Especially so-called "clean up tools" that also scan for malware can report false-positives. If you suspect VPN Tracker 365 or Mail Designer 365 to be infected, we recommend to upload your copy of the app to
www.virustotal.com which is a free service that scans your uploaded files using several reputable virus scanners. If any of the virus scanners on this site flags the app, please contact us.
How can I verify that my copy of VPN Tracker 365 or Mail Designer has not been modified?
All our apps are properly code-signed by Apple, so macOS can verify that the app has not been tampered with. You can check the integrity by opening Terminal.app and entering the following command:
spctl --assess "/Applications/VPN Tracker 365.app"
Please note that double quotes around the path are required because the path contains spaces. If your copy is in a different location, please replace "/Applications/VPN Tracker 365.app" with the proper path to the app.
The output may look like this:
/Applications/VPN Tracker 365.app: accepted
source=Notarized Developer ID
If the app has been modified, an error message like this is printed:
Mail Designer 365.app: invalid signature (code or signature have been modified)
Please contact us if your copy of VPN Tracker 365 or Mail Designer 365 has an invalid signature.
How can I verify that my copy of VPN Tracker 365 or Mail Designer 365 was signed by equinux?
All our apps are properly code-signed by Apple, so macOS can verify that the app has not been tampered with. You can review this signature by opening Terminal.app and entering the following command:
codesign -d -vv "/Applications/VPN Tracker 365.app"
Please note that double quotes around the path are required because the path contains spaces. If your copy is in a different location, please replace "/Applications/VPN Tracker 365.app" with the proper path to the app.
The output may look like this:
Executable=/Applications/VPN Tracker 365.app/Contents/MacOS/VPN Tracker 365
Identifier=com.vpntracker.365mac
Format=app bundle with Mach-O universal (x86_64 arm64)
CodeDirectory v=20500 size=81953 flags=0x10000(runtime) hashes=2550+7 location=embedded
Signature size=9071
Authority=Developer ID Application: equinux AG (MJMRT6WJ8S)
Authority=Developer ID Certification Authority
Authority=Apple Root CA
Timestamp=1. Jun 2021 at 17:22:51
Info.plist entries=42
TeamIdentifier=MJMRT6WJ8S
Runtime Version=11.1.0
Sealed Resources version=2 rules=13 files=684
Internal requirements count=1 size=216
The important parts to look out for here are the lines starting with "Authority": They list the chain of trust. The last entry must always be "Apple Root CA", the entry above must either be "Developer ID Certification Authority" or "Apple Worldwide Developer Relations Certification Authority" for App Store versions. The first entry must either be "Developer ID Application: equinux AG" (VPN Tracker 365), "Developer ID Application: Tower One GmbH" (Mail Designer 365 non-App Store), or "Apple Mac OS Application Signing" (Mail Designer 365 App Store).
Again, if you see a different entry, please contact us.