	{"id":82852,"date":"2018-09-11T08:52:50","date_gmt":"2018-09-11T15:52:50","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=82852"},"modified":"2022-11-17T17:44:22","modified_gmt":"2022-11-18T01:44:22","slug":"how-safe-is-the-mac-app-store-privacy-violating-apps-uncovered","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/how-safe-is-the-mac-app-store-privacy-violating-apps-uncovered\/","title":{"rendered":"How safe is the Mac App Store? Privacy-violating apps uncovered"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter wp-image-82960 size-medium\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/mac-app-store-safe-300x300.png\" alt=\"How Safe Is the Mac App Store? Privacy-Violating Apps Uncovered\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/mac-app-store-safe-300x300.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/mac-app-store-safe-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/mac-app-store-safe-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/mac-app-store-safe-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/mac-app-store-safe-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/mac-app-store-safe-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/mac-app-store-safe-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/mac-app-store-safe.png 600w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Security professionals often advise users that Apple&#8217;s\u00a0Mac App Store is one of the safest places to download apps.<\/p>\n<p>After all, Apple has a review process that&#8217;s supposed to\u00a0help\u00a0prevent potentially harmful apps from ever being published.\u00a0Additionally, App Store apps are <a href=\"https:\/\/developer.apple.com\/app-sandboxing\/\" target=\"_blank\" rel=\"noopener\">sandboxed<\/a>,\u00a0which is supposed to limit apps&#8217; ability to engage in undesirable behavior. Together,\u00a0Apple&#8217;s app\u00a0review process and sandboxing\u00a0theoretically make\u00a0the App Store a more trustworthy software source than\u00a0most.<\/p>\n<p>Lo and behold,\u00a0new information has come to light that calls into question the safety of the App Store\u00a0platform. Many apps have recently been caught doing unscrupulous things, circumventing protections supposedly provided by the App Store, and invading users&#8217; privacy.<\/p>\n<p>So then, just how safe\u00a0is the Mac App Store? And what should Mac users do?<\/p>\n<h3>Multiple independent sources find privacy-violating apps<\/h3>\n<p>Last\u00a0Friday,\u00a0a few Mac security researchers independently published their findings regarding a number of Mac App Store apps that\u00a0employ questionable tactics, violate Apple&#8217;s guidelines, and\u00a0spy on victims&#8217; computer activity.<\/p>\n<p>A Twitter user going by the name &#8220;Privacy 1st&#8221; (<a href=\"https:\/\/twitter.com\/privacyis1st\" target=\"_blank\" rel=\"noopener\">@privacyis1st<\/a>) recently\u00a0found some suspicious behavior in a popular App Store app, called Adware Doctor (full App Store title: &#8220;<strong>Adware Doctor:Anti Malware &amp;Ad<\/strong>&#8220;) and began tweeting about it. Privacy 1st reached out to a Mac security researcher, Patrick Wardle, who did further investigation of his own.<\/p>\n<p>Privacy 1st and Wardle <a href=\"https:\/\/objective-see.com\/blog\/blog_0x37.html\" target=\"_blank\" rel=\"noopener\">discovered<\/a> that Adware Doctor\u2014which recently achieved App Store stardom as #1 in Top Paid Utilities and #4 in Top Paid Apps\u2014was stealing users&#8217; browsing history and more.<\/p>\n<div id=\"attachment_82858\" style=\"width: 583px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-82858\" loading=\"lazy\" class=\"size-full wp-image-82858\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/Adware-Doctor-unzipped-browser-history.png\" alt=\"\" width=\"573\" height=\"433\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/Adware-Doctor-unzipped-browser-history.png 764w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/Adware-Doctor-unzipped-browser-history-150x113.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/Adware-Doctor-unzipped-browser-history-300x227.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/Adware-Doctor-unzipped-browser-history-657x496.png 657w\" sizes=\"(max-width: 573px) 100vw, 573px\" \/><p id=\"caption-attachment-82858\" class=\"wp-caption-text\">Adware Doctor steals Chrome, Firefox, and Safari browsing history, among other things. Image: <a href=\"https:\/\/objective-see.com\/blog\/blog_0x37.html\" target=\"_blank\" rel=\"noopener\">Wardle<\/a><\/p><\/div>\n<p>For an app that\u00a0claims to\u00a0search for adware on the user&#8217;s account, it&#8217;s no surprise that\u00a0Adware Doctor requests access to the user&#8217;s home directory, since that&#8217;s where\u00a0any adware would reside.\u00a0However, after the user grants this access, the app proceeds to do some questionable things\u2014unrelated to the adware scan\u2014without informing the user.<\/p>\n<p>In the background, Adware Doctor\u00a0creates a password-protected zip archive containing the user&#8217;s Chrome, Firefox, and Safari browsing history, as well as the user&#8217;s App Store search history and a list of all the running apps, and then sends that zip archive to a server that&#8217;s evidently\u00a0located in China.<\/p>\n<p>All of this is done without the victim&#8217;s knowledge or consent.<\/p>\n<div class=\"embed-vimeo\" style=\"text-align: center;\"><iframe loading=\"lazy\" src=\"https:\/\/player.vimeo.com\/video\/288987290\" width=\"600\" height=\"338\" frameborder=\"0\" webkitallowfullscreen mozallowfullscreen allowfullscreen><\/iframe><\/div>\n<p>This behavior is\u00a0not at all\u00a0justifiable. Another researcher, Thomas Reed,\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/09\/mac-app-store-apps-are-stealing-user-data\/\" target=\"_blank\" rel=\"noopener\">notes<\/a> in a follow-up article that one\u00a0could\u00a0argue that a malware or adware cleaning app might\u00a0want to check recently browsed sites in an attempt to identify and report back about the source of\u00a0an\u00a0infection; however, the user is never informed about or asked to consent\u00a0to this activity, which takes place surreptitiously in the background\u2014even when no\u00a0adware is found on the system.<\/p>\n<p>Web browsing history can contain very private, personal, or sensitive information. Often it can contain personally identifiable information, or strong clues as to the exact identity of the user. It may reveal things such as home and work addresses (e.g. via Google Maps searches), medical conditions (e.g. via search engine or medical site queries), sexual orientation or fetishes (e.g. via the types of dating sites visited), and a multitude of other things that should not be freely available to an app developer without obtaining the user&#8217;s explicit consent.<\/p>\n<h3>Which apps behaved this way?<\/h3>\n<p>Unfortunately, Adware Doctor was just the tip of the iceberg.<\/p>\n<p>Researchers\u00a0warned of several\u00a0other Mac App Store apps that have been behaving in similar manner, collecting browser history without the user&#8217;s consent, and even\u00a0compressing\u00a0it into a password-protected zip file and sending\u00a0it off to the developer, just like Adware Doctor was doing.<\/p>\n<p>Adware Doctor and two other apps (&#8220;<strong>Komros Anti Malware &amp; Adware<\/strong>&#8221; and &#8220;<strong>AdBlock Master:Block Popup Ads<\/strong>&#8220;) by the same developer,\u00a0Yongming Zhang,\u00a0were removed from the Mac App Store on Friday after the publication of Wardle&#8217;s article\u2014a month after Privacy 1st and Wardle reported the\u00a0illegitimate\u00a0behavior to Apple.<\/p>\n<p><em>But it wasn&#8217;t just a single rogue developer engaging in these privacy-compromising tactics.<\/em><\/p>\n<p>Three additional apps, evidently developed by\u00a0the 30-year-old security company Trend Micro, were called out by Reed and a forum user known as &#8220;PeterNopSled&#8221;\u00a0for using the same technique to exfiltrate users&#8217; browsing history as far back as <em>December 2017<\/em>:<\/p>\n<ul>\n<li>Dr. Antivirus<\/li>\n<li>Dr. Cleaner<\/li>\n<li><strong>Open Any Files: RAR Support<\/strong><\/li>\n<\/ul>\n<p>The latter app, Open Any Files,\u00a0seems to have been removed from the App Store sometime over the weekend.<\/p>\n<p>On Sunday, eight\u00a0more Trend Micro apps were pulled from the Mac App Store, including the aforementioned Dr.\u00a0Antivirus and Dr. Cleaner apps, and Dr. Unarchiver which was <a href=\"https:\/\/9to5mac.com\/2018\/09\/09\/additional-mac-app-store-apps-caught-stealing-and-uploading-browser-history\/\" target=\"_blank\" rel=\"noopener\">called out<\/a> by 9to5Mac&#8217;s\u00a0Guilherme Rambo:<\/p>\n<ul>\n<li><strong>Dr. Antivirus: Remove Malware<\/strong><\/li>\n<li><strong>Dr. Cleaner: Disk, Mem Clean<\/strong><\/li>\n<li><strong>Dr.\u00a0Cleaner Pro: System Clean<\/strong><\/li>\n<li><strong>Dr. Cleaner Elite &#8211; Disk, Memory, System Optimizer<\/strong><\/li>\n<li><strong>Dr. Unarchiver: RAR &amp; Zip Tool<\/strong><\/li>\n<li><strong>Dr. Battery: Health Monitor<\/strong><\/li>\n<li><strong>Duplicate Finder &#8211; File Clean<\/strong><\/li>\n<li><strong>No Sleep:Keep screen light on<\/strong><\/li>\n<\/ul>\n<div id=\"attachment_82861\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-82861\" loading=\"lazy\" class=\"size-large wp-image-82861\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/TrendMicroAppsRemovedFromMAS20180910-1024x507.png\" alt=\"\" width=\"1024\" height=\"507\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/TrendMicroAppsRemovedFromMAS20180910-1024x507.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/TrendMicroAppsRemovedFromMAS20180910-150x74.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/TrendMicroAppsRemovedFromMAS20180910-300x149.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/TrendMicroAppsRemovedFromMAS20180910-768x381.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/TrendMicroAppsRemovedFromMAS20180910-657x326.png 657w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-82861\" class=\"wp-caption-text\">Several apps evidently published by Trend Micro were removed from the Mac App Store on Sunday and early Monday\u2014all the apps shown here except for the two Wi-Fi apps.<\/p><\/div>\n<p>In the early hours of Monday morning, another app, <strong>App Uninstall: Remove Application and Its Service Files for Complete Uninstallation<\/strong>, was removed from the App Store, leaving only two Trend Micro apps\u00a0remaining in the store: &#8220;Dr. Wifi: speed &amp; signal test&#8221; and &#8220;Network Scanner: WiFi Security.&#8221;<\/p>\n<p>Incidentally, Microsoft&#8217;s Windows application store still lists Windows 10 versions of\u00a0at least two of these apps,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/p\/dr-cleaner-clean-computer-space\/9nwwhthnn3wp\" target=\"_blank\" rel=\"noopener\">Dr. Cleaner<\/a> and <a href=\"https:\/\/www.microsoft.com\/en-us\/p\/dr-unarchiver-open-rar-zip-7z-gzip-bz-for-free\/9p8405b66pzv\" target=\"_blank\" rel=\"noopener\">Dr. Unarchiver<\/a>. It is not yet known whether the Windows versions attempt to exfiltrate similar data, but <a href=\"https:\/\/twitter.com\/ductionist\/status\/1038981073529581568\" target=\"_blank\" rel=\"noopener\">early observations<\/a> suggest that the apps may have been ported from Mac to Windows, so it&#8217;s possible that they might contain similar functionality.\u00a0Trend Micro has issued a <a href=\"https:\/\/twitter.com\/theJoshMeister\/status\/1039259066395021312\" target=\"_blank\" rel=\"noopener\">statement<\/a>, saying, &#8220;Windows products and enterprise products do not\u00a0have this feature&#8221;; see below\u00a0to read more from the statement.<\/p>\n<h3>Did Trend Micro really develop spyware?<\/h3>\n<p>One might reasonably ask whether the apps listed above are really from Trend Micro, or whether they\u00a0were created by someone\u00a0merely claiming to be Trend Micro\u00a0to\u00a0benefit from the\u00a0company&#8217;s\u00a0reputation.<\/p>\n<p>Evidence suggested but did not conclusively prove that the apps\u00a0may have been\u00a0developed by Trend Micro. The zip files collected by the apps are uploaded to\u00a0update.appletuner.trendmicro\u2024com, a subdomain of Trend Micro&#8217;s main site. Additionally, a\u00a0May 2018 <a href=\"https:\/\/web.archive.org\/web\/20180910134346\/https:\/\/blog.trendmicro.com\/why-choose-dr-cleaner-is-it-the-best-mac-cleanup-app\/\" target=\"_blank\" rel=\"noopener\">article<\/a> on Trend Micro&#8217;s blog advertises and links to Dr. Cleaner, Dr. Antivirus, Dr. Unarchiver, and Dr. Battery in the Mac App Store.<\/p>\n<p>What remained unclear is when and why the data exfiltration began.<\/p>\n<p>Had exfiltration\u00a0always been a &#8220;feature&#8221; of these products, or was it only added recently, and what was the purpose of collecting this private data? Was the company massively compromised by an attacker? Was there a rogue developer within the company? Did the company somehow forget to ask users&#8217; permission before taking their private data? Even if the apps were acquired by Trend Micro through an acquisition (which is merely one theory), that\u00a0would not fully explain how the data began to be exfiltrated to a Trend Micro server without the company knowing\u00a0it was collecting\u00a0users&#8217; browser history.<\/p>\n<p>On Monday, Trend Micro issued\u00a0a\u00a0<a href=\"https:\/\/blog.trendmicro.com\/answers-to-your-questions-on-our-mac-apps-store\/\" target=\"_blank\" rel=\"noopener\">statement<\/a>, which reads, in part:<\/p>\n<blockquote><p>Trend Micro has completed an initial investigation of a privacy concern related to some of its MacOS [sic] consumer products. The results confirm that Dr Cleaner, Dr Cleaner Pro, Dr. Antivirus, Dr. Unarchiver, Dr. Battery, and Duplicate Finder collected and uploaded a small snapshot of the browser history on a one-time basis, covering the 24 hours prior to installation. This was a one-time data collection, done for security purposes (to analyze whether a user had recently encountered adware or other threats, and thus to improve the product &amp; service). The data collected was explicitly identified to the customer in the data collection policy and is highlighted to the user during the install. The browser history data was uploaded to a U.S.-based server hosted by AWS and managed\/controlled by Trend Micro.<\/p>\n<p>Trend Micro is taking customer concerns seriously and has decided to remove this browser history collection capability from the products.<\/p><\/blockquote>\n<p>Following\u00a0Trend Micro&#8217;s\u00a0statement, Reed <a href=\"https:\/\/twitter.com\/thomasareed\/status\/1039252791464796161\" target=\"_blank\" rel=\"noopener\">stated<\/a> publicly that when he had installed the apps, he had looked for any notification within\u00a0the apps that disclosed the data collection but &#8220;did not find any,&#8221;\u00a0and that he was willing to share\u00a0those versions of the apps with other researchers who wished to verify this.<\/p>\n<p>Trend Micro further updated their statement on Tuesday, adding that they &#8220;have permanently dumped all legacy logs,&#8221; but they made no statement about what they would do to either prevent or automatically delete future logs that old versions of the app may attempt to upload.\u00a0The company also stated:<\/p>\n<blockquote>[&#8230;] we believe we identified a core issue which is humbly the result of the use of common code libraries. We have learned that browser collection functionality was designed in common across a few of our applications and then deployed the same way for both security-oriented as well as the non-security oriented apps such as the ones in discussion. This has been corrected.<\/p><\/blockquote>\n<p>The implication is that Dr. Antivirus was supposed to have collected browser history as an intended feature, but several other Trend Micro consumer Mac\u00a0apps had reused the same\u00a0code.<\/p>\n<h3>What can be done about this?<\/h3>\n<p>Apple has\u00a0removed the known offending apps from the Mac App Store.<\/p>\n<p>However, a more thorough\u00a0investigation of App Store apps is certainly warranted. The\u00a0Mac App Store contains\u00a0a plethora of\u00a0obscure and questionable-looking apps that claim to &#8220;clean&#8221; or &#8220;scan&#8221;\u00a0one&#8217;s system, all of which\u00a0presumably request full access to the user&#8217;s home directory and could potentially\u00a0exhibit similar behaviors.<\/p>\n<p>If you&#8217;ve\u00a0purchased or downloaded\u00a0an app within the last 90 days that you believe may be malicious, you can go to\u00a0<a href=\"https:\/\/reportaproblem.apple.com\" target=\"_blank\" rel=\"noopener\">https:\/\/reportaproblem.apple.com<\/a>\u00a0(or e-mail <a href=\"mailto:appreview@apple.com\" target=\"_blank\" rel=\"noopener\">appreview@apple.com<\/a>\u00a0with a link to the offending app) to file a\u00a0report with Apple\u00a0or to request a refund.<\/p>\n<p>Of course, if your private information has already been exfiltrated, you won&#8217;t be able to get it back.<\/p>\n<h3>Can the App Store be trusted?<\/h3>\n<p>In spite of the rather unfortunate news about the misbehavior of App Store apps and the\u00a0delays of up to nine months prior to Apple removing them, obtaining software through the Mac App Store is still probably somewhat safer than doing a Google search for an app and clicking\u00a0on whatever you happen\u00a0to\u00a0see in the results. It still takes a bit\u00a0more effort for shady developers to circumvent Apple&#8217;s review process, and Apple should certainly learn from\u00a0this\u00a0incident\u00a0and add detection for similar behavior into its app review workflow.<\/p>\n<p>It&#8217;s clear that one should not blindly trust everything in the App Store\u2014on macOS or even on iOS.<\/p>\n<p>(Incidentally, Forbes <a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2018\/09\/07\/a-load-of-apple-iphone-apps-are-covertly-selling-your-location\/\" target=\"_blank\" rel=\"noopener\">reported<\/a>\u00a0late Friday\u00a0that an iOS security researcher, Will Strafach, warned about iPhone apps &#8220;covertly&#8221; selling users&#8217; location data.)<\/p>\n<p><strong>How to\u00a0stay safe when shopping in Apple&#8217;s Mac or iOS App Stores:<\/strong><\/p>\n<ul>\n<li>Whenever possible, stick\u00a0with developers you already know and trust. If you must download an app from a developer you don&#8217;t know, check out their other apps, and try to\u00a0look up the developer to see if you can find out anything about their reputation.<\/li>\n<li>Don&#8217;t automatically\u00a0trust\u00a0excessively positive app reviews or apps with an unusually high volume of positive reviews; sometimes fake or paid reviews are\u00a0mixed in to make an app seem more popular or trustworthy than it really is.<\/li>\n<li>Check out what the more critical\u00a0reviews have said by selecting &#8220;Most Critical&#8221; from the &#8220;Sort By:&#8221; menu.<\/li>\n<li>Read the app&#8217;s privacy policy; all App Store apps submitted or updated\u00a0on or after October 3, 2018 will be\u00a0<a href=\"https:\/\/appleinsider.com\/articles\/18\/08\/31\/apple-requires-privacy-policy-metadata-for-all-app-store-submissions-from-october-3\" target=\"_blank\" rel=\"noopener\">required<\/a> to have a privacy policy.<\/li>\n<\/ul>\n<div id=\"attachment_82864\" style=\"width: 492px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-82864\" loading=\"lazy\" class=\"size-full wp-image-82864\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/Mac-App-Store-Sort-By-Most-Critical.png\" alt=\"\" width=\"482\" height=\"177\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/Mac-App-Store-Sort-By-Most-Critical.png 482w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/Mac-App-Store-Sort-By-Most-Critical-150x55.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/Mac-App-Store-Sort-By-Most-Critical-300x110.png 300w\" sizes=\"(max-width: 482px) 100vw, 482px\" \/><p id=\"caption-attachment-82864\" class=\"wp-caption-text\">In the Mac App Store, you can\u00a0sort user reviews by most critical first.<\/p><\/div>\n<p>While not foolproof, these tips should help\u00a0you\u00a0make more informed choices\u00a0about the\u00a0apps you choose to download from the\u00a0iOS\u00a0and\u00a0Mac App Stores.<\/p>\n<h3>Where can I learn more?<\/h3>\n<p><a href=\"https:\/\/itunes.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\"><img loading=\"lazy\" class=\"alignright wp-image-71419 size-thumbnail\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-Podcast-A-150x150.png\" alt=\"\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-Podcast-A-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-Podcast-A-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-Podcast-A-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-Podcast-A-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-Podcast-A-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-Podcast-A-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-Podcast-A.png 216w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p>Keep an eye on <strong>The Mac Security Blog<\/strong> for updates on this story as well as other Mac news and security and privacy stories.<\/p>\n<p>We&#8217;ll talk about the safety of the App Store on\u00a0an upcoming episode of the\u00a0<strong>Intego Mac Podcast<\/strong>.\u00a0<a href=\"https:\/\/itunes.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\">Subscribe now<\/a>\u00a0to make sure you don&#8217;t miss an episode!<\/p>\n<p><strong>Further reading:<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/weighing-the-pros-and-cons-of-apples-mac-app-store\/\" target=\"_blank\" rel=\"noopener\">Weighing the Pros and Cons of Apple&#8217;s Mac App Store<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-manage-privacy-settings-on-popular-ios-apps\/\" target=\"_blank\" rel=\"noopener\">How to Manage Privacy Settings on Popular iOS Apps<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/unwanted-cryptomining-debuts-briefly-in-mac-app-store\/\" target=\"_blank\" rel=\"noopener\">Unwanted Cryptomining Debuts (Briefly) in Mac App Store<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Security professionals often advise users that Apple&#8217;s\u00a0Mac App Store is one of the safest places to download apps. After all, Apple has a review process that&#8217;s supposed to\u00a0help\u00a0prevent potentially harmful apps from ever being published.\u00a0Additionally, App Store apps are sandboxed,\u00a0which is supposed to limit apps&#8217; ability to engage in undesirable behavior. Together,\u00a0Apple&#8217;s app\u00a0review process and [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":82966,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[151,13,11],"tags":[4318,317,79,106,113,114,4324,4321,1747],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Security professionals often advise users that Apple&#039;s\u00a0Mac App Store is one of the safest places to download apps. After all, Apple has a review process\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-safe-is-the-mac-app-store-privacy-violating-apps-uncovered\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How safe is the Mac App Store? Privacy-violating apps uncovered - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Security professionals often advise users that Apple&#039;s\u00a0Mac App Store is one of the safest places to download apps. After all, Apple has a review process\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/how-safe-is-the-mac-app-store-privacy-violating-apps-uncovered\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-11T15:52:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-18T01:44:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/app-store-safe-featured-image.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-safe-is-the-mac-app-store-privacy-violating-apps-uncovered\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/app-store-safe-featured-image.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/app-store-safe-featured-image.png\",\"width\":400,\"height\":260,\"caption\":\"How Safe Is the Mac App Store?\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-safe-is-the-mac-app-store-privacy-violating-apps-uncovered\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/how-safe-is-the-mac-app-store-privacy-violating-apps-uncovered\/\",\"name\":\"How safe is the Mac App Store? Privacy-violating apps uncovered - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-safe-is-the-mac-app-store-privacy-violating-apps-uncovered\/#primaryimage\"},\"datePublished\":\"2018-09-11T15:52:50+00:00\",\"dateModified\":\"2022-11-18T01:44:22+00:00\",\"description\":\"Security professionals often advise users that Apple's\\u00a0Mac App Store is one of the safest places to download apps. After all, Apple has a review process\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-safe-is-the-mac-app-store-privacy-violating-apps-uncovered\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-safe-is-the-mac-app-store-privacy-violating-apps-uncovered\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-safe-is-the-mac-app-store-privacy-violating-apps-uncovered\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How safe is the Mac App Store? Privacy-violating apps uncovered\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-safe-is-the-mac-app-store-privacy-violating-apps-uncovered\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-safe-is-the-mac-app-store-privacy-violating-apps-uncovered\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"How safe is the Mac App Store? Privacy-violating apps uncovered\",\"datePublished\":\"2018-09-11T15:52:50+00:00\",\"dateModified\":\"2022-11-18T01:44:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-safe-is-the-mac-app-store-privacy-violating-apps-uncovered\/#webpage\"},\"wordCount\":2130,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-safe-is-the-mac-app-store-privacy-violating-apps-uncovered\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/app-store-safe-featured-image.png\",\"keywords\":[\"Adware Doctor\",\"App Store\",\"Mac App Store\",\"Privacy\",\"Rogue Antivirus\",\"Rogue Software\",\"search history\",\"Trend Micro\",\"Web Browsing\"],\"articleSection\":[\"Recommended\",\"Security &amp; Privacy\",\"Software &amp; Apps\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-safe-is-the-mac-app-store-privacy-violating-apps-uncovered\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Security professionals often advise users that Apple's\u00a0Mac App Store is one of the safest places to download apps. After all, Apple has a review process","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/how-safe-is-the-mac-app-store-privacy-violating-apps-uncovered\/","og_locale":"en_US","og_type":"article","og_title":"How safe is the Mac App Store? Privacy-violating apps uncovered - The Mac Security Blog","og_description":"Security professionals often advise users that Apple's\u00a0Mac App Store is one of the safest places to download apps. After all, Apple has a review process","og_url":"https:\/\/www.intego.com\/mac-security-blog\/how-safe-is-the-mac-app-store-privacy-violating-apps-uncovered\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2018-09-11T15:52:50+00:00","article_modified_time":"2022-11-18T01:44:22+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/app-store-safe-featured-image.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-safe-is-the-mac-app-store-privacy-violating-apps-uncovered\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/app-store-safe-featured-image.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/app-store-safe-featured-image.png","width":400,"height":260,"caption":"How Safe Is the Mac App Store?"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-safe-is-the-mac-app-store-privacy-violating-apps-uncovered\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/how-safe-is-the-mac-app-store-privacy-violating-apps-uncovered\/","name":"How safe is the Mac App Store? Privacy-violating apps uncovered - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-safe-is-the-mac-app-store-privacy-violating-apps-uncovered\/#primaryimage"},"datePublished":"2018-09-11T15:52:50+00:00","dateModified":"2022-11-18T01:44:22+00:00","description":"Security professionals often advise users that Apple's\u00a0Mac App Store is one of the safest places to download apps. After all, Apple has a review process","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-safe-is-the-mac-app-store-privacy-violating-apps-uncovered\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/how-safe-is-the-mac-app-store-privacy-violating-apps-uncovered\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-safe-is-the-mac-app-store-privacy-violating-apps-uncovered\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"How safe is the Mac App Store? Privacy-violating apps uncovered"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-safe-is-the-mac-app-store-privacy-violating-apps-uncovered\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-safe-is-the-mac-app-store-privacy-violating-apps-uncovered\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"How safe is the Mac App Store? Privacy-violating apps uncovered","datePublished":"2018-09-11T15:52:50+00:00","dateModified":"2022-11-18T01:44:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-safe-is-the-mac-app-store-privacy-violating-apps-uncovered\/#webpage"},"wordCount":2130,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-safe-is-the-mac-app-store-privacy-violating-apps-uncovered\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/app-store-safe-featured-image.png","keywords":["Adware Doctor","App Store","Mac App Store","Privacy","Rogue Antivirus","Rogue Software","search history","Trend Micro","Web Browsing"],"articleSection":["Recommended","Security &amp; Privacy","Software &amp; Apps"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/how-safe-is-the-mac-app-store-privacy-violating-apps-uncovered\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/app-store-safe-featured-image.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-lyk","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/82852"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=82852"}],"version-history":[{"count":29,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/82852\/revisions"}],"predecessor-version":[{"id":96602,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/82852\/revisions\/96602"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/82966"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=82852"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=82852"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=82852"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}