Compare commits

...

3 Commits

Author SHA1 Message Date
kimg45
e6c51b6692
spacing
Co-authored-by: Jonah Aragon <jonah@triplebit.net>
Signed-off-by: kimg45 <138676274+kimg45@users.noreply.github.com>
2024-09-18 18:46:35 -05:00
kimg45
b6b04c4289
update Mac address wording
Co-authored-by: Jonah Aragon <jonah@triplebit.net>
Signed-off-by: kimg45 <138676274+kimg45@users.noreply.github.com>
2024-09-18 18:46:19 -05:00
kimg45
0c53231cc8
wording
Co-authored-by: Jonah Aragon <jonah@triplebit.net>
Signed-off-by: kimg45 <138676274+kimg45@users.noreply.github.com>
2024-09-18 18:43:26 -05:00

View File

@ -137,7 +137,7 @@ macOS uses a randomized MAC address when performing Wi-Fi scans while disconnect
You can set your MAC address to be randomized per network and rotate occasionally to prevent tracking between networks and on the same network over time.
Go to **System Settings** > **Network** > **Wi-Fi** > **Details** and set **Private Wi-FI address** to either **Fixed** if you want a fixed random address for each network or **Rotating** if you want it to change over time.
Go to **System Settings** > **Network** > **Wi-Fi** > **Details** and set **Private Wi-FI address** to either **Fixed** if you want a fixed but unique address for the network you're connected to, or **Rotating** if you want it to change over time.
Your MAC address is not the only unique information about your device which is broadcast on the network, your hostname is another piece of information which could uniquely identify you. You may wish to set your hostname to something generic like "MacBook Air", "Laptop", "John's MacBook Pro", or "iPhone" in **System Settings** > **General** > **Sharing**. Some [privacy scripts](https://github.com/sunknudsen/privacy-guides/tree/master/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos#guide) allow you to easily generate hostnames with random names.
@ -170,7 +170,7 @@ System Integrity Protection makes critical file locations read-only to protect a
##### App Sandbox
On macOS, whether an app is sandboxed is determined by the developer when they sign it. The App Sandbox protects against vulnerabilities in the apps you run by limiting what a malicious actor can do in the event that the app is exploited. The App Sandbox *alone* can't protect against [:material-package-variant-closed-remove: Supply Chain Attacks](../basics/common-threats.md#attacks-against-certain-organizations){ .pg-viridian } by malicious developers. For that, sandboxing needs to be enforced as it is on the App Store.
On macOS, whether an app is sandboxed is determined by the developer when they sign it. The App Sandbox protects against vulnerabilities in the apps you run by limiting what a malicious actor can do in the event that the app is exploited. The App Sandbox *alone* can't protect against [:material-package-variant-closed-remove: Supply Chain Attacks](../basics/common-threats.md#attacks-against-certain-organizations){ .pg-viridian } by malicious developers. For that, sandboxing needs to be enforced by someone other than the developer themselves, as it is on the App Store.
macOS apps submitted to the App Store after June 1, 2012 are required to be sandboxed using the [App Sandbox](https://developer.apple.com/documentation/security/app_sandbox).
@ -207,6 +207,7 @@ If an app is sandboxed, you should see
```
If you find that the app you want to run is not sandboxed, then you may employ methods of [compartmentalization](../basics/common-threats.md#security-and-privacy) such as virtual machines or separate devices, use a similar app that is sandboxed, or choose to not use the unsandboxed app altogether.
##### Hardened Runtime
The [Hardened Runtime](https://developer.apple.com/documentation/security/hardened_runtime) is an extra protection for apps that prevents certain classes of exploits. It improves the security of apps against exploitation by disabling certain features like JIT.