News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

How to mitigate Apple's firmware backdoor and permanently secure your Mac's firmware : techsupport | Torhoo darknet markets

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

NOVEMBER 19, 2023: UPDATE

This guide isn't useful for ALL macs, particularly modern ARM based macs with Apples version of secure boot. I also believe this guide isn't accurate for any OS before MacOS Monterey. On later OS's (MacOS Monterey and above) Apple has included a Graphical window in the Recovery partition that does just what this guide teaches you how to do using terminal commands. Therefore, a tutorial for moderna Macs that boot Monterey and above is in the works. If you have a newer modern Mac with Monterey and above, this tutorial doesn't apply, and you should instead contact me directly for more information, or wait until I put out another guide for modern Macs. Legacy mac users, please still read through this as it applies to you!

MARCH 12, 2022:

Go ahead and boot up your mac in recovery mode (Hold Command+R at boot).
Once recovery mode boots up, click on your username and enter your user password to get into the recovery apps. Then, click on the terminal app in the recovery menu, and open up the recovery terminal.

Now, you are going to have to first set a firmware password.
To set a firmware password that's required to be entered on every startup (most secure option), type the following command in your mac recovery terminal:
firmwarepasswd -setpasswd -setmode full
To set a firmware password that's required to be entered only when changing boot disks (less secure option), or booting a different os from a second partition, type the following in your mac recovery terminal.
firmwarepasswd -setpasswd -setmode command
After you have created a password for your firmware, reboot by typing
reboot
in your recovery terminal, and hitting enter. If you chose to use the
-setmode full
command, you will be prompted for your firmware password upon reboot before being able to boot into recovery mode. Otherwise if you chose
-setmode command
you can boot directly to recovery mode without entering a firmware password. Once in recovery mode, log back in to your recovery account by typing your password again, and open up the recovery terminal. Now lets check the status of your new firmware password and mode that has been enabled with the following commands: ...
firmwarepasswd -check
should return:
Password Enabled: Yes
then typing...
firmwarepasswd -mode
should return:
Mode: full
Option roms not allowed
if you used the (most secure) command
firmwarepasswd -setpasswd -setmode full
to set your password. Otherwise, if you used the (less secure) command
firmwarepasswd -setpasswd -setmode command
, then
firmwarepasswd -mode
should return:
Mode: command
Option roms not allowed
Once you verify your firmware mode you may next want to to create a backup seed incase you forget your firmware password, however, doing so makes your firmware less secure. Instead, it is recommended that you just be 100% positive you remember your password, and not create a backup seed. However, if you choose to go the "backup seed" route, then you should go to your recovery terminal and type...
firmwarepasswd -unlockseed
then...
a random number will show here
You want to write that random number down and store it in another residence of whom you trust, preferably in a safe. Or, even better, you could go to the park, and bury the written password in the ground inside of a mini treasure chest, and remember where you buried it incase you need to dig it up for firmware recovery one day. However, nobody but you should ever have access to this recovery seed, or they will be able to unlock your firmware and get into your option rom, possibly being able unlock your home user account.
  • .
NOW, LETS TALK ABOUT THE HIGHLY IMPORTANT BUILT IN APPLE FIRMWARE BACKDOOR THAT ALLOWS APPLE (POSSIBLY IN COOPERATION WITH LE) TO UNLOCK YOUR LOCKED FIRMWARE WITHOUT USING YOUR PASSWORD!
  • .
Ultra secure firmware, Not so secure until you make it secure:
  • .
Apple Inc. has designed an unlocking mechanism that can override your firmware password and unlock your computer if you bring it into an Apple store with your reciept for the computer. If you don't believe me, just do all of the above steps I wrote to lock your firmware, bring your mac into an apple store with your reciept, and tell them you forgot your firmware password. Within minutes, they will unlock your firmware for you, and you will be able to access your home user account with out a firmware password again. Law enforcement can also sieze this computer and get apple to cooperate with unlocking your firmware for LE to try to hack your home user password and option rom to get into your user account. Although this "backdoor" was designed with good intentions (to help you not turn your computer into a tv tray if you forget your firmware password), it poses quite a large problem to people who need serious protection from their firmware being unlocked.
  • .
The GOOD NEWS, is that Apple Inc. has also included a relatively unnanounced and undocumented mechanism to prevent even even Apple Stores or headquarters from unlocking your Macs firmware.
  • .
Be warned though, once you take these next steps, you CANNOT LOSE YOUR PASSWORD AND RECOVERY KEY! IF YOU DO, YOUR MOTHERBOARD WILL BE PERMANANTLY BRICKED, and you will have to buy a completely new motherboard!
  • .
So be sure that you use a password that you will always remember no matter what. If you want to be ultra secure, don't activate and write down the recovery key option mentioned above. That way, nobody can find your written down recovery key and unlock your firmware.
  • .
Now, let's proceed, and show you how to permanently prevent even Apple Inc. or LE from unlocking your firmware... To completely disable Apple's firmware backdoor, go to your recovery terminal and type the following command:
firmwarepasswd -disable-reset-capability
  • .
Then agree to the warning by typing "Yes" and then enter your password to confirm. You will need to reboot for these changes to take effect.
reboot
Then hit "enter".
  • .
Thats all there is to it. Now once you've rebooted, Even Apple themselves (and LE) cannot override your firmware password, and your macs firmware is as secure as it can possibly can be. Just be sure to NEVER forget your firmware password, or you will have to pay for a new motherboard, because the old one will be permanently inaccessible.
  • .
I hope this tutorial helped you get started securing your Mac firmware here on https://torhoo.cc/go.php?u=TDJRdmRHVmphSE4xY0hCdmNuUT0=#. If you have any further followup questions, please feel free to post them beneath this original post. Cheers, and good luck securing your mac! Lastly, if you want to make a contribution to me for the time and effort it took to produce this guide, then you can do any of the following things: 1) Buy some weed from "alwaysfire" on one of the markets I vend on. 2) Make a small crypto donation to my wallet MY BTC ADDRESS:
bc1q76j2s36mpzrzsr4a92d7tzvvk6uncx4snp9d2y
MY XMR ADDRESS:
86v1XL4qVRfCeGU6K7PWocjXxS8gxSqkBfPiqmWzzjD7NtUMZs4kka5WbJ4nGyKhQFKh7kV4WTCRHh6QWZjX4iEC3ZpNZrT


Sincerely,
Your Friendly Cannabis vendor,

alwaysfire
alwaysfire@risup.net
alwaysfire@jabber.calyxinstitute.org
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEE7Tki5nUOIUy8IJ1DI7AuCa1QTPEFAmVaixcACgkQI7AuCa1Q
TPGIxw//b3VRE8hQFSZdH7Rsf0X9DGHJY6yYT+UcaPeLSMT6zsfMrvthXDW3OMwW
/jWKRj1h6jkD/JMD9avWCNkR9G1s45lfLejFg1j7kUfgZqRS1XzYmK7b4It4UfHx
pm8fulBOvCjHs6Eb4fSbpNrQ+s5JpTxt3K/z1GmvJYFeFFWRz5nuKSFOF9Fpx+x7
p3YucpoBeY76Zd1EdyX5hvvPS8pET5Cg7Pv5tv78/4D2caujgXQLbJomTy5Q0OE6
+FWcLeTOXqHY0TEJ+/ukATSYzZGQRsyC6B+LAqC5ABdsI+ca0Hw3EEcXdDl0wTaM
C5qi9OpbTDNGlA751XalxhALmvOsG4pKudhGXS4enMyAhOurXiGfRSPMU0YZg+v+
j4LuTHZ++krDNvzF2j3frDxZIZYp1ajvPPGyahIOpKyUDLxwTqfSPAzwVQUrzv7A
ixAV1feNiQGGmun1g8HhMmN3ypPHHJgWm53j/xe8g2/JY4hIrsKZDONw+hdMkzDK
7kpXpesnCmXPZAlONhSdt9uJXpI2xaYqNTkYmj7ypwoWTxXEKj6c9HeQSu+s/80k
Fv9Ow+5/FSLMcY193uxm0nJ41nTbzoQV/358/r7sM6JChj+HkapU3Jsj8IWKxWP9
P30MXipJlPbb9iFPksN9nxd8dv/mtp+fpNqKJrAZ/GLil7gWwsE=
=LwoN
-----END PGP SIGNATURE-----
/u/6pence
2 points
3 years ago
Saved.
A smart thing to do. I doubt many people even know about this firmware backdoor as apple doesn't even document it. So it's definitely a good trick. Glad you got some knowledge out of it.
/u/6pence
1 points
3 years ago
I was aware of something to do with it as I've read about some cases where they did"voodoo" too access it. This just elaborates on their voodoo. To think any device is impervious with a password or passcode or passphrase is just idiocy. I have a hard time trusting a paid lawyer, you got me fucked up too trust a tech giant.

you the man.
Haha! Well thanks for the swell compliments buddy! Yes, Apple and most other computer manufacturers have voodoo that was created with "Good intentions", but the fact that it exist, means it can be used and abuse by other attackers or LE if they want to. If apple was going to create this backdoor, I think they definitely need to publish disclosures of it to be a responsible tech-company to the public. However, the choose not to publish this. Also, you are correct, a password lock is not the ultimate End-All security. Passwords can be cracked, modified, hacked, keylogged, etc. So nobody should assume that because they have a strong passwerd, that their system is safe. Anyways, I'm just glad I can spread this information to people who want to know about certain mac secrets that can keep there mac more secure. You seem to be one of those people! So I will raise my glass to ya bud!

alwaysfire
/u/barenakedfuckers
2 points
3 years ago
thats some fucked up shit right there. but of course, one of the bigeest companies, and of course they are gonna go with what they are told to do. Thats why "SMART" people use LINUX :)
It is definitely some fucked up shit. But they say they do it because too many users lock themselves out of there firmware, which is mildly feasable, since most mac users are fucking retards. However, the firmare lock here occurs before the OS is even booted. Meaning, if you were running linux on your mac, it wouldn't even matter, because if you don't follow my guide, apple could still unlock the firmware from their apple store, and then access your Linux OS. This issue runs at the firmware level, which happens before the OS even loads, or boots. This happens when the computer itself turns on or boots it's firmware from instrucion set #1, Which is the very first instruction the mac is given when turned on. This is the the area of attack for rootkits, and bootkits, and all sorts of bios/firmware viruses, that persist even across full hard drive erasures and formatting. The boot kits can even infect a brand new drive that you install in your computer, because they maintain persistence at the firmware level, and reinfect anything that touches it. Very dangerous stuff. But having an impenetrable firmware lock can help in preventing certain attacks of these types of kits.
/u/42069
1 points
1 year ago
Apple just doesn't want to be able to repair /post/619131d048f22f5ea1fc/#c-0f77275183f5db6973 or refurbish their expensive shite https://www.youtube.com/watch?v=ZzS2vwDUO9U ...

It's not about security, but about who ultimately owns a device...
/u/HeadJanitor Moderator
2 points
3 years ago
So glad this is pinned. This WILL help somebody someday.
/u/barenakedfuckers
2 points
3 years ago
what sucks about the new macbooks is that the entire OS is installed on the CPU and not the drive. Also ive done some research about upgrading the internal memory and it doesnt even seem possible. Fucking proprietary shit!
/u/HeadJanitor Moderator
2 points
3 years ago
I think, as a company, Apple spends more time on how to refine their proprietary methods than the products themselves. They want to make sure there are no counterfeits.
/u/barenakedfuckers
1 points
3 years ago
but they also need to stop producing so many new version of the iphone, they just need to keep it at one kinda of phone and just keep updating their firmware. Even their firmware if buggy as fuck. My wifi at times wouldnt even work for making calls etc. And lately there been issues with the eSim
/u/42069
1 points
1 year ago
Apple is a greedy corporation.

That's why they solder down RAM and SSD, and use proprietary NANDs and put their EFI on the same chips as the OS so when their voltage IC suicides and yeets 12V onto a 2,7V rail, your MacBook is fucked so hard calling it bricked is victim-blaming!

https://www.youtube.com/watch?v=7cNg_ifibCQ

Personally I'd advice against using Apple Hardware entirely.
Get yourself some cheap used ThinkPad, a 2,5" SATA-SSD and matching USB Case and yoink Tails on that.
You can thank me later for saving you 4 digits in hardware costs...
/u/maxdroo1
2 points
3 years ago
This prevents alot of the long running online attacks against the OSX login security. Good post.
OS and FW hardening is something everybody should do, but ultimately we should all keep in mind
that it will not protect us from unencrypted data on disk. Nor proprietary operating systems.
/u/42069
1 points
1 year ago
The way Apple does shit however is just arsenine assholeism!
/post/619131d048f22f5ea1fc/#c-0f77275183f5db6973