So even after an attacker finds a security bug that allows him access to the system, he can exploit it only by reusing commands that are already in Apple's software, a process security researcher Dino Dai Zovi has compared to writing a ransom note out of magazine clippings.
Roth was doing research on flight performance for a U.S. Air Force contractor and had relied on the assistance of Nourgostar and of Xin Dai, a Chinese national also studying under him.