Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Ok, had to reboot in Ventura to look at the version as Safari was not shown in Ventura partition when booted in Sequoia. Same goes when booted in Ventura, no trace of Safari in /Applications looking at the Sequoia partition!!! Weird!

Anyway, Safari is 18.1.1 in Ventura so, yes, latest version supported.

That's good to know. Thank you.
 
  • Like
Reactions: Patrice Brousseau
Did that on my one Creedence cryptex. It has now gone from Disk Utility. I have not yet done a restart.

But the trustd process running under user _trustd crashed when I did the erase. A snippet from the crash report:
Exception Type: EXC_BAD_ACCESS (SIGBUS)
Exception Codes: KERN_MEMORY_ERROR at 0x00000001034064dc
Exception Codes: 0x000000000000000a, 0x00000001034064dc

Termination Reason: Namespace SIGNAL, Code 10 Bus error: 10
Terminating Process: exc handler [846]

That is potentially worrying, but may tie in with intermittently having similar crashes byhelpd.

Interesting.

As long as it only crashed that one single time, it should be ok. Did you do it from your standard (admin) account or also from root?
 
  • Like
Reactions: Patrice Brousseau
Ok, had to reboot in Ventura to look at the version as Safari was not shown in Ventura partition when booted in Sequoia. Same goes when booted in Ventura, no trace of Safari in /Applications looking at the Sequoia partition!!! Weird!

Anyway, Safari is 18.1.1 in Ventura so, yes, latest version supported.

That's good to know. Thank you.

There is already an 18.2 beta for Ventura , although there is no Technology preview for Ventura anymore what ist also on 18.2 now. I think the support will stop for Safari 19 then. It's always after two new versions.

Screen Shot 2024-12-01 at 04.17.42.png


But any other browser can be used much longer with recent updates. The Orion browser is almost a clone of Safari, just with more functions. It supports Firefox and Chrome extensions at the same time and still has support for Big Sur and it is also available for iOS.

 
Last edited:
  • Like
Reactions: Patrice Brousseau
There is already an 18.2 beta for Ventura , although there is no Technology preview for Ventura anymore what ist also on 18.2 now. I think the support will stop for Safari 19 then. It's always after two new versions.

View attachment 2457571

But any other browser can be used much longer with recent updates. The Orion browser is almost a clone of Safari, just with more functions. It supports Firefox and Chrome extensions at the same time and still has support forBig Sur and it is also available for iOS.

Thank you for the info. I don't mind going back to Sonoma or Ventura even, as long as I can get the current version of Safari. My son keeps telling me to use Firefox. He hasn't used Safari for years. I do use DuckDuckGo on a couple of sites that just won't work with Safari.
 
Yesterday there were two APFS partitions mounted with a very short name, I can't remember, but nothing with cryptex.
Also only visible in Disk Utiity. But I could just eject them and they were gone then, even after a reboot. But something seems to be still going on there. Very strange. I think it's still the same bug that caused this.
 
  • Like
Reactions: Patrice Brousseau
Login to root account
Disk Utility
Show in Finder (right click on the cryptex-drive)
Show enclosing folder (right click on the path bar at the bottom that maybe has to be unhidden in the view menu)
Erase Disk to FAT MS DOS (right click in Finder on the cryptex-drive in that folder)
And always deleted everything that was in those folders, when the drives were gone after formatting.
Did that on my one Creedence cryptex. It has now gone from Disk Utility. I have not yet done a restart.
This is just to report back. I did the process described by @Adora last Saturday. I have since done 2 restarts.

There continues to be no sign of the Creedence cryptex in Disk Utility. (I never had it on the Desktop.)

Under /System/Library/AssetsV2/com_apple_MobileAsset_PKITrustStore/purpose_auto/6dd55b0d06633a00de6f57ccb910a66a5ba2409a.asset I now have normal folder structure with no mount points.

But the cryptex is still there as an unmounted .dmg. /System/Library/AssetsV2/com_apple_MobileAsset_PKITrustStore/purpose_auto/6dd55b0d06633a00de6f57ccb910a66a5ba2409a.asset/AssetData/Restore/SECUREPKITRUSTSTOREASSETS_SECUREPKITRUSTSTORE_Cryptex.dmg
I am not touching that!

So, for me with just the one cryptex, this is a success in getting rid of it from Disk Utility - even if I don't fully understand why it worked!
 
  • Like
Reactions: Adora
Just for fun I tried to activate Apple Intelligence for a few times again on my external boot drive. It downloads but doesn't really stop at 100%, the wheel is still turning. Now while I am writing this it stopped and everything is normal.
At least it's always hanging since I deleted the cryptexes.

Just out of curiosity I will try now that Terminal command again that let me activate it. Maybe it really caused them to mount.

Code:
curl -L https://raw.githubusercontent.com/Kyle-Ye/XcodeLLMEligible/release/0.2/scripts/override.sh | bash -s -- install override xcodellm+greymatter+strontium

So, I just did it and they are not there again. Not sure what this is doing. But I turn off Intelligence anyway again.


Bash:
curl -L https://raw.githubusercontent.com/Kyle-Ye/XcodeLLMEligible/release/0.2/scripts/override.sh | bash -s -- install override xcodellm+greymatter+strontium
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100 11716  100 11716    0     0   3139      0  0:00:03  0:00:03 --:--:--  3140
Performing with [action]=install [method]=override [key]=xcodellm+greymatter+strontium
[install] started
[download_file] Download started
[download_file] Downloading from https://github.com/Kyle-Ye/XcodeLLMEligible/releases/download/0.2.0/xcodellm+greymatter+strontium.eligibility_overrides.data to /tmp/eligibility_overrides.data
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0
100   679  100   679    0     0    550      0  0:00:01  0:00:01 --:--:-- 15790
[download_file] Download completed
[method_override] Copying eligibility_overrides.data to each Daemon Container...
Password:
[method_override] Copying for container 0A6F0F2C-9517-4AAF-AF75-AA4F41F52185
[method_override] Copied to /private/var/root/Library/Daemon Containers/0A6F0F2C-9517-4AAF-AF75-AA4F41F52185/Data/Library/Caches/NeverRestore/
[method_override] Copying for container 28DDBEFA-04E3-4058-A84D-08C90EEB7241
[method_override] Copied to /private/var/root/Library/Daemon Containers/28DDBEFA-04E3-4058-A84D-08C90EEB7241/Data/Library/Caches/NeverRestore/
[method_override] Copying for container 4470B5D2-117E-4FAD-AD32-85343984EEA0
[method_override] Copied to /private/var/root/Library/Daemon Containers/4470B5D2-117E-4FAD-AD32-85343984EEA0/Data/Library/Caches/NeverRestore/
[method_override] Copying for container 484570F5-394D-485A-8131-D0ED8264C5BD
[method_override] Copied to /private/var/root/Library/Daemon Containers/484570F5-394D-485A-8131-D0ED8264C5BD/Data/Library/Caches/NeverRestore/
[method_override] Copying for container 52C69C76-1421-4196-83FA-F09DC59581FB
[method_override] Copied to /private/var/root/Library/Daemon Containers/52C69C76-1421-4196-83FA-F09DC59581FB/Data/Library/Caches/NeverRestore/
[method_override] Copying for container 6A6D2F94-3D5E-4226-9AA5-0CD9F417B733
[method_override] Copied to /private/var/root/Library/Daemon Containers/6A6D2F94-3D5E-4226-9AA5-0CD9F417B733/Data/Library/Caches/NeverRestore/
[method_override] Copying for container 73CA7CE0-77D1-4361-8D9D-9C318E3AF920
[method_override] Copied to /private/var/root/Library/Daemon Containers/73CA7CE0-77D1-4361-8D9D-9C318E3AF920/Data/Library/Caches/NeverRestore/
[method_override] Copying for container 7DF35021-FFC5-4513-85A4-4F1C7669382C
[method_override] Copied to /private/var/root/Library/Daemon Containers/7DF35021-FFC5-4513-85A4-4F1C7669382C/Data/Library/Caches/NeverRestore/
[method_override] Copying for container DE5C4839-F59A-4C1F-87DB-1B3F8137BADD
[method_override] Copied to /private/var/root/Library/Daemon Containers/DE5C4839-F59A-4C1F-87DB-1B3F8137BADD/Data/Library/Caches/NeverRestore/
[method_override] Copying for container E700AC1E-D4FD-43F4-AA59-C6B512DDD1F9
[method_override] Copied to /private/var/root/Library/Daemon Containers/E700AC1E-D4FD-43F4-AA59-C6B512DDD1F9/Data/Library/Caches/NeverRestore/
[method_override] Copying for container E751DECF-6629-4A08-A4EA-576BF64A9008
[method_override] Copied to /private/var/root/Library/Daemon Containers/E751DECF-6629-4A08-A4EA-576BF64A9008/Data/Library/Caches/NeverRestore/
[method_override] killing eligibilityd...
[download_file] Download started
[download_file] Downloading from https://github.com/Kyle-Ye/XcodeLLMEligible/releases/download/0.2.0/eligibility_util_sip to /tmp/eligibility_util_sip
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0
100 1529k  100 1529k    0     0   976k      0  0:00:01  0:00:01 --:--:-- 1492k
[download_file] Download completed
[method_override] Checking the status...
OS_ELIGIBILITY_ANSWER_ELIGIBLE
OS_ELIGIBILITY_ANSWER_ELIGIBLE
OS_ELIGIBILITY_ANSWER_ELIGIBLE
[install] completed
If you find this script helpful, please consider giving a star to the project.
🌟🌟🌟 https://github.com/Kyle-Ye/XcodeLLMEligible 🌟🌟🌟
 
Cryptex volume still there after a full 15.2 install on top of 15.1.1.
Same here, except Disk Utility now has it 5 times (originally only once). Any of them, if mounted, show as an empty 4MB FAT12 disk. They all seem to be /System/Library/AssetsV2/com_apple_MobileAsset_PKITrustStore/purpose_auto/6dd55b0d06633a00de6f57ccb910a66a5ba2409a.asset/AssetData/Restore/SECUREPKITRUSTSTOREASSETS_SECUREPKITRUSTSTORE_Cryptex.dmg

I am doing my best to ignore it/them. :)
 
  • Like
Reactions: Patrice Brousseau
Same here, except Disk Utility now has it 5 times (originally only once). Any of them, if mounted, show as an empty 4MB FAT12 disk. They all seem to be /System/Library/AssetsV2/com_apple_MobileAsset_PKITrustStore/purpose_auto/6dd55b0d06633a00de6f57ccb910a66a5ba2409a.asset/AssetData/Restore/SECUREPKITRUSTSTOREASSETS_SECUREPKITRUSTSTORE_Cryptex.dmg

I am doing my best to ignore it/them. :)
Ignoring « it » too :)
 
  • Like
Reactions: gilby101
Same here, except Disk Utility now has it 5 times (originally only once). Any of them, if mounted, show as an empty 4MB FAT12 disk. They all seem to be /System/Library/AssetsV2/com_apple_MobileAsset_PKITrustStore/purpose_auto/6dd55b0d06633a00de6f57ccb910a66a5ba2409a.asset/AssetData/Restore/SECUREPKITRUSTSTOREASSETS_SECUREPKITRUSTSTORE_Cryptex.dmg

I am doing my best to ignore it/them. :)

I forgot to remove everything else in the folder where one of two new cryptexes I removed were and it now also comes back several times, at first as empty FAT drives, after formatting with APFS I get unformatted Apple disk image Media.

But I am asked to initialize them, only then they are in Disk Utility and they can just be ejected after clicking some error messages away, that they are in use and can't be ejected.

Now I know for sure mine have to do with Apple Intelligence. Because only when I go into its settings those messages appear. Or when I disable and enable it.

Screen Shot 2024-12-17 at 15.32.33.png
 
Last edited:
  • Like
Reactions: Patrice Brousseau
I just turned it on and off again. 🙃

Screen Shot 2024-12-17 at 15.51.29.png


Just noticed they are still in Disk Utility before I click on anything. After clicking on Eject, they are gone.

Screen Shot 2024-12-17 at 15.54.13.png
 
Someone on Apple support forums reported that he/she logged out of iCloud then logged back in… and the cryptex volume(s) disappeared.

I didn’t tried on my Intel system yet…

I'll try that if I see one the next time.


If so, it is not a direct consequence. These mysterious disk images appear on Intel macOS which does not have Apple Intelligence.

Yes, there must be other reasons too. But mine appeared also in the time frame I did this Terminal command to allow Apple Intelligence on an external boot drive.

Now those I had were new ones and only two instead of seven. I went to their folders again and formatted them, but for one I forgot to delete every folder and file in the enclosing folder too and I haven't found it anymore, because there are so many.

I think it happened because I couldn't delete the other stuff without root rights and the other one even only was format-able in the root account.
 
Last edited:
Just got into the system settings of Apple Intelligence and again without doing anything in there:

Screen Shot 2024-12-18 at 03.26.40.png

Screen Shot 2024-12-18 at 03.29.57.png

I logged out of iCloud after that and back in. I'll see if it helps to not get those anymore.

P.S.: Now on 15.3 by the way.
 
Using the new Apple Intelligence object erase function in photos does also create and mount disk images.
 
I had a similar problem. When I searched through some logs, it appears to be because I have two Google Drives on the computer (in Sequoia). The computer also had trouble saving new files that didn't have a location yet, because it was searching for ALL the drives it could save them to, and couldn't mount both Google Drives. This is not entirely confirmed, but this is a reasonable guess, at least in my case.

Here's my evidence, from a log:

device_status_service.cc:344:AddMediaInternal [Media: media_id="A4B97E21-47AA-4E5E-(????)-1F7563C37536" name="Creedence11M6270.SECUREPKITRUSTSTOREASSETS_SECUREPKITRUSTSTORE_Cryptex" file_system="APFS" mount_point(raw)="" device_type="Virtual" device_number=16777232 writable="true"] was removed during addition.

2024-12-30T06:34:05.158ZE [9416:stderr_thread] stderr: 2024-12-29 22:34:05.146 Google Drive[864:9262] HIToolbox: received notification of WindowServer event port death.

2024-12-30T06:34:05.158ZE [9416:stderr_thread] stderr: 2024-12-29 22:34:05.146 Google Drive[864:9262] port matched the WindowServer port created in BindCGSToRunLoop
 
So, I'd had enough and just did it the rough way:

Login to root account
Disk Utility
Show in Finder (right click on the cryptex-drive)
Show enclosing folder (right click on the path bar at the bottom that maybe has to be unhidden in the view menu)
Erase Disk to FAT MS DOS (right click in Finder on the cryptex-drive in that folder)
And always deleted everything that was in those folders, when the drives were gone after formatting.

Did this to all seven, they appeared on the desktop, I ejected them, restarted and they are gone now. Everything is still working. Maybe you don't even need the root account for doing this.
I -- possibly a little too hastily -- attempted this and have run into quite a mess since macOS 15.2..

I now have 4 x Ex-FAT-formatted 4.1MB disk images (each with 4MB free space), all renamed as "MYSTERYDISK" and none of which can be removed, only ejected. They all appear on the desktop every time I launch macOS. And of course they are also visible in Disk Utility.

Once ejected they will not return until I reboot the device but I dual boot Windows 11 and macOS 15.3.1 (as of today) so they come back every time I switch into macOS.

Due to the images now being in the Ex-FAT format, I cannot revert them to the previous "Creedence11M6270.SECUREPKITRUSTSTOREASSETS_SECUREPKITRUSTSTORE_Cryptex" name and the original disk format. They also show up in safe mode and under another user account on the same device.

Following various flawed points of online advice I have uninstalled OCLP, reinstalled OCLP, logged out of iCloud, logged back into iCloud...nothing will get rid of them.

Has anybody made any progress on this issue? Any ideas on how to resolve it?
 

Attachments

  • Screenshot 2025-02-20 at 20.08.54.png
    Screenshot 2025-02-20 at 20.08.54.png
    325.2 KB · Views: 34
I -- possibly a little too hastily -- attempted this and have run into quite a mess since macOS 15.2..

I now have 4 x Ex-FAT-formatted 4.1MB disk images (each with 4MB free space), all renamed as "MYSTERYDISK" and none of which can be removed, only ejected. They all appear on the desktop every time I launch macOS. And of course they are also visible in Disk Utility.

Once ejected they will not return until I reboot the device but I dual boot Windows 11 and macOS 15.3.1 (as of today) so they come back every time I switch into macOS.

Due to the images now being in the Ex-FAT format, I cannot revert them to the previous "Creedence11M6270.SECUREPKITRUSTSTOREASSETS_SECUREPKITRUSTSTORE_Cryptex" name and the original disk format. They also show up in safe mode and under another user account on the same device.

Following various flawed points of online advice I have uninstalled OCLP, reinstalled OCLP, logged out of iCloud, logged back into iCloud...nothing will get rid of them.

Has anybody made any progress on this issue? Any ideas on how to resolve it?


I have no solution for the coming back FAT-Drives. I also have one on my iMac. But the three others are gone, I just deleted them and everything else in the folder where they were located. One I missed somehow.

I will do a clean install on my iMac soon and hope they don't come back. I already did this on my new Mini when 15.3 still was in beta and did not use the Migration Assistant.
I just copied the things I needed over via Network in Finder or from a backup drive and until now, I never saw anything in Disk Utility again.
 
I have no solution for the coming back FAT-Drives. I also have one on my iMac. But the three others are gone, I just deleted them and everything else in the folder where they were located. One I missed somehow.

I will do a clean install on my iMac soon and hope they don't come back. I already did this on my new Mini when 15.3 still was in beta and did not use the Migration Assistant.
I just copied the things I needed over via Network in Finder or from a backup drive and until now, I never saw anything in Disk Utility again.
I bought a new iMac and copied everything over from Time Machine. No weird disks. Disk Utility was as expected. Erased the new iMac and did another restore from Time Machine. No issues here either.
 
  • Like
Reactions: Adora
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.