What does HackerNews think of macOS-Security-and-Privacy-Guide?

Guide to securing and improving privacy on macOS

Language: Python

#12 in macOS
#8 in Security
- 1Password

- Fastmail (block images in email, which are often used for tracking)

- Privacy.com

1Password integrates with both of the above, so that any time I sign up for a new service it will get a random, unique email from Fastmail (masked email), a unique credit card from privacy.com, and I use 1Password to generate not only a unique, strong password but also a unique username (hence my current username here, squeegee_scream).

- sync.com for online storage. it's e2ee

- MFA everywhere it's available

- 1Blocker

- nextdns

- use privacy-respecting alternative frontends:

  - use invidious instead of youtube
  
  - libreddit or teddit instead of reddit
  
  - nitter instead of twitter
- macos, following https://github.com/drduh/macOS-Security-and-Privacy-Guide for hardening (I haven't compared this to other hardening guides, but doing something is better than nothing)

- rotate my usernames on social sites on a regular basis. I'm really only active on reddit and HN, but I'm still concerned about being doxxed

- avoid buying things from amazon

- Signal app for communication as often as possible

Discussion from the last time this was posted in 2018 - https://news.ycombinator.com/item?id=18099835

Also the macOS Security and Privacy Guide may be of interest

https://github.com/drduh/macOS-Security-and-Privacy-Guide

as discussed on HN last year https://news.ycombinator.com/item?id=24242890

macOS Mail.app -> Preferences -> Viewing -> Uncheck "Load remote content in messages"

Privacy defaults come down to usability vs. privacy; Apple making this so easy to toggle is fine by me as I care about privacy and tracking.

Now, it would be great if every macOS application walked you through privacy settings right after installation in the same way that I am offered a tour of the new features. Since there is no such "privacy tour", the community has discussed ways in which macOS can be hardened [1], [2].

1. https://github.com/drduh/macOS-Security-and-Privacy-Guide

2. https://news.ycombinator.com/item?id=18099835

I think the turning off FindMy one really depends on where you fall on the security-usability spectrum. For example if you want to truly harden your Mac there is a ton of steps you can take, but they get gradually more intrusive to the experience of actually using the system: https://github.com/drduh/macOS-Security-and-Privacy-Guide
I follow some parts on Bejarano's [0]. It was discussed on HN https://news.ycombinator.com/item?id=18099835 (6 months ago)

macOS Security and Privacy guide [1] also a recommendation you can try.

[0]: https://blog.bejarano.io/hardening-macos.html

[1]: https://github.com/drduh/macOS-Security-and-Privacy-Guide

Very interesting! I’m reading it quite thoroughly so I don’t have any immediate thoughts but this did remind me of another similar guide in the spirit of things if you haven’t seen it:

https://github.com/drduh/macOS-Security-and-Privacy-Guide

Very good also if you liked this

Yes, with some effort: https://github.com/drduh/macOS-Security-and-Privacy-Guide

You probably could with the same amount of effort for Windows, but at least Windows makes it more clear that it is happening.

Are there any good analyses out there of what telemetry OSX sends?

I did find this which is interesting and helpful:

https://github.com/drduh/macOS-Security-and-Privacy-Guide

Not sure, haven't come across it. Here's a pretty paranoid setup, can't totally vouch for it though https://github.com/drduh/macOS-Security-and-Privacy-Guide