Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

How Secure is FileVault?

If I use FileVault, and someone gets my computer, can they get into my files by using the Reset Password utility on the Mac OS X installation DVD?

iMac6,1 (Late 2006 iMac Intel), 3 GB RAM, 2.33 GHz Processor, 2 TB internal HD, Mac OS X (10.5.8), Minor GUI mods, a lot of stuff connected with FireWire or USB

Posted on Apr 18, 2012 8:53 PM

Reply
22 replies

Apr 19, 2012 8:28 PM in response to Mac OS 9000

The location of the Master Password info is not a secret - it is stored on a special keychain in the main HD Library:


HD>Library>Keychains>FileVaultMaster.keychain


You don't need root privileges to look into that file, but it is useless to do so - the Master Password information stored there is itself very securely encrypted, and a login password or root password will not decrypt it. You could Trash that keychain file, and the system would then let you set up a new Master Password and create a new FileVaultMaster.keychain file. BUT - that wouldn't help you either! Such a new Master Password does not work on pre-existing FileVault accounts, only on accounts that had FileVault turned on after the creation of the new Master Password.

Apr 21, 2012 1:40 AM in response to jsd2

This is interesting... but the OS must be accessing the master password file somehow. It just seems like it would be hackable if it's just being encrypted the same way every time. Or someone could modify the system to make it open the FileVault for them? Well, it already seems very tough to do any of that. I guess it can be considered very unlikely that it would be hacked unless some real professionals are after the data.

jsd2 wrote:


The location of the Master Password info is not a secret - it is stored on a special keychain in the main HD Library:


HD>Library>Keychains>FileVaultMaster.keychain


You don't need root privileges to look into that file, but it is useless to do so - the Master Password information stored there is itself very securely encrypted, and a login password or root password will not decrypt it. You could Trash that keychain file, and the system would then let you set up a new Master Password and create a new FileVaultMaster.keychain file. BUT - that wouldn't help you either! Such a new Master Password does not work on pre-existing FileVault accounts, only on accounts that had FileVault turned on after the creation of the new Master Password.

Apr 21, 2012 8:02 AM in response to Mac OS 9000

I believe that File Vault is very secure, but there is one aspect no-one has yet mentioned - you should also make sure that "Use secure virtual memory" is checked in the Security pane of System Preferences. If you don't, and OS X starts using swap files while you're in FV (which is what happens if there isn't enough free RAM) then your data is scattered over your HD unencrypted. Checking that option means that any swap files are encrypted the same way as any other component of your Home folder.

Jul 9, 2012 4:07 AM in response to Rudolfensis

I've googled that, and VileFault in general.


Apparently there is a hole in 10.7.3 that allows the password for older FV accounts (where the FV has been logged into since upgrade) to be read in plain text by other admin Users on a computer with startup privileges, who can access a certain system log file. It's NOT a general weakness in FV for people who haven't upgraded to OS 10.7.3


Also, VileFault claims to be able to decrypt OS X .dmg files. Considering that one of their two methods is a brute force "dictionary attack", and the other involves enabling .dmg files to be read by other platforms where the password is known, it doesn't sound like a general hole in security.


So I would question "easily".

Mar 14, 2016 1:55 AM in response to Mac OS 9000

FileVault doesn't seem to be secure at all if someone is willing to erase or reformat the volume and then run a recovery app.

Anyone serious about accessing your data would surely try this, once they were unable to provide the FV password.


I've been thinking of using FV on several external drives as well as my internal.

A few hours ago I took an external drive that had previously been wiped and erased it in Disk Utility.


I encrypted it in Finder and entered a password.

I ejected and unplugged the drive, then re-mounted it.

I entered my password to unlock it.

Then I copied a 280 GB video to it.

I ejected and re-mounted the volume, ignoring the password request.

In DU I erased the drive.


I ran two recovery apps for about 15 minutes each, both quickly found the video, and one was able to play it back perfectly while still scanning for deleted files. The other can't preview recovered files larger than 20 MB, so I stopped it. But the file size was correct, so I'm sure the entire video was recovered.


Maybe FileVault should be called FailVault.



OS X 10.11.3

How Secure is FileVault?

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.