preface
System -> Security & Privacy -> General -> “Allow any source” is slightly different from Intel chips;
posture
Intel chip
Without encryption chip, the general implementation of the following a series of operations came out
- Open the terminal and execute the command as administrator (sudo privilege)
sudo spctl --master-disable
Copy the code
- Enter the computer boot password, then press Enter to see
If not, you should turn off SIP and start your own search.
If you can see the whole thing, here’s reboot to go to options and open terminal execution
csrutil disable
Copy the code
Don’t mess around with the shell (delete it!!).
M1 chip
Some people will default to the Intel chip position. In this case, it is necessary to enable the system kernel security to be reduced
- To turn it off
- Long press the power button and wait for the option to come out
- Go to the options
Matters needing attention
If you have macOS 10.15 and above enabled, some software will still report corruption. In this case, you need to do the following: Grant an application permission to run with this privileged command
# sudo xattr -r -d com.apple.quarantineSudo xattr-r-d com.apple.quarantine application path# For example, I installed the M1 version of the finchSudo xattr -rd com.apple. Quarantine /Applications. AppCopy the code
conclusion
Change is what it is, as long as Apple doesn’t limit it. There is always a command to break this closed position of safety; Enabling privileges is definitely a security risk, but you can also install third-party software. It’s up to you