For no apparent reason, Sierra has again downloaded and installed an old ‘security’ update from 2016. Not only that, but it does its utmost to prevent you from finding out, even when studying the log. At least 5 bugs!
Apple
A tag containing the filename of a file still held remotely in iCloud, attached to a stub. Only in iCloud files.
Scripts and apps which could look at folders in iCloud should watch for stub files. Here’s how they work, and why they can mislead.
How the two user modes differ, what iCloud Drive does to files transferred between two different clients, and an apparently unique tag it applies to apps which pass through.
More mitigation for Meltdown and Spectre, EFI updates, and steady progress in High Sierra are all very promising. So where does that put macOS 10.14?
Gatekeeper doesn’t seem interested in extended attributes attached to the contents of signed apps – the signature remains valid. Could this be exploited?
I haven’t written much about my first-generation Apple Watch, because like all good watches, it has just got […]
Apple says that macOS Server is changing, then warns that almost all its services will be removed. After 19 years, is this the end?
OS X El Capitan Security Update 2018-001 is, I think, the most substantial update to 10.11.6 since 2016, […]
macOS Sierra Security Update 2018-001 is effectively a minor macOS update which updates a lot of components within […]
