Hacker Read top | best | new | newcomments | leaders | about | bookmarklet login

If we're talking about sandboxing, then macOS has that too. Apps installed through the MAS have specific sandboxes they can play in and require permission for the others.


sort by: page size:

macOS does exactly this, although it’s sandbox is an opt-in for the app and there is no easy way for the user to see if an app is sandboxed.

That’s how macOS sandboxing works too.

OSX does app sandboxing as well (not everywhere). But yeah, you're right i only skimmed the content and missed that part.

Windows and macOS both have application-tied sandboxing systems. Maybe they plan to use that?

That’s for all apps, but only for specific parts of the filesystem, so there’s still plenty of room for apps to cause havoc by messing with everything else.

This is separate from the older sandboxing feature that’s designed to fully isolate apps from the rest of the system, which is mandatory for Mac App Store apps but opt-in for other apps.


Sandboxing is one of the pain points of Mac App Store. I certainly would like to see sandboxing being more prevalent on the desktop, but not like the MAS way. The user should have the final say of the way in which a sandbox allows and restricts the application. Just for example, I should be able to completely trust an app with access to the filesystem, not with all the popups and confirmations, while disallowing network access from it.

On MacOS they could and should be sandboxed by the OS.

MacOS now has app sandboxing.

Sandboxing is extremely hard to get right. It's even harder to retrofit it into an existing system, because so many programs exist that just store files wherever they feel like, and you don't want the new OS to break all the old programs. And if the OS provides a "legacy program" mode, malicious apps will just use that.

In addition to files, sandboxing has to protect against capturing screen pixels, getting keyboard events, doing network or device IO, inspecting the cut&paste buffer, and hundreds more things, all of which some apps have legitimate reasons to do. So the matrix of permissions gets very large.


this is essentially how the sandbox works on macos from what I understand. 90% of applications should work fine for this. Some though like antivirus (as an example) can't really do so.

You can have sandboxing without an App Store (macOS supports it)

Couldn't you run the Mac equivalent of a Windows Sandbox to restrict access if you had concerns about an app?

MacOS manages to implement all those things while having sandboxing. Though at the expense of many popups (program X wants to do Y) right now. Maybe not the perfect solution either but it is not an unreasonable thing to ask for IMO.

macOS already has a sandbox. In practice many sandboxed apps can't actually write to /Library or ~/Library. They write to a sandboxed directory that pretends to be ~/Library further containing directories like ~/Library/Application Support. The real path of that directory is generally under ~/Library/Containers.

Now for obvious reasons Apple cannot force all macOS apps to be sandboxed. It was already a PR hit when they required Mac App Store apps to be sandboxed.


Imagin an OS where applications/serices each get their own mini-filesystem, without ability to access each other's data.

OS X does this for sandboxed apps:

https://developer.apple.com/library/mac/documentation/Securi...

All apps from the App Store are sandboxed.


Also, sandboxing is designed to prevent unfettered filesystem access on macOS, meaning this isn’t part of the threat model if all apps are sandboxed and packaged.

The macOS sandbox exists to mitigate this. The system also goes out of its way to let you know you're running an un-sandboxed-app.

Thanks. I've been chewing on your reply. I didn't get very far. It finally occurs to me that macOS (or equiv) could implement iOS (or equiv) style sandboxing. Maybe that's already in progress. As a dev and former power user, I'm sure it'll be uncomfortable.

I mean, Mac/iOS App Store apps are already sandboxed and easily distributable.

Windows, Android, and Linux all have stores/package managers and I assume/hope some level of sandboxing.


Sandboxed macOS apps have a much finer access control. Only non-sandboxed apps ask for access to such a large part of the disk.
next

Legal | privacy