Quote:
Originally Posted by PB PM
Nope, the password is stored in the T2 security chip,
|
It
was. This feature wipes the key.
Quote:
Originally Posted by PB PM
if they can use the crack they have your password to decrypt the disk. Keep in mind I’m talking about a situation where someone trades in a machine with an active user account, not one that has been deleted.
|
Huh? I thought we were talking about a new Monterey feature?
Quote:
Originally Posted by PB PM
Even if it is deleted do we know for sure that the T2 forgot that password? Do we really trust firmware writers to make perfect code?
|
No, but by the same token, you can't trust that code that writes zeroes actually writes zeroes.
Quote:
Originally Posted by PB PM
As for writing zeros, it’s still a must. Why do you think vendors that sell self encrypting SSDs, which most non entry level drives have, still provide a secure erase function with their software (yes, I know not for Macs because Apple is perfect TM)? Because firmware flaws in the drives controller can provide weaknesses, or even the key for the encryption.
|
Plenty of features exist for snake oil reasons.