Logan the Wolf (Short Film)

https://theawesomer.com/photos/2024/10/logan_the_wolf_short_film_t.jpg

Logan the Wolf (Short Film)

(PG-13) “I leave one of you alive, so you can warn your sons about those fairy tales.” Director and co-writer Godefroy Ryckewaert shares this labor of love that he created with fellow volunteers. Logan the Wolf reimagines Wolverine and the rise of mutants in the Viking Age. The fight scenes rival the best that Hollywood has to offer, sheesh.

The Awesomer

Hacked Robot Vacuums Across the U.S. Started Yelling Slurs

https://gizmodo.com/app/uploads/2024/10/GettyImages-1945576383.jpg

It’s a tale as old as… the Internet of Things era. Robot vacuums made by Ecovacs have been reported roving around people’s homes, yelling profanities at them through the onboard speakers after the company’s software was found to be vulnerable to intrusion.

ABC News in Australia reports that there were recently multiple instances across the U.S. when owners of Ecovacs vacuums noticed their devices acting unusually.

“It sounded like a broken-up radio signal or something,” Daniel Swenson told the outlet. “You could hear snippets of maybe a voice.” He opened the vacuum’s app to find a stranger was accessing its live camera feed and remote control feature, but assumed it might be an error. After resetting the password and rebooting the robot, the vacuum quickly started moving again:

This time, there was no ambiguity about what was coming out of the speaker. A voice was yelling racist obscenities, loud and clear, right in front of Mr Swenson’s son.

“F*** n******s,” screamed the voice, over and over again.

Perhaps the best part of this anecdote was Swenson’s incredulous conclusion that the situation “could have been worse.” But he’s right that it was nice of the hacker to let him know his vacuum was hacked instead of spying on him indefinitely.

The most common issue people have with so-called “smart” home devices is that they often require a software subscription to access most functionality, and if the manufacturer goes under or stops supporting the device, it simply becomes a paperweight.

The more disturbing issue arises when smart devices are remotely accessed and the manufacturer never considered (or cared about) the possibility that tricksters might take advantage of this to torment people in their own homes. Remote access is convenient, but every couple of years we hear about something egregious, like intruders accessing a baby monitor and whispering through it at night, or gaining access to your garage door to mess with its owner.  A lot of the time the intent of these intruders is just to be punks. But you have to wonder how many times it happens and no one knows about it.

The problem is that most of these smart home companies are selling consumer hardware and don’t want or care to invest much in security. You can buy one of dozens of robovacs on Amazon; most people want the cheapest one. So this is what we get, a company that doesn’t put basic security measures in place.

And ‘basic’ seems to be fair here. ABC found that although Ecovacs accounts are password-protected, and a further four-digit PIN code is required to access the video feed, that PIN code is not validated server-side—meaning anyone with the basic know-how of a tool like Chrome web inspector could bypass it. It’s likely that Swenson was reusing credentials from other services, but the code should have been an extra factor that prevented access. At a bare minimum all Ecovacs really needs to do is some basic “if-true” validation on its servers before opening the video feed.

Ecovacs reportedly was informed about the vulnerability back in 2023 and didn’t take action until recently. It says a more substantial security update will be released in November.

If you are paying rock-bottom prices for a robot vacuum, you may get what you’re paying for.

Gizmodo

Babylon Bee Releases Movie

https://media.babylonbee.com/articles/670942b84f1bc670942b84f1bd.jpg

WORLD — Today marks the historic release day of January 6, The Most Deadliest Day, an already critically acclaimed documentary chronicling the deadliest and darkest and scariest event in world history: the January 6 insurrection.

Critics are lauding the film as "not the worst thing I’ve seen," and "eh, kinda funny." Liberals, on the other hand, have marked the momentous day by screaming and crying and wetting their pants in rage and confusion.

"How did we as a country get to the point where The Babylon Bee can just make a film about January 6 without facing serious consequences?" said a tearful Obama to reporters. "This film is an attack on our sacred democracy and the communist global order I have dedicated my whole life to building. I am literally shaking right now."

Eyewitnesses confirmed Obama then calmed himself down by launching a drone attack in Yemen.

Attorney General Merrick Garland has also responded, instructing FBI field offices to keep a close eye on anyone who dares to watch the film. "Watching this film is an attack on our sacred democracy," he said between sobs. "I am literally throwing up just thinking about it."

Sources confirmed the new film is available at BabylonBee.com/january6 and is only available to subscribers.


BIG NEWS: We made a movie, and you can watch the trailer NOW:

Click here to find out how you can watch the movie when it releases on October 11

Babylon Bee

You Might Still Be Making These 7 Mistakes on Facebook

https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2024/10/a-person-using-facebook-on-their-smartphone-with-warning-icons-in-the-background.jpg

Social media platforms like Facebook are excellent for connecting with people online, but it’s important to be cautious. Here are some common mistakes you might be making on Facebook without even realizing it.

MAKEUSEOF VIDEO OF THE DAY
SCROLL TO CONTINUE WITH CONTENT

1 Oversharing About Your Personal Life

While it’s natural to want to connect with friends and family by sharing updates about your life, revealing too much information can compromise your privacy and security. Sharing things like your location, daily routines, or family information can expose you to potential privacy breaches.

This information can be exploited by hackers, stalkers, or even advertisers seeking to target you more aggressively. For example, posts about vacations can signal to potential burglars that your home is empty, significantly increasing the risk of a break-in. Additionally, sharing real-time updates can inadvertently inform malicious actors of your whereabouts, leaving you vulnerable.

It’s best to limit the details you share about your daily life. Consider curating your posts and keeping sensitive information for private conversations rather than sharing it publicly.

2 Including Excessive Details in Your Bio

a person using facebook on a laptop
DenPhotos / Shutterstock

It’s not just about what you post; it’s also important to reflect on the details you’ve included in your bio and how much information you’ve shared there. You may have unwittingly disclosed excessive personal details, such as phone numbers, email addresses, significant life events, and intimate family information.

It’s crucial to remember that your Facebook profile may be visible to strangers, especially if your privacy settings aren’t properly configured. This level of openness can leave you vulnerable to harassment or unwanted contact from individuals with ill intentions. Personal information is also used in spear phishing scams.

Rather than sharing sensitive information in your bio, consider offering a concise overview of your interests, hobbies, or professional background. This will allow you to convey your personality without compromising your privacy.

3 Spreading Misinformation or Unverified News

These days, social media platforms like Facebook serve as major sources of news and information for many. However, the ease of sharing content has also contributed to the widespread dissemination of misinformation and unverified news.

When you share articles, memes, or posts without verifying their accuracy or understanding their sources, you may unintentionally contribute to the spread of misinformation. This can be especially harmful, as misinformation has the potential to incite panic, shape public opinion, and even influence elections.

To combat this, it’s essential to verify the credibility of any information before sharing it. Engaging critically with what you read helps prevent the spread of misinformation and contributes to a more informed community. Every post you share has the potential to influence others, so ensure that the message you’re amplifying is accurate and valuable.

4 Engaging in Toxic Discussions or Trolling

a person tapping a comment button on facebook
Mircea Moira / Shutterstock

Facebook is a platform designed for connection, yet it often becomes a battleground for toxic discussions and trolling. What may seem funny or harmless to you can be offensive or hurtful to others. It’s important to understand that engaging in heated debates or making sarcastic comments can escalate tensions and contribute to a hostile environment.

Toxic discussions not only damage relationships but can also tarnish your online reputation. Once words are typed and posted, they can spread rapidly, leaving a permanent mark on your digital footprint. Consider whether your words will contribute to a healthy dialogue or simply escalate tension. After all, social media should be a space for connection and understanding, not conflict and division.

5 Allowing Your Profile to Be Discoverable by Search Engines

By default, your Facebook profile is discoverable through search engines. This means that anyone can find your account simply by typing in your name in a Google or Bing search. While this may seem harmless, it can compromise your privacy and security. Strangers or unwanted acquaintances can easily locate your profile and gather personal information that could be used for malicious purposes.

Even if you believe your privacy settings are strict, search engine visibility can undermine those protections. Search engines index your information regardless of your privacy preferences, which can expose you to unwanted friend requests, harassment, or even identity theft.

To avoid this, it’s best to make your Facebook profile unsearchable via search engines. For that, open Facebook and head to Settings & privacy > Audience and visibility > How people find and contact you. Then, turn off the toggle next to Do you want search engines outside of Facebook to link to your profile.

6 Failing to Adjust Critical Privacy Settings

One of the most significant mistakes Facebook users make is neglecting to adjust their privacy settings. Sticking with the default settings often allows broader access to your profile and posts than you might realize.

For instance, by default, Facebook allows anyone—regardless of whether they are friends—to view your friends list, bio, and the pages you follow. This can lead to unintended exposure of personal information to strangers, increasing the risk of privacy breaches.

Moreover, you may not realize that your posts can be visible to the public, depending on your settings. Even seemingly innocent information can be misused by malicious actors. Therefore, it is essential to take the time to enhance your Facebook profile’s privacy by manually adjusting the privacy settings or using the Privacy Checkup tool.

7 Overlooking Essential Account Security Measures

person inputting 2fa password into laptop and smartphone
LookerStudio/Shutterstock

Keeping your Facebook account secure may not seem important, but it’s crucial for protecting your personal information and online identity. One common oversight is failing to enable two-factor authentication (2FA). Without it, your account is more vulnerable to unauthorized access, especially if your passwords are weak or reused across multiple platforms.

Over time, you may have unknowingly granted third-party apps and websites access to your Facebook account. These apps often require permissions that extend beyond what is necessary for their functionality, making it essential to regularly audit and manage these permissions. By taking a few moments to reassess what apps have access to your account and limiting permissions where possible, you can significantly enhance your data security.

In the fast-paced world of social media, it’s easy to fall into the trap of making mistakes, from oversharing personal information to neglecting privacy settings. However, by being aware of these common missteps, you can take proactive steps to enhance your Facebook presence and use the platform more effectively.

MakeUseOf

You Might Still Be Making These 7 Mistakes on Facebook

https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2024/10/a-person-using-facebook-on-their-smartphone-with-warning-icons-in-the-background.jpg

Social media platforms like Facebook are excellent for connecting with people online, but it’s important to be cautious. Here are some common mistakes you might be making on Facebook without even realizing it.

MAKEUSEOF VIDEO OF THE DAY
SCROLL TO CONTINUE WITH CONTENT

1 Oversharing About Your Personal Life

While it’s natural to want to connect with friends and family by sharing updates about your life, revealing too much information can compromise your privacy and security. Sharing things like your location, daily routines, or family information can expose you to potential privacy breaches.

This information can be exploited by hackers, stalkers, or even advertisers seeking to target you more aggressively. For example, posts about vacations can signal to potential burglars that your home is empty, significantly increasing the risk of a break-in. Additionally, sharing real-time updates can inadvertently inform malicious actors of your whereabouts, leaving you vulnerable.

It’s best to limit the details you share about your daily life. Consider curating your posts and keeping sensitive information for private conversations rather than sharing it publicly.

2 Including Excessive Details in Your Bio

a person using facebook on a laptop
DenPhotos / Shutterstock

It’s not just about what you post; it’s also important to reflect on the details you’ve included in your bio and how much information you’ve shared there. You may have unwittingly disclosed excessive personal details, such as phone numbers, email addresses, significant life events, and intimate family information.

It’s crucial to remember that your Facebook profile may be visible to strangers, especially if your privacy settings aren’t properly configured. This level of openness can leave you vulnerable to harassment or unwanted contact from individuals with ill intentions. Personal information is also used in spear phishing scams.

Rather than sharing sensitive information in your bio, consider offering a concise overview of your interests, hobbies, or professional background. This will allow you to convey your personality without compromising your privacy.

3 Spreading Misinformation or Unverified News

These days, social media platforms like Facebook serve as major sources of news and information for many. However, the ease of sharing content has also contributed to the widespread dissemination of misinformation and unverified news.

When you share articles, memes, or posts without verifying their accuracy or understanding their sources, you may unintentionally contribute to the spread of misinformation. This can be especially harmful, as misinformation has the potential to incite panic, shape public opinion, and even influence elections.

To combat this, it’s essential to verify the credibility of any information before sharing it. Engaging critically with what you read helps prevent the spread of misinformation and contributes to a more informed community. Every post you share has the potential to influence others, so ensure that the message you’re amplifying is accurate and valuable.

4 Engaging in Toxic Discussions or Trolling

a person tapping a comment button on facebook
Mircea Moira / Shutterstock

Facebook is a platform designed for connection, yet it often becomes a battleground for toxic discussions and trolling. What may seem funny or harmless to you can be offensive or hurtful to others. It’s important to understand that engaging in heated debates or making sarcastic comments can escalate tensions and contribute to a hostile environment.

Toxic discussions not only damage relationships but can also tarnish your online reputation. Once words are typed and posted, they can spread rapidly, leaving a permanent mark on your digital footprint. Consider whether your words will contribute to a healthy dialogue or simply escalate tension. After all, social media should be a space for connection and understanding, not conflict and division.

5 Allowing Your Profile to Be Discoverable by Search Engines

By default, your Facebook profile is discoverable through search engines. This means that anyone can find your account simply by typing in your name in a Google or Bing search. While this may seem harmless, it can compromise your privacy and security. Strangers or unwanted acquaintances can easily locate your profile and gather personal information that could be used for malicious purposes.

Even if you believe your privacy settings are strict, search engine visibility can undermine those protections. Search engines index your information regardless of your privacy preferences, which can expose you to unwanted friend requests, harassment, or even identity theft.

To avoid this, it’s best to make your Facebook profile unsearchable via search engines. For that, open Facebook and head to Settings & privacy > Audience and visibility > How people find and contact you. Then, turn off the toggle next to Do you want search engines outside of Facebook to link to your profile.

6 Failing to Adjust Critical Privacy Settings

One of the most significant mistakes Facebook users make is neglecting to adjust their privacy settings. Sticking with the default settings often allows broader access to your profile and posts than you might realize.

For instance, by default, Facebook allows anyone—regardless of whether they are friends—to view your friends list, bio, and the pages you follow. This can lead to unintended exposure of personal information to strangers, increasing the risk of privacy breaches.

Moreover, you may not realize that your posts can be visible to the public, depending on your settings. Even seemingly innocent information can be misused by malicious actors. Therefore, it is essential to take the time to enhance your Facebook profile’s privacy by manually adjusting the privacy settings or using the Privacy Checkup tool.

7 Overlooking Essential Account Security Measures

person inputting 2fa password into laptop and smartphone
LookerStudio/Shutterstock

Keeping your Facebook account secure may not seem important, but it’s crucial for protecting your personal information and online identity. One common oversight is failing to enable two-factor authentication (2FA). Without it, your account is more vulnerable to unauthorized access, especially if your passwords are weak or reused across multiple platforms.

Over time, you may have unknowingly granted third-party apps and websites access to your Facebook account. These apps often require permissions that extend beyond what is necessary for their functionality, making it essential to regularly audit and manage these permissions. By taking a few moments to reassess what apps have access to your account and limiting permissions where possible, you can significantly enhance your data security.

In the fast-paced world of social media, it’s easy to fall into the trap of making mistakes, from oversharing personal information to neglecting privacy settings. However, by being aware of these common missteps, you can take proactive steps to enhance your Facebook presence and use the platform more effectively.

MakeUseOf

Optimize Your SQLite Database with the Laravel Optimize DB Package

https://picperf.io/https://laravelnews.s3.amazonaws.com/featured-images/laravel-optimize-db-featured.png

Optimize Your SQLite Database with the Laravel Optimize DB Package

The Laravel Optimize DB package provides a good starting point for production-ready SQLite databases. Pest creator and core Laravel team member Nuno Maduro created this package.

This package is meant for SQLite (3.46+) in a Laravel project and works by applying migration to your project and runtime configuration applied via the package’s service provider. It applies the following settings at the time of writing:

 ┌───────────────────────────┬─────────────┬───────────┐
 │ Setting                   │ Value       │ Via       │
 ├───────────────────────────┼─────────────┼───────────┤
 │ PRAGMA auto_vacuum        │ incremental │ Migration │
 │ PRAGMA journal_mode       │ WAL         │ Migration │
 │ PRAGMA page_size          │ 32768       │ Migration │
 │ PRAGMA busy_timeout       │ 5000        │ Runtime   │
 │ PRAGMA cache_size         │ -20000      │ Runtime   │
 │ PRAGMA foreign_keys       │ ON          │ Runtime   │
 │ PRAGMA incremental_vacuum │ (enabled)   │ Runtime   │
 │ PRAGMA mmap_size          │ 2147483648  │ Runtime   │
 │ PRAGMA temp_store         │ MEMORY      │ Runtime   │
 │ PRAGMA synchronous        │ NORMAL      │ Runtime   │
 └───────────────────────────┴─────────────┴───────────┘

High Impact Settings

I won’t cover each setting, but the following three settings could potentially have a highly positive impact on SQLite performance.

journal_mode = WAL:

  • Why it’s beneficial: Write-Ahead Logging (WAL) is one of the most effective ways to improve concurrency and performance in SQLite, especially for applications that need to support multiple readers and writers. It allows the database to handle many reads simultaneously while still maintaining atomicity and durability for writes.
  • Use case: Great for databases with mixed read/write workloads and high concurrency requirements.

cache_size = -20000 (20 MB cache):

  • Why it’s beneficial: Increasing the cache size helps store more pages in memory, reducing the need for disk I/O. This is especially useful for databases that are read frequently or have hot data. A larger cache means fewer page reads from disk, resulting in faster query responses.
  • Use case: Important when dealing with large datasets and you have sufficient memory resources available.

mmap_size = 2147483648 (2 GB memory mapping):

  • Why it’s beneficial: Memory-mapping the database file can dramatically improve performance by reducing the overhead associated with file system operations. It allows the database to access data directly in memory, bypassing the need for repeated system calls to read or write data.
  • Use case: Very beneficial for large databases on systems with ample memory, where file access speed is a priority.

The package is considered a work-in-progress, so use it carefully. The package advises not to use it in production yet and to back up your database before requiring it. You can learn more about this package and view the source code on Github.


The post Optimize Your SQLite Database with the Laravel Optimize DB Package appeared first on Laravel News.

Join the Laravel Newsletter to get all the latest
Laravel articles like this directly in your inbox.

Laravel News

How Mossad Planned Its Exploding Pager Operation: Inside Israel’s Penetration of Hezbollah

The Washington Post interviewed Lebanese officials, people close to Hezbollah, and Israeli, Arab and U.S. security officials and politicians about a years-long plan (originated at Mossad headquarters) that ultimately killed or maimed "as many as 3,000 Hezbollah officers and members — most of them rear-echelon figures… along with an unknown number of civilians… when Israel’s Mossad intelligence service triggered the devices remotely on September 17."
In the initial sales pitch to Hezbollah two years ago, the new line of Apollo pagers seemed precisely suited to the needs of a militia group with a sprawling network of fighters and a hard-earned reputation for paranoia… Best of all, there was no risk that the pagers could ever be tracked by Israel’s intelligence services. Hezbollah’s leaders were so impressed they bought 5,000 of them and began handing them out to mid-level fighters and support personnel in February. None of the users suspected they were wearing an ingeniously crafted Israeli bomb… Israeli officials had watched with increasing anxiety as the Lebanese group added new weapons to an arsenal already capable of striking Israeli cities with tens of thousands of precision-guided missiles. Mossad, the Israeli intelligence service responsible for combating foreign threats to the Jewish state, had worked for years to penetrate the group with electronic monitoring and human informants. Over time, Hezbollah leaders learned to worry about the group’s vulnerability to Israeli surveillance and hacking, fearing that even ordinary cellphones could be turned into Israeli-controlled eavesdropping and tracking devices. Thus was born the idea of creating a kind of communications Trojan horse, the officials said. Hezbollah was looking for hack-proof electronic networks for relaying messages, and Mossad came up with a pair of ruses that would lead the militia group to purchase devices that seemed perfect for the job — equipment that Mossad designed and had assembled in Israel. The first part of the plan, booby-trapped walkie-talkies, began being inserted into Lebanon by Mossad nearly a decade ago, in 2015. The mobile two-way radios contained oversized battery packs, a hidden explosive and a transmission system that gave Israel complete access to Hezbollah communications. For nine years, the Israelis contented themselves with eavesdropping on Hezbollah, the officials said, while reserving the option to turn the walkie-talkies into bombs in a future crisis. But then came a new opportunity and a glitzy new product: a small pager equipped with a powerful explosive. In an irony that would not become clear for many months, Hezbollah would end up indirectly paying the Israelis for the tiny bombs that would kill or wound many of its operatives. Because Hezbollah leaders were alert to possible sabotage, the pagers could not originate in Israel, the United States or any other Israeli ally. So, in 2023, the group began receiving solicitations for the bulk purchase of Taiwanese-branded Apollo pagers, a well-recognized trademark and product line with a worldwide distribution and no discernible links to Israeli or Jewish interests. The Taiwanese company had no knowledge of the plan, officials said… The marketing official had no knowledge of the operation and was unaware that the pagers were physically assembled in Israel under Mossad oversight, officials said… In a feat of engineering, the bomb component was so carefully hidden as to be virtually undetectable, even if the device was taken apart, the officials said. Israeli officials believe that Hezbollah did disassemble some of the pagers and may have even X-rayed them. "Thousands of Apollo-branded pagers rang or vibrated at once, all across Lebanon and Syria," according to the article, with a short sentence in Arabic that said "You received an encrypted message." The two-button de-encryption procedure "ensured most users would be holding the pager with both hands when it detonated," according to the article, although "Less than a minute later, thousands of other pagers exploded by remote command, regardless of whether the user ever touched his device. The following day, on September 18, hundreds of walkie-talkies blew up in the same way, killing and maiming users and bystanders…" "As Hezbollah reeled, Israel struck again, pounding the group’s headquarters, arsenals and logistic centers with 2,000-pound bombs," the article concludes. And the strike "convinced the country’s political leaders that Hezbollah could be put on the ropes, susceptible to a systematic dismantling using airstrikes and, eventually a ground invasion…"


Read more of this story at Slashdot.

Slashdot

How to make an external bootable drive in macOS Sequoia

https://photos5.appleinsider.com/gallery/61263-126550-IMG_9785-xl.jpg

All of these drives can get Sequoia. Here’s how.


Apple makes it harder to make an external boot drive for your Mac than it has in the past, but sometimes you still need to do it. Here’s how to do it in macOS Sequoia.

Apple Silicon and macOS may be excellent, but when a Mac won’t start up, having the option to boot from an external drive is key. It will help with diagnosing the problem, and at worst it can mean your being able to carry on working after just a few minutes.

Being able to boot up any Mac from an external drive you happen to have with you is a potential security risk, though, and Apple is not having that. You now have to make a deliberate, positive choice to disable an element of macOS security in order to even start.

Take extreme care

Not only will you be actively turning off a security feature, you’ll also have to erase the external drive you want to boot from. You know that accidentally erasing your Mac’s own internal drive would be disastrous, you know you wouldn’t do that deliberately.

Yet despite that and despite the Mac double-checking you mean what you’re doing, it is still possible to make a mistake.

Consequently, the short answer to how you make a bootable external working drive is very, very carefully — and only after you’ve backed up everything.

You’ve simply got to make a backup of anything on the external drive that you want, because that’s all going away. It isn’t strictly necessary to back up your Mac’s internal drive, but do it anyway.

Use Apple’s Disk Utility to format the external drive

Maybe you’ll just have a spare copy of your data, but maybe that spare copy will be what you need to get back to work.

Then the job entails two steps:

  1. Allowing your Mac to boot from external drives at all
  2. Preparing a bootable external drive

That first part is crucial, and it is crucial that you do it before you have any problems. If you need to boot from an external drive because your Mac won’t start up, you’ve got to have already done this step because there’s no way to do it later.

So while your Mac is fine, take a few minutes to do this enabling of external drives. If you’re still on an Intel Mac, the process is different, but for all Apple Silicon Macs you have to go through these same steps.

How to allow external startup drives on Apple Silicon Macs

  1. Shut down the Mac
  2. Press the power button and keep it pressed
  3. Let go when you see one or more drives and an Options section
  4. Select Options and click Continue
  5. When the Mac boots into Recovery Mode, select a Mac user you know the password for
  6. Log in as that user
  7. Ignore all of the options in the pop-up list and instead choose Startup Security Utility from the Utilities menu
  8. Click to select the Mac’s internal drive and then click Unlock
  9. Follow the prompts concerning passwords, and select Security Policy
  10. In the Security Policy window that appears, click to select Reduced Security
  11. Then click OK
  12. Under the Startup Disk menu at top left of your screen, choose Shut Down

Now your Mac is ready. You can plug in an external drive to start up from it — except you now need to prepare that drive.

How to create an external, bootable work disk with macOS Sequoia

Not every external drive will do, but most will. The ones to ignore are the cheapest flash drives, though, as this works even with many USB sticks.

The external drive should preferably be a fast one. It definitely has to be a single drive — you can’t start up your Mac by plugging in any kind of RAID array of drives.

You can use a spinning hard drive, and those are available cheaply. But this is something where you need reliability, so go for one of the current best external SSDs.

Be so careful to choose the right drive

And of course the drive has to have macOS Sequoia on it.

So next you format the drive, then you put the macOS installer onto it.

How to format an external drive on macOS Sequoia

  1. Connect your external drive to your Mac
  2. Open Disk Utility in Applications, Utilities on your Mac
  3. Carefully select the external drive from the list that appears
  4. Click on Erase
  5. Give the drive a name
  6. From the dropdown menus that appear, choose APFS
  7. Click on Erase

Under Apple Silicon, this is likely to take only moments. When it’s done, the drive is ready, and you can go get macOS Sequoia from the Mac App Store — but you need to look in the right place.

Even as Apple promotes a new macOS on the App Store, it may not give you a link to a downloadable installer. Instead, search the Mac App Store for "macOS Sequoia," and you’ll find it.

From the list of search results that appears, click on View, then when you see it, Get. Important — it’s going to look exactly as if you’re about to install macOS Sequoia on your Mac’s internal drive, but you are not.

It looks like that because you are bounced from the App Store to the Settings app, and its Software Update section. After a few moments, however, a popup asks whether you want to download the OS. Click on the Download button to say yes.

Don’t think you can go make coffee and lunch, the time remaining is an estimate that tends to be overly cautious

Once it is downloaded, then you are prompted to install. While that is what you want, take a moment first to find the installer in the Finder. It will be called "Install macOS Sequoia" and is about 14.5GB is size.

Find it and make a copy somewhere. If you later want to install macOS Sequoia on different Macs, or if you just need to start again with your current one, it’s handy to have that file available.

Nonetheless, you downloaded it to install it on your external drive and assuming that drive is now formatted, you can just follow the prompts. Be certain, though, be absolutely certain, that you have selected that external drive first.

The next step takes several minutes, although you have nothing to do during that time but wait. When it’s ready, the Mac will ask you to restart it and will also caution that it may then restart itself several times.

You now have an external startup disk with macOS Sequoia on it

In theory, you’re finished now, but in practice installing a copy of macOS anywhere sets the Mac off asking you questions. It will try to prompt you through questions about location, Siri, and so on.

It will try very hard, but you don’t need to answer everything. While Apple seems to have made this deliberately hard to spot, there will always be a "Set Up Later" or similar button somewhere on the screen.

You may find that your fresh, new installation of macOS Sequoia on the external drive abruptly launches the same macOS Sequoia installer. Just quit it.

What to do next

You made this drive bootable for a reason, and whether that’s because you suspect a particular problem, or you just want to be careful, you need to do one thing next. You need to startup the Mac from this drive, just to be certain that it works.

It almost certainly will. The only possibility where it might not is if there is an issue with the external drive.

Typically that means there’s a fault or that the drive isn’t fast enough. What you’ll almost certainly find is that even when it works, though, the external drive will not be as fast as your internal one.

The result is that you’ll feel your Mac is slower. It’s possibly Apple’s way of saying you need to get that internal drive fixed sharpish.

Assuming that you can put up with a slower Mac if it means you can carry on working, you do also need to make sure that you have the tools you need to do that work. So while it’s probably not worth copying everything over from your Mac to this drive, at least make sure that the major applications you use are there.

With a slower Mac and perhaps not all of your applications available, booting from an external drive is a compromise. But it’s a compromise we need in order to fix problems or work around them.

So it’s good that Apple has made it so that by default, random strangers can’t boot your Mac from their drive. But it’s a relief that Apple hasn’t made it impossible for us to — as long as we prepare in advance.

AppleInsider News