
These technologies have justly earned the attention of the press and security researchers, and they’ve been discussed in great detail elsewhere.

You should also check out Andrew Cunningham’s review of macOS 11. (MacOS has booted from a read-only volume since 10.15.) Apple’s Protecting data at multiple layers article briefly describes SSV, but Howard Oakley has an even more detailed write-up on his blog, with illustrations a must-read.
MALWAREBYTES FOR MAC LOGS CODE
Currently limited to system code and kernel extensions, but open to all third-party developers for experimentation.
MALWAREBYTES FOR MAC LOGS 64 BIT

Note that I’m just a developer, neither a security researcher nor an exploit writer, and my descriptions of security issues and their mitigations might fall between “slightly incorrect” and “completely wrong”.

Use common sense, assess the risks, choose, and take responsibility for your choice.

In this article, I describe poorly-documented, or completely undocumented, features that could stop working as advertised or disappear completely without notice in future releases of macOS. On macOS, nobody seems to do it (at least not in public), and something as simple as diffing the includes from one SDK version to the next and patiently going through it, file by file, can reveal interesting features nobody knows (or at least talks) about.Ĭomparing the macOS 11 and macOS 10.15 SDKs, I found several intriguing surprises that deserve to be more widely known. This is not uncommon on, say, Windows: There are entire websites dedicated to large scale, long term, differential reverse engineering, that tell you what new functions appeared in what version of Windows, how their relationship with other functions has changed, how internal data structures have evolved etc.
MALWAREBYTES FOR MAC LOGS SOFTWARE
Me, I download the software development kit (SDK) for the new version, and diff it with the current version. When a new release of an operating system comes out, normal people find out what’s new by attending developer conferences, reading release notes, changelogs, reviews.
