So uh...why exactly haven't you joined the hackintosh master race?
What makes you think that Mac hardware isn't backdoored too?
>Each of these diagnostic capabilities requires the user to have unlocked their device and agreed to trust another computer. Any data transmitted between the iOS device and trusted computer is encrypted with keys not shared with Apple. For users who have enabled iTunes Wi-Fi Sync on a trusted computer, these services may also be accessed wirelessly by that computer.
>installing un-official, modified OS media with no source code
>implying your computer isnt being used to spam dickpill emails and your credit cards in the hands of the russian mob
No, because you're giving them unlimited power to do basically whatever the fuck they want to with your machine. I would have a hard time trusting anything like that even if it was Open Source, much less a proprietary hack on OS code.
Also, most low-level exploits are written in assembly which compiles very small. 20mb would be much more than enough space
that's true, unfortunately I've no real purpose for using OS X anymore. It would be nice to try it with better graphical support however.
Although it's as effective as using a linux distro right now.
ok let's just say you're right. Tonymac built a backdoor in his unibeast/clover installer. Then you see it asking for permission in Little Snitch and you deny access. What now?
uhm...did you ever use a mac? You can turn off everything icloud related in 2 clicks. What are you takling about?
I kinda like having notes synced though
Leaving out how often it phones home for Apple's other embedded services. The whole thing is net-based, I don't want that.
(Source: Me running it in a VM and checking Incoming/outgoing connections)
How the fuck do you do hackintosh without any access to any sort of Mac? I tried some dodgy images from piratebay but none of them would boot past clover. I kknow you can do it through VM's but that wouldnt work for me either, any ISOS on the web that just work ?
>Hack on OS code
I dont think you realize how much power a rootkit gives an attacker, if they get root it's basically over for you. For example you can make the OS lie to the user about how much memory is being used or what connections are going through (So they could decide to use your PC as a bitcoin miner and you wouldnt even see the CPU/memory use in the task manager)
well shit. I'm not worried about the tonymac forum but that I pirated software like logic and word. What are the chances?
try the ml2 atkos image. Ez to mount and then just download the el capitan file from the official appstore.
Heartbleed, 25 years before being found.
>b-b-but bad things can't make it to the upstream just like that
>n-n-nobody finds these and exploits them
You really don't think malicious people, goverments, etc out there don't have a shit load vulns stockpiled and never reported that allow them to do shit you wouldn't want them doing?