<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<meta http-equiv="Content-Type" content="text/xhtml; charset=utf-8">
<style>
div.markdown { white-space: normal; }
div.plaintext { white-space: normal; }
body { font-family: sans-serif; }
h1 { font-size: 1.4em; }
h2 { font-size: 1.2em; }
h3 { font-size: 1.1em; }
blockquote { margin: 0 0 5px; padding-left: 5px; border-left: 2px solid #136BCE; color: #136BCE; }
blockquote blockquote { border-left-color: #4B89CF; color: #4B89CF; }
div.footnotes li p { margin: 0.2em 0; }
</style>
</head>
<body>
<div class="markdown">
<p dir="auto">On 24 Feb 2017, at 0:50 MST, Robert M. Münch wrote:</p>
<p dir="auto"></div>
<div class="plaintext"><blockquote><p dir="auto">Hi, I think that's Appel's sandboxing where apps are run from random paths. LS should handle this, I'm using it too and don't see this effect for any apps. But I'm not using MM 2 beta.</p>
</blockquote></div>
<div class="markdown"></p>
<p dir="auto"><a href="https://developer.apple.com/library/prerelease/content/technotes/tn2206/_index.html">https://developer.apple.com/library/prerelease/content/technotes/tn2206/_index.html</a></p>
<p dir="auto">Scroll down to...</p>
<hr>
<p dir="auto">Shipping your Signed Code</p>
<p dir="auto">The preferred way to ship a signed app is via the Mac App Store. The Mac App Store provides a secure channel for app delivery and installation that requires minimal action on the part of the user.</p>
<p dir="auto">For distribution outside of the Mac App Store, the preferred options are to use a signed disk image (DMG) or signed installer package. Signing these allows validation of the contents and their source. ZIP archives may also be used, but this is discouraged.</p>
<p dir="auto">If using a disk image to ship an app, users should drag the app from the image to its desired installation location (usually /Applications) before launching it. This also applies to apps installed via ZIP or other archive formats or apps downloaded to the Downloads directory: ask the user to drag the app to /Applications and launch it from there.</p>
<p dir="auto">This practice avoids an attack where a validly signed app launched from a disk image, ZIP archive, or ISO (CD/DVD) image can load malicious code or content from untrusted locations on the same image or archive. Starting with macOS Sierra, running a newly-downloaded app from a disk image, archive, or the Downloads directory will cause Gatekeeper to isolate that app at a unspecified read-only location in the filesystem. This will prevent the app from accessing code or content using relative paths.</p>
<hr>
<p dir="auto">I must add I personally prefer the simplicity of zip archives, and hope this does not lead to their demise.</p>
<p dir="auto">Dragging the expanded application program to the /Applications directory also kills the translocation sandboxing... NB this means you must uncompress it anywhere but in the dir from which you intend to run it. My impression is when MailMate updates itself this is done in Library/Caches/... and thus should not be a problem.</p>
<p dir="auto">ビリー ヨーデルマん<br>
+1 310 839 7673<br>
<a href="http://MIX.ORG/">http://MIX.ORG/</a></p>
</div>
</body>
</html>