Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
MacLockPick

Eeek!!!

Apple you better do something about this!

I do not care if its only for law enforcement only, it happens often that their **** gets stolen each year anyways.

Note that the computer has to be booted up (and presumably, logged on with the owner's password) in order to run the program and extract the data.

Nothing in the description says that it will function on a Mac that has been shut down, unless you already know the login password...

So, if that's true, then what they are saying is:
"If you leave your machine logged on your account, then your files, including your keychain and settings files, are visible and can be copied."
This is not a surprise. OSX's vaunted security means nothing - nada - zilch when the snooper has physical access to the machine and the password.
In fact, anyone with physical access to the machine and boot OSX CDs can change the main user password.
 
I read this and wasn't completely sure what it needed in order to copy data successfully. Does it need to be logged in to an account? What if the screen saver is on and password protected?
 
I read this and wasn't completely sure what it needed in order to copy data successfully. Does it need to be logged in to an account? What if the screen saver is on and password protected?

SubRosaSoft are ambiguous on this aren't they? All the site says is the machine has to be on or sleeping. Presumably that means logged in but the details are vague.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.