Your browser is usually the first thing attackers hit.
Brave: builtâin Shields block ads, thirdâparty trackers, and many fingerprinting vectors by default; optional Tor windows route traffic through Tor relays for added network anonymity.
Safari: Intelligent Tracking Prevention and perâtab sandboxing limit crossâsite tracking and keep compromised tabs from pivoting into the OS; recent updates strengthen fingerprinting defenses in Private Browsing.
Chrome & Firefox: Chromium has long had strong siteâisolation and sandboxing, and Firefox has recently closed much of the sandbox gap with higher isolation levels and Fission on desktop and Android.
For devs: keep at least one hardened profile with minimal extensions, strict privacy settings, and automatic updates turned on for everyday browsing of sensitive sites.
How you install tools on macOS changes your supply-chain risk profile.
Mac App Store: apps are reviewed and signed by Apple; Gatekeeper trusts them without separate notarization and checks for known malware at first launch.
Direct downloads: Gatekeeper verifies the developer signature and Apple notarization for apps from the web; unsigned or tampered binaries trigger explicit warnings or blocking.
Homebrew: formulae pull signed macOS binaries (bottles); proposals add Sigstore-based bottle signing so brew install only uses artifacts with a valid attestation, mitigating tampering in storage or build pipelines.
Guideline: prefer App Store for endâuser apps, use Homebrew for CLI tools from trusted taps, and minimize bypassing Gatekeeper or running unsigned installers.
FileVault: fullâdisk encryption baseline
Protects data at rest on every Mac you care about.
Encrypts the entire startup disk with XTSâAES; transparent on modern Apple silicon and T2 Macs.
Mandatory for laptops and shared machines; prevents offline disk access if a device is stolen.
Recovery keys can be escrowed to iCloud or MDM; highârisk users may prefer offline-only storage for maximum control.
Encrypted containers & iCloud
Selective, portable encryption for the data you really care about.
Encrypted disk images (.dmg, .sparsebundle) act as onâdemand encrypted volumes with their own strong passphrases.
Storing those images in iCloud Drive gives you a double layer: iCloudâs encryption plus your independent container key.
Nested images on top of FileVault let you keep especially sensitive material private even on managed Macs with escrowed recovery keys.
Picking a strategy that fits you
From "Appleâonly moderate" to "crossâplatform hardened".
Appleâonly, moderate: FileVault on, iCloud Keychain, strong Apple ID passphrase, standard 2FA, optional encrypted image for a few sensitive folders.
Appleâonly, hardened: add two YubiKeys on Apple ID, enable Advanced Data Protection, use diceware passphrases and userâside salting for 5â10 critical accounts.
Crossâplatform dev: 1Password or Bitwarden with hardwareâkey 2FA, OSânative disk encryption on every platform, and optional encrypted containers for ultraâsensitive material.
Developer access to sensitive instances
Minimum bar when your Mac can reach prod or high-value crypto material.
Unique accounts per developer, with phishingâresistant MFA (hardware key or platform authenticator) required for sensitive systems.
Compliant devices only: FileVault enabled, current macOS with security responses on, and MDM enrollment where applicable.
Least privilege and logging: narrow access scopes, and regular reviews of who can reach what.
90âday implementation roadmap
Small, timeâboxed steps to move from "nice idea" to "actually done".
Month 1: verify FileVault, enable or adopt a password manager, and set a strong Apple ID/master passphrase.
Month 2: rotate critical account passwords to managerâgenerated ones and enable 2FA everywhere it is offered.
Month 3: buy and register two hardware keys, start registering passkeys, and create at least one encrypted container for sensitive data.
Questions & discussion
Happy to dig deeper into any of the demos, browser and tooling setups, or threat models.