Did Apple keep quiet for more than 3 months about the leak of encryption passphrases into High Sierra’s log files?
How good is the new unified log’s privacy? Does it live up to Apple’s goal of designing privacy into the system, or is it easily beaten? And how did passwords leak into the log?
Why doesn’t High Sierra record the opening of keychains in the log, in the way that Sierra does? Has Apple abandoned the goals of its new unified log?
Every week, Macs running High Sierra will check the integrity of their EFI firmware, in a bid to detect tampering by malware.
How to encrypt your hard disk without tears, using macOS FileVault. Includes addressing problems.
Want to hide text from electronic searching and matching? Or just explore some of Unicode’s encoding issues? Here’s a useful tool.
How to set a managed account up for a child, or another vulnerable user, using Parental Controls.
FileVault is most secure and robust when you shut your Mac down. But there are many times when you want full protection when only sleeping.
How to get the best out of the Privacy tab in the Security & Privacy pane, and why Apple’s apps don’t bother to ask.
Sierra, new MacBooks and MacBook Pros, APFS, Affinity Photo, malware, surveillance – 2016 was perhaps not as bad as it seemed.