Hacker Read top | best | new | newcomments | leaders | about | bookmarklet login

https://xkcd.com/1200/ points out that if malicious code runs as a user they can read my e-mails, access all my files, and keylog my passwords. By escalating to root, they can... what? Install OS updates and drivers? Mount and unmount disks? Access the serial port? Persist their access in a slightly harder to detect manner?

Of course, it's a different matter for shared computers in school computer labs. Or if mac servers were a thing.



view as:

It would be difficult for an arbitrary process to do that on macOS. They can access your files, but your passwords are in the keychain and emails in a data vault, both of which require permission to access.

Install ransomware that is annoying to remove.

Does it really matter if the ransomware is easy to remove? If you remove the ransomware, your files will still be encrypted.

Solid point.

Legal | privacy