TekRevue

  • Home
  • OS X
  • Windows
  • Mobile
  • Games
  • Reviews
  • Editorials
  • Tips
    • Windows
    • Mac
    • Mobile
  • Twitter
  • Facebook
  • Google+
  • Feed

 0580

OS X / Tips

How and Why to Enable FileVault Encryption on Your Mac

By Jim Tanous on January 2, 2014 at 8:30 AM • @mggjim

FileVault 2

OS X 10.7 Lion brought many changes to Apple’s desktop operating system. Some of these changes were met with dismay by longtime Mac users, but most Apple customers were excited to see at least one new feature: Apple’s implementation of FileVault 2.

Although sharing the same name, FileVault 2 is an entirely different scheme than its predecessor. Instead of just encrypting the user’s home folder, FileVault 2 employs a technique called “whole disk encryption” (or “full disk encryption”) which, as you can undoubtedly guess from its name, encrypts the entire Mac system volume.

This change brings several improvements over Legacy FileVault. First, as we’ve already mentioned, FileVault 2 encrypts the entire Mac system drive. This solves the issue with the original FileVault whereby hackers or thieves could access any data on the drive that wasn’t inside the user’s encrypted home folder. Second, FileVault 2 utilizes a stronger form of encryption, called XTS-AES 128.

When the Mac is shut down, the entire drive is encrypted and protected; when an authorized user boots the Mac and logs in with the correct password, the entire drive is unlocked. This helps prevent issues like software incompatibility because the whole drive is unlocked when in use, and installed apps generally don’t even know the drive is encrypted at all. However, this also means that your Mac is more vulnerable when booted. Even with the best whole disk encryption, a thief or hacker who gains access to your Mac while it’s booted and logged in will be able to see all of the drive’s data. Only when the Mac is completely shut down is the data on its drive locked up.

As you can probably surmise, booting an encrypted drive (FileVault 2) is a bit more complex than booting a non-encrypted drive that merely contains some encrypted files (Legacy FileVault). In order to accomplish this feat, Apple uses another key OS X feature that was introduced in OS X 10.7 Lion: the Recovery Partition. Once FileVault is enabled and the Mac system drive is encrypted, the Mac will seamlessly boot first to the OS X Recovery Partition in order to give the user the opportunity to enter their password and unlock the main encrypted volume. To the user, this processes presents itself with a simple login prompt. The only clue that something different from a normal boot process is happening is the presence of the gray background that accompanies pre-OS EFI tasks on modern Macs.

And that’s truly the “magic” of FileVault 2. Apple’s implementation, with few exceptions, protects user data with a process that is transparent to the end user. Excluding the initial setup, users with FileVault 2 enabled need only to enter their account password when booting their Mac. Practically all other aspects of using OS X are the same as with a non-encrypted drive.

Still Not Perfect

Despite the improvements offered by FileVault 2, it’s still far from perfect, and there are many issues for users to consider. First, and most importantly, you’ll need to remember your user account password or recovery key (a replacement for Legacy FileVault’s Master Password, which we’ll discuss further below). This is absolutely essential; without one of these items, you’ll be unable to decrypt your drive, and your data (plus the data from any other user accounts) will be permanently trapped inside the encrypted volume. As a backup for this scenario, you can choose to store a copy of your recovery key on Apple’s servers when you enable FileVault. This is generally a safe option, but those with critical business or personal data on their Macs may not want to take the risk. If you do decide to store a backup copy of your recovery key with Apple, you’ll need to set three security questions. Note that you must submit the exact same answers to these questions if you ever need to retrieve the key from Apple, so make sure to pick questions with unambiguous answers.

Another issue to consider is performance. Because the Mac will have to encrypt and decrypt data as the user calls for it, there will be a slight performance hit when it comes to reading and writing data. The magnitude of this performance hit will depend on your Mac. Users with older Macs and slower processors will feel it more, but those with newer Macs may hardly notice a difference thanks to a combination of faster processors, faster drives, and hardware encryption capabilities built into newer Intel CPUs.

FileVault 2 also cannot be used with every Mac and every drive configuration. In general, FileVault 2 can only be enabled on a single system drive containing only the OS X and Recovery partitions. Users report problems when enabling FileVault on drives with additional partitions, and FileVault can’t be used at all on RAID volumes. Further, FileVault protects only the system drive. If you have a Mac with multiple internal or external hard drives, the data on those drives won’t be encrypted by FileVault, something that may be an important consideration for power users (although there are ways to manually encrypt additional drives in OS X).

If these FileVault drawbacks are outweighed by its benefits, then FileVault whole disk encryption may be right for you and your Mac. While we’ve touched on many of the steps necessary to enable FileVault, straightforward instructions on the process are listed below.

Learn how to enable FileVault on page 3.

Previous1 2 3 4Next

 0580

  • Categories: OS X / Tips
  • Tags: #Apple #Encryption #FileVault #How To #OS X #Security #Tips

Sign Up for the TekRevue Weekly Digest

Read more in OS X or Tips on TekRevue

  • mac keyboard command control
    How to Switch the Command and Control Keys on Your Mac Keyboard

    Filed Under: OS X

  • format skype text chats
    How to Format Skype Text Chats

    Filed Under: Tips

  • chrome for mac os x
    How to Test Chrome’s Native Notifications for Mac

    Filed Under: Tips

  • fight.the.stupids

    Any issues with using Target Mode on a Mac encrypted with Filevault 2? For example, if a person wanted to use Migration Assistant and the current Mac is using Filevault 2, are you just required to put in one of the usernames/passwords? Or are you required to enter a Master Password? How does that work? Thanks.

    • http://www.tekrevue.com/ TekRevue

      I haven’t looked at this exact scenario since Lion launched but, as I recall, a migration with Migration Assistant should work just fine with the correct user account password (if migrating FV2 to FV2) or correct master password (FV1 to FV2). There have been some reports of issues after migration (“unable to log in to the FileVault user account”) but you can solve this by deleting the user account, leaving the user data intact, and then recreating a new user with the same name to point to the existing data. See Apple Support Article TS4184 for more on this.

      To verify this, I’ll enable FV2 on one of our MacBooks and do a test migration. I’ll report back if anything is different from my recollections. The data is encrypting now; should have results in a few hours.

      • http://www.tekrevue.com/ TekRevue

        Okay, so after testing it out, when you try to mount a FV2-protected Mac via Target Disk Mode, OS X will ask for an unlock password. This can be any password that was authorized to boot the Mac during FileVault setup. http://www.tekrevue.com/wp-content/uploads/2014/01/filevaultTDM.jpg

        Once the password is entered, the drive mounts and acts the same as any other external drive. As for Migration Assistant, it doesn’t look like FV2 settings are transferred over, so you’ll need to do that manually after the migration. So it seems to go: TDM old Mac to new > unlock old Mac with any authorized password > copy data unencrypted to new Mac > reboot new Mac and reenable FV2.

        • fight.the.stupids

          Thanks a lot for trying that out. Migration Assistant is a great feature and to be able still use it with FV2 is great.

  • Frederick D

    Great article. Thank you for the history lesson on File Vault 2 as well. It is good background information. What I have been using as an additional layer of protection is the SecuriKey Pro USB token. This works with a standard Mac or a File Vault 2 protected Mac to add two-factor authentication. Without the USB token it is not possible to log into the Mac, nor unlock the File Vault 2 encryption.

    It is very cool and easy to use.

  • greendrawer

    Really not sure why “you’ll need to remember your user account password or recovery key”
    qualifies as one of the reasons as to why Filevault 2 is “not perfect”. Especially as the “first and most important” reason as to why it’s not perfect (?)

    • http://www.tekrevue.com/ TekRevue

      “Not Perfect” means that new users will forever lose access to their data if they can’t remember an account password or recovery key. This is true with many encryption schemes (some use hardware keys like USB drives), but this article is targeted at new Mac or new FileVault users, and we were trying to stress the reality that data could be irrevocably lost without a password. A “perfect” scenario, which may not exist today, is one that protects user data without the risk of permanent loss (think future implementations based on fingerprints, DNA, etc.)

      The reference to not needing a separate password is just pointing out that you only need an account password, as compared to third party solutions that are often set up with their own passwords (although I suppose a user of something like TrueCrypt could set their encryption password to match their account password).

  • Alan Goldberg

    One of the things that put me off using FV1 was the performance hit that encryption made on video apps like iMovie.

    Have you done any testing to see the performance of video capture if you are storing your data files to the encrypted drive with FV2?

  • Paul Wasmund

    Have you done any recovery testing on Mavericks? I have been testing fileVault encryption and recovery procedures recently and while the standard schemes using the recovery partition and commands such as diskutil cs revert and diskutil cs unlockVolume work as expected on Lion and Mountain Lion recovery volumes, the same is not true using a Mavericks recovery volume. For example, I unlock the recovery keychain and try to mount a fileVault volume using

    diskutil cs unlockVolume lvUUID -recoverykeychain /path/to/recovery.keychain

    This hangs on Mavericks even though the exact same command works on older recovery volumes. No error is given, the command just puts up its indefinite character passed progress bar, asks for permission to access the private key in the keychain which is granted and never does anything else.

  • Sam

    I’m running Mountain Lion 10.8.5 on a MacBook Pro 13″. I have a FAT32 partition on my disk and don’t care if it gets encrypted or not. Will I run into problems enabling and using Filevault 2 on the main partition? I also use Parallels Desktop with Windows 7 & 8 virtual machines. Will these still work? I often use SuperDuper to create bootable USB backups. If my internal disk crashes, I can boot from an external USB backup drive and continue working until the internal drive is replaced and data is restored. Will my backup/restore scenario that I described above still work if I enable Filevault 2?

  • BruceWayne

    Great article. Very helpful to a casual mac user such as me. Informative and readable. Very much appreciated.

  • Veronica

    Is there anyway to retrieve my photos from File Vault 1 from an external hard drive? I had my computer wiped because I could not remember my File Vault password from two years ago. I backed up all my family photos (40,000 photos) onto my external hard drive before wiping my computer, through Time Machine. I am so sad that I cannot access my photos on the external hard drive now. How can I access them?! Any suggestions?

    • http://www.tekrevue.com/ TekRevue

      Is the Time Machine backup encrypted, too? If not, and if the drive still works, you should be able to restore from that backup using Migration Assistant. As the Time Machine drive now contains the only potential copies of your photos, I’d recommend paying the Apple Store a visit so that they can help guide you through the process.

      • Veronica

        The Time Machine backup is also encrypted :(
        I was at the apple store when I wiped my mac. There was some miscommunication, and I thought that my external hard drive safely stored all my photos. I am praying for a miracle! I am going to go visit the apple store again tomorrow. Thank you for your suggestion and for responding so quickly!

        • vampyren

          I know it wont help with your problem but I suggest you buy something like mSecure and save your passwords securely. It cost a bit but its priceless when you need to remember an important password. I have mSecure on my iphone, Mac and Android phone. It wasnt the cheapest solution or product but after several years those initial costs are meaningless. I have had so much use for this app that i cant be without it now. I save all my passwords for work, home, websites and much more in there. I wish you good luck at the Store …..

  • Sander

    Two questions:
    1. Suppose I turn filevault 2 on and my mac dies but the harddisk is not to blame. When i connect the mac’s harddisk to another computer, can I still acces the data (e.g. after entering the master password)?
    2. I use an application that mirrors my Mac’s harddisk on my NAS. Is filevault 2 likely to cause any issues? Will these files be encrypted too?

  • sudon’t

    “Because the Mac will have to encrypt and decrypt data as the user calls for it, there will be a slight performance hit…”

    Why would there a performance hit if when one “logs in with the correct password, the entire drive is unlocked”? If that is the case, the only place I can see a slowdown would be at boot and shutdown, not during normal computer use. Or is it the case that files are encrypted/decrypted on the fly, only when they are called?

    This leaves me wondering what state your hard drive would be in if someone came along and yanked the cord out of the wall, (in the case of a desktop)? Would all your files be in an unlocked state, or just the open ones?

    • Nick Yasnov

      I know, I’m a bit late to the party, but I could try give you the answer. If you’re already know the answer, this might be useful for other people reading the comments.

      > Or is it the case that files are encrypted/decrypted on the fly, only when they are called?

      > This leaves me wondering what state your hard drive would be in if someone came along and yanked the cord out of the wall, (in the case of a desktop)? Would all your files be in an unlocked state, or just the open ones?

      Encryption is a slow task. In layman terms, the process consists of three steps: reading the file, encoding the file, writing the file. So if your disk has reading-writing speed about 100 MB/s (Megabytes/s), then a single 100 MB file will encode in roughly 3 seconds. If you have 1 TB disk, it will take about 9 hours to just encrypt the data. Then it will take 9 hours to decrypt it all back. So they surely aren’t being decrypeted as the user enters his password. Otherwise, the user will wait forever until he will boot. And then he will be forced to encrypt it again when he shuts down the computer. This isn’t user friendly. And it would be a pain in the ass to keep the data consistent if the encryption process will be interrupted.

      What actually happens, is right after you encrypted all your data with FileVault, it is already stored in unreadable format. If someone will steal your disk and plug it to his PC, he won’t find anything useful, anything at all. Even with data recovery tools. The disk will be full of random bytes, white noise. While booting, the system will prompt a password to the data and will read and store keys for files unlocking in RAM after the correct password is entered. From this moment, if someone will gain access to RAM, he could steal the keys. That’s why it’s important to not install untrusted software. Before the user entered his password for the first time after booting, the data is fully protected.

      So when any program tries to read the data from disk, these requests are actually passed through a special layer which reads the encrypted file from disk, decrypts it with keys stored in RAM, and gives the result to the program. So program doesn’t even suspect the file it tries to read is encrypted, it’s all transparent for user and a programmer, the decryption happens on the fly and the result is stored in RAM only. This will slow down the performance a bit because of the decryption overhead for each I/O operation. “The drive is unlocked” part means only that the keys are loaded into RAM to be used when a file will be read next time, not that all files are magically become decrypted (as it takes insane amount of time even on SSDs).

      iOS have the similar protection system named Data Protection which behaves just like this. However, there are four security levels: None, Complete, Complete unless open, Complete until first authentication. Every program can use any level it wants when creating its own files. The most user data (messages, photos, email) is protected with Complete level by default since iOS 8, and user can’t turn it off. What these protection level mean?

      On iOS, the whole disk is _always_ encrypted with AES-256 cipher which uses unique device key and user password. When the device is booted, all the files (except those that use None level) are protected and no way someone can read them. After the user entered his password, those files that use Complete until first authentication are unlocked. While device is locked, all files that use Complete level will be protected and no way someone can read them. After first authentication, the system loads keys needed for unlock files with corresponding level of protection. After user unlocks the device, additional keys, needed for unlocking files with Complete level of protection, are read into RAM and stored there until the device is locked again. So again, if someone gains access to the RAM, the data is compromised. But it’s not an easy task, and you need to install such software yourself, because it requires the device to be unlocked. So if someone steals your device, even if he bypass the password, he wouldn’t be able to read the data because this password is one of two keys needed to unlock the protection. If its entering is bypassed, it doesn’t even exist in the memory. This makes it easy to remote wipe the device. Just all the keys are deleted, and the encrypted files become useless to the thief. Data protections is so successful, that FBI tries to ask the US Government to force Apple to release the OS version that allows to just brute-force the password (there are limits after which the system slows down the password entering attempts), not even read the encrypted data, because the password isn’t stored anywhere and is needed to read the files.

  • http://aqfl.net/ Ant

    Do we trust Apple with backdoors and keys? 😛

Search

Related Articles

  • ipad controller game
    How to Set Up and Game With an iOS Controller on Your iPhone or iPad
  • chkdsk windows 10
    How to Scan & Fix Hard Drives with CHKDSK in Windows 10
  • ipad pro true tone display
    How to Disable True Tone Display on the 9.7-inch iPad Pro

Connect with TekRevue

  • TekRevue on Twitter
  • TekRevue on Facebook
  • TekRevue on Google+
  • Cheats
  • Deals
  • Distractions
  • Editorials
  • Gadgets
  • Games
  • Giveaway
  • Hardware
  • Mobile
  • News
  • More in OS X
  • Podcast
  • Reviews
  • Sponsor
  • Tips
  • Windows
  • mac keyboard command control
    How to Switch the Command and Control Keys on Your Mac Keyboard
  • ps4 remote play mac
    How to Change PS4 Remote Play Resolution & Frame Rate on the Mac
  • disable automatic updates el capitan
    How to Disable Automatic Updates in OS X El Capitan
  • mac os x custom resolutions
    How to Set Custom Resolutions for External Displays in Mac OS X
  • itunes-movies-metadata
    How to Add Detailed Metadata to Ripped Movies in iTunes
  • safari responsive design mode
    Test Your Website’s Mobile Layout With Safari Responsive Design Mode
  • mac os x help window
    How to Stop the OS X Help Window from Staying on Top
  • delete zip file mac
    How to Automatically Delete Zip Files When Opened in Mac OS X
  • mac uptime
    How to Find Mac Uptime in OS X
  • map location pin
    How to Manually Add a Location to Your Images in Photos for Mac
  • macbook-dual-monitor
    How to Move the Dock to a Another Monitor in OS X El Capitan
  • gatekeeper el capitan
    How to Permanently Disable Gatekeeper in OS X El Capitan
  • el capitan transparency
    How to Reduce Transparency in OS X El Capitan
  • replace login screen wallpaper os x el capitan
    How to Replace the OS X El Capitan Login Screen Wallpaper
  • Mac OS X Dock
    How to Dim Hidden Mac App Icons in the Dock
  • file-path-mac
    OS X El Capitan: How to Copy a File Path in Finder
  • raid os x el capitan
    How to Create RAID Volumes in OS X El Capitan
  • using macbook trackpad
    How to Turn Off Force Touch in OS X El Capitan
  • shake cursor large os x el capitan
    How to Stop Your Cursor from Getting Bigger in OS X El Capitan
  • split view not working
    El Capitan’s Split View Not Working? Check This Option in System Preferences

Tips

  • Apps
  • Gaming
  • Mac
  • Mobile
  • Online
  • Windows
  • format skype text chats
    How to Format Skype Text Chats
  • chrome for mac os x
    How to Test Chrome’s Native Notifications for Mac
  • office 365 installer
    How to Install the Older Office 2013 via Office 365
  • itunes 12 separate download window
    iTunes 12: How to Show a Separate iTunes Downloads Window
  • ipad controller game
    How to Set Up and Game With an iOS Controller on Your iPhone or iPad
  • ps4 remote play mac
    How to Change PS4 Remote Play Resolution & Frame Rate on the Mac
  • steam trash
    How to Remove a Game From Your Steam Library
  • xbox one elite controller
    How to Use Custom Button Mapping on the Xbox One
  • mac keyboard command control
    How to Switch the Command and Control Keys on Your Mac Keyboard
  • disable automatic updates el capitan
    How to Disable Automatic Updates in OS X El Capitan
  • mac os x custom resolutions
    How to Set Custom Resolutions for External Displays in Mac OS X
  • itunes-movies-metadata
    How to Add Detailed Metadata to Ripped Movies in iTunes
  • safari-reader-ios-ipad
    How to Use and Customize Safari Reader in iOS
  • ipad controller game
    How to Set Up and Game With an iOS Controller on Your iPhone or iPad
  • ipad pro true tone display
    How to Disable True Tone Display on the 9.7-inch iPad Pro
  • sunset location services
    Enable Location Services to Use Night Shift’s ‘Sunset to Sunrise’ Option
  • youtube loop
    How to Loop YouTube Videos
  • netflix bandwidth data usage
    How to Reduce Netflix Bandwidth Usage to Avoid ISP Data Caps
  • netflix autoplay
    How to Stop Netflix From Automatically Playing the Next Episode
  • distracted man computer
    How to Turn Off Distraction-Free Mode in WordPress
  • chkdsk windows 10
    How to Scan & Fix Hard Drives with CHKDSK in Windows 10
  • windows 10 login screen
    How to Skip the Windows 10 Login Screen and Log Into Your User Account Automatically
  • laptop apps
    How to Organize and Remove Apps from the Windows 10 Start Menu ‘All Apps’ List
  • windows-defender-icon-metro
    Windows 10: How to Quickly Scan a File or Folder with Windows Defender
Company
  • About TekRevue
  • Get in Touch
  • Sponsorships

Sign Up for the TekRevue Weekly Digest

© TekRevue LLC. All Rights Reserved.

  • TekRevue User Agreement
  • TekRevue Privacy Policy

Built by Blazer Six