https://forums.macrumors.com/conversations/secure-erase-question.814314/
Check the last post, you could ask that poster as he is one of the few here that will take the time to help. He wrote that the issue was patched in OS Lion 10.7.2
Also check out
https://security.stackexchange.com/...levault-2-while-the-computer-is-in-sleep-mode
This information posted there:
Apparently FileVault 2 is secure against a
DMA Attack if the screen isn't unlocked, since 10.7.2 (so make sure you're running Lion). My guess is that on sleep the keys are encrypted with your password, rather than just left in memory.
I'm assuming that it also means it is protected against a
Cold Boot Attack too.
The only sources I could find on it is this
blog post.
And this:
In older versions of Mac OS X, an attacker with physical access to the machine could plug in via Firewire (or Thunderbolt) and use DMA attacks to gain access to memory. This would
let the attacker slurp out your password and thus defeat FileVault 2's protection. However, this vulnerability was
fixed in Mac OS X 10.7.2.
Later versions of Mac OS X have largely eliminated this vulnerability. The attack is still possible if a user is logged in and the machine is unlocked. However, when the screen lock kicks in, the OS enables extra protections that prevent this attack.
References:
- "OS X Lion disables DMA when the user is logged out/screen is locked. Attacking will only work while the user is logged in, or if user switching is enabled. The user switching trick only works for versions before 10.7.2, where the vulnerability is patched." http://www.breaknenter.org/projects/inception/
Also, setting a firmware (pre-boot) password
may help.