Yes, I found that link you cited a day ago and tried it before seeing your post.
Found my file under ~/Library/Containers/com.apple.Safari/Data/Library/Preferences/com.apple.Safari.Extensions.plist.
I dragged that file onto SRExport, but a "SRExport quit unexpectedly" error was returned:
Crashed Thread: 0 Dispatch queue: com.apple.main-thread
went to https://sessions-extension.github.io/Sessions/export.html , downloaded the script and following the instructions attempted to run it. Terminal returned the following error:
ERROR /Users/danielcarlock/Library/Safari/Databases/safari-extension_yoo.david.sessions-deub45nr9t_0/ is either unreadable or contains no databases.
I have figured this out! I have the answer to all Mac products after 2017... The features is disabled by the T2 security chip. You can lower the level of startup security and then Wifi Spoof will work. I have verified this works! I have spoofed the MAC address for a travel router and an Apple TV and logged into web authentication protected wifi systems... See the below link: https://support.apple.com/en-us/HT208198
No data is transmitted to mine or anyone else’s server.
SessionRestore doesn’t store anything related to your browsing history either - unless you have specifically enabled autosave. Even then the saves are only local, and you can delete an autosave session at anytime.
@SweetP Hi, yes, I'm using Cookie 5 in an administrator account, and the script files are all owned by my user and group staff. They weren't all executable, though, and it turns out that that was the problem. I have set the scripts executiable ("chmod 755 ~/Library/Application\ Scripts/com.sweetpproductions.Cookie5/*") and now it works. Thanks.