From the start of voluntary code signing in 2007, defences against malware in macOS have changed dramatically. Here’s an overview of what has happened.
What are checksums, CRCs and hashes? What is required for a hash to be cryptographic, and how any of these affect your Mac? Some answers and explanations.
WWDC this year again featured a session on notarization. Here’s a summary of its status in Big Sur, and details of what’s next.
What tells me that macOS isn’t about to be swallowed up into iOS? Look at what’s happened with Time Machine in Big Sur, which has undergone as much development as it did prior to release in 2007.
Does Big Sur require you to sign your own apps or other code using a proper Apple-issued signature? What about notarization and quarantine? Your questions answered.
You try to open an app on your M1 Mac, only to see an alert telling your that you don’t have permission to open it. Only that isn’t the reason.
Final in series. Examines how the hardened runtime controls access to protected private data and services, and how some use private entitlements.
Second in the series. Considers in detail what the hardened environment offers the user, and how notarized apps can opt out of its protection.
First of three articles looking in detail at what notarization involves, and the benefits it might have to users. Considers the question of legacy apps.
Why does it take 2 years to realise that macOS has been checking signing certificate validity online?