MacOS Hosts

From Kicksecure
Jump to navigation Jump to search

In a fashion similar to Windows platforms, Apple operating systems also pose many security and privacy threats.

Info This macOS Hosts chapter might need some improvements.

In a fashion similar to Windows platforms, Apple operating systems also pose many security and privacy threats.

Table: macOS Threats [1]

Category Description
  • Files on devices can be deleted if they were downloaded from sources competing with Apple companies.
  • Intentional backdoors allow remote root privileges, wipes and deletion of applications.
Design Flaws
  • An insecure design allows execution of malicious code by applications and the extraction of messaging history.
Device Bricking
  • Devices are bricked if fixed by an "unauthorized" repair shop.
  • Devices are bricked that were unlocked without permission.
Personal Information
  • Biometric markers like fingerprints are used for device authorization.
  • Extensive personal information is sent to Apple servers, such as:
    • Automatic uploads of photos and videos used by certain applications; and
    • Unsaved documents and program files (without permission).
  • Search terms and location information are sent to Apple.
  • System files are scanned.
  • OSX phones home with info about the Date, Time, Computer, ISP, City, State and Application Hash when any program is executed, by default. [2] [3]
User Control and Freedoms
  • Allowable programs like media, political, bitcoin and health-focused applications, and games are censored.
  • Arbitrary limits are imposed on the use of software.
  • Digital restrictions mechanisms are imposed.
  • System upgrades are forced without consent.
  • Older versions of operating systems cannot be installed.
  • It is impossible to manually fix system security bugs that Apple have not addressed.
  • User interfaces are designed to make specific options hard to find and enable/disable.

See this by the FSF for further detailed information. [4]

In public talks, ex-Tor developer Jacob Appelbaum who had access to the Snowden files, hinted that Apple devices in particular were easy to infiltrate by the Intelligence Community.


Unfinished: This wiki is a work in progress. Please do not report broken links until this notice is removed, use Search Engines First and contribute improving this wiki.

We believe security software like Kicksecure needs to remain Open Source and independent. Would you help sustain and grow the project? Learn more about our 12 year success story and maybe DONATE!