Curious if anyone has come across the answer to this or is willing to try a scenario to test. Given the way the T2 chip in the 2018 MBP machines (and iMac Pro) works with encryption, I am trying to figure out how capturing an image and moving it to another machine, or using bootable images may work.
The way I understand it currently, if your machine is encrypted and has a T2 chip, in addition to your password the T2 chip also generates and stores a separate unique key specific to that set of encrypted data. Would this not mean that if you block copy the encrypted storage you would not be able to boot this copy on any other machine? Further, if you make a bootable image of a T2 encrypted drive, then erase the drive the image was taken from, and try to restore the image (to the internal storage) and boot again, it would not work as the key the T2 chip stores would have been lost?
Does this make sense?
The way I understand it currently, if your machine is encrypted and has a T2 chip, in addition to your password the T2 chip also generates and stores a separate unique key specific to that set of encrypted data. Would this not mean that if you block copy the encrypted storage you would not be able to boot this copy on any other machine? Further, if you make a bootable image of a T2 encrypted drive, then erase the drive the image was taken from, and try to restore the image (to the internal storage) and boot again, it would not work as the key the T2 chip stores would have been lost?
Does this make sense?