# Subvert Trust Controls

## Code Signing

## Gatekeeper Bypass

## Install Root Certificate

## SIP and Trust Provider Hijacking
