I would say relying on the user community to beta test software is a problem; there's no accountability. A paid QA department can be hung out to dry for missing bugs such as these.This is why having the user community helping beta test software & OS releases is so important. Also glad to see people using their skills to help improve systems rather than exploitation and wreaking havoc.
using encrypted volumes, mounting them, then unmounting, then mounting them.
But we need to have animated emoji faces...
Yeah, Apple should have just put in a larger SSD and kept the hard drive separate. That's how I have my MacBook Pro's two drives set up - separate.First fusion drives have problems with high Sierra, a cheap hybrid drive that shoulda never been made standard for retina iMacs considering their price tag, NOW this!
So glad I dual boot Sierra and high Sierra (on a smaller partition) on my 13" nTB
I simply don't trust apple thoroughly tests stuff and/or cares
Exactly this. The reason why this could be missed because not many would be doing this and this is not a normal behaviour of an average consumer usage. And for those who mentioned that the QA testers are bad, do you even unmount, mount, unmount then mount your APFS container on a standard basis?
That whole application is one huge bug.To be clear, the linked Twitter thread suggests that this is a Disk Utility bug
Yeah, Apple should have just put in a larger SSD and kept the hard drive separate. That's how I have my MacBook Pro's two drives set up - separate.
Yeah because the engineers that took a couple of hours to skin an authentication framework are the same ones working on Disk Utility. Great critical thinking there, champ.
This is why having the user community helping beta test software & OS releases is so important. Also glad to see people using their skills to help improve systems rather than exploitation and wreaking havoc.
This is clearly not merely a bug in Disk Utility itself - if a password is encrypted, then NO PROGRAM CAN EVER DISPLAY IT - all you can do is encrypt a user given password and compare to see if the encrypted versions match. The fact that Disk Utility COULD show the password means it was NOT ENCRYPTED. (Or else stored somewhere, or the NSA demanded a back door or something.)
Disk Utility has actually revealed a core security issue here!
Yeah because the engineers that took a couple of hours to skin an authentication framework are the same ones working on Disk Utility. Great critical thinking there, champ.