Security of trash on SSD with APFS

I have a MacBook Pro with touch bar, I wanted to know how secure the trash can is with the new APFS and file Vailt 2 enabled. I have read somewhere that TRIM or Garbage controller means files deleted on an SSD are not able to be recovered by even the best software. What security functions does Mac OS High Sierra have on an SSD touch bar Mac? Does TRIM or garbage controller exist on these macs? Does file vault 2 encrypt deleted data? How does this work now secure erase has been removed.

Posted on Jan 9, 2018 12:36 AM

Reply
Question marked as Top-ranking reply

Posted on Jan 9, 2018 3:39 PM

You had a lot of questions, all of which led to the same answer. APFS uses encryption by default. Installing macOS High Sierra on a Mac with all-flash storage (in other words, not a hard disk, not a Fusion Drive, but all flash and nothing else) then there is no need to do anything else. macOS already performs all of the housekeeping minutia necessary for using flash storage to its maximum performance and lifespan. Security is a fundamental component of it.


Does TRIM or garbage controller exist on these macs?


Yes, it has to, and there is nothing you can do about it anyway.


Does file vault 2 encrypt deleted data?


It encrypts the entire storage device. Trash, deleted Trash, all of it. It's encrypted from cradle to grave and everything in between... the only correct way to handle secure data.


When do secure files become secure anyway? The moment you decide to throw it away? An hour before? A minute after? Last Wednesday? When exactly? The answer should be obvious. Before you "secure" them, many non-"secure" files and copies of files are created in the normal course of working with them. What's worse is that multiple redundant copies are normally stored in sectors of a hard disk totally inaccessible to the operating system. If they weren't secure then, they can't be secured now. That's even more the case with flash—because of TRIM.


How does this work now secure erase has been removed.


Taken to its literal extreme, "secure erase" was never capable of doing everything its name implied even with magnetic media. The advent of flash memory (which is all Apple is interested any more) and the manner in which it needs to be used was the final nail in its coffin.

3 replies
Question marked as Top-ranking reply

Jan 9, 2018 3:39 PM in response to MonsterMike

You had a lot of questions, all of which led to the same answer. APFS uses encryption by default. Installing macOS High Sierra on a Mac with all-flash storage (in other words, not a hard disk, not a Fusion Drive, but all flash and nothing else) then there is no need to do anything else. macOS already performs all of the housekeeping minutia necessary for using flash storage to its maximum performance and lifespan. Security is a fundamental component of it.


Does TRIM or garbage controller exist on these macs?


Yes, it has to, and there is nothing you can do about it anyway.


Does file vault 2 encrypt deleted data?


It encrypts the entire storage device. Trash, deleted Trash, all of it. It's encrypted from cradle to grave and everything in between... the only correct way to handle secure data.


When do secure files become secure anyway? The moment you decide to throw it away? An hour before? A minute after? Last Wednesday? When exactly? The answer should be obvious. Before you "secure" them, many non-"secure" files and copies of files are created in the normal course of working with them. What's worse is that multiple redundant copies are normally stored in sectors of a hard disk totally inaccessible to the operating system. If they weren't secure then, they can't be secured now. That's even more the case with flash—because of TRIM.


How does this work now secure erase has been removed.


Taken to its literal extreme, "secure erase" was never capable of doing everything its name implied even with magnetic media. The advent of flash memory (which is all Apple is interested any more) and the manner in which it needs to be used was the final nail in its coffin.

Jan 9, 2018 2:21 PM in response to John Galt

Hi John,


Am I correct then in saying if someone then manages to gain access to the Mac, gains access to the user via a brute fore attack they will still be unable to recover confidential deleted files from an SSD? How does the full disk encryption work? I read somewhere that it deletes the old encryption keys on the file, replaces it with a new encryption key and then erase that?

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

Security of trash on SSD with APFS

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.