A new thread, for the discussion of OpenCore Legacy Patcher’s security issues…
BTW: I get that one could argue that, since the Wi-Fi framework is extracted from Ventura, it is still getting updates from Apple. Ok - we still have to wait for OCLP Devs to extract the framework from Ventura and release an OCLP update with the new framework. And that only lasts as long as Apple is still supporting Ventura.
- If a vulnerability is discovered by OCLP Devs and they are able to patch it, it is unreasonable to expect the Devs to communicate the vulnerability and then to patch it in a timely manner (even though they are software gods). They are unpaid volunteers doing this on their own time and at their own expense (despite donations). During the response time (time for Devs to learn about the bug and then the time for it to be fixed and then the time for you to apply the OCLP update), your OCLP-patched Mac may be vulnerable to exploits, allowing a hacker enough time to learn about and exploit the vulnerability. And I want Devs to be able to take vacations as much as anyone (they deserve it!), but not when I'm waiting for a security patch to OCLP.
You're doing that via a regular Mac also, they're anonymously called Apple Inc., the difference is precisely trust. You trust them. OCLP's code can be reviewed, Apple's can't. You might think this is easy, but it isn't. It's just a question of trust who and what to rely on.You are trusting some unknown people over the Internet to make unnamed changes to your Mac
It is a matter of trust. I can't argue with that. The Devs are nice people and have the best of intentions. According to their own admission, OCLP is a "small project" that grew beyond their expectations. It was never anticipated nor was it designed to accommodate the scope of all Intel Mac owners.You're doing that via a regular Mac also, they're anonymously called Apple Inc., the difference is precisely trust. You trust them. OCLP's code can be reviewed, Apple's can't. You might think this is easy, but it isn't. It's just a question of trust who and what to rely on.
When you know enough about computer security, the reality makes the conspiracy theories look like child's play.“OCLP Security” 🤣 What security? It’s insecure by default. You are trusting some unknown people over the Internet to make unnamed changes to your Mac, while lying about SIP. My impression was always that OC/OCLP developers are paid by Apple to make everything obscure and harder, starting with the idiotic way of defining kexts in the config file.
If you want to run macOS on unsupported hardware, stop using OCLP and document in separate threads for each unsupported Mac what changes are needed to make it work. This is the way.![]()
Cherry picking an out-of-context phrase to make your point ignores the rest of the post and is misleading. Do better to preserve your credibility in this thread. This OCLP Security thread is not telling people to stop using OCLP. This thread is about making users aware of the security limitations of OCLP and about requesting changes that make the end user aware of the security limitations. And maybe even prompting changes that close some of the security holes.
After you examine the source of each new release, just give us your confirmation that that rooted macOS with its injected, reviewed, third-party code isn't vulnerable to any exploits that we don't know about and we'll trust you. Thanks.Well, OCLP is Open Source. And as such, it's pretty easy to check the source code to figure out which info is transmitted. I am not a programmer but looking into the "analytics_handler.py" file might provide the answers:
![]()
OpenCore-Legacy-Patcher/resources/analytics_handler.py at main · dortania/OpenCore-Legacy-Patcher
Experience macOS just like before. Contribute to dortania/OpenCore-Legacy-Patcher development by creating an account on GitHub.github.com
So, you didn't mean what I quoted? Well, I thought as much, that's why I quoted it.Cherry picking an out-of-context phrase to make your point ignores the rest of the post and is misleading. Do better to preserve your credibility in this thread. This OCLP Security thread is not telling people to stop using OCLP. This thread is about making users aware of the security limitations of OCLP and about requesting changes that make the end user aware of the security limitations. And maybe even prompting changes that close some of the security holes.
After you examine the source of each new release, just give us your confirmation that that rooted macOS with its injected, reviewed, third-party code isn't vulnerable to any exploits that we don't know about and we'll trust you. Thanks.
Please read the previous posts before jumping to the conclusion that the security vulnerabilities are limited to a review of the source code.
EDIT: Posting here is a clever way to promote your own github repo.
I am. I know how intelligent you are, so I'm surprised you didn't raise them first.Well, you are the one raising security concerns,
You are comparing a trillion-Dollar software and hardware company, that sells billions of devices, to a software project started and maintained by members of a Russian warez forum. Good luck convincing anyone of the equivalency in trust.You're doing that via a regular Mac also, they're anonymously called Apple Inc., the difference is precisely trust. You trust them. OCLP's code can be reviewed, Apple's can't. You might think this is easy, but it isn't. It's just a question of trust who and what to rely on.
You are comparing a trillion-Dollar software and hardware company, that sells billions of devices, to a software project started and maintained by members of a Russian warez forum.