Restart macOS, holding ⌘+R. Open Terminal. Type `csrutil disable`. Restart macOS again.
But as far as I'm aware the reasoning is that if there's a way to access something from a normal user account (with admin privileges) it can be abused somehow.
Maybe a "key" would be the ability to boot/log in to a special mode with SIP enabled. Disabling/enabling it approximates this, but as far as I know an update will generally destroy your changes because Apple will just overwrite everything.
Any day now…
Stallman was right about "treacherous computing".
I'm not sure what it really does (could not find any docs, maybe someone can enlighten?) but the text made me think it could allow stuff like running unsigned debuggers:
Allow the applications below to run software locally that does not meet the system's security policies
Funny thing is all computers used to run without SIP, but since they added it I’m now hesitant to turn it off even though I’m not any worse off than I used to be.
This got far more of a chuckle from me than it should have. Must have had a long day or far to little sleep.
a. It would require that we maintain a potentially pretty big list of self-compiled binaries
b. It would be an alteration of what the user's running, which we try to keep to a minimum, as mirrord's commonly used as a testing tool
Why would I need this? or whatever this does?
You can read more about it here https://metalbear.co/blog/mirrord-3.0-is-out/