Technoprenerd
Technoprenerd
@maltfield me neither, but from my limited understanding the above should be correct. There are multiple FileVault Analysis or Filevault reverse engineering papers, but I haven't found official documentation from...
@maltfield : It's unfortunate but it seems that there was one FOSS FDE tool for MacOS, but not anymore FOSS and usable. PGP Whole Disk Encryption for MacOS - https://tidbits.com/2010/05/14/pgp-whole-disk-encryption-and-pgp-desktop-professional-10-0/...
@maltfield: Yes. I've executed the script : https://github.com/BusKill/buskill-app/blob/master/src/packages/buskill/root_child_mac.py The output of the logging is: ``` 19:45:06,622 root_child INFO Waiting for command 19:45:31,554 root_child INFO Command received 19:45:31,555 root_child DEBUG Command...
@maltfield : No preference, I've tried them all and it seems that for new users this type of application is more usable (better UI/UX) for creating and encrypting individual files...
@maltfield Agreed, adversary would just copy the backup masterkey from cloud provider and decrypt it. Yes, below is how far I've come and works on OSX. The psutil is the...
It does work with multiple vaults open at the same time ``` python3 find_volumes.py /Volumes/test3 Unmount successful for /Volumes/test3 /Volumes/test4 Unmount successful for /Volumes/test4 /Volumes/test2 Unmount successful for /Volumes/test2 ```...
Yes, still the same error.