Skip to content

Commit

Permalink
wording
Browse files Browse the repository at this point in the history
Co-authored-by: Jonah Aragon <[email protected]>
Signed-off-by: kimg45 <[email protected]>
  • Loading branch information
kimg45 and jonaharagon committed Sep 18, 2024
1 parent b055568 commit 0c53231
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion docs/os/macos-overview.md
Original file line number Diff line number Diff line change
Expand Up @@ -170,7 +170,7 @@ System Integrity Protection makes critical file locations read-only to protect a

##### App Sandbox

On macOS, whether an app is sandboxed is determined by the developer when they sign it. The App Sandbox protects against vulnerabilities in the apps you run by limiting what a malicious actor can do in the event that the app is exploited. The App Sandbox *alone* can't protect against [:material-package-variant-closed-remove: Supply Chain Attacks](../basics/common-threats.md#attacks-against-certain-organizations){ .pg-viridian } by malicious developers. For that, sandboxing needs to be enforced as it is on the App Store.
On macOS, whether an app is sandboxed is determined by the developer when they sign it. The App Sandbox protects against vulnerabilities in the apps you run by limiting what a malicious actor can do in the event that the app is exploited. The App Sandbox *alone* can't protect against [:material-package-variant-closed-remove: Supply Chain Attacks](../basics/common-threats.md#attacks-against-certain-organizations){ .pg-viridian } by malicious developers. For that, sandboxing needs to be enforced by someone other than the developer themselves, as it is on the App Store.

macOS apps submitted to the App Store after June 1, 2012 are required to be sandboxed using the [App Sandbox](https://developer.apple.com/documentation/security/app_sandbox).

Expand Down

0 comments on commit 0c53231

Please sign in to comment.