Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.

GoCubsGo

macrumors Nehalem
Feb 19, 2005
35,741
153
I'm super curious what activities this guy gets into on his computer that would make him so paranoid. Either way, I truly want to know if I removed the SSD from the Air then would the TB port be useful at all? It's not like data is stored within the port.
 

flynz4

macrumors 68040
Aug 9, 2009
3,242
126
Portland, OR
http://dailymactips.com/2012/05/04/how-to-set-a-firmware-password-in-lion/

Same process for Mountain Lion. Make sure you use a password you won't forget as there is no way to reset or remove the password if you forget it.

Thanks... FW Password set. I've been meaning to do this. Now I do not necessarily need to power-down my machine when left in a semi-public place (like a hotel room).

I'm super curious what activities this guy gets into on his computer that would make him so paranoid. Either way, I truly want to know if I removed the SSD from the Air then would the TB port be useful at all? It's not like data is stored within the port.

I assume you are wondering about the wisdom of destroying a FW port... not using FV2 + FW Password.

/Jim
 

Steve121178

macrumors 603
Apr 13, 2010
6,400
6,951
Bedfordshire, UK
I am about to buy myself a brand new MacBook Air when the next model comes out.

I believe in anonymity and I am beyond paranoid.

Yet you use the internet leaving a highly visible and traceable paper-trail for everything you do? And do you know how much stuff is sent to Apple & other vendors who's software you install?

You haven't really thought this through have you?

Just a heads up, but if you are serious about security why the hell are you looking at MBA? Get a laptop that suits your needs and run Linux. And I mean proper Linux, not crap like Ubuntu.
 

flynz4

macrumors 68040
Aug 9, 2009
3,242
126
Portland, OR
But the whole thread is about how that is not enough.

No... I think you might be missing a key point. There is nothing wrong with an encrypted drive per se. An encrypted drive out of the system is safe.

The issue is that if a machine is either running or suspended... then the encryption key can be extracted from active system memory... and then the system has a vulnerability.

There are two ways to circumvent a memory resident key from being accessed:
  1. Shut down the computer when it might be physically accessed by a 3rd party.
  2. Use a firmware password so that the system cannot be accessed via an external boot device... including a FW or TB connection.

Either of those two actions removes the threat of this specific security threat.

A bunch of people appear to be misunderstanding that there is nothing wrong with an encrypted drive, and incorrectly believe that physical possession of an encrypted drive is insecure. They seem to be missing the fact that real culprit in this particular example is having the key available in system memory and available to be exploited... while the encrypted drive itself is otherwise actually secure.

/Jim

P.S. I previously used method #1 above to keep my system secure... but it is impractical to shut down 100% of the time. Due to the information in this thread... I now use approach #2... which adds security, even if I do not shut down.
 
Last edited:

Stetrain

macrumors 68040
Feb 6, 2009
3,550
20
But the whole thread is about how that is not enough.

The thread is about the apparent ability to access an encrypted drive when the machine isn't completely powered off because the encryption key is stored in memory.

Once the machine is turned off or the drive removed from the machine that would no longer be effective.
 

justperry

macrumors G5
Aug 10, 2007
12,557
9,750
I'm a rolling stone.
No... I think you might be missing a key point. There is nothing wrong with an encrypted drive per se. An encrypted drive out of the system is safe.

The issue is that if a machine is either running or suspended... then the encryption key can be extracted from active system memory... and then the system has a vulnerability.

There are two ways to circumvent a memory resident key from being accessed:
  1. Shut down the computer when it might be physically accessed by a 3rd party.
  2. Use a firmware password so that the system cannot be accessed via an external boot device... including a FW or TB connection.

Either of those two actions removes the threat of this specific security threat.

A bunch of people appear to be misunderstanding that there is nothing wrong with an encrypted drive, and incorrectly believe that physical possession of an encrypted drive is insecure. They seem to be missing the fact that real culprit in this particular example is having the key available in system memory and available to be exploited... while the encrypted drive itself is otherwise actually secure.

/Jim

P.S. I previously used method #1 above to keep my system secure... but it is impractical to shut down 100% of the time. Due to the information in this thread... I now use approach #2... which adds security, even if I do not shut down.


Bold
Three, disabling the Thunderbolt extensions is another one.
 

dyn

macrumors 68030
Aug 8, 2009
2,708
388
.nl
Bold
Three, disabling the Thunderbolt extensions is another one.
In that case you are wrong too. There are many more ways of destroying the TB port. You could desolder it for example. All of those are impractical. The two mentioned are the most practical and useful ways of avoiding the issue.
 

Siderz

macrumors 6502a
Nov 10, 2012
991
6
Plot twist: His friend needs the Thunderbolt port, and so OP wants to destroy it so that he can no longer use the device.

Why don't you just open the MBA and physically remove the port?
 

andiwm2003

macrumors 601
Mar 29, 2004
4,382
454
Boston, MA
I'm super curious what activities this guy gets into on his computer that would make him so paranoid. Either way, I truly want to know if I removed the SSD from the Air then would the TB port be useful at all? It's not like data is stored within the port.

While this all sounds paranoid there are scenarios where this paranoia is warranted.

I'm working for a biotech and on my computer are project plans, chemical structures that are not patented yet and such stuff. When I'm on a conference usually the entire industry is booked in the same hotels and it's conceivable that someone for the heck of it downloads a bunch of laptop HD's and figures out who is doing what.

Other scenarios are that I have unpublished clinical trial results on my HD and someone could use the information to buy/sell stocks. We had our company broken in and all computers stolen a few years ago. Luckily the thief's seem to have been interested in the hardware only.
 

dyn

macrumors 68030
Aug 8, 2009
2,708
388
.nl
If you put that much data on a notebook it means that you haven't thought it through. Always carefully decide what data to bring along and what not. Also carefully decide how you bring it. Do you put it on just the drive with whole disk encryption turned on or do you put it in a secured Truecrypt container on a drive with whole disk encryption turned on whilst only powering the machine when necessary? Do you even put it on the notebook or keep it stored elsewhere that you can safely access?

It's not just whole disk encryption you need to think about in that case!
 

DisplacedMic

macrumors 65816
May 1, 2009
1,411
1
I'm suspecting its his internet history and the 'someone' is his wife. :)

seriously. just get one of these

JTpDI1.jpg
 

cyclotron451

macrumors regular
Mar 16, 2005
220
1
Europe
Liquid Nitrogen

The LN2 attack involves cooling the MBA rapidly down to minus 321 farenheit and allows to preserve the RAM contents for quite some time, potentially allowing the whole-disk-encryption key recovery from RAM, even in a powered off MBA.

The SSD on the MBA, being an SSD, never actually quite deletes data, the trim algorithm presumably keeps writing the whole-disk-encryption key all over the place, such that even a NIST military 'data destruction' overwrite on the SSD isn't actually guaranteed to overwrite your sensitive stuff.

Some Three letter Acronym organisations glue/seal items to block USB & other ports for their staff devices. (a 'cheap' Apple A1305 or similar DVI adapter could have the bare TB connector removed and superglued into the port, I wouldn't do anything more aggressive than that to an Apple MB/MBA)

Machines that are über-protected in any of these ways are easily persuaded to reveal their contents via social engineering = targeted Phish APT or by essential system upgrade components being subverted ( = iTunes upgrades allegedly used by FinFisher in the past) or by generic *.* Certificate Authority SSL certificates (which are still in use for Enterprise and National security means)

The various whole disk encryption schemes might be assumed to have essential third-party maintenance access capabilities anyway.

The sound that your keyboard makes when you type your decrypt passwd can be used to 'guess' it, likewise many keyboards radiate sufficient RF for the keypresses to be scanned from a short distance (I've seen reading at three floors distance in a hotel! - with around $1K of Ettus products used)

It's best to have a vanilla machine , use it normally and store your secrets in a safe! (or saran-wrap covered 64GB microSD card retained in your mouth)

For realistic data security you have to assume your opponents are already in your system, so use multiple independent elements of security.

There are some situations where these 'paranoid' levels of security are necessary - journalism comes to mind in some countries, but on the whole I do trust my national authorities with all of my data.

Ross Anderson has another 600 pages on the subject here Cambridge UK
 

marvin4653

macrumors regular
Jun 11, 2012
109
5
Wasn't the FireWire/Thunderbolt DMA vector patched in 10.7.2 for all states except when a user is actively logged in (i.e. the attack isn't possible if the computer is idle with a screensaver and password prompt, or sleeping with a password prompt on wake)?

http://support.apple.com/kb/HT5002
 

mizzouxc

macrumors member
Apr 12, 2010
85
0
Someone could hack you via your Internet connection. You should maybe jut not use computers.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.