Patch the base operating system and all third party software.Recognize threats and how to reduce attack surface against them.What are you trying to protect and from whom? Is your adversary a three letter agency (if so, you may want to consider using OpenBSD instead) a nosy eavesdropper on the network or a determined apt orchestrating a campaign against you?.To suggest an improvement, please send a pull request or open an issue.
Only you are responsible if you break anything or get in any sort of trouble by following this guide. This guide is provided on an 'as is' basis without any warranties of any kind. There is no one single technology, software, nor technique to guarantee perfect computer security a modern operating system and computer is very complex, and requires numerous incremental changes to meaningfully improve one's security and privacy posture. This guide is targeted to power users who wish to adopt enterprise-standard security, but is also suitable for novice users with an interest in improving their privacy and security on a Mac.Ī system is only as secure as its administrator is capable of making it. This guide is a collection of techniques for improving the security and privacy of a modern Apple Macintosh computer ('MacBook') running a recent version of macOS (formerly known as 'OS X').