Well I've got no clue what they do exactly but I mean how do they check what you run?Yeah but then armchair security advisor would say “duh, using such an obsolete piece of software is insecure, full of security bugs and issues, and endanger everyone else” blah blah. 😕
for the network you can just spoof the system.
and on a security side note: who the hell goes around trying to infect the 1% of macOS users which in turn have maybe a 15-20% share globally