osx-config-check
macOS-Security-and-Privacy-Guide
Our great sponsors
osx-config-check | macOS-Security-and-Privacy-Guide | |
---|---|---|
1 | 25 | |
1,249 | 20,795 | |
- | - | |
0.0 | 9.6 | |
about 5 years ago | 2 days ago | |
Python | Python | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
osx-config-check
We haven't tracked posts mentioning osx-config-check yet.
Tracking mentions began in Dec 2020.
macOS-Security-and-Privacy-Guide
-
Hardening macOS
Discussion from the last time this was posted in 2018 - https://news.ycombinator.com/item?id=18099835
Also the macOS Security and Privacy Guide may be of interest
https://github.com/drduh/macOS-Security-and-Privacy-Guide
as discussed on HN last year https://news.ycombinator.com/item?id=24242890
- Orion Browser
-
my first Mac! any tips or suggestions?
turn on FileVault , turn on the firewall (built in). install Lulu firewall follow this guide and harden the system https://github.com/drduh/macOS-Security-and-Privacy-Guide
-
Privacy Guide for MacOS Ventura?
I'm looking for a guide to harden MacOS Ventura, preferably including little snitch/lulu blocklist suggestions for MacOS services. I'm aware of dr druh's guide (that currently doesn't seem to be updated for Ventura though) and isn't including a little snitch/lulu blocklist.
- “Confirm that you’re not a robot” malware
-
Ask HN: What do you do for online privacy?
- macos, following https://github.com/drduh/macOS-Security-and-Privacy-Guide for hardening (I haven't compared this to other hardening guides, but doing something is better than nothing)
-
Homebrew Package Manager Harden Script
Hardening is based off of several guides such as drduh hardening guide.
-
Spy pixels in emails 'have become endemic'
macOS Mail.app -> Preferences -> Viewing -> Uncheck "Load remote content in messages"
Privacy defaults come down to usability vs. privacy; Apple making this so easy to toggle is fine by me as I care about privacy and tracking.
Now, it would be great if every macOS application walked you through privacy settings right after installation in the same way that I am offered a tour of the new features. Since there is no such "privacy tour", the community has discussed ways in which macOS can be hardened [1], [2].
1. https://github.com/drduh/macOS-Security-and-Privacy-Guide
What are some alternatives?
chezmoi - Manage your dotfiles across multiple diverse machines, securely.
macOS-enterprise-privileges - For Mac users in an Enterprise environment, this app gives the User control over administration of their machine by elevating their level of access to Administrator privileges on macOS. Users can set the time frame using Preferences to perform specific tasks such as install or remove an application.
apple-telemetry - Domain blocklists, IP blocklists, Little Snitch .lsrules, and cloaking files for blocking Apple telemetry
PopClip-Extensions - Source code extensions in the official PopClip Extensions directory.
macos_security - macOS Security Compliance Project
MailTrackerBlocker - Email tracker, read receipt and spy pixel blocker plugin for macOS Mail (10.11-13.x)
OSX-KVM - Run macOS on QEMU/KVM. With OpenCore + Monterey + Ventura + Sonoma support now! Only commercial (paid) support is available now to avoid spammy issues. No Mac system is required.
BLEUnlock - Lock/unlock your Mac with your iPhone, Apple Watch, or any other Bluetooth LE devices
TheMacHardeningScripts - Scripts to secure and harden Mac OS X
CIS-macOS-Security
dotfiles - macOS dotfiles for 10.13. Drawing upon the work of many others' dotfiles. Sets up Mac with home-brew, PHP 7.1 fish shell and more.
mnm - mnm implements TMTP protocol. Let Internet sites message members directly, instead of unreliable, insecure email. Contributors welcome! (Server)