Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

update: macOS Section #2702

Merged
merged 1 commit into from
Oct 26, 2024
Merged

update: macOS Section #2702

merged 1 commit into from
Oct 26, 2024

Conversation

friadev
Copy link
Contributor

@friadev friadev commented Aug 7, 2024

Changes proposed in this PR:

  • remove information about previous versions of macOS
  • added link about their promise to implement a mechanism to disable OCSP checks
  • removed unsourced claim that the majority of privacy concerns are over iCloud
  • add info about Standard Data Protection
  • add info about how to check if an app is sandboxed
  • add info about the Hardened Runtime
  • add info about notarization
  • updated for macOS Sequoia

Full disclosure: I copied parts of this from https://github.com/drduh/macOS-Security-and-Privacy-Guide?tab=readme-ov-file#app-sandbox however I wrote these parts so I'm only plagiarizing myself. The commands are from official Apple documentation which I link to so in the interest of having the most accurate info I haven't edited the commands at all

  • I agree to the terms listed below:
    Contribution terms (click to expand) 1) I am the sole author of this work. 2) I agree to grant Privacy Guides a perpetual, worldwide, non-exclusive, transferable, royalty-free, irrevocable license with the right to sublicense such rights through multiple tiers of sublicensees, to reproduce, modify, display, perform, relicense, and distribute my contribution as part of this project. 3) I have disclosed any relevant conflicts of interest in my post. 4) I agree to the Community Code of Conduct.

Copy link

github-actions bot commented Aug 7, 2024

Your preview is ready!

Name Link
🔨 Latest commit 6bc376f
😎 Preview https://2702--glowing-salamander-8d7127.netlify.app/

@friadev friadev marked this pull request as ready for review August 7, 2024 23:17
@@ -209,6 +209,21 @@ If an app is sandboxed, you should see
[Value]
[Bool] true
```

##### Hardened Runtime
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This and the sandboxing section feel a little unnecessary to me. If the results are no, as they will be in most cases, what is the reader supposed to do about that?

We should try to add actionable advice in both of these sections.

Copy link
Contributor Author

@friadev friadev Aug 7, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

hmm? They should know if it's sandboxed or not. Then they can decide if they want to run it, run in a VM, etc. People ask me a lot how they can tell if an app is sandboxed.

@dngray dngray changed the title Update macOS Section update: macOS Section Aug 7, 2024
@dngray dngray added c:os operating systems and related topics t:correction content corrections or errors labels Aug 7, 2024
@friadev friadev marked this pull request as draft August 8, 2024 01:32
@friadev
Copy link
Contributor Author

friadev commented Aug 8, 2024

Note to self: possibly mention .pkg vs .dmg for app installs. Also mention umask

Copy link
Member

@redoomed1 redoomed1 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm going to be busy when the new macOS version releases (late Sept or Oct?), so I thought to add my suggestions here while they're still fresh in our minds.

docs/os/macos-overview.md Outdated Show resolved Hide resolved
docs/os/macos-overview.md Outdated Show resolved Hide resolved
docs/os/macos-overview.md Outdated Show resolved Hide resolved
docs/os/macos-overview.md Show resolved Hide resolved
@@ -19,7 +19,7 @@ Brand new Apple silicon devices can be set up without an internet connection. Ho

macOS performs online checks when you open an app to verify whether an app contains known malware, and whether the developer’s signing certificate is revoked.

Previously, these checks were performed via an unencrypted OCSP protocol which could leak information about the apps you ran to your network. Apple upgraded their OCSP service to use HTTPS encryption in 2021, and [posted information](https://support.apple.com/HT202491) about their logging policy for this service. They additionally promised to add a mechanism for people to opt-out of this online check, but this has not been added to macOS as of July 2023.
Apple's OCSP service uses HTTPS encryption, so only they are able to see which apps you open. They've [posted information](https://support.apple.com/HT202491) about their logging policy for this service. They additionally [promised](http://lapcatsoftware.com/articles/2024/8/3.html) to add a mechanism for people to opt-out of this online check, but this has not been added to macOS.

While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running.
Copy link
Member

@redoomed1 redoomed1 Aug 8, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In the team chat, you emphasized the importance of OCSP checks to block malicious apps for which Apple revoked their certificates.

I think that this sentence can start out with talking about the importance of this feature, then you can mention the edge case for disabling the check.

badly compromised by the revocation checks

Because I'm not sure what this concretely entails

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Basically just means there's a longer period of time before your system would recognize the app as malicious.


The [Hardened Runtime](https://developer.apple.com/documentation/security/hardened_runtime) is an extra protection for apps that prevents certain classes of exploits. It improves the security of apps against exploitation by disabling certain features like JIT.

You can check if an app uses the Hardened Runtime using the command
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Not sure if this section needs to be here after our last convo, unless there's an obvious footgun that allows people to disable this, which you would like to emphasize not to do

However gatekeeper enforces hardened runtime
People are less likely to run an app when gatekeeper blocks them
And it’s not something you have to go out of you’ll way to check
In fact really it doesn’t apply on second thought
It’s enforced by gatekeeper my bad
In the same way the app store enforces the sandbox

Copy link
Contributor Author

@friadev friadev Aug 9, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yeah Gatekeeper is easily by passable as it is now, I think in the beta they're taking out the easy bypass and giving you a setting to disable it. So I'd like to keep this part in, maybe elaborate on that a bit. Also it only applies to apps and not other binaries.

It's kinda like the App Store in that you don't have to use it, but if you choose to only run apps that gatekeeper doesn't warn you about then you'll have better security.

docs/os/macos-overview.md Outdated Show resolved Hide resolved
docs/os/macos-overview.md Outdated Show resolved Hide resolved
docs/os/macos-overview.md Outdated Show resolved Hide resolved
@friadev friadev marked this pull request as ready for review August 22, 2024 08:58
@friadev friadev marked this pull request as draft September 15, 2024 19:51
@friadev friadev marked this pull request as ready for review September 17, 2024 18:53
@friadev friadev marked this pull request as draft September 17, 2024 22:40
@friadev friadev marked this pull request as ready for review September 17, 2024 22:47
Copy link
Member

@jonaharagon jonaharagon left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This PR looks great :)

I just want your opinion on the MAC address thing below.

docs/os/macos-overview.md Outdated Show resolved Hide resolved
docs/os/macos-overview.md Outdated Show resolved Hide resolved
docs/os/macos-overview.md Outdated Show resolved Hide resolved
jonaharagon
jonaharagon previously approved these changes Sep 18, 2024
@privacyguides-bot
Copy link
Collaborator

This pull request has been mentioned on Privacy Guides Community. There might be relevant details there:

https://discuss.privacyguides.net/t/macos-sequoia-supports-mac-randomisation/20988/5

docs/os/macos-overview.md Outdated Show resolved Hide resolved
docs/os/macos-overview.md Outdated Show resolved Hide resolved
docs/os/macos-overview.md Outdated Show resolved Hide resolved
docs/os/macos-overview.md Outdated Show resolved Hide resolved
docs/os/macos-overview.md Outdated Show resolved Hide resolved
docs/os/macos-overview.md Outdated Show resolved Hide resolved
docs/os/macos-overview.md Outdated Show resolved Hide resolved
docs/os/macos-overview.md Outdated Show resolved Hide resolved
docs/os/macos-overview.md Outdated Show resolved Hide resolved
Copy link
Member

@redoomed1 redoomed1 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

Signed-off-by: Daniel Gray <dngray@privacyguides.org>
Signed-off-by: redoomed1 <161974310+redoomed1@users.noreply.github.com>
@dngray dngray merged commit 6bc376f into privacyguides:main Oct 26, 2024
9 checks passed
@friadev friadev deleted the pr-macos branch October 27, 2024 02:47
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
c:os operating systems and related topics t:correction content corrections or errors
Projects
Status: Done
Development

Successfully merging this pull request may close these issues.

5 participants