You can't trust macOS Privacy and Security settings
macOS folder permissions behavior
- Core issue: apps can retain access to protected folders (e.g., Documents) even when System Settings shows access as revoked.
- This often happens via the Open/Save panel: selecting a folder there grants access that can persist, but that grant isn’t clearly surfaced or revocable via the GUI.
- Several commenters tested the article’s steps and confirmed that apps could still read Documents while the UI claimed access was blocked.
- Some note that this is limited to TCC‑protected folders and doesn’t affect general filesystem access in the usual Unix sense.
Is it a bug, design quirk, or vulnerability?
- One camp: this is a security‑UI bug / “security theater.”
- The UI misrepresents actual permissions and offers no clear way to audit or revoke “implicit” grants.
- For some, this undermines trust in macOS privacy controls.
- Another camp: intended but poorly communicated behavior.
- The file picker is treated as explicit consent; it’s a separate mechanism from the “Files & Folders” toggles.
- From this view, two systems are working as designed; only the UI is inadequate.
TCC, sandboxing, and technical details
- Distinction is made between:
- TCC (privacy gates on Desktop/Documents, Messages, etc.)
- The App Sandbox (entitlements, temporary “sandbox extensions,” and security‑scoped bookmarks).
- Sandboxed apps typically get temporary access via file pickers unless they persist security‑scoped bookmarks.
- For non‑sandboxed apps, TCC is a leaky layer bolted on top of a traditional desktop OS, with many legacy compromises.
- One commenter notes extended attributes (e.g.,
com.apple.macl) and SIP making implicit grants hard to remove; others saytccutil resetplus reboot should work, though at least one report says it didn’t.
UX, permission fatigue, and “performative security”
- Many criticize permission prompts as noisy, confusing, and inconsistent, comparing them unfavorably to Windows UAC or praising simpler Unix models plus containers.
- Complaints include: barrage of prompts on fresh setups, app restarts required after toggling permissions, inconsistent behavior between Apple vs third‑party apps, unclear “Full Disk Access” semantics, and ambiguous toggle states.
- Others argue that default deny is necessary in a world of compromised supply chains and untrusted plugins, and that developers underestimate real risk.
Broader trust and mitigations
- Some express broader distrust of Apple’s privacy posture (VPN bypass history, iCloud behavior, persistent wireless state quirks).
- Suggested mitigations include router‑level VPNs, using Linux/Unix with explicit sandboxing, and resetting TCC for specific apps.