Developers/vendors have had years to sign their apps. (Was it 10.5 or 10.6 signing was introduced?) As a transitional step, "Anywhere" was... acceptable... but those outstanding vendors need to get their sh.. stuff together and catch up to this decade. It's just not good enough any more. And as mentioned, telling people to turn it off entirely is just poor, poor and poor some more. Not even the right/control/alternate-click gesture. Will they take responsibility for adware, spyware and malware that lands on their user's machines as a result? All because they couldn't be bothered getting their sh.. stuff in order. As an IT admin, I will be glad to see the back of "Anywhere". I'll be able to tear down the detection and remediation that reverts any "Anywhere"-configured machines in our fleet back to the default MAS/identified developers.I can imagine the panic regarding apps from 'anywhere' but I have seen a couple of vendors including in their installation instructions the steps to disable Gatekeeper, which obviously leaves naive users vulnerable after that. Removing the permanent options seems sensible to thwart that.
I for one want macOS to be case-sensitive. It's better for performance. Comparing "abc" to "ABC" and seeing that it's a mismatch takes a single instruction: The character code for a is not A. To do the same on a case-insensitive system requires comparing every letter using some transformation function that translates each letter. It's just stupid.
I think Adobe is the only company whose software has trouble when macOS is installed on a "HFS+ Case-sensitive" partition.
I'm talking about phished passwords or or other means to get to the account itself.I agree with your sentiments about Optimized Storage, but Apple did imply that the data will be end-to-end encrypted, so identity thieves and hackers wouldn't be likely to get anything useful.
Right-clicking a tampered/modified/cracked binary and choosing "Open" will give you the "This application is damaged and can't be opened. You should move it to the Trash." error message. There is no way to open cracked programs anymore.
The right-click method only opens totally unsigned binaries, i.e. open source and freeware that hasn't bothered to get a free developer signature.
In short: Removing "Anywhere" kills piracy and prevents malware infected binaries from running. It doesn't affect UNSIGNED open source/freeware, which can still be opened via a right-click the first time you run it (after that it remembers that you want to allow it).
However, I discovered that you can (at least currently) disable Gatekeeper via a Terminal command. I hope they lock down that loophole too or all of this is easily defeated by the pirates.
Developers/vendors have had years to sign their apps. (Was it 10.5 or 10.6 signing was introduced?) As a transitional step, "Anywhere" was... acceptable... but those outstanding vendors need to get their sh.. stuff together and catch up to this decade. It's just not good enough any more.
When a binary is not signed, it's blocked by default whether you run Mountain Lion or Sierra. Right click it or option click to run it and you'll enable the "proceed anyway" option. But, that appears to only be the case if the binary is _-not-_ signed. However, if I am reading that post on page 5 correctly, if the binary *is* signed, but the digital signature is not intact because the file has been altered (whatever the cause) then you can't "proceed anyway" even if you right click or option click to open the file. You have to disable gatekeeper entirely to run said altered binary.If I can just right click or command click on the unsigned/tempered binary to run it, then removing the "anywhere" option really doesn't do anything to address piracy at all. So that is a moot point that doesn't cut one way or the other at all.
Since when has app signing been free? Because Apple has this tidbit in its developer documentation.This will force Developers to get their apps signed by Apple, which is a free and painless process. Xcode 8 takes care of the signing. This is mainly to help prevent malware from installing by mistake on macOS.
I haven't yet run in a single case where this would cause practical problems with UNIX compatibility. I also haven't seen a single practical case where case-sensitivity would be important for either Linux or UNIX.
Just buy a hard drive that is big enough for everything. I would assume things get moved to the cloud if there is no space left on your hard drive. Easiest would be a "manual" option where you decide what files you are likely not using for a while.I don't like to much build in intelligence that starts doing things in the background and I am not aware. I do not want to store any documents in the cloud. I hope there is a good system pref page that gives the user plenty of options.
I run into this problem almost every day. I have a mixed-OS setup, with Linux and OS X systems.
I think they want to turn OS x, or Mac OS, into the iOS controlled walled in garden, so they could cash in, but of course taking your freedom to use your computer whichever way you choose to.**** that.
No option to install apps from "anywhere"? Mandatory binary code signing? No thanks.
Christ, I hate Windows 10 as much as the next guy, but not even Microsoft requires signed binaries on x86_64. What's next, people are going to find out that csrutil is missing and SIP is now mandatory to boot?
-SC
When a binary is not signed, it's blocked by default whether you run Mountain Lion or Sierra. Right click it or option click to run it and you'll enable the "proceed anyway" option. But, that appears to only be the case if the binary is _-not-_ signed. However, if I am reading that post on page 5 correctly, if the binary *is* signed, but the digital signature is not intact because the file has been altered (whatever the cause) then you can't "proceed anyway" even if you right click or option click to open the file. You have to disable gatekeeper entirely to run said altered binary.
My argument, or devil's argument, is that signed binaries which have been altered shouldn't be run period. That Gatekeeper should enforce this. Unsigned binaries, though, are acceptable provided you right click / option open them.
That is, if you're disabling or some documentation or "tech support" person has you disabling Gatekeeper, just to avoid the "inconvenience" of having to right click or option click open a binary -- In my argument, that should be disallowed.
I would argue whether it outweighs the benefits is a personal decision impacted by each particular set of facts. Maybe you say it outweighs the benefits. I say in one day a year it doesn't for me.I'd argue the inconvenience of learning about and using the secret handshake for running an unsigned binary outweighs the benefits.
Developers/vendors have had years to sign their apps. (Was it 10.5 or 10.6 signing was introduced?) As a transitional step, "Anywhere" was... acceptable... but those outstanding vendors need to get their sh.. stuff together and catch up to this decade. It's just not good enough any more. And as mentioned, telling people to turn it off entirely is just poor, poor and poor some more. Not even the right/control/alternate-click gesture. Will they take responsibility for adware, spyware and malware that lands on their user's machines as a result? All because they couldn't be bothered getting their sh.. stuff in order. As an IT admin, I will be glad to see the back of "Anywhere". I'll be able to tear down the detection and remediation that reverts any "Anywhere"-configured machines in our fleet back to the default MAS/identified developers.
Why would it be any different than iCloud Photo Library and Apple Music, where (a) uploading files (aka using it) is optional and (b) the 'optimized storage' is optional even after that?
I will assume all risk, and I will not come crying to Apple if my actions result in my computer being totally messed up and all my private information in the hands of North Korean hackers.
Just buy a hard drive that is big enough for everything. I would assume things get moved to the cloud if there is no space left on your hard drive. Easiest would be a "manual" option where you decide what files you are likely not using for a while.
Just buy a hard drive that is big enough for everything. I would assume things get moved to the cloud if there is no space left on your hard drive. Easiest would be a "manual" option where you decide what files you are likely not using for a while.
But as the owner of my computer, I should have the ability to disable any security feature that is designed to limit what I do. I see no reason for make it so absolute as to make running signed and tampered binaries impossible. I will assume all risk, and I will not come crying to Apple if my actions result in my computer being totally messed up and all my private information in the hands of North Korean hackers.
I'm not a fan of a locked-down Gatekeeper either, but this isn't entirely a situation where a naive user installing a bad actor on their computer harms no one else. There aren't any botnets built on OS X systems that I've heard of, but there might be in the future. In this case, infected computers infect everyone even if only in small measure. I'd like to see things set up so that the default is lock-down, but ways in which this can be circumvented by people with a bit more know-how, maybe a CLI utility. Yeah, you can't stop idiots from misusing any work-around, but absolutely nothing is absolutely perfect (except for a few perfect sphincters I've known).
I agree. And that is why you have the option to bypass Gatekeeper with the "Open Anyway" button. I think it makes sense to stop complaining about a lack of feature until that feature is actually taken away.