> On 2023-05-07 11:45, Joerg Lorenz wrote:
>> Am 07.05.23 um 17:06 schrieb Alan Browne:
>>>
>>> Once Apple introduced Keychain in the 90's, almost everything
>>> password related went encrypted.
>>>
>>> I personally wish that all files on Macs would be separately
>>> encrypted. Then deleting a file (and its key) [after emptying the
>>> trash] would make recovery impossible. (This is simplistic -
>>> implementation details would be a little stickier).
>>
>> You could create this yourself with reasonable effort albeit
>> circumventing the keychain. Flexible encrypted and password protected
>> containers can do exactly that.
>
> Of course. But that isn't the point.
>
> Up until SSD's became common issue on Macs, when you deleted files
> there was a mechanism (within Finder IIRC) to securely wipe the file
> if desired. So for things of particular import you could be sure they
> were not recoverable.
>
> Apple removed this feature (even for spinning mass drives) at some
> point to avoid over-writing to SSD's.
It's nowhere near as easy or effective to recover deleted data from
flash storage as it is from traditional hard drives due to the way
storage is controlled. So there's not much of a need to secure wipe
individual files, especially when the entire file system is encrypted
with FileVault.
> On iOS, OTOH, all files are separately encrypted - when they are
> deleted so is the key. Not recoverable.
Encryption and Data Protection overview
<
https://support.apple.com/guide/security/encryption-and-data-protection-overview-sece3bee0835/web>
---
iOS and iPadOS devices use a file encryption methodology called Data
Protection, whereas the data on an Intel-based Mac is protected with a
volume encryption technology called FileVault. A Mac with Apple silicon
uses a hybrid model that supports Data Protection, with two caveats: The
lowest protection level Class (D) isn’t supported, and the default level
(Class C) uses a volume key and acts just like the FileVault on an
Intel-based Mac. In all cases, key management hierarchies are rooted in
the dedicated silicon of the Secure Enclave, and a dedicated AES Engine
supports line-speed encryption and helps ensure that long-lived
encryption keys aren’t exposed to the kernel operating system or CPU
(where they might be compromised). (An Intel-based Mac with a T1 or
lacking a Secure Enclave doesn’t use dedicated silicon to protect its
FileVault encryption keys.)
---