There’s a rather massive amount of information presented in this blog post, so let’s break down what we’re going to cover: Background: We begin the post with a discussion of common (user-assisted) infection vectors and highlight security mechanisms that Apple has introduced to keep users safe. It is important to understand these core macOS security mechanisms, as they are the very mechanisms the b