Readit News logoReadit News
tokamak-teapot · 2 years ago
More of this could be great for corporate machines. Currently they are often bogged down with poorly behaving third party security software, some of which causes real problems for users, which could be lessened if some of that software could be replaced with better behaving OS capabilities.

Windows Defender (or whatever it’s called) looked like it might help similarly on Windows, but I haven’t seen it being used that way. It looks to me like the third parties keep looking for new features they can advertise, knowing that corporate InfoSec will mandate support for them quickly, and that an OS-provided solution isn’t sold in the same way, so will be deemed unsuitable.

Anyone feel more optimistic?

drewg123 · 2 years ago
If you read the darwin-kernel mailing list archives from 10-15 years ago, some of the most ignorant questions were from AV vendors. (like: "why does my system deadlock when I stop the entire kernel waiting for a userspace helper ..") They seemed so horrifically incompetent that I resolved to never run any 3rd party AV software on any machine I control.
cpach · 2 years ago
“They seemed so horrifically incompetent that I resolved to never run any 3rd party AV software on any machine I control.”

Good call. There has been too many awful products in that space.

lloeki · 2 years ago
Scenario 1: corp buys into Apple's protection, gets rid of (most) third party software

Scenario 2: corp keeps third party software, which bangs its head against Apple's protection which prevents such god processes to access information, thus corp disables Apple's protection and keeps using third party software.

derefr · 2 years ago
Scenario 3: Apple treats third-party software that "bangs its head against Apple's protection" as malware, force-disabling it; mandates all third-party software to be rewritten to just use control APIs for Apple's internal protection mechanism.

(Compare/contrast: Hypervisor.framework)

greggsy · 2 years ago
This is exactly how Symantec operated under Windows 7, which required you to disable a key security feature at boot. Not sure if it’s still a thing.
ec109685 · 2 years ago
Apple’s software will never support DLP and other invasive Corp spyware so I think there will always unfortunately be a need for the latter.

E.g. https://www.bloomberg.com/news/features/2023-05-11/the-plot-...

g42gregory · 2 years ago
Hopefully Scenario 3a: corp realized that they don't really need Apple OS and move to Linux instead.
greggsy · 2 years ago
IMO this is pulling the OS closer towards a more trusted platform model that mobile devices have been afforded through years of incremental refinement of corporate MDM solutions.

Deleted Comment

ChrisMarshallNY · 2 years ago
I would hope so.

We used to write image processing pipelines.

This is code that really needs to run fast.

We spent a huge amount of time tuning, analyzing, and re-tuning the software.

Our IT group was completely focused on office workers, and would force us to install their spyware on our test machines.

It was not a good fit.

bluedino · 2 years ago
3rd party software checks the security and regulatory teams boxes, so no matter how bad they are, they won't be going away anytime soon.
iancarroll · 2 years ago
I have seen companies pass audits with just XProtect, but I think it highly depends on your auditor and the wording you use to justify it.
Unfrozen0688 · 2 years ago
>Windows Defender (or whatever it’s called) looked like it might help similarly on Windows, but I haven’t seen it being used that way.

It is more and more, but you need the expensive Microsoft 365 license to use the web portal for it for, key word, MANAGEMENT.

You want to be able to scan computers, lock them out of all network access besides the AV management, block usb/peripherals etc etc when an attack happens.

You DONT want to just let it run headless.

GavinAnderegg · 2 years ago
For those interested in more details on XProtect’s status on their systems, Howard Oakley (the author of this blog) also provides free utilities: https://eclecticlight.co/downloads/

XProCheck, which allows for easier viewing of XProtect log details: https://eclecticlight.co/consolation-t2m2-and-log-utilities/

As well as SilentKnight + LockRattler for checking the status of XProtect updates and other security configuration: https://eclecticlight.co/lockrattler-systhist/

callalex · 2 years ago
I wonder why Apple finds the need to run all of this security software in the shadows with zero documentation, near zero user access to logging, and zero user access to what the system is doing. Is it just some leftover pride because a handsome actor in blue jeans said macs don’t have viruses on TV 15 years ago?
kaba0 · 2 years ago
Because a serious enough malware running rampant on their platform would cause actual monetary loss for them, potentially losing their image as a safe OS?
callalex · 2 years ago
In that case isn’t it better to be seen doing something to counteract that possibility instead of hiding the effort?
wkat4242 · 2 years ago
Zero user control over technical functionality is totally Apple's MO these days. They were a lot better at this in the early OSX days, they only used to hide technical details but the user could still control them if they knew what they were doing.

But since iOS they've been slowly pushing this model to Mac. It pushed me away from the Mac platform, I only use it for work now.

sam0x17 · 2 years ago
Hah, my minecraft region protection mod used to be called XProtect
shepherdjerred · 2 years ago
I love seeing all of the fellow HN users who participated in the Minecraft server community
cjdoc29 · 2 years ago
...There was an HN Minecraft server community?
mattmcknight · 2 years ago
Is there any software out there detecting an unusual volume of file encryption activities from a process that could indicate it is ransomware?
Terretta · 2 years ago
“RansomWhere? is a utility with a simple goal; generically thwart OS X ransomware. It does so by identifying a commonality of essentially all ransomware; the creation of encrypted files.”

https://objective-see.org/products/ransomwhere.html

For a deep dive into this line of thinking, his post:

Towards Generic Ransomware Detection (04/20/2016)https://objective-see.org/blog/blog_0x0F.html

Malwarebytes purchased an activity detecting product and claimed to offer this type of protection, though that marketing has become more generic now:

https://www.malwarebytes.com/cybersecurity/business/what-is-...

Given AV firms change hands and veer into dark patterns, forum posts like this one shouldn't recommend anything in particular as the ownership and policies can change overnight.

Unfrozen0688 · 2 years ago
Sentinelone et al. places canary files that when encrypted flags for ransomware to central management.

Deleted Comment

nxobject · 2 years ago
I do wonder whether they'll let other apps hook into the "don't access private data for X" safeguards. In this hypothetical, how many developers would choose this – over simply putting their private data behind a password?
1letterunixname · 2 years ago
The industry bar is low: Is it any better than MDE?