Block potential of code injection via macOS' dynamic linker for improved security #593
Unanswered
pingu-the-penguin
asked this question in
Ideas
Replies: 1 comment 1 reply
-
|
uBOL is HTML/CSS/JS. Are other content blockers such as AdGuard, Ghostery, or ABP setting this flag? |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
The user can enable a column in Activity Monitor to check for a flag called "Restricted" which is a flag that prevents programs from injecting code via macOS's dynamic linker. Ideally, this flag should be set for UBOL to prevent code injection, but it is not. It should not cause any issues as all the app does is prompt you to press on a button but it is better to enable it.
Beta Was this translation helpful? Give feedback.
All reactions