Robert Sesek

125 Followers
103 Following
35 Posts
Software engineer, infosec. Mac & Android internals, reverse engineering, FOIA. Views are my own.
Websitehttps://robert.sesek.com
Twitter@rsesek

Woah, in macOS 15.4, two of my favorite syscalls are finally 'public' and documented!

"fileport_makeport(2) and fileport_makefd(2) are now APIs with manual pages. (66571768) (FB8270900)"
https://developer.apple.com/documentation/macos-release-notes/macos-15_4-release-notes

Chromium has been using them for at least 6 years, when I implemented the IPC Channel using Mach messages.

macOS Sequoia 15.4 Release Notes | Apple Developer Documentation

Update your apps to use new features, and test your apps against API changes.

Apple Developer Documentation
Wrote a little thing on how I set up TLS certs using DNS-01 challenges for some Tailscale hosts that have no public Internet presence: https://robert.sesek.com/2025/2/tailscale_vanity_domains_and_tls.html
Tailscale Vanity Domains and TLS - Robert Sesek

Cool project: "Nepenthes" is a tarpit to catch (AI) web crawlers.

"It works by generating an endless sequences of pages, each of which with dozens of links, that simply go back into a the tarpit. Pages are randomly generated, but in a deterministic way, causing them to appear to be flat files that never change. Intentional delay is added to prevent crawlers from bogging down your server, in addition to wasting their time. Lastly, optional Markov-babble can be added to the pages, to give the crawlers something to scrape up and train their LLMs on, hopefully accelerating model collapse."

https://zadzmo.org/code/nepenthes/

Nepenthes - ZADZMO.org

Making web crawlers eat shit since 2023

I've recently been working to understand what triggers certain TCC prompts on macOS. During this investigation I noticed something that many prior analyses of TCC overlook: TCC prompts can be triggered not only by system frameworks, but by the Sandbox kernel extension in response to rules defined by the platform sandbox policy.

My latest blog post documents the sandbox features behind this and provides examples of some of the responsible sandbox policies.

https://bdash.net.nz/posts/tcc-and-the-platform-sandbox-policy/

TCC and the macOS Platform Sandbox Policy // Mark Rowe

How some macOS privacy prompts are triggered from within the kernel via sandbox policies

Another big step towards becoming a security boundary: today we’re expanding the VRP for the V8 Sandbox

* No longer limited to d8

* Rewards for controlled writes are increased to $20k

* Any memory corruption outside the sandbox is now in scope

See https://bughunters.google.com/about/rules/chrome-friends/5745167867576320/chrome-vulnerability-reward-program-rules#v8-sandbox-bypass-rewards for more details.

Happy hacking!

Chrome Vulnerability Reward Program Rules | Google Bug Hunters

ATTENTION As of 4 February 2024, Chromium has migrated to a new issue tracker, please report security bugs to the new issue tracker using this form . Please see the Chrome VRP News and FAQ page for more updates and information. The Chrome...

Here's a thing I noticed today. macOS Sequoia changes how non-notarized apps are handled on first launch. I couldn't override by doing the control-click > Open > yes really Open dance. Instead, I had to go to the Settings app, to the Security screen, and click there to allow it to open. At which point it asked me AGAIN if I wanted to open it, and then had to put in my password!

I get the impulse about making it harder to socially engineer bad apps from opening, but... this is ridiculous.

little fun fact for PMs considering adding this to their product: if i’m viewing a website in a browser, chances are i want to view the website in a browser. thanks!! 🙏

I learned about a new information classification system used by the US Federal Reserve. Documented here: https://www.federalreserve.gov/monetarypolicy/files/FOMC_InformationSecurityProgram.pdf.

You can see the markings on Jerome Powell's documents in this photo: https://images.wsj.net/im-758621/?width=4000&size=1

Not as interesting as intelligence classification system, but there are some obvious similarities: classification levels, handling directives, and "//" separators. You can find a surprising number of documents online labeled "FRSONLY".

(CC: @Electrospaces )

More on E2EE apps for the web: is the web really that bad for E2EE compared to mobile/native? And some (IMO) unappreciated challenges in bridging the gaps https://emilymstark.com/2024/02/09/e2ee-on-the-web-is-the-web-really-that-bad.html
E2EE on the web: is the web really that bad?

In my last blog post, I discussed why people often view the web as a uniquely unsuited platform for implementing end-to-end encryption (E2EE). This view is that the web doesn’t offer a long-term trustable notion of what the application is. In that earlier post, I explored the idea of treating the application as untrustworthy and isolating sensitive data from it. In this post, I’m going to pontificate on whether web applications are truly less trustworthy than native applications, especially in an E2EE setting, and if so, how we should bridge the gap. The gap is narrower than it appears at first glance, especially with desktop applications. To close it, though, the devil is in the (UX- and deployment-related) details.

Emily M. Stark
After 13 great years, today was my last day as a Googler.