this post was submitted on 23 Jan 2026
802 points (99.5% liked)

Technology

79233 readers
3121 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] m0stlyharmless@lemmy.zip 1 points 12 hours ago

The initial setup of macOS offers disk encryption by default, but also prompts the user to upload the FileVault recovery keys to iCloud. It’s more transparent than Windows, which, if I recall correctly, just silently encrypts the disk and uploads the key to Microsoft servers.

iCloud’s Advanced Data Protection (ADP) feature, which enables E2E encryption, does protect these recovery keys, but I would worry about them being copied elsewhere or retained in unprotected backups after ADP is enabled.

One would probably want to regenerate the FileVault encryption keys after enabling ADP and potentially fully disable uploading the recovery keys to iCloud.

Similarly, it is possible to disable uploading of the BitLocker decryption key in Windows with the Pro and Enterprise versions.

Personally, I doubt most users would use disk encryption if they had to keep track of the disk recovery keys on their own, so this provides meaningful protection against exfiltration of sensitive information if an adversary were to have brief physical access to the device or were to steal it, but it does no good at all for protecting against Microsoft, someone with deep access to Microsoft’s systems, or legal requests to Microsoft.

The same goes for Apple users who don’t have ADP enabled for their iCloud accounts or who have enabled ADP without later regenerating their FileVault keys. (I don’t think one can be reasonably sure that there will be no traces of the cleartext FileVault recovery key on Apple’s servers after ADP is enabled for iCloud.)

Ultimately, so many users should better engage a culture of privacy and security, think seriously about their threat models, and think about what would happen if one where to get access to their sensitive information.