In this chapter, we looked at a wide range of tools and features macOS provides for protecting user security and privacy. We covered the password types available in macOS. You now know how to manage those password types, including changing and resetting them through various methods. We also looked at the Keychain system, and how you can now manage keychains stored in your system and add your own. And in the last section, we looked at other privacy-related options and how to use them to customize a system to protect users' privacy, including the features Safari offers to prevent cross-site tracking by third-party content providers on websites you visit, and how the Privacy Report can help you identify and manage those trackers. You are now equipped to use those options and tools to protect your privacy and to assist other users in doing the same.
In the next chapter, we will look at the macOS filesystem in-depth, including managing disks, volumes, and partitions, and much...