Did your sister find any adult material that would have put you or her in an uncomfortable situation?this is same reason i didnt sell my laptop a year or 2 ago. instead just gave it to my sis.
Did your sister find any adult material that would have put you or her in an uncomfortable situation?this is same reason i didnt sell my laptop a year or 2 ago. instead just gave it to my sis.
As many has pointed out the default option for macOS the last I think almost 10 years is that FileVault is on if you have T2 chip (and also M-series), but you can opt out. T2 and M-chips includes hardware AES-256 en–/decryption, so it is done without using any CPU, but initially after OS install it takes some time before everything is encrypted.I really only remember that before selling I wanted to format it (obviously) and I remember going into recovery mode and seeing the utilities menu, then I remember waiting a long time for the Mac to install, and then the screenshot I posted came up.
I didn't delete that file you mention, so I understand that before I did the reinstall, I erased the disk, only now I don't remember exactly since it's been a year.
I also remember I followed a tutorial for that. (I'm a Windows user)
No, as mentioned earlier in the thread, data on T2 and Apple Silicon Mac internal disks is always encrypted, even if the user has not enabled FileVault. There is no delay in encrypting when enabling FileVault because all the computer is doing is requiring a key to unlock that disk rather than the Secure Enclave unlocking it automatically.As many has pointed out the default option for macOS the last I think almost 10 years is that FileVault is on if you have T2 chip (and also M-series), but you can opt out. T2 and M-chips includes hardware AES-256 en–/decryption, so it is done without using any CPU, but initially after OS install it takes some time before everything is encrypted.
If someone is very motivated, they can recover some degree of data from a drive even if it has been formatted. For this reason, I don’t sell anything that includes the drive I used. I smash the drive to death with a hammer and recycle the remains. Yes, I’m on the bleeding edge of data security and I have zero regrets.
By default, the data is encrypted. You can disable this but you'd remember doing it. So it simply does not matter one bit if you formatted the disk or not or if the data was overwritten. It is a non-issue.Before selling it I remember that I formatted it,
Your paranoia is healthy and prevents you from making mistakes in the future. Hopefully nothing will happen but next time use filevault to encrypt your drive and encrypt time machine as well.I am already calm.
Worse is when last year I went to a cyber and logged in with my Google account. Nothing happened either.
Bad paranoia, it doesn't let me live.
I wish I had known about all this security stuff.
Thank you. How does this additional layer of security play in, when it comes to restoring data, which is already encrypted? Is it another password than the log in password or iCloud password?No, it doesn't encrypt again. It only encrypts the key and only takes seconds for it to turn on for T2 / Apple Silicon Macs (compared to before, when it took time to encrypt the entire drive). With the key being encrypted, it adds an additional layer of security by requiring the password to decrypt the key, which is then used to decrypt your data.
Correct, basically, Erase All Content and Settings deletes the “Data” volume, which houses the user (accounts) data. As part of that removal process:This. "Erase all contents and settings" erases the drive encryption key from the secure enclave, which makes it impossible to decrypt the drive contents. Macs that are lost/stolen and connected to iCloud can be remote-wiped.
Apple said:When deleting a volume, its volume encryption key is securely deleted by the Secure Enclave. This helps prevent future access with this key even by the Secure Enclave. In addition, all volume encryption keys are wrapped with a media key. The media key doesn’t provide additional confidentiality of data; instead, it’s designed to enable swift and secure deletion of data because without it decryption is impossible.
And the UID:Apple said:If FileVault isn’t turned on in a Mac with Apple silicon or a Mac with the T2 chip during the initial Setup Assistant process, the volume is still encrypted but the volume encryption key is protected only by the hardware UID in the Secure Enclave.
Apple said:The Secure Enclave includes a unique ID (UID) root cryptographic key. The UID is unique to each individual device and isn’t related to any other identifier on the device.
A randomly generated UID is fused into the SoC at manufacturing time. Starting with A9 SoCs, the UID is generated by the Secure Enclave TRNG during manufacturing and written to the fuses using a software process that runs entirely in the Secure Enclave. This process protects the UID from being visible outside the device during manufacturing and therefore isn’t available for access or storage by Apple or any of its suppliers.
One major concern was when an iPad died, I took it in to the Apple Store, they confirmed it was toast and offered a replacement via applecare. But as mr Geniusman is taking the dead one, I ask him if there's ANY chance that SSD gets disassembled in China and its contents looked at. He replies "probably not", and I'm like yea but if you're wrong, I am absolutely going to prison. At this point I have to explain what ITAR is because the look on their faces tells me they're alarmed that I'm the worst kind of pervert. I asked if there was a way we can ensure the dead ipad is processed without ever leaving the US, and they just taped a little note on it that said "USA" to get me out of there lol. I walked out feeling somewhat relieved they only thought of me as a sex offender instead of as a guy who worked on those kind of weapons, a realization that led to the end of that kind of work.
Apple said:sepOS uses the UID to protect device-specific secrets. The UID allows data to be cryptographically tied to a particular device. For example, the key hierarchy protecting the file system includes the UID, so if the internal SSD storage is physically moved from one device to another, the files are inaccessible.
Enabling FileVault doesn’t re-encrypt the volume. Instead, it rewraps the (“Data”) volume encryption key (VEK) with a new media key generated also on the account password.Is File Vault removed from Si Macs, since the data is encrypted anyway?
It's still there and I just saw it is even disabled, but my drive is formatted APFS (encrypted). Must be because I am using an external drive that was formatted encrypted before. On my MBP with internal boot drive it's turned on and I can't remember doing that on purpose.
When I turn it on, there are those options, but I don't think it will encrypt the whole 2.2TB data again.
Nowadays… Social engineering is much more effective (and thus far more popular).If some one is going to invest time and money going lengths to recover encryption keys, if it is even possible. And then decrypt, the target has to be high value. If you are high value target, mac encryption is least of your problems.
This is what I imagine it's like to get your draft thesis back from a generous advisor.Foremost, the nature of how SSDs function ...
Depends, How much do you really trust your sister?this is same reason i didnt sell my laptop a year or 2 ago. instead just gave it to my sis.
That sounds like a very different situation. Thanks for clarifying.
The Mac was even delisted from Addigy and the OS was reinstalled. It wasn't a personal Mac but a company's computer and the ticket went through several teams before it was recovered. The only instance where it was a personal computer in question I can think of is from 2013 and I'm sure a lot has changed during that time, but back then there were apps to recover the 'lost files'.
Still, if I was the OP I wouldn't worry about it.
Exactly. It's a different situation.A company computer would likely have the drive's decryption keys stored by the company and cloud backups also accessible by the company.
Though hopefully you wouldn't ever know that you lived next door to a spy agency.I think the chances of you selling your Mac to someone with these "special programs" is ridiculously low, unless you live in a hotbed of cybercrime or right next door to a spy agency or something.
Not really possible or a good idea on an SSD. And not relevant to newer Macs anyway.But now that I've been trained in security and I've seen that the best thing to do is to overwrite the left space data
To write non-zero values to a block, the entire block must be zeroed out. It doesn't always happen right away. Trim just tells the drive it can do it. But it's not relevant to newer Macs.I've read that if it's an Apple ssd, the Trim feature fills the empty space with zeros, so there wouldn't be a problem, but I CAN'T CONFIRM IT, I've read it here:
Even if FileVault is turned off, the disk is encrypted.Your data was encrypted. At least that's standard setting for some years now
It isn't once the Mac has been wiped with the option intended to do that.But it's still possible to recover the data on the disk even after formatting it and reinstalling the OS
Not possible once the Mac is wiped, since the keys are lost.If FileVault is not enabled they can create a new admin account / change the password and through that they could reset the user password as well.
It's impossible in most practical senseTheoretically if some one can recover your encryption keys and then decrypt the drive to recover. After T2 chips and Apple silicon, it’s probably not something you can do it in practice. It’s not impossible but very hard to do.
It just re-encrypts the underlying real encryption key.When I turn it on, there are those options, but I don't think it will encrypt the whole 2.2TB data again.
Your internal drive is overall vastly more secure than your external ones, but whatever you like.I never ever use the internal drives for security reasons
As others have pointed out, the odds of that are super low. Even disregarding for a moment the Secure Enclave and FileVault encryption, remember also that every moment the machine is on and running decreases the (already remote) possibility of anything being recovered from it. Why? Because stuff is constantly being written to disk, overwriting any latent deleted data. That could happen with cache files or virtual memory, all stuff generated in the course of normal operation.Before selling it I remember that I formatted it, (I have a screenshot I had taken, I hope that's what it is)
But now that I've been trained in security and I've seen that the best thing to do is to overwrite the left space data, I've become paranoid and I don't want to sell any more equipment, but I've already sold it and I'm afraid that someone might recover the data with special programs. (I had work documentation)
It's a good thing family members never sell or regift computers?this is same reason i didnt sell my laptop a year or 2 ago. instead just gave it to my sis.