Hacker News new | past | comments | ask | show | jobs | submit login

I'm curious about Macs. If I have Firmware Password and FileVault enabled, is it same FBI-proof as iPhone? Does T1 and T2 chips or absent Tx chip (older Macs) make difference? Is storing FileVault unlock key in iCloud makes difference?



I’m not sure how FileVault is implemented, but so long as your key is derived solely from your passphrase and not stored outside your brain (iCloud can be subpoenaed) the strength of your encryption should be proportional to the strength of your passphrase. Computers have less of a reason to use the baked-in CPU or security chip data in deriving the encryption key because longer passwords are more feasible on a laptop than a phone, so brute force attacks are already not likely to succeed.

The only difference I can think of is the ease of an offline brute force attack due to the fact that you can remove a hard drive somewhat easily and then image it and use an entire datacenter’s power at attacking the passphrase. But a strong passphrase (note, not a password) stored only in your head should be quite secure.


FileVault 2 Recovery key is 120 bit, I guess not feasible to bruteforce? Actual low level key is 256-bit XTS-AES. Still unsure what is the process of converting typed login password to low level key.


T1 no, T2 yes. Because T2+NAND as a combined setup does the same as the SE in iOS devices. Heck, it basically runs iOS.


> T1 no

No meaning not proof? Say I FileVault my drive and elect not to store my Recovery Key in iCloud, but write it down. Drive should be FBI safe. No?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: