A smart thing to do. I doubt many people even know about this firmware backdoor as apple doesn't even document it. So it's definitely a good trick. Glad you got some knowledge out of it.
I was aware of something to do with it as I've read about some cases where they did"voodoo" too access it. This just elaborates on their voodoo. To think any device is impervious with a password or passcode or passphrase is just idiocy. I have a hard time trusting a paid lawyer, you got me fucked up too trust a tech giant.
Haha! Well thanks for the swell compliments buddy! Yes, Apple and most other computer manufacturers have voodoo that was created with "Good intentions", but the fact that it exist, means it can be used and abuse by other attackers or LE if they want to. If apple was going to create this backdoor, I think they definitely need to publish disclosures of it to be a responsible tech-company to the public. However, the choose not to publish this. Also, you are correct, a password lock is not the ultimate End-All security. Passwords can be cracked, modified, hacked, keylogged, etc. So nobody should assume that because they have a strong passwerd, that their system is safe. Anyways, I'm just glad I can spread this information to people who want to know about certain mac secrets that can keep there mac more secure. You seem to be one of those people! So I will raise my glass to ya bud!
thats some fucked up shit right there. but of course, one of the bigeest companies, and of course they are gonna go with what they are told to do. Thats why "SMART" people use LINUX :)
It is definitely some fucked up shit. But they say they do it because too many users lock themselves out of there firmware, which is mildly feasable, since most mac users are fucking retards. However, the firmare lock here occurs before the OS is even booted. Meaning, if you were running linux on your mac, it wouldn't even matter, because if you don't follow my guide, apple could still unlock the firmware from their apple store, and then access your Linux OS. This issue runs at the firmware level, which happens before the OS even loads, or boots. This happens when the computer itself turns on or boots it's firmware from instrucion set #1, Which is the very first instruction the mac is given when turned on. This is the the area of attack for rootkits, and bootkits, and all sorts of bios/firmware viruses, that persist even across full hard drive erasures and formatting. The boot kits can even infect a brand new drive that you install in your computer, because they maintain persistence at the firmware level, and reinfect anything that touches it. Very dangerous stuff. But having an impenetrable firmware lock can help in preventing certain attacks of these types of kits.
what sucks about the new macbooks is that the entire OS is installed on the CPU and not the drive. Also ive done some research about upgrading the internal memory and it doesnt even seem possible. Fucking proprietary shit!
I think, as a company, Apple spends more time on how to refine their proprietary methods than the products themselves. They want to make sure there are no counterfeits.
but they also need to stop producing so many new version of the iphone, they just need to keep it at one kinda of phone and just keep updating their firmware. Even their firmware if buggy as fuck. My wifi at times wouldnt even work for making calls etc. And lately there been issues with the eSim
That's why they solder down RAM and SSD, and use proprietary NANDs and put their EFI on the same chips as the OS so when their voltage IC suicides and yeets 12V onto a 2,7V rail, your MacBook is fucked so hard calling it bricked is victim-blaming!
https://www.youtube.com/watch?v=7cNg_ifibCQ
Personally I'd advice against using Apple Hardware entirely.
Get yourself some cheap used ThinkPad, a 2,5" SATA-SSD and matching USB Case and yoink Tails on that.
You can thank me later for saving you 4 digits in hardware costs...
This prevents alot of the long running online attacks against the OSX login security. Good post.
OS and FW hardening is something everybody should do, but ultimately we should all keep in mind
that it will not protect us from unencrypted data on disk. Nor proprietary operating systems.
you the man.
alwaysfire