How Secure is Downtime?
Downtime uses the Unix security features built in to Mac OS X to provide the best possible security. Downtime works by making settings for a built-in scheduling program called Cron. The changes Downtime makes require administrative privileges. That is why Downtime must ask you for your administrator password before it can make any changes to your computer. Once you have made changes in Downtime, the changes are locked and protected by the Mac's Unix-based security. In order for anyone to make changes to Downtime, they must have access to a user account that has administrative privileges. If you can ensure that your restricted users do not know an administrative password, Downtime should provide you with a high degree of security.
Depending on the sophistication of your users, you may wish to add an additional layer of protection to your Mac to prevent people from bypassing Downtime. More info.
Downtime is designed with the home user in mind who needs to limit the amount of time certain family members spend on the computer. We do not recommend using Downtime in environments where security is a mission-critical requirement and we do not recommend using Downtime as a replacement for parental supervision. But within these design limitations, we believe that Downtime will help you to enforce your family rules on computer usage. If you believe you have discovered a security weakness in Downtime, please do contact us and let us know.