You can also download old versions of MacOS installers. I forget the link to the easier scripts/installers, there's a High Sierra one at http://dosdude1.com/highsierra/
and then temporarily blocked swcdn.apple.com in /etc/hosts,
and then served the /content/ directory so that swcdn.apple.com/content/ was pointed at 127.0.0.1/content
(I used python here in the parent directory of /content/)
> sudo python -m SimpleHTTPServer 80
and then I opened the High Sierra MacOS app store specific link to make it download & assemble the .dmg file properly
Can use the same approach to grab other versions of MacOS downloaders from apple too if you look up the app store links for it and then serve the catalog locally I guess.
I did the same with my 2015 MacBook Pro, and I'm still amazed that a $5 adapter and an Intel SSD are super fast and don't cause any problems at all. The machine sleeps, wakes, hibernates without any issues whatsoever.
Also, I sold the original, well used Apple 1TB SSD for more than I paid for the brand new 2TB Intel SSD.
Not GP, but as others have described here, you can clone your entire disk to an external one (using an application like SuperDuper! or Carbon Copy Cloner), upgrade the internal disk, and the restore from the external clone.
When it comes to hardware upgrades of the DIY kind, iFixit (https://www.ifixit.com/) is a great resource with detailed instructions, photos and even videos on how to do them for different devices. The site also sells tools and parts, but you don’t necessarily have to buy from there. For SSDs, OWC (Other World Computing, https://eshop.macsales.com/) has tested parts available for many older Macs.
So what? There are risks everywhere in life. You buy a new car and you decide to go on a road trip and there is a dangerous road ahead. The car company should stop your car remotely?
When you are driving a car, the dangers you encounter are immediately perceptible, and your driver’s license means you specifically trained for and are certified as able to deal with them.
With our laptops full of PII, corporate secrets, cryptocurrency wallet keys and so on, without proper security measures one can be taken advantage of without detection over long periods of time, and only a tiny percentage of the user base can adequately assess potential attack vectors (even the scope of possible damage is not intuitively obvious).
There may be issues with specific implementations, and the degree of trust one has to put in their device’s manufacturer could probably be lower, but without those measures a typical user would be like a 5-year old driving a Ferrari on a winding mountain road. Yes, I’d be okay if my car automatically stopped before a cliff that I couldn’t see even if I drove right into it.
Privacy Policies are written in juridical terms and are hardly/not-easily understood by an average person or user. That is the main issue with Privacy Policies, in my opinion.