

That’s sich a Mac answer it’s unbelievable.
Describing “A project aimed to be agnostic of it’s environment” as a design mistake and not a inherent flaw of the OS is… Just wow.
Remember in this thread it’s about the pro and con of Macos as interference hardware. This is a major flaw which comes baked into the hardware. I tested it and find it an unacceptable limitation. It’s important for others to know.
To state “containerization is the issue” though… Just wow.






Though this is a severe exploit, note that you need already user access to the machine to use it.
Dor like … Everyone here who learns from it cis this need it’s likely a non issue. Still good practice to fix but if you didn’t share your user space this will not be the attack vector you will fall victim to - most likely.