{{Header}}
{{#seo:
|description=In a fashion similar to Windows platforms, Apple operating systems also pose many security and privacy threats.
}}
[[File:logo-apple-500x500.png|thumb|link=|class=hide-enlarge|200px|macOS]]
{{intro|
In a fashion similar to Windows platforms, Apple operating systems also pose many security and privacy threats.
}}
{{mbox
| type = notice
| image = [[File:Ambox_notice.png|40px|alt=Info]]
| text = This macOS Hosts chapter might need some improvements. [https://forums.whonix.org/t/improve-windows-hosts-macos-wiki-mentions/18434 ticket]
}}
In a fashion similar to Windows platforms, Apple operating systems also pose many security and privacy threats.
'''Table:''' ''macOS Threats'' [https://www.gnu.org/proprietary/malware-apple.en.html]
{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| Backdoors
|
* Files on devices can be deleted if they were downloaded from sources competing with Apple companies.
* Intentional backdoors allow remote root privileges, wipes and deletion of applications.
|-
! scope="row"| Design Flaws
|
* An insecure design allows execution of malicious code by applications and the extraction of messaging history.
|-
! scope="row"| Device Bricking
|
* Devices are bricked if fixed by an "unauthorized" repair shop.
* Devices are bricked that were unlocked without permission.
|-
! scope="row"| Personal Information
|
* Biometric markers like fingerprints are used for device authorization.
* Extensive personal information is sent to Apple servers, such as:
** Automatic uploads of photos and videos used by certain applications; and
** Unsaved documents and program files (without permission).
* Search terms and location information are sent to Apple.
* System files are scanned.
* OSX phones home with info about the Date, Time, Computer, ISP, City, State and Application Hash when any program is executed, by default. [https://sneak.berlin/20201112/your-computer-isnt-yours/] [https://web.archive.org/web/20210125023629/https://appleterm.com/2020/10/20/macos-big-sur-firewalls-and-vpns/]
|-
! scope="row"| User Control and Freedoms
|
* Allowable programs like media, political, bitcoin and health-focused applications, and games are censored.
* Arbitrary limits are imposed on the use of software.
* Digital restrictions mechanisms are imposed.
* System upgrades are forced without consent.
* Older versions of operating systems cannot be installed.
* It is impossible to manually fix system security bugs that Apple have not addressed.
* User interfaces are designed to make specific options hard to find and enable/disable.
|}
See [https://www.gnu.org/proprietary/malware-apple.en.html this write-up] by the FSF for further detailed information. [https://web.archive.org/web/20180331212528/https://fix-macosx.com/]
In public talks, ex-Tor developer Jacob Appelbaum who had access to the Snowden files, hinted that Apple devices in particular were easy to infiltrate by the Intelligence Community.
= References =
{{reflist|close=1}}
{{Footer}}
[[Category:Documentation]]