Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> they are hidden away inside the settings, and they are not granular.

The switches default to off though, with a prompt on first attempt at accessing the protected resource.

The problem is that they're leaky like a sieve and the permission model and inheritance works is unclear (I once had the Terminal app ask me for permission - does it now mean anything I run from the terminal automatically inherits it - and so on).





Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: