Synk Icon

Initial Setup

When you first launch Synk, as well as after downloading some new versions of the software, Synk prompts you on launch to do some setup. Once done, this won’t have to be repeated unless the infrastructure becomes damaged somehow, or needs to be upgraded. Synk has built-in uninstall support to remove this infrastructure anytime you like.

For most people, that’s all you really need to know. If you’re curious about more details, read on.

Synk consists of a number of interlocking pieces of infrastructure:

All of these pieces work closely together, and it’s imperative that they all be the same version, speaking the same languages, and secure against modifications, because they’re doing sensitive work. Synk needs to have them all in a known, controlled, and secure location.

Additionally, the script data has to be stored somewhere, and unfortunately some kinds of home folders may cease to exist when the user is logged out, like FileVault or network home folders. Synk needs someplace to store the script information, outside of the home folders, but still with careful permissions so no other users can read or write your scripts.

The AuthTool that does the installation of the other components is cryptographically code signed, and after it’s been installed, the OS refuses to upgrade it to anything besides a newer version that’s been signed by the same vendor. So it’s not feasible for the AuthTool to be replaced by a malicious program.

In turn, the AuthTool also verifies the cryptographic code signatures of all of the other components as it’s installing them. As a result, it’s also not feasible for something to trick AuthTool into installing a malicious program instead of one of the Decimus-provided components.

We take security very seriously, and the architecture of Synk is not only based around the established best practices for making secure applications on Mac OS X, but we’ve even consulted with Apple security engineers in the course of its development to ensure that we’re doing everything right. You can have confidence in the security of Synk, and rest easy that your granting superuser privileges to it isn’t opening a gaping hole in your system.

Anybody who believes they’ve found a security problem with Synk should contact us immediately, and we’ll investigate promptly.

Related Topics