Forensics can now easily gain a FileVault encryption key, takes 40 minutes regardless of password length
I found this PDF online. This is very scary. Passware appears to claim to be able to do this.
Here are some relevant links (Feb 2012)
http://www.lostpassword.com/pdf/pr-120201.pdf
http://reviews.cnet.com/8301-13727_7-57369983-263/filevault-2-easily-decrypted-w arns-passware/
This basically means the computer forensics can now easily gain a FileVault encryption key from the target computer's memory.
This too is very alarming:
Passware has been actively tackling various encryption technologies such as BitLocker, TrueCrypt, and FileVault, and says its latest Passware Kit Forensic 11.3 software can extract encryption keys for all of these technologies. In addition to extracting FileVault keys, Passware can also extract passwords from encrypted keychain files and recover log-in passwords for user accounts.
Anyone care to comment?
iMac, Mac OS X (10.7.4), iMac 2006 10.6.8, Mac mini 10.7.4