
Apple has recently addressed a vulnerability that lets attackers with root privileges bypass System Integrity Protection (SIP) to install « undeletable » malware and access the victim’s private data by circumventing Transparency, Consent, and Control (TCC) security checks. […]