One of the last of Catalina’s promised features, hardening and notarization become fully mandatory for all new apps from today.
Jeff Johnson of @lapcatsoftware has just published an excellent technical article looking at controversial issues over hardening, sandboxing, […]
Apple’s pushed update to XProtect’s data a couple of days ago is one of the most substantial since […]
What to expect from the many changes to security and privacy in the first release of Catalina. How to run non-notarized apps, and more.
Apple’s recent change in requirements for notarization also affects privacy protection in both Mojave and Catalina.
How can you tell whether a notarized app has been hardened, which Apple claims makes it more secure?
Many small independent developers have put a lot of effort into getting their app notarized. Then Apple changes the rules. What does this mean for users, and our security?
Newly-built apps supplied by developers outside the App Store need now to be notarized. This in turn requires hardening, but what is that?
You don’t have to add an Info.plist to a standalone Mach-O tool in order to sign it, or to get it notarized successfully. And more tips.
System Integrity Protection can get in your way, and may be recommended to solve compatibility problems. It’s also changing again in Catalina.