The four types of log entry, all the fields they can contain, and those they are likely to include, shown in the order and colour scheme used in LogUI. Censorship and how to disable it, with a signed profile to do so.
privacy
Four eras: rebuilding the Desktop, repairing permissions, resetting Home permissions, and most recently cursing privacy protection. A cynical history?
You’ve set up your new Mac, and now need to prepare the old one for disposal, maybe to a friend, relative or someone buying it, or to go for recycling. What to do next,
Pasteboard privacy protection, a Magnifier app, Vehicle Motion Cues, Braille Access, Accessibility Reader, Apple Diagnostics and many others coming to a macOS 16 next month.
Whether they enable an App Store app to go beyond its sandbox, provide access to features that are privacy-protected, or give access to macOS features only permitted for approved apps, entitlements are important.
The difference between security and privacy, how consent and intent are obtained, how this works with command tools, important links, lists of protected resources and tccutil arguments.
Survey of other privacy controls, including those involved in scripting and for development. Details of the new control on access to devices on the local network.
These work differently from other privacy controls, and are required for Find My… and Activation Lock. There are some catches too, and no command tool to help.
Control access from apps to devices like cameras and microphones. How to check the reason for their request, and whether they have entitlement to do so. How to remove apps from the privacy lists, and more.
The difference between consent and intent, why an app adds itself to Settings, and when you should add it to Full Disk Access.
