Come see me and my colleague Arthur present two macOS vulnerabilities we’ve found at Objective By The Sea v6.0!
launchd debug logs are always fun to read. Today’s examples: “uncorking exec source” and “internal event: PETRIFIED”
When you write code for hours and finally press “build” and the build passes and you’re like yay I’m awesome and then you test it and nothing works and it turns out you had the wrong target selected all along.
oh wow, I only now noticed that in Sonoma, there’s /etc/pam.d/sudo_local which persists across upgrades!
Might need to tweak those serial parameters a bit. Also homebrew needs to learn to respect the termcap!