| ▲ | ramoz 3 hours ago | |||||||||||||||||||||||||||||||||||||||||||
Macs do not have an accessible hardware TEE. Macs have secure enclaves. | ||||||||||||||||||||||||||||||||||||||||||||
| ▲ | nl 3 hours ago | parent [-] | |||||||||||||||||||||||||||||||||||||||||||
Good point! But they argue that: > PT_DENY_ATTACH (ptrace constant 31): Invoked at process startup before any sensitive data is loaded. Instructs the macOS kernel to permanently deny all ptracerequests against this process, including from root. This blocks lldb, dtrace, and Instruments. > Hardened Runtime: The binary is code-signed with hardened runtime options and explicitly without the com.apple.security.get-task-allow entitlement. The kernel denies task_for_pid() and mach_vm_read()from any external process. > System Integrity Protection (SIP): Enforces both of the above at the kernel level. With SIP enabled, root cannot circumvent Hardened Runtime protections, load unsigned kernel extensions, or modify protected sys- tem binaries. Section 5.1 proves that SIP, once verified, is immutable for the process lifetime. gives them memory protection. To me that is surprising. | ||||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||||