If every app I installed did this then my mac is closer to getting hacked.
Anyway, Apps that asks for root password on installation always makes me cringe, e.g. they could turn on SSH and put a pubkey into authorized_keys, or they could upload SSH identity files. But I still proceed to enter my password.
You don't need root to do any of those things. If you're going to run the SSH server on port 22, sure, but it can be run on any port above 1024 by a regular user in user space.
If you're already running an SSH server, a non-root app can most likely edit your ~/.ssh/authorized_key file. It's just a regular file, nothing special about a malicious app adding an entry to it.
Think a NAT is going to save you? A malicious program can SSH out and create a reverse tunnel to circumvent it.
Short answer: running anything you don't know or trust is dangerous, root access just makes it more dangerous.
So, "How Dropbox uses the root access you give it during installation to gain full control of your Mac without triggering the usual popup."
That file is -rw-r--r--, so only the owner or root can change it, unless I am misunderstanding you?
So it's more like "how dropbox uses the root access you give it after installation to install software which will permanently re-add itself to accessibility even if you attempt remove its authorization".
The first bit, for me, is key.
Slimy, slimy, slimy.
Dropbox doesn't save your password.
...But I am wondering why one of these suid binaries is world-writable.
Being an app developer that was bitten in the ass by the new "security" in El Crapitan, and having spent 2 weeks trying to get our app back to normal, this makes me really mad that Apple makes us developers jump through all these hoops for security that isn't actually secure anyway.
1) the Dropbox client stores the password and uses it to hack the accesses db at every login.
2) the Dropbox client runs as root and does the same thing.
Both options are simply terrible from a security point of view
[1]: https://developer.apple.com/library/mac/documentation/Securi...
And this is what they actually do.
% ls -l /Library/DropboxHelperTools/Dropbox_u501
total 256
-r-s--x--x 1 root wheel 9632 Sep 8 20:10 dbaccessperm
-r-s--x--x 1 root wheel 116668 Sep 8 20:10 dbfseventsd
(Note the SUID bit and the root owner, meaning that these binaries will run with the root UID when started by a normal user.)