Encryption of a HDD using the Disk Utility or FileVault

Hi,

I am thinking of buying some external WD disks, namely “My Passport for Mac” disk. The description of this HDD says it has got the “hardware encryption” capability, but they also say I need their WD software for the encryption, which is a little bit confusing. The description says: “The drive’s built-in 256-bit AES hardware encryption with WD Security softwarre helps keep your content private and safe.”

Here is the disk:
https://www.wdc.com/products/portable-storage/my-passport-for-mac.html

What type of encryption is it then - hardware or software encryption of HDD?

Would the Disk Utilty encrypted formatting or FileVault encryption provide the same service to me? In other words, as a Mac user, should I use the third-party encryption software provided by WD, or is it better to rely on the Disk Utility or FileVault instead?

Thank you for your reply

MacBook Pro, macOS Sierra (10.12.6)

Posted on May 26, 2018 8:35 AM

Reply
Question marked as Top-ranking reply

Posted on Jun 1, 2018 10:52 AM

The WD software is likely the interface for setting the the hardware encryption (on-board encryption chip with potential unfixable flaws).


Using Apple’s software disk encryption, you will know what you get, and always be compatible with the new macOS updates.

With WD’s method, you get slightly different features, a history of crackable security (2015 shamefulness), potential risk of non-compatibility with updates, dependency on a third party for continuity and support.


I’m a happy customer of their disks, but I won’t use their software, and their support was lacking when I needed them (expired warranty prohibited information on compatibility).

Similar questions

15 replies
Question marked as Top-ranking reply

Jun 1, 2018 10:52 AM in response to Enthusiast1

The WD software is likely the interface for setting the the hardware encryption (on-board encryption chip with potential unfixable flaws).


Using Apple’s software disk encryption, you will know what you get, and always be compatible with the new macOS updates.

With WD’s method, you get slightly different features, a history of crackable security (2015 shamefulness), potential risk of non-compatibility with updates, dependency on a third party for continuity and support.


I’m a happy customer of their disks, but I won’t use their software, and their support was lacking when I needed them (expired warranty prohibited information on compatibility).

Jun 29, 2018 6:18 AM in response to Enthusiast1

The encryption key is stored on the disk. Both Disk Utility and FileVault. The Encryption key itself is encrypted by the passphrase for Disk Utility and by the user login password(s) for FileVault.


The 2 stage encryption is done this way so you can change your password, or the passphrase and just need to decrypt the encryption key and re-encryption with the new password or passphrase, which can be very quick. If your password or the passphrase was the actual encryption key, you would need to decrypt the entire disk and re-encrypt it if you wanted to change your password or the passphrase. Also, the encryption key is much larger and more secure than most people are willing to make their passwords and passphrases. Although the better you make your password or passphrase, the more secure the encryption of the key itself will be.


Also encrypting the key using your password, allows FileVault to store multiple copies of the encryption key, each encrypted by a different user's password, so more than one person can unlock the disk.


Any time you expose your data to someone else, you MUST trust the other person. If they have hacked their system so it can read the encryption key from RAM, or they have hacked it so they capture your password or passphrase as you are entering it, then they can unlock your disk anytime they want.


Also once your disk is unlocked, the device drivers will let ANY program running on that computer, free access to the data on your disk. Remember, no matter how you set ownership and permission on files, the owner of the computer can become 'root' and have full unrestricted access to all parts of that disk.


The owner of that computer can also modify things on that disk, including programs that you may have stored there to substitute there own.


And it does not need to be the owner themselves. If the owner has malware on their system, the malware could be accessing your disk. If your data is so sensitive that you might be targeted, then a bad actor could infect the owner's computer with special malware aimed at you, if they know you regular expose your data to that owner's computer.


So "Do You Trust That Computer And Its Owner?"


The purpose of whole disk encryption is to prevent someone that gets your disk and NOT your password/passphrase from accessing your disk. If you give them the password or passphrase (even if indirectly by typing it yourself), whole disk encryption is now defeated.

Jun 4, 2018 8:55 AM in response to Enthusiast1

The macOS disk device drivers provide the encryption (as you write to the disk) and decryption (as you read from the disk). This is software, but it is part of macOS.


The Disk Utility (or System Preferences -> Security -> FileVault) applications just gets things started by acquiring the encryption password, encryption keys, and telling the macOS disk device drivers to encrypt the volume.


After that, it is all the macOS disk device drivers doing the encryption/decryption as data moves between memory and the disk.

Jun 18, 2018 3:50 PM in response to Enthusiast1

FileVault encryption creates an encryption key of the form ABCD-EFGH-IJKL-MNOP-QRST using numbers and letters. This key is what is used to encrypt/decrypt the disk.


FileVault takes your macOS login password and uses that to separately encrypt just the encryption key, and that encrypted value is stored on the disk.


When you boot your system and are asked for your macOS login password, it is to decrypt the FileVault key. The decrypted FileVault key is given to the device drivers so they can on-the-fly decrypt what is read and encrypt what is written.


When unmounting an encrypted volume, or shutdown your Mac, the in-memory copy of the encryption key is thrown away (the memory location is erased).


FileVault will ask if you want to enable additional macOS login accounts to be able to decrypt the volume. FileVault will take the macOS login password for each account you allow, and again encrypt the FileVault key and store that encrypted value on the disk. That gives macOS multiple ways to get the FileVault key and pass it to the device drivers.

Jun 26, 2018 12:32 PM in response to Allan Eckert

Thank you Allan.


I have also decided to use Disk Utility instead of any WD or LaCie software. You and other people say WD software is not secure. I don't know anything about the reliability of LaCie Private-Public software, but it creates encrypted volume at the speed of 1GB per 1 minute. This means that if I have 5TB disk I would have to wait 5 000 minutes to make it encrypted volume, which is ridiculous. I have not tested it yet but that's what the manual of Private-Public software says. If I can get the same encryption from DiskUtility and faster, there is no reason to use Private-Public. Unless it would be some different kind of encryption.

Jun 2, 2018 11:50 AM in response to Urquhart1244

Thank you a lot for both replies, Urquhart and Eric. I am sorry I reply with delay. After a couple of busy days I can finally resume my shopping for the disks.

The idea that the WD software is just the interface makes sense and it clarified the ambiguous description to me. Speaking of the apple software, I am also inclined to use it instead of WD hardware encryption. It looks like the more straightforward way not to rely on any third-party products.

Speaking of which, why do people actually buy external HDDs with hardware encryption? I understand that people buy internal HDDs with hardware encryption because of the Cold Boot Attack, but is there any reason to buy an external HDD with hardware encryption? Is the only reason the fact that the hardware encryption does not slow down my computer, because it is not using the computer's processing power, or are there any other reasons?

There is one more thing that is unclear to me. Once I format the HDD as “encrypted” using the Disk Utility, which software executes the encrypting when I later use the drive? In other words, when I connect the encrypted drive to my or somebody else's iMac and drag some data on the drive, the Disk Utility is not running any more (at least not visibly), but the encryption of the data takes place anyway. Does it mean that there are some (hidden) OS processes or drivers doing the encryption for me automatically every time I work with the encrypted disk?Thanks for your replies again.

Jun 4, 2018 6:44 AM in response to Eric Root

I admit that my questions can be confusing. I am not a native speaker and sometimes I express myself in a too complicated way. But your answer helps me anyway.

You say “Once encrypted, the software on the external encrypts new data”. As far as I understand this explanation, the encrypted format encrypts and hides my data. So, when we speak about “software encryption”, it does not have to involve an application. The encrypted format itself is the software measure. Is that right?

This is what was so confusing for me. When I first read about “software encryption”, I thought the “software” has to be some application that carries out the encryption. I thought that I have to install an app either on my computer or directly on the disk to be able to achieve some kind of encryption.

But now I see that the word “software” does not have to refer to an app. It can refer to the fact, that the security step is software-based (for instance the encrypted format), and not hardware-based (for instance a hardware chip).

The app - namely Disk Utility - creates just the encrypted volume or encrypted disk image at the very beginning, but that’s it. After this initial formatting, the encryption takes place automatically, as I drag and drop the data. It takes place thanks to the encrypted format of the disk and its specific cipher key that was created and embedded in the disk when I formatted the disk.

Do I understand the process right? Correct me, if I am wrong.

Jun 18, 2018 10:01 AM in response to BobHarris

Thank you for your reply, Bob. Your answer has explained exactly the thing that I did not understand. Thank you a lot for that.

I apologise to you and to other participants of this discussion that I reply with delay again, but the summer vacation kept me away from the online world for a while.

Speaking of the encryption keys, I would like to ask one more question. As far as I know, when I use an external disk with hardware encryption, the encryption key never leaves the disk. But I am wondering about how it works when I use Disk Utility, i.e. software encryption.

If macOS disk device drivers provide the encryption and decryption, where are the encryption keys stored during or after the process - on the disk or on my computer? Are the keys and the password deleted from the computer memory after I dismount the disk?

Also, if the computer retains the keys, I suppose it might be risky to connect the disk to someone else’s computer, because the owner of the computer could later recover the keys, am I right?

But I suppose hardware encryption is not 100% reliable either.


P.S. How do I mark someone's post as "helpful" on this forum? The button works for me only sometimes. I don't know why. Is there a limit on the number of times I can use it in each thread?

Jun 26, 2018 12:22 PM in response to BobHarris

Hi Bob, thank you for your answer. Very logically put again. Thank you for that.

I tried to use FileVault a couple of months ago but it slowed down my computer a bit so I turned it off again. My MacBook is getting old and I had to give preference to speed over security.

Now I am thinking more about encrypting my external devices. So, my question was more about how the password and encryption keys work when it comes to external HDDs. I would like to know, where the encryption keys are stored when I encrypt an external disk. Are they deleted after I eject the disk?

Jun 26, 2018 6:55 PM in response to Enthusiast1

Now I am thinking more about encrypting my external devices. So, my question was more about how the password and encryption keys work when it comes to external HDDs. I would like to know, where the encryption keys are stored when I encrypt an external disk. Are they deleted after I eject the disk?

External or Internal it all works the same way.


Each disk gets it own ABCD-EFGH-IJKL-MNOP-QRST encryption key. That key is itself encrypted by your login password and the resulting encrypted value is stored on the disk the encryption key go to. And if multiple users are allowed to decrypt the disk, their login password is used to encrypted the key and those values are also stored on the disk itself.


So you can disconnect the disk from Mac A and plug it into Mac B and still decrypt it as long as you know one of the login password for the users that are allowed to decrypt the disk. And if you do move it to Mac B, it is the login password(s) from Mac A that are required.


An "No" they are not deleted when you eject the disk. If you delete the encrypt key, you will not be able to decrypt the disk. The keys are stored on the disk itself, but are protected by having been encrypted using your login password.


To use the disk you have to provide your login password. The login password it then used to decrypt the key. They key is then given to the device driver to use when reading and writing to that disk.

Jun 28, 2018 12:55 PM in response to BobHarris

I think there is a misunderstanding. I talk about encryption of external disks via Disk Utility, whereas you seem to be talking about the encryption of external disks via FileVault.

I know that in principle it is the same thing, but judging from my experience, there are some little differences. When I use Disk Utility, it does not work with my login password (i.e. my user account password) at all. I choose a separate password for the external disk when I format it, and this is the only password that decrypts the disk. It is not possible to set more than one password for the disk when formatted in Disk Utility. Or is it possible? (I have never noticed that option in Disk Utility.)

But I think your answer applies partly to Disk Utility as well. You explained to me where the encryption key is stored. I suppose, regardless whether I use Disk Utility of FileVault, the password that I choose encrypts the encryption key. The encryption key is stored on the external disk itself. After I use my password to unlock the drive, the encryption key is then given to the device drivers.

My second question from my post on 18th June was about using the disk with other computers. I know it is possible to use it, but is it safe to use it? After you explained it, I understand the encryption key cannot be deleted from the disk itself. But is it removed from the device drivers after I dismount the disk?

I am asking this question, because I would like to know how safe it is to use an encrypted disk on someone else’s computer. I have to connect my disk to other people’s computers from time to time, but I do not want my password or encryption key to get stuck somewhere in the memory of these computers.

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

Encryption of a HDD using the Disk Utility or FileVault

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.