Apple FileVault 2 Encryption Cracked by Forensic Software

John E Dunn for Macworld on a new “forensic” piece of software that can crack into Apple’s FileVault 2 encrypted systems: >Put another way, the product cannot extract encryption keys on static data or before the keys have been summoned as part of the logging-in process. As long as the login is not automatic users…

John E Dunn for Macworld on a new “forensic” piece of software that can crack into Apple’s FileVault 2 encrypted systems:
>Put another way, the product cannot extract encryption keys on static data or before the keys have been summoned as part of the logging-in process. As long as the login is not automatic users should be safe.

>In the case of FireVault, hackers also need to get to the memory contents through a working FireWire port so remote access is not possible.

I am guessing that a locked screen will still count as “logged in”. So if traveling it might actually be a fantastic idea to actually turn your laptop off so that this software cannot be used to hack into it.

One other interesting thing is that FireWire must be used. I am assuming you could use Thunderbolt to get a FireWire port, but what about on my 2010 MacBook Air that has only USB?

**Update**: [Thomas Brand](http://eggfreckles.net/) chimed in to confirm my suspicions about Thunderbolt:

and:

This website makes use of affiliate links whenever possible, these links may earn the site money by clicking them.


Discover more from The Brooks Review

Subscribe to get the latest posts sent to your email.