I do not even know the name of proprietary closed-source software that apple uses for disk encryption.
Well now you know. You really shouldnât be making claims against it if you donât even have a vague idea of what it is or how it works conceptually.
- Firstly, encryption is used everywhere, not only for disk encryption: messengers, browser, email client, backups, everywhere.
Messengers, browsers, and email clients use the same thing they use everywhere on Windows, macOS, Linux, or any other platform. There is no practical difference, maybe apart from which CAs are trusted.
Backups are Filevault 2 again (albeit not backed by the the Secure Element).
I am not sure why you even bring this up because it doesnât make any sense. If you are worried about the OS, the relevant thing here is the OS disk encryption since they are widely different. Oh, and on top that, my original post only mention better disk encryption handling than LUKS, so when you reply to it with âhurrr hurrr untrustable encryptionâ how am I supposed to read it?
And when the app is closed-source, compiled, obfuscated and the output is not that obvious, itâs insanely hard to find it out.
You can use the same logic against open source stuff too. The distributed executable can be different from the open source stuff. Are you gonna read everything, check every code changes, then compile everything yourself?
By the way, truecrypt
and veracrypt
also can be considered to be proprietary, but quite trustworthy due to their history and being at least source-available software (not closed-source).
Not-so-trustworthy. Actual technical reasons (albeit unrelated to the cryptography since I do not know cryptography):
- Veracrypt doesnât even support UEFI secure boot by default. You have to go out of your way to sign it every time if you wanna keep Secure Boot.
- No TPM support. This makes it impossible to have any kind of tamper detection and rate limiting. Meanwhile, with Bitlocker, you can use TPM for rate limiting and bind to PCR 0,1,2,3,3,4,6,7,11 to have some tamper protection. Oh, and unlike systemd-cryptenroll, Bitlocker doesnât blindly trust the TPM either, so even if the TPMâs internal state is compromised your encryption key is still protected: 2304.14717 (arxiv.org). macbooks have rate limiting with the Secure Element too: If you try to bruteforce it it will just lock you out.
- This is a third party app with admin privileges on Windows, so it is extra attack surface. On macOS, it requires a whole system extension, so you have to reduce the boot security policy from Full Security to Medium Security.
- All of this, and for what? When you use an OS, you implicitly trust the OS vendor. The only time when you shouldnât be using their encryption method is if there is something seriously wrong with their implementation, or when there is some significant security improvement to be had. All of the stuff I listed above are just weakening security while providing no real apparent benefit.
And yes, I personally do not trust bitlocker nor your apple vaults.
And yes, Filevault 2 is garbage in my eyes a priori , needless to say I would have to use garbage OS to use it. Itâs my opinion, sorry if you do not like it.
You just say stuff for the sake of saying it, without any sane technical reasoning. This is why we canât have a productive conversation: You keep airing your opinions that are not backed by anything. It doesnât lead to anything fruitful. It is just to spread fear, uncertainty, and doubt. Please at least provide any real technical reasoning beyond just âhurr hurr closed source untrustableâ, or you can just say nothing and this argument would have never needed to happen.
About experts that assume that closed-source software should not be trusted more than xor: sorry, I wonât name names, if that what you are so worried about, nor have I never promised to do that.
Yeah, because you made them up.