this post was submitted on 16 Oct 2024
98 points (97.1% liked)

Privacy

1223 readers
136 users here now

Icon base by Lorc under CC BY 3.0 with modifications to add a gradient

founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] AsudoxDev@programming.dev 2 points 1 month ago* (last edited 1 month ago) (2 children)

Correct, though it still is saved somewhere. Just like how TPMs in Computers can be exploited as well, this also can be. What I meant in my original comment was that the emergency mode did not clear that hardware chip's storage, which others said otherwise.

edit: corrected mistake according to ethan

[–] firelizzard@programming.dev 2 points 1 month ago

do a full encryption of the storage

That’s not how disk encryption works. Data in storage is always encrypted. That’s the whole point. When an app requests data, it is decrypted on the fly. Decrypted data is never stored outside of RAM.

[–] pivot_root@lemmy.world 2 points 1 month ago* (last edited 1 month ago)

Ah. Then yeah, emergency mode won't suffice for protecting the full contents of the disk.

I can't say Apple actually does this, but it is possible to protect important data by further encrypting user data with a separate encryption key derived from the passcode, and then clearing the key whenever the screen is locked.