If a hacker succeeds in logging his system into my Apple account…
This boils all the way down to what are your dangers with a compromised Apple account. It does not matter in the event that they use their system and even your system for that matter. As soon as the account is compromised, they’ll take full possession of any and every part saved on that account.
See Can thieves with a stolen Macbook (non-M1) and corresponding AppleID iCloud password retrieve keychain and chrome passwords from the Mac? for a extra in-depth look. The underside line is your threat profile is simply as giant or small as you make it.
Can the Terminal app on one system execute instructions affecting one other system?
That is like asking if a hammer or screwdriver from one toolbox have an effect on the instruments in one other – it is irrelevant as exploits may be accomplished by way of e mail, webpage, message app, and so forth. Instructions may be executed in a non-interactive shell by no means having introduced up Terminal; that is the mistaken issue to give attention to. As an alternative, you need to be targeted on securing your knowledge and having a number of layers of safety such that if one is compromised, you do not instantly quit the keys to the dominion.
Particularly, I’m wondering how Continuity options might be exploited.
Continuity options are based mostly in a number of underlying applied sciences like WiFi, BLE (Bluetooth Low Power) and iCloud id companies. If these applied sciences are compromised, it means gadgets close to or in your possession have been compromised. Apple has a wonderful write up on their platfom safety; I extremely counsel an intensive assessment. Apple Platform Safety
Leave a Comment