Powered by

macOS Ventura just got a great new feature that will protect your Mac.



Apple just revealed Ventura will require user permission before a USB C and Thunderbolt accessories can transfer data on M1 and M2-based Macs. So from now on, you won’t have to fear that someone could deliver malware by just plugging in a thumb drive.

This policy is enabled by default on the operating system, but it won’t affect accessories plugged into your Mac during the OS upgrade process. Also, this new feature won’t block external monitors, power adapters, or products attached to already approved hubs. Devices will also continue to charge if they are blocked, so you can still use your computer to charge your phone.

This won’t affect devices that normally fry ports through electrical surges. However, this will add a meaningful layer of security on top of USB C requirements for encrypted authentication certificates. This feature might prove to be useful for a lot of people, as you will have the final say on data access and you could also just stop a malicious device before it even has a chance to do any kind of damage to your device.

macOS Ventura just got a great new feature that will protect your Mac.

macOS Ventura just got a great new feature that will protect your Mac.


Apple just revealed Ventura will require user permission before a USB C and Thunderbolt accessories can transfer data on M1 and M2-based Macs. So from now on, you won’t have to fear that someone could deliver malware by just plugging in a thumb drive.

This policy is enabled by default on the operating system, but it won’t affect accessories plugged into your Mac during the OS upgrade process. Also, this new feature won’t block external monitors, power adapters, or products attached to already approved hubs. Devices will also continue to charge if they are blocked, so you can still use your computer to charge your phone.

This won’t affect devices that normally fry ports through electrical surges. However, this will add a meaningful layer of security on top of USB C requirements for encrypted authentication certificates. This feature might prove to be useful for a lot of people, as you will have the final say on data access and you could also just stop a malicious device before it even has a chance to do any kind of damage to your device.