....Little Snitch...also sort of "spies" on you.
Hmmm . . . like (for example) storing my name, email, address, phone, license key, and payment method . . . or in other matters?
Care to elabourate?
I really appreciate--and understand--your vigilance John. I go to great lengths to enforce and maintain the security of my little network, and it's become almost a part-time job. *sigh*
One strategy I developed was to find a homogeneous level of trust in the things that I use to learn other things. These are all just basically tools.
A hammer can help hang a beautiful painting, or it can (as it did this past weekend while in the process of installing a new dishwasher) smash my finger. I just used it the wrong way this weekend!
One could, I presume, modify the filters in Little Snitch (LS) to actively allow all sorts of malignancy to have it's way, but that's really not what the Devs intend/ed.
It is in my trust that they wrote the soft to
prevent such things <smile>
wrt MalwareBytes (MB), the granularity of the analysis that one finds in LS is really not there, and another level of trust is needed to become developed: is it doing what it says it will do? You'll have to be the judge of that.
Your mileage may vary on that matter, but there's little reason to believe that the effort that went into such a thing was driven by data harvesting. If MB becomes as large an institution as, say, Microsoft, or Facebook, it may very well slippery-slope into the data-collection space, but it is in my trust that we really don't have to worry about that far-fetched possibility with such a small, specific tool <s>
Best of luck in your pursuits, John
🙂