{{Header}} {{#seo: |description=In a fashion similar to Windows platforms, Apple operating systems also pose many security and privacy threats. }} {{intro| In a fashion similar to Windows platforms, Apple operating systems also pose many security and privacy threats. }} {{mbox | type = notice | image = [[File:Ambox_notice.png|40px|alt=Info]] | text = This macOS Hosts chapter might need some improvements. [https://phabricator.whonix.org/T993 ticket] }} In a fashion similar to Windows platforms, Apple operating systems also pose many security and privacy threats. '''Table:''' ''macOS Threats'' https://www.gnu.org/proprietary/malware-apple.en.html {| class="wikitable" |- ! scope="col"| '''Category''' ! scope="col"| '''Description''' |- ! scope="row"| Backdoors | * Files on devices can be deleted if they were downloaded from sources competing with Apple companies.
* Intentional backdoors allow remote root privileges, wipes and deletion of applications. |- ! scope="row"| Design Flaws | * An insecure design allows execution of malicious code by applications and the extraction of messaging history. |- ! scope="row"| Device Bricking | * Devices are bricked if fixed by an "unauthorized" repair shop.
* Devices are bricked that were unlocked without permission. |- ! scope="row"| Personal Information | * Biometric markers like fingerprints are used for device authorization.
* Extensive personal information is sent to Apple servers, such as:
** Automatic uploads of photos and videos used by certain applications; and
** Unsaved documents and program files (without permission).
* Search terms and location information are sent to Apple.
* System files are scanned. * OSX phones home with info about the Date, Time, Computer, ISP, City, State and Application Hash when any program is executed, by default. https://sneak.berlin/20201112/your-computer-isnt-yours/ https://web.archive.org/web/20210125023629/https://appleterm.com/2020/10/20/macos-big-sur-firewalls-and-vpns/ |- ! scope="row"| User Control and Freedoms | * Allowable programs like media, political, bitcoin and health-focused applications, and games are censored.
* Arbitrary limits are imposed on the use of software.
* Digital restrictions mechanisms are imposed.
* System upgrades are forced without consent.
* Older versions of operating systems cannot be installed.
* It is impossible to manually fix system security bugs that Apple have not addressed.
* User interfaces are designed to make specific options hard to find and enable/disable. |} See [https://www.gnu.org/proprietary/malware-apple.en.html this write-up] by the FSF for further detailed information. https://web.archive.org/web/20180331212528/https://fix-macosx.com/ In public talks, ex-Tor developer Jacob Appelbaum who had access to the Snowden files, hinted that Apple devices in particular were easy to infiltrate by the Intelligence Community. = References = {{reflist|close=1}} {{Footer}} [[Category:Documentation]]