[messages] [Technical Support & Bugs] Vassal under Apple Catalina

Malnorma malnormacxio at gmail.com
Mon Oct 21 15:30:23 CEST 2019


You can run this command: 
Code:
man xattr

 to view documentation for the xattr command (or read the same
information here: https://ss64.com/osx/xattr.html[1] )

When you download a file with your browser, it writes additional
attributes to the file to mark it as coming from an untrusted source. 
Running xattr with just a filename will print any attributes out:

Code:
$ xattr ~/Downloads/VASSAL-3.3.0-svn9280-macosx.dmg
com.apple.diskimages.recentcksum
com.apple.macl
com.apple.metadata:kMDItemWhereFroms
com.apple.quarantine




The quarantine attribute at the end is the only attribute that persists
when Vassal.app is copied from the disk image.  Deleting the attribute
makes the system behave as if the file was obtained "safely", so it does
not prevent it from running or accessing your personal files.  You can
search for "com.apple.quarantine" to find a bit more information on it.

It's good to be cautious, as you would be bypassing some of the
safeguards meant to protect users from malicious apps (bypassing for
Vassal only, not for the whole system!)  Hopefully this info can help
you make a decision you are comfortable with.

[1] https://ss64.com/osx/xattr.html


_______________________________________________
Read this topic online here:
http://www.vassalengine.org/forum/viewtopic.php?p=57816#p57816


More information about the messages mailing list