TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Bypassing macOS TCC user privacy protections by accident and design

159 pointsby adibalmost 4 years ago

8 comments

crazygringoalmost 4 years ago
&gt; <i>At least, that’s how it’s supposed to work, but if Alice is an admin user and gives Terminal Full Disk Access (FDA), then Alice can quite happily navigate to Bob’s Desktop and Downloads folders (and everyone else’s) regardless of what TCC settings Bob (or those other users) set... When Alice grants FDA permission to the Terminal for herself, all users now have FDA permission via the Terminal as well. The upshot is that Alice isn’t only granting herself the privilege to access others’ data, she’s granting others the privilege to access her data, too... Any application granted Full Disk Access has access to all user data, by design.</i><p>This indeed seems dangerously counterintuitive.<p>I, like most other people I&#x27;d think, always assumed the permission dialogs (&quot;TCC&quot;) were a layer of restrictions <i>on top of</i> traditional UNIX user permissions. Not <i>overriding</i> them.<p>In other words, granting full-disk access to an app would give it access to everything <i>my user</i> can access. Not &quot;sudo&quot; access to other users&#x27; data as well.<p>Why would an app ever need <i>that</i> level of access? For installing files, maybe, but not while running.<p>Can anyone else confirm this is how macOS actually works? And if there&#x27;s some justification I&#x27;m missing? It seems <i>so</i> crazy that I can&#x27;t actually believe it without somebody else verifying it.
评论 #27733754 未加载
评论 #27734982 未加载
评论 #27733310 未加载
judge2020almost 4 years ago
I think the original title would be better<p>&gt; Bypassing macOS TCC User Privacy Protections By Accident and Design<p>Simply because &#x27;backdoor&#x27; is especially vague - I first thought it was about Apple backdooring their users perhaps, but it&#x27;s a way for malware to abuse Finder to bypass the &#x27;Full Disk Access&#x27; permission prompt. It&#x27;s also not an editorialized title.
评论 #27732727 未加载
noizejoyalmost 4 years ago
It’s been too many years, since I had detailed professional involvement with computer and network security, so I apologize if this question is stupid and I’m not even sure, if it’s even phrased quite right by modern standards:<p>On a computer shared by multiple people and multiple applications, shouldn’t privileges be assigned at the intersection between user and app (and or groupings thereof)? And if there was some sort of privileges table, it would have a composite key consisting of app-id and user-id.<p>Is any modern OS actually set up that way and if yes, is there any way to generate a report to show the combination of user&#x2F;app privileges?
评论 #27733011 未加载
评论 #27733743 未加载
csande17almost 4 years ago
&gt; At least, that’s how it’s supposed to work, but if Alice is an admin user and gives Terminal Full Disk Access (FDA), then Alice can quite happily navigate to Bob’s Desktop and Downloads folders (and everyone else’s) regardless of what TCC settings Bob (or those other users) set.<p>How does this interact with regular Unix file permissions? Is the assumption that Alice is using sudo, or do modern macOS versions mark all user files world-readable?
评论 #27734032 未加载
评论 #27732981 未加载
GekkePrutseralmost 4 years ago
I really think Apple should be clearer about what all this stuff does. They&#x27;re adding a layer of what looks like security but it&#x27;s not always clear how it behaves.<p>I feel Apple tries to hide complexity from the user too much. I understand they want to do this by default but there should be a way for technical users to know what&#x27;s going on. I don&#x27;t think that&#x27;s the case well enough now.<p>Especially that thing with the full disk access cascading though the automation permission is very vague.
philistinealmost 4 years ago
This shit is bananas! I had no idea, as the average user, about such glaring holes in the protection. Any app can read and write its own files in the protected folders? How on earth could that be intended?
interactivecodealmost 4 years ago
As I understand it full disk access means the app can read the disk outside of the usual (strict) app sandbox or explicit user actions like file modals.<p>This is completely separate from the unix user permissions.
评论 #27734938 未加载
lilyballalmost 4 years ago
How does granting automation access to Finder allow other users to access Alice’s data? TCC doesn’t negate standard Unix file permissions, and other users couldnt read Alice’s data before TCC. And the standard user directories (such as Desktop) are not accessible by other users.
评论 #27735064 未加载
评论 #27733540 未加载