	{"id":96720,"date":"2022-12-22T02:41:58","date_gmt":"2022-12-22T10:41:58","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=96720"},"modified":"2022-12-22T17:13:02","modified_gmt":"2022-12-23T01:13:02","slug":"stalkerware-gatekeeper-vulnerabilities-and-no-mac-pro-for-christmas-intego-mac-podcast-episode-271","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/stalkerware-gatekeeper-vulnerabilities-and-no-mac-pro-for-christmas-intego-mac-podcast-episode-271\/","title":{"rendered":"Stalkerware, Gatekeeper Vulnerabilities, and No Mac Pro for Christmas &#8211; Intego Mac Podcast Episode 271"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+blVzQsrm?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Commercial stalkerware can record everything on a victim&#8217;s iPhone; yet another Gatekeeper bypass shows that even Lockdown Mode isn&#8217;t impermeable; and Apple hasn&#8217;t transitioned all its Macs to its own processors: the Mac Pro still hasn&#8217;t made the change.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/\" rel=\"noopener\">Microsoft discovers new Gatekeeper bypass; Apple updates past security advisories<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/\" rel=\"noopener\">Apple also patched a zero-day vulnerability last week (that was previously patched for iOS only)<\/a><\/li>\n<li><a href=\"https:\/\/techcrunch.com\/2022\/12\/12\/xnspy-stalkerware-iphone-android\/\" target=\"_blank\" rel=\"noopener\">Xnspy stalkerware spied on thousands of iPhones and Android devices<\/a><\/li>\n<li><a href=\"https:\/\/arstechnica.com\/information-technology\/2022\/12\/microsoft-digital-certificates-have-once-again-been-abused-to-sign-malware\/\" target=\"_blank\" rel=\"noopener\">Microsoft digital certificates have once again been abused to sign malware<\/a><\/li>\n<li><a href=\"https:\/\/www.macrumors.com\/2022\/12\/14\/apple-considering-non-webkit-iphone-browsers\/\" target=\"_blank\" rel=\"noopener\">Apple Considering Dropping Requirement for iPhone Web Browsers to Use WebKit<\/a><\/li>\n<li><a href=\"https:\/\/www.macrumors.com\/2022\/12\/20\/apple-self-service-repair-mac-desktops\/\" target=\"_blank\" rel=\"noopener\">Apple Expands Do-It-Yourself Repair Program to Desktop Macs With M1 Chips and Studio Display<\/a><\/li>\n<li><a href=\"https:\/\/arstechnica.com\/gadgets\/2022\/12\/it-might-be-time-for-apple-to-throw-in-the-towel-on-the-mac-pro\/\" target=\"_blank\" rel=\"noopener\">It might be time for Apple to throw in the towel on the Mac Pro<\/a><\/li>\n<li><a href=\"https:\/\/www.macrumors.com\/2022\/12\/19\/apple-to-launch-search-engine-to-rival-google\/\" target=\"_blank\" rel=\"noopener\">Apple Pushing to Launch Search Engine to Rival Google<\/a><\/li>\n<li><a href=\"https:\/\/www.apple.com\/legal\/privacy\/data\/en\/safari-search\/\" target=\"_blank\" rel=\"noopener\">Safari Search &amp; Privacy<\/a><\/li>\n<li><a href=\"https:\/\/www.theverge.com\/2022\/12\/16\/23512952\/anker-eufy-delete-promises-camera-privacy-encryption-authentication\" target=\"_blank\" rel=\"noopener\">Anker\u2019s Eufy deleted these 10 privacy promises instead of answering our questions<\/a><\/li>\n<li><a href=\"https:\/\/arstechnica.com\/information-technology\/2022\/12\/swatters-used-ring-cameras-to-livestream-attacks-taunt-police-prosecutors-say\/\" target=\"_blank\" rel=\"noopener\">Swatters used Ring cameras to livestream attacks, taunt police, prosecutors say<\/a><\/li>\n<li><a href=\"https:\/\/www.apple.com\/home-app\/accessories\/#section-cameras\" target=\"_blank\" rel=\"noopener\">Apple Home security camera and doorbell compatibility<\/a><\/li>\n<\/ul>\n<p>If you like the Intego Mac Podcast podcast, be sure to rate and review it on Apple Podcasts.<\/p>\n<p><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\"><img loading=\"lazy\" class=\"aligncenter size-thumbnail wp-image-78820\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png\" alt=\"Intego Mac Podcast\" width=\"150\" height=\"39\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-300x78.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts.png 400w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p><strong>Have a question? Ask us!<\/strong> <a href=\"https:\/\/podcast.intego.com\/contact\" target=\"_blank\" rel=\"nofollow noopener\">Contact Intego<\/a> if you have any questions you want to hear discussed on the podcast, or to provide feedback and ideas for upcoming podcast episodes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Commercial stalkerware can record everything on a victim&#8217;s iPhone; yet another Gatekeeper bypass shows that even Lockdown Mode isn&#8217;t impermeable; and Apple hasn&#8217;t transitioned all its Macs to its own processors: the Mac Pro still hasn&#8217;t made the change.<\/p>\n","protected":false},"author":46,"featured_media":80878,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[4390],"tags":[3715,3919],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Commercial stalkerware can record everything on a victim&#039;s iPhone; yet another Gatekeeper bypass shows that even Lockdown Mode isn&#039;t impermeable; and Apple hasn&#039;t transitioned all its Macs to its own processors: the Mac Pro still hasn&#039;t made the change.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/stalkerware-gatekeeper-vulnerabilities-and-no-mac-pro-for-christmas-intego-mac-podcast-episode-271\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Stalkerware, Gatekeeper Vulnerabilities, and No Mac Pro for Christmas - Intego Mac Podcast Episode 271 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Commercial stalkerware can record everything on a victim&#039;s iPhone; yet another Gatekeeper bypass shows that even Lockdown Mode isn&#039;t impermeable; and Apple hasn&#039;t transitioned all its Macs to its own processors: the Mac Pro still hasn&#039;t made the change.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/stalkerware-gatekeeper-vulnerabilities-and-no-mac-pro-for-christmas-intego-mac-podcast-episode-271\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-22T10:41:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-23T01:13:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/stalkerware-gatekeeper-vulnerabilities-and-no-mac-pro-for-christmas-intego-mac-podcast-episode-271\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"width\":400,\"height\":260,\"caption\":\"Intego Mac Podcast - Apple security news and more\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/stalkerware-gatekeeper-vulnerabilities-and-no-mac-pro-for-christmas-intego-mac-podcast-episode-271\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/stalkerware-gatekeeper-vulnerabilities-and-no-mac-pro-for-christmas-intego-mac-podcast-episode-271\/\",\"name\":\"Stalkerware, Gatekeeper Vulnerabilities, and No Mac Pro for Christmas - Intego Mac Podcast Episode 271 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/stalkerware-gatekeeper-vulnerabilities-and-no-mac-pro-for-christmas-intego-mac-podcast-episode-271\/#primaryimage\"},\"datePublished\":\"2022-12-22T10:41:58+00:00\",\"dateModified\":\"2022-12-23T01:13:02+00:00\",\"description\":\"Commercial stalkerware can record everything on a victim's iPhone; yet another Gatekeeper bypass shows that even Lockdown Mode isn't impermeable; and Apple hasn't transitioned all its Macs to its own processors: the Mac Pro still hasn't made the change.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/stalkerware-gatekeeper-vulnerabilities-and-no-mac-pro-for-christmas-intego-mac-podcast-episode-271\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/stalkerware-gatekeeper-vulnerabilities-and-no-mac-pro-for-christmas-intego-mac-podcast-episode-271\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/stalkerware-gatekeeper-vulnerabilities-and-no-mac-pro-for-christmas-intego-mac-podcast-episode-271\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Stalkerware, Gatekeeper Vulnerabilities, and No Mac Pro for Christmas &#8211; Intego Mac Podcast Episode 271\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/stalkerware-gatekeeper-vulnerabilities-and-no-mac-pro-for-christmas-intego-mac-podcast-episode-271\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/stalkerware-gatekeeper-vulnerabilities-and-no-mac-pro-for-christmas-intego-mac-podcast-episode-271\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"Stalkerware, Gatekeeper Vulnerabilities, and No Mac Pro for Christmas &#8211; Intego Mac Podcast Episode 271\",\"datePublished\":\"2022-12-22T10:41:58+00:00\",\"dateModified\":\"2022-12-23T01:13:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/stalkerware-gatekeeper-vulnerabilities-and-no-mac-pro-for-christmas-intego-mac-podcast-episode-271\/#webpage\"},\"wordCount\":230,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/stalkerware-gatekeeper-vulnerabilities-and-no-mac-pro-for-christmas-intego-mac-podcast-episode-271\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"keywords\":[\"Intego Mac Podcast\",\"Mac Pro\"],\"articleSection\":[\"Intego Mac Security Podcast\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/stalkerware-gatekeeper-vulnerabilities-and-no-mac-pro-for-christmas-intego-mac-podcast-episode-271\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Commercial stalkerware can record everything on a victim's iPhone; yet another Gatekeeper bypass shows that even Lockdown Mode isn't impermeable; and Apple hasn't transitioned all its Macs to its own processors: the Mac Pro still hasn't made the change.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/stalkerware-gatekeeper-vulnerabilities-and-no-mac-pro-for-christmas-intego-mac-podcast-episode-271\/","og_locale":"en_US","og_type":"article","og_title":"Stalkerware, Gatekeeper Vulnerabilities, and No Mac Pro for Christmas - Intego Mac Podcast Episode 271 - The Mac Security Blog","og_description":"Commercial stalkerware can record everything on a victim's iPhone; yet another Gatekeeper bypass shows that even Lockdown Mode isn't impermeable; and Apple hasn't transitioned all its Macs to its own processors: the Mac Pro still hasn't made the change.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/stalkerware-gatekeeper-vulnerabilities-and-no-mac-pro-for-christmas-intego-mac-podcast-episode-271\/","og_site_name":"The Mac Security Blog","article_published_time":"2022-12-22T10:41:58+00:00","article_modified_time":"2022-12-23T01:13:02+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/stalkerware-gatekeeper-vulnerabilities-and-no-mac-pro-for-christmas-intego-mac-podcast-episode-271\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","width":400,"height":260,"caption":"Intego Mac Podcast - Apple security news and more"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/stalkerware-gatekeeper-vulnerabilities-and-no-mac-pro-for-christmas-intego-mac-podcast-episode-271\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/stalkerware-gatekeeper-vulnerabilities-and-no-mac-pro-for-christmas-intego-mac-podcast-episode-271\/","name":"Stalkerware, Gatekeeper Vulnerabilities, and No Mac Pro for Christmas - Intego Mac Podcast Episode 271 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/stalkerware-gatekeeper-vulnerabilities-and-no-mac-pro-for-christmas-intego-mac-podcast-episode-271\/#primaryimage"},"datePublished":"2022-12-22T10:41:58+00:00","dateModified":"2022-12-23T01:13:02+00:00","description":"Commercial stalkerware can record everything on a victim's iPhone; yet another Gatekeeper bypass shows that even Lockdown Mode isn't impermeable; and Apple hasn't transitioned all its Macs to its own processors: the Mac Pro still hasn't made the change.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/stalkerware-gatekeeper-vulnerabilities-and-no-mac-pro-for-christmas-intego-mac-podcast-episode-271\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/stalkerware-gatekeeper-vulnerabilities-and-no-mac-pro-for-christmas-intego-mac-podcast-episode-271\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/stalkerware-gatekeeper-vulnerabilities-and-no-mac-pro-for-christmas-intego-mac-podcast-episode-271\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Stalkerware, Gatekeeper Vulnerabilities, and No Mac Pro for Christmas &#8211; Intego Mac Podcast Episode 271"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/stalkerware-gatekeeper-vulnerabilities-and-no-mac-pro-for-christmas-intego-mac-podcast-episode-271\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/stalkerware-gatekeeper-vulnerabilities-and-no-mac-pro-for-christmas-intego-mac-podcast-episode-271\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"Stalkerware, Gatekeeper Vulnerabilities, and No Mac Pro for Christmas &#8211; Intego Mac Podcast Episode 271","datePublished":"2022-12-22T10:41:58+00:00","dateModified":"2022-12-23T01:13:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/stalkerware-gatekeeper-vulnerabilities-and-no-mac-pro-for-christmas-intego-mac-podcast-episode-271\/#webpage"},"wordCount":230,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/stalkerware-gatekeeper-vulnerabilities-and-no-mac-pro-for-christmas-intego-mac-podcast-episode-271\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","keywords":["Intego Mac Podcast","Mac Pro"],"articleSection":["Intego Mac Security Podcast"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/stalkerware-gatekeeper-vulnerabilities-and-no-mac-pro-for-christmas-intego-mac-podcast-episode-271\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-pa0","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/96720"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=96720"}],"version-history":[{"count":5,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/96720\/revisions"}],"predecessor-version":[{"id":96769,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/96720\/revisions\/96769"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/80878"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=96720"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=96720"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=96720"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}