Jump to content

Apple intentionally created a security breach in macOS Big Sur


fantomas
 Share

9 posts in this topic

Recommended Posts

  • 2 weeks later...
  • 4 weeks later...
  • 1 year later...
On 11/19/2020 at 3:24 PM, HenryV said:

People who want to know what apps and processes are exempt can open the macOS terminal and enter sudo defaults read /System/Library/Frameworks/NetworkExtension.framework/Resources/Info.plist ContentFilterExclusionList.

 

Feedback about this: Must have typed in incorrectly I suppose?

 

MacBook-Pro ~ % sudo defaults read /System/Library/Frameworks/NetworkExtension.framework/Resources/Info.plist ContentFilterExclusionList

Password:

2022-02-19 20:20:20.143 defaults[2009:60869]

The domain/default pair of (/System/Library/Frameworks/NetworkExtension.framework/Resources/Info.plist, ContentFilterExclusionList) does not exist

Edited by makk
Link to comment
Share on other sites

 Share

×
×
  • Create New...