A follow-up re Macs

If you are interested, I can direct you to some additional information relating to my earlier blog post about recent Macs and the Mac operating system.

This blog post by security researcher Jeffrey Paul further explains why Apple’s decisions about hardware design and operating system implementation are so problematic. If you are a Mac user and have any concerns at all about the privacy and security of your recent or future systems this is a must-read article.

To be fair, it can be argued that Apple’s approach can make it harder for someone who actually steals your computer to wipe it and treat it as their own. However, I feel that the way Apple restricts your ability to independently manage your machine while leaving it open outside interference and monitoring far outweighs this limited benefit.