On Code Injection on MacOSX High Sierra09 May 2018
I've always fancied tweaking my system, and a distribution like ArchLinux and its open source Window Managers seem like a fine solution. However, I've been using MacOSX for ages, and despite the fact I'm having a close look at Xiaomi's expansion, I'm still in love with Darwin, a little bit less with Quartz.
Today I came across MIP a code injection platform that doesn't go for the obvious. Here's a starting guide to have it installed.
The following is the first of a series of posts about code injection. It supposes SIP (System Integrity Protection) to be turned off at your own risks.
First, to build MIP, you'll have to create yourself a code signing identity. For now, we'll start with a self generated one.
Keychain Access.app and the menu, choose
Keychain Access > Certificate Assistant > Create a Certificate.
Follow the wizard, filling up fields to your likings, the certificate will end up in the
login section of the
Keychain Access application.
Building MIP is then straigthforward.
$ brew install binutils $ cd ~/Development $ git clone https://github.com/LIJI32/MIP.git mip $ cd mip/MIP $ emacs -nw -Q Makefile $ # set SIGN_IDENTITY ?= "Julien Wintz" to match the name of your profile $ make $ make install