Killed by Jupiter’s thunderbolts when she insisted he proved his identity, this myth is a reminder that making something more secure isn’t always a good answer.
keychain
Malware tries to trick you into providing it your password. How to recognise genuine requests from those fakes.
Do you want a Password Manager that can use a local, standalone vault, or share one using iCloud, Dropbox, or another cloud service of your choice?
iCloud Keychain is apparently the way ahead, but even Apple has a great deal more work to do before that’s feasible. A look at what’s needed.
How is an attacker most likely to get their hands on the secrets stored in your Mac’s keychains, and what can you do to protect them?
We’re swimming upstream in a raging torrent of alerts and notifications. Rather than clicking through everything, macOS should lead by example and do what we did with traffic signs.
Multiple requests for a keychain password, login password mismatch, broken keychains, expired certificates, and using the Data Protection keychain.
How can you tell whether a request for a keychain password is genuine? What about a regular request for password authentication?
macOS has two types of keychain, and its tools for working with them, Keychain Access and the command tool security, only work fully with one type.
Solving repeated requests for passwords, telling the genuine from the bogus, how passwords can become mismatched, and more.