Privacy Tools Guide

macOS collects more data than most users realize. Apple telemetry, Siri voice processing, iCloud photo analysis, location history, and app analytics all transmit data off your device, even when you haven’t explicitly opted in to any of them. This checklist covers every privacy-relevant setting in macOS Sequoia (15.x) and applies broadly to macOS 13 and 14 as well.

Work through each section. Many of these settings are buried in submenus that most people never see.

System Settings: Privacy and Security

Open System Settings → Privacy & Security and work through each category:

Location Services

# Disable Location Services entirely via command line (requires SIP disabled or MDM)
sudo defaults write /var/db/locationd/Library/Preferences/ByHost/com.apple.locationd LocationServicesEnabled -int 0

Analytics and Improvements

Uncheck all of:

Apple Advertising

Siri and Spotlight

System Settings → Siri and Spotlight:

For Spotlight, disable online search suggestions:

App Permissions Audit

In Privacy & Security, review each category:

Network Privacy Settings

iCloud Private Relay

If you have an iCloud+ subscription, enable iCloud Private Relay: System Settings → Apple ID → iCloud → Private Relay.

Private Relay routes Safari traffic through two separate internet relay servers — Apple sees your IP but not your destination, the relay operator sees the destination but not your IP. It only applies to Safari and does not protect other apps.

DNS Configuration

Replace your ISP’s default DNS with a privacy-respecting resolver:

# Set DNS via networksetup (replace "Wi-Fi" with your interface name)
networksetup -setdnsservers Wi-Fi 9.9.9.9 149.112.112.112

# Verify
scutil --dns | grep nameserver

Consider Quad9 (9.9.9.9), NextDNS, or Mullvad DNS. All offer DNS-over-HTTPS or DNS-over-TLS.

Built-in Firewall

System Settings → Network → Firewall:

# Enable firewall via command line
sudo /usr/libexec/ApplicationFirewall/socketfilterfw --setglobalstate on
sudo /usr/libexec/ApplicationFirewall/socketfilterfw --setstealthmode on

iCloud Settings

iCloud syncs a large amount of sensitive data. Review what is synced:

System Settings → Apple ID → iCloud → Show All:

Advanced Data Protection

If you use iCloud, enable Advanced Data Protection: Apple ID → iCloud → Advanced Data Protection. This expands end-to-end encryption to cover iCloud Backup, Photos, Notes, and most other iCloud data. Apple Support cannot read this data even with a legal request.

Software and Updates

Automatic Updates

System Settings → General → Software Update → Automatic Updates:

Gatekeeper and Notarization

Keep Gatekeeper on. System Settings → Privacy & Security → Security:

To run a specific unsigned app without disabling Gatekeeper:

sudo spctl --add /Applications/AppName.app

Safari Privacy Settings

If you use Safari rather than a privacy-hardened browser:

Safari → Settings → Privacy:

Safari → Settings → Search:

Terminal Hardening Commands

Run these commands to tighten privacy settings that have no GUI toggle:

# Disable crash reporter
defaults write com.apple.CrashReporter DialogType none

# Disable remote Apple Events
sudo systemsetup -setremoteappleevents off

# Disable remote login (SSH) if not needed
sudo systemsetup -setremotelogin off

# Disable Bluetooth if not in use
sudo defaults write /Library/Preferences/com.apple.Bluetooth ControllerPowerState -int 0

# Disable Wake for Network Access
sudo pmset -a womp 0

# Clear Siri voice and text history via System Settings
# Also delete via: ~/Library/Application Support/com.apple.assistant.support/

# Disable Spotlight from indexing external drives
sudo defaults write /.Spotlight-V100/VolumeConfiguration Exclusions -array "/Volumes"

# Disable sending diagnostic data from Terminal
defaults write com.apple.Terminal NSQuitAlwaysKeepsWindows -bool false

FileVault

System Settings → Privacy & Security → FileVault: Turn On.

FileVault encrypts the entire startup disk. On Apple Silicon and T2 Macs this is hardware-accelerated and has no perceptible performance impact.

Choose “Create a recovery key and do not use my iCloud account” for the recovery option — this keeps the recovery key local rather than escrowed with Apple.

Store the recovery key in your password manager or a printed document in a physically secure location.

Audit Installed Apps and Login Items

Login items that run at startup

System Settings → General → Login Items:

Third-party apps

Periodically audit installed applications:

# List all apps with their TCC (privacy permission) database entries
sudo sqlite3 /Library/Application\ Support/com.apple.TCC/TCC.db \
  "SELECT client, service, allowed FROM access ORDER BY service"

This shows every app that has requested any system permission and whether it was granted.

Built by theluckystrike — More at zovo.one