Since November 2020, every T2 and Apple silicon Mac that has booted Big Sur or later in Full Security mode has check the integrity of its 9 GB SSV.
With the sealed system and Cryptexes, macOS updates are less likely to cause problems. As RSRs are easy to uninstall, it’s simple to test whether they’re the cause.
Here’s an APFS (Encrypted) volume that isn’t encrypted, and an unencrypted volume with FileVault active. Something must be wrong.
Details of the three standard Cryptexes in Ventura 13.3, when they can be loaded in the boot process, and where they fit in with Rapid Security Responses.
macOS has changed fundamentally. So has troubleshooting it. Secure Boot, the SSV, and Gatekeeper checks bring changes in strategy.
Once, you could run diskutil to ‘fix’ broken permissions in your Home folder, then it was replaced by repairHomePermissions in Recovery. Apple no longer documents this, but it’s still there. Should you use it?
Expected in Ventura 13.1 is a new lightweight system for applying security patches. This article explains how it uses cryptexes, already being used in macOS 13.
This has changed greatly over the last few versions of macOS, and differs between different types of Mac. Here’s an outline.
macOS 13.0.1 is the first small security update to Ventura, although it still seems large. What’s going on, and where are macOS updates heading?
Short explanations of all the information reported in SilentKnight, and its command line equivalent silnite.