Final in series. Examines how the hardened runtime controls access to protected private data and services, and how some use private entitlements.
Second in the series. Considers in detail what the hardened environment offers the user, and how notarized apps can opt out of its protection.
First of three articles looking in detail at what notarization involves, and the benefits it might have to users. Considers the question of legacy apps.
If you’re using Catalina or Big Sur, you should by now only be obtaining apps from four sources: […]
Stepping through building it correctly in Xcode, turning it into an Installer package getting it notarized and the ticket stapled to the tool.
One of the last of Catalina’s promised features, hardening and notarization become fully mandatory for all new apps from today.
Jeff Johnson of @lapcatsoftware has just published an excellent technical article looking at controversial issues over hardening, sandboxing, […]
Apple’s pushed update to XProtect’s data a couple of days ago is one of the most substantial since […]
What to expect from the many changes to security and privacy in the first release of Catalina. How to run non-notarized apps, and more.
Apple’s recent change in requirements for notarization also affects privacy protection in both Mojave and Catalina.