Authentication
Introduction
Disable automatic login
Require a password when resuming
Make that more secure passwords
Use a password manager
Managers
It does not protect from keyloggers
Use multi-factor authentication (MFA)
Protect SSH access with MFA
Services and applications
Introduction
Restrict which apps can run
System integration protection (SIP)
Secure browsers that protect your privacy
Use a secure messaging service
Use secure email services
Articles
Use SSH tunnels
Tunnelling with local port forwarding
Reverse tunnelling with remote port forwarding
Dynamic port forwarding
Use a VPN service
No logs policy
Logs timestamps and bandwidth
Use a firewall as a VPN fail-safe mechanism
Kill switch using pf
Use alternative DNS servers
Alternative DNS servers
Use wireshark to check for leaks
Use a Tor proxy
Tor proxy
Set network proxy settings via System Preferences
Notes
Change MAC address
Renew IP lease
Edit hosts file
Data
Introduction
Set up the time machine and backups in macOS
Partitioning the drive
Set up time machine
Backups for the file storage partition
Enable full disk encryption using FileVault
Enable FileVault
Create a Vault
Password protect files and folders
iWork suite documents
PDF Files in Preview
Microsoft Word files
Microsoft PowerPoint and Excel files
Password protect folders
Privacy
Introduction
Disable location services and other privacy settings
Remove metadata from files
Techniques for metadata removal
Edit exif metadata in images
Native
ExifEdit
Remove metadata with hex editors
Usage in general
Using software
Online
Clean machine with BleachBit
Malware
Introduction
Mac myths
There are no viruses for Mac
Apple quickly fixes vulnerabilities
Scan and clean machine
Automagically
Manually
Check activity monitor
Check for unwanted applications
Look at login items
Fail
Related
Catch and remove daemons and launch agents
Automagically assisted
Manually
Folder actions
Remove items
Related
Analysing trojans
Related
Operations security
Introduction
Fail
Use email securely
Detecting fake emails and phishing
Fake emails
Phishing
Browse more safely
Check integrity of downloads
Verifying downloaded software
‘;–have i been pwned?
Guards! Guards!
Introduction
Choosing a firewall for a Mac
Choosing a HIDS for a Mac
Alphabet soup
Firewall
IDS
IPS
macOS intrusion detection systems
Host intrusion detection systems
Network intrusion detection systems
OSSEC
Hardening macOS
Ty Myrddin Home
Unseen University
Improbability Blog
About
Contact
Index