Do Not Disturb (macOS) icon
Do Not Disturb (macOS) icon

Do Not Disturb (macOS)

One of the best ways to compromise a computer is with physical access. Many of us have likely left our laptops unattended (perhaps in a hotel room while traveling?). It'd be nice to know if somebody attempted to hack it! ya?

Cost / License

  • Freemium (Subscription)
  • Open Source

Platforms

  • Mac
  • iPhone
  • iPad
-
No reviews
1like
0comments
0alternatives
0news articles

Features

Suggest and vote on features
No features, maybe you want to suggest one?

 Tags

  • attack
  • hacker-protection

Do Not Disturb (macOS) News & Activities

Highlights All activities

Recent activities

No activities found.

Do Not Disturb (macOS) information

  • Developed by

    US flagObjective-See
  • Licensing

    Open Source (GPL-3.0) and Freemium product.
  • Pricing

    Subscription that costs up to $1 per month + free version with limited functionality.
  • Written in

  • Alternatives

    0 alternatives listed
  • Supported Languages

    • English

GitHub repository

  •  309 Stars
  •  45 Forks
  •  25 Open Issues
  •   Updated  
View on GitHub
Do Not Disturb (macOS) was added to AlternativeTo by Paul on and this page was last updated .
No comments or reviews, maybe you want to be first?
Post comment/review

Featured in Lists

A list with 45 apps by caiocco without a description.

List by caiocco with 45 apps, updated

What is Do Not Disturb (macOS)?

One of the best ways to compromise a computer is with physical access. Many of us have likely left our laptops unattended (perhaps in a hotel room while traveling?). It'd be nice to know if somebody attempted to hack it! ya?

Do Not Disturb (DND) continually monitors your system for events that may indicate a precursor of "evil maid" attack. Specifically it watches for 'lid open' events (idea credit: @thegrugq).

If you've shut your laptop (and thus triggered sleep mode), the majority of physical access attacks may require the lid to be opened in order for the attack to succeed. Such attacks could include:

  • Logging in locally as root, by exploiting a bug such as '#iamroot'
  • Locally logging in via credentials captured by a hidden camera
  • Inserting a malicious device into a USB or Thunderbolt port.

Again, most of these attacks require a closed laptop to be opened...either to awake it (i.e. to process a malicious device) or for the attacker to interact with the laptop!