fantomas Posted November 19, 2020 Share Posted November 19, 2020 In Big Sur Apple decided to exempt many of its apps from being routed thru the frameworks they now require 3rd-party firewalls to use (LuLu, Little Snitch, etc.) Q: Could this be (ab)used by malware to also bypass such firewalls? A: Apparently yes, and trivially so. twitter View full article 8 1 Link to comment Share on other sites More sharing options...
eSaF Posted November 19, 2020 Share Posted November 19, 2020 This is getting to be seriously concerning, first we read about BS collecting personal data of it's users and possible spying, now this. BS is turning out to be a Big Surprise. 2 1 Link to comment Share on other sites More sharing options...
eSaF Posted November 19, 2020 Share Posted November 19, 2020 1 hour ago, 5T33Z0 said: Here's a bit more technical insight on the issue: In the words of Spock - 'Fascinating' 2 Link to comment Share on other sites More sharing options...
eSaF Posted November 19, 2020 Share Posted November 19, 2020 @Hervé - Oh darn it man now you've put me in the mood to go and watch some reruns of 'Next Generation'. 2 Link to comment Share on other sites More sharing options...
HenryV Posted November 19, 2020 Share Posted November 19, 2020 People who want to know what apps and processes are exempt can open the macOS terminal and enter sudo defaults read /System/Library/Frameworks/NetworkExtension.framework/Resources/Info.plist ContentFilterExclusionList. 1 2 Link to comment Share on other sites More sharing options...
Muaitai Posted November 28, 2020 Share Posted November 28, 2020 Apple is addressing this issue in the article below: https://support.apple.com/en-us/HT211931 Link to comment Share on other sites More sharing options...
azul líder Posted December 26, 2020 Share Posted December 26, 2020 I'm pretty sure that's actually about a separate, stupid issue. Link to comment Share on other sites More sharing options...
makk Posted February 20, 2022 Share Posted February 20, 2022 (edited) On 11/19/2020 at 3:24 PM, HenryV said: People who want to know what apps and processes are exempt can open the macOS terminal and enter sudo defaults read /System/Library/Frameworks/NetworkExtension.framework/Resources/Info.plist ContentFilterExclusionList. Feedback about this: Must have typed in incorrectly I suppose? MacBook-Pro ~ % sudo defaults read /System/Library/Frameworks/NetworkExtension.framework/Resources/Info.plist ContentFilterExclusionList Password: 2022-02-19 20:20:20.143 defaults[2009:60869] The domain/default pair of (/System/Library/Frameworks/NetworkExtension.framework/Resources/Info.plist, ContentFilterExclusionList) does not exist Edited February 20, 2022 by makk Link to comment Share on other sites More sharing options...
makk Posted February 22, 2022 Share Posted February 22, 2022 Funny thing, Big Sur 11.6.0 runs extremely fast as compared to those with security updates such as 11.6.4. Link to comment Share on other sites More sharing options...
Recommended Posts