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31003200
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001968
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_02_1827219_2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001904
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001624
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001514
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_02_1827219_9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001728
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001624
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001514
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_02_1827219_6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31005340
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001888
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_02_1827219_12</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001470
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001274
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_02_1827219_11</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31002604
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001784
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001454
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_02_1827219_18</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31003196
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001240
</commentlist>
</thread>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_02_02_1827219.3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001454
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001784
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31002288
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31002604
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_02_02_1827219.1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31002174
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_02_02_1827219.4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001790
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_02_02_1827219.7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001266
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_02_02_1827219.2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001274
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001470
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001374
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001378
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_02_02_1827219.5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31003016
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_02_02_1827219.8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001314
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001568
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31004714
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31003902
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_02_02_1827219.6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001514
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001556
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31006556
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31004514
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31002256
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001624
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001710
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001904
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001934
---http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31003102
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001728
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001766
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_02_02_1827219.0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31002266
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_02_02_1827219.10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31005456
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_02_02_1827219.11</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001968
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31003200
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31016810
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_02_02_1827219.12</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001240
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001424
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31003196
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001400
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001480
---http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31002738
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_02_02_1827219.9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31001888
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_02_1827219.31005340
</commentlist>
</conversation>
