1. Settings enable: any source is allowed, and some applications enable any source or cannot be installed. This is because Apple has further narrowed the rights of unsigned applications, and it needs to execute the command line code through the terminal to bypass the application signature authentication.
2. Execute orders and bypass Apple's notary gatekeeper.
3. Turn off the integrity protection of SIP system. Macintosh (Mac for short) is a personal consumer computer developed by Apple from 1984.