Low Level Format on Macbook Pro M1

Hi Support,


I've been asked by my company where I work do a low level format on my macbook pro M1.

Is there any way I can safely do this ?


I just want to confirm to, if I just do the factory reset or ordinary format my SSD on my macbook, the data also cannot be restored in any way, correct ?


Thanks

MacBook Air (M1, 2020)

Posted on Jul 5, 2024 12:06 AM

Reply
Question marked as Top-ranking reply

Posted on Jul 5, 2024 11:37 PM

If that Apple Silicon Mac is running Monterey or later, use the “Erase All Contents and Settings” feature mentioned in the Support article.


I don’t think it does a full reformat of all of the flash sectors of the SSD. It probably marks space as available in whatever way involves a minimum of rewriting / reformatting. (Akin to the standard “fast” erase of a hard disk.)


I believe that it would cause the Apple Silicon chip to change the real-time encryption / decryption keys for the internal SSD, thus effectively turning any existing data into so much useless hash, even if someone found a way to read it.


if the company where you work is named CIA or NSA and the computer contains secrets that would be of interest to the successor to the KGB, you might then want to physically destroy the computer & flash chips afterwards. But if the machine uses real-time encryption in the way I think it does, “Erase All Contents and Settings”will make the data as good as gone, as far as any adversary without unlimited resources is concerned.

5 replies
Question marked as Top-ranking reply

Jul 5, 2024 11:37 PM in response to erwinlin

If that Apple Silicon Mac is running Monterey or later, use the “Erase All Contents and Settings” feature mentioned in the Support article.


I don’t think it does a full reformat of all of the flash sectors of the SSD. It probably marks space as available in whatever way involves a minimum of rewriting / reformatting. (Akin to the standard “fast” erase of a hard disk.)


I believe that it would cause the Apple Silicon chip to change the real-time encryption / decryption keys for the internal SSD, thus effectively turning any existing data into so much useless hash, even if someone found a way to read it.


if the company where you work is named CIA or NSA and the computer contains secrets that would be of interest to the successor to the KGB, you might then want to physically destroy the computer & flash chips afterwards. But if the machine uses real-time encryption in the way I think it does, “Erase All Contents and Settings”will make the data as good as gone, as far as any adversary without unlimited resources is concerned.

Jul 6, 2024 7:02 AM in response to erwinlin

If what you need to accomplish is to remove all data, for an SSD drive, ERASE will work nicely. Simple data blocks are re-grouped into SuperBlocks are their block numbers randomized, and the SuperBlocks are pre-erased to accept new data. Blocks can not be written unless they have been pre-erased, so the "resting" state of an SSD drive is all unused blocks erased.


Re-writing all data blocks on an SSD drive only shortens its life, it does not improve the thoroughness of data erasure in the slightest.


-------

For a rotating magnetic drive, only the directory is actually over-written during a quick erase, and since the block numbers are static, 'recovering' some deleted data can sometimes be done with simple aftermarket utilities.


Rotating magnetic drive data blocks are typically overwritten directly by new data, in one pass without an intervening erase, so the 'resting' state of Rotating magnetic drive is unused blocks likely contain stale data and their block numbers are on the Volume's FreeList to be written over when needed to new data.


This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

Low Level Format on Macbook Pro M1

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.