← Back to context

Comment by Folcon

20 days ago

I mean it has, but the situation is getting ridiculous, I'm at the point where I'm honestly not sure what special set of magical incantations and rituals I need to do to get this process to work, it seems to change between different bits of software and get more complex with time as if Apple keeps finding proverbial bigger fools who can get through this mess without intending to and so they're solution is to keep making it increasingly more Byzantine

The thing that really irks me is I've got a paid developer account with Apple, I've already done the xcode dance, notarized binaries and all that nonsense, shouldn't this have activated some super special bit on my Apple account that says

“this one needs to do random stuff now and again and after saying, `Hey just checking in, doing this will do X to your computer probably, and maybe set it on fire, but if you say "go for it, I promise I know what I'm doing', I'm gonna trust you champ`, finger guns

(not sure why in my head the personification of Apple would do "finger guns", but here we are I guess :shrug:)

Hell at this point I'll take a checkbox in my settings that says, ”Some people are into extreme sports, I love to install random binaries, just get out of my way“

You shouldn't need the company's permission to run whatever you want on your machine.

  • It's not an issue of permission, it's an issue of trying to make a computer that's safe for grandma to use. Criminals can and will convince grandma to navigate a byzantine labyrinth of prompts and technical measures in order to drain her bank account. That's the threat model we're dealing with here.

    • >make a computer that's safe for grandma to use

      People also forget that it makes it safe for people who aren't grandmas. The reason why you think it's just grandmas is because, for you to get a virus or your computer hacked now, it requires so many user gaffes for something like that to happen. In addition, it almost always involves typing in or telling someone your password when you shouldn’t. In the early 2000s, I still remember there was some ad affiliate for the cyanide and happiness webcomic website that, if you let it's ad load, instantly infected your computer with adware just from visiting the site. That’s unheard of now because of increasingly protective/restrictive policies set by technology companies. It’s one of those situations where if a system is working correctly, you won’t even know it’s working at all.

    • I think a time-lock feature to enable “I know what I’m doing mode” for a year, after a 48h delay would be ok.

      Or something like that

      3 replies →

    • Any inmutable distro with Flatpak will solve this forever. No need to restrict anything.

  • …you don’t, just like you don’t need the bank’s permission to withdraw funds… but they will still try and stop you pulling out $10,000 so you can buy iTunes gift cards to pay off your taxes.

IIRC everything you compile on macOS yourself, possibly only when using Apple’s llvm toolchain, already gets the proper bits set to execute just fine. This also seems to work for rust and go binaries. I’m not sure whether that is because they replicated the macOS llvm toolchain behaviour for the flag or whether another mechanism is at play.

You used to be able to boot into the rescue mode and disable their security system. Is that not a thing anymore?

The command line incantation is just a convenience. You can unblock the app that you just tried to run by going to Privacy and Security in system settings and clicking around a bit.