ran mak
(replying to Saagar Jha)
@saagar @lapcatsoftware none of this makes any sense. if it's trivial, what's the way? i'll report it as a bug.
if you can't tell me what it is, is it a zero day? are reminding us that there are 0-day vulnerabilities at any given time?
only macos uses SIP, so you're saying everyone else is insecure or macos is insecure by design ?
Saagar Jha
(replying to ran mak)
@ranvel @lapcatsoftware What Joe said here: https://f.duriansoftware.com/@joe/116134278291526557. There are always a handful of these present at any given time, and Apple does not consider them bugs because they view SIP as a security boundary so any report that starts with “first, disable SIP…” is discarded
Saagar Jha
(replying to Saagar Jha)
@ranvel @lapcatsoftware Other platforms are often really broken which is well documented online but my point here is really that macOS can be even more broken if SIP is off because the default is that you are supposed to have it on. There are designs that require its existence
Saagar Jha
(replying to Saagar Jha)
@lapcatsoftware @ranvel Put another way, the design of SIP makes it possible to architect security boundaries that are not possible on other systems, but when you take away the protection, they fail in completely different ways. It’s an orthogonal security feature
Saagar Jha
(replying to Saagar Jha)
@lapcatsoftware @ranvel On another OS, code running as your user cannot perform privileged actions because, well, that would give you that privilege. On macOS code running as you but written by Apple can do whatever it wants and SIP is effectively what enforces this