After doing a google search it was derterminded that ocspd performs caching and network fetching of Certificate Revocation Lists (CRLs) and Online Certificate Certificate Status Protocol (OCSP) responses. It is used by Security.framework during certificate verification. verification.
tion. Security.framework communicates with ocspd via a private RPC interface.
These are becoming quite bothersome and running a full scan with AVAST it returns no infections…
Any suggestions or comments would be greatly appreciated.
I’m having the same problem and would love to have this resolved. It happens every time I open Firefox, Chrome or Safari. Mine are a little different than robert’s, but they are essentially affecting the same process: