Explanation of Wi-Fi Security Vulnerabilities and the "Attack Surface"
I'm reluctant to post more information in this thread, because I don't want to clutter it and I think that Dev responses are going to be more important than mine. I'm also being extremely careful to review my posts (and posts of others) to make sure they are factual/accurate, because I know there are many (not just Devs, but also their well-deserved fans and supporters) waiting to pounce on any inaccuracies with the hope of dismantling arguments and damaging credibility. Note that none of the computer security concerns in this thread have been successfully challenged or disputed, let alone disproven. The computer security concerns in this thread are valid, undisputed and are not opinions.
After reviewing comments in this thread and in other threads, it has become apparent to me that most readers don't understand what is meant by "attack surface" and "security vulnerabilities." I'm not going to take the time to rehash these concepts which are well-defined and easily searched. What I will do is help to understand why I am less concerned about OCLP post-install patches for Big Sur, Monterey and Ventura (no Wi-Fi root-patches) than I am about Sonoma OCLP Wi-Fi root-patches. Warning: it is very possible that even with my extensive experience, I am being naive in assuming that other root-patches have a smaller attack surface than the Wi-Fi root patches. I do think it's a reasonable assertion.
Wi-Fi root patches have a greatly expanded attack surface (much more than graphics root patches). In addition to the vulnerability that exists because trusted framework in the secure dataflow is breached and modified (it's software and software has bugs), if Apple detects a Wi-Fi security flaw that needs an emergency repair or a Standards Body finds a flaw that needs a Wi-Fi architecture mod,
these issues will NOT be addressed by Apple on the OCLP-Patched Mac running Sonoma. And if the Devs find an OCLP bug that exposes a Wi-Fi security vulnerability, they can't be expected to respond as quickly as Apple. The Devs will need time to learn about the bug, figure out a fix, implement the fix, test the fix on all OCLP-supported Macs and then deploy the fix via an updated version of OCLP. Then the user will need to fetch and apply the OCLP update and then manually apply new OCLP root-patches.
Even if the Devs close the hole after a few days or a week or a month (that's ambitious), there is a window of opportunity for the hacker (who already knows about the vulnerability if the Devs know about it and who is already working to exploit it for criminal gain or malicious intent).
Wi-Fi may be the most likely avenue into a PC or Mac for a hacker (it's debatable, but it's certainly near the top). It is a likely medium through which a hacker at a coffee shop, an airport or a fast-food restaurant will gain access to the unsuspecting user. And that's if you connect to a "legitimate" Wi-Fi hotspot. If you inadvertently connect to the hacker's fake Wi-Fi hotspot, forget about it.
Anyone who claims that the vulnerabilities exposed by OCLP's Wi-fi root-patches can be "fixed" with application layer security (even something as well-known and trusted as SSL or something as irrelevant as Gatekeeper) has no idea what they are talking about and by making such statements, they only reveal their own ignorance (not a bad thing, they just aren't qualified to make the claim).
EDIT: I have not reviewed T1 patches. I cannot comment on these patches and cannot determine their vulnerability relative to Wi-Fi root patches.
EDIT2: I have already stated that you should not believe me and you should not trust me. Do your own homework to substantiate (or disprove) claims made in this thread. Search for and read articles like
this. If you find information that contradicts any claims or statements in this thread, please post this information so that we can keep this thread factual and accurate and so that we can make corrections if necessary. As long as we keep this thread fact-based and not opinion-based, it will remain helpful to all who are concerned about computer security when using OCLP. Thank you.