Is Apple going to meet the promises it made a year ago, to protect its users around the world from the risk posed by its online signing certificate checks?
Gatekeeper
Improved reporting of firmware, Gatekeeper, and clearer documentation are the main improvements.
From CompatibilityNotificationData to XProtect, details of all the security data and related components in Monterey.
Nine months ago, Apple undertook to make changes in the way in which macOS checks its OCSP service for certificate revocations. Has it changed anything yet?
From the start of voluntary code signing in 2007, defences against malware in macOS have changed dramatically. Here’s an overview of what has happened.
If you use the Installer app the wrong way, it will open an ad-hoc signed package and quietly install apps which don’t get checked by Gatekeeper.
When you check the version of Gatekeeper data on a new Mac, why should it show one which was pushed by Apple nearly 5 years ago for El Capitan?
Details of data files for MRT, XProtect, Gatekeeper and other security features in Big Sur. Covers both Intel and M1 Macs.
Why does it take 2 years to realise that macOS has been checking signing certificate validity online?
If you were to strip unwanted code from a Universal App, would it still pass Big Sur’s strict security checks?
