https://xkcd.com/1200/ points out that if malicious code runs as a user they can read my e-mails, access all my files, and keylog my passwords. By escalating to root, they can... what? Install OS updates and drivers? Mount and unmount disks? Access the serial port? Persist their access in a slightly harder to detect manner?
Of course, it's a different matter for shared computers in school computer labs. Or if mac servers were a thing.
It would be difficult for an arbitrary process to do that on macOS. They can access your files, but your passwords are in the keychain and emails in a data vault, both of which require permission to access.
Of course, it's a different matter for shared computers in school computer labs. Or if mac servers were a thing.
reply