New version of ViableS runs in a sandbox, with no shared folders, and can now be isolated from networks. So how well does Ventura work without internet?
Gatekeeper
If Ventura checks the security of apps more thoroughly, how does it go about that? Gatekeeper explored, from XProtect to OCSP checks.
Are additional Gatekeeper checks in Ventura effective, and worth the effort? Surely malware can bypass them easily.
macOS has changed fundamentally. So has troubleshooting it. Secure Boot, the SSV, and Gatekeeper checks bring changes in strategy.
Run Catalina or later and there are two XProtects in the CoreServices folder. But they’re completely different, as this explains.
While you may feel more comfortable working with the more limited privileges of a normal rather than admin user, does that improve security?
How macOS security can have excellent tools and defences, but fail to inform the user of the detection of malicious software.
Samples of four malicious software downloaded and run on macOS 13.1. Could it detect and block them effectively? Or do you need 3rd party protection?
It’s well over 4 years since Apple introduced notarization, but many executables still aren’t properly signed, and require the user to bypass Gatekeeper.
Download some vital free software, mount its disk image, run the Installer package there – but why does Ventura refuse to install it, and what you do?
