How are folder protections implemented? How do settings for Full Disk Access interact with those in Files & Folders for specific protected locations? And how does this involve making screenshots?
log
How TCC gets to authorise whether apps can obtain listings and open files in protected folders. The attribution chain and its effect on command tools.
Two users confronted by a dialog to install command line developer tools so they can use git. Neither wanted to use git, but wondered which app could have triggered it. Despite its protestations, Claude knows only too well.
How long should you expect your Mac’s log to retain entries? Evidence here suggests that anything beyond 5 days isn’t looking good, and expecting to retrieve those made more than 5 days ago is likely to fail.
When humans explain how to tackle a Mac problem, they usually prefer to use GUI apps when appropriate. AI much prefers you to enter commands into Terminal. This has consequences.
New version adds more detail to the list of log files, and a new graphical view to pick out anomalies in up to 6 weeks of previous log records.
Doesn’t macOS wear out internal SSDs quickly because of all the data it writes to them? Will my Mac’s SSD wear out prematurely? How can I tell?
How to browse log entries for an event that occurred many days after its entries have been removed from the active log, by discovering its exact time and the processes involved.
Tens of thousands of log entries are made between the start of kernel boot and the unlocking of the Data volume. Where they’re stored has been a mystery. With additional details of log maintenance and retention.
A new app to analyse the size of log entries written by different processes over the last few weeks or months, Logistician. First release version for Sonoma and later.
