Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

What exactly attack vectors you think are possible against macOS without SIP but not possible against Linux?


I think the argument is that file permissions may not be applied as rigorously, with the assumption that SIP is in effect.


SIP won't save you from wrong file permissions.

And SIP doesn't defend you from editing files in /bin. They are guarded by the fact that root filesystem is mounted read-only.


With SIP enabled it’s not possible to load arbitrary kernel extensions, for one - they must be signed.


Entitlement stealing, for example.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: