http://damaga37e3smvdiz473qnzyfnul275erstpaihy2apvwq3bspjxyvnad.onion/books?page=10
Part I of this volume explores the mechanisms and techniques employed - Including Auditing, Authentication, the MAC Framework, Code Signing, Sandboxing, SIP, AMFI and more - most of which are documented for the first time. The second part then discusses historical vulnerabilities in MacOS 10.10 and 10.11, as well as all modern exploits - from Evasi0n (iOS6) through the very latest mach_portal for 10.1.1 with KPP bypass in unprecedented detail - showing both the vulnerabilities and their...