Learn macOS Startup and Disk Protections
Apple builds in a huge array of tools that help if your machine is physically compromised, as when someone gains access to your computer without your permission, someone takes your Mac away without your knowledge or steals it in order to try to break into it, or when someone extracts hardware from your Mac.
Starting several years ago, Apple embedded the same chip-based Secure Enclave technology into Macs as they had developed for iPhones and iPads. That’s a big improvement for device security and data integrity.
But Apple has layered much more underneath and around it. In this chapter, I start by explaining how the Secure Enclave works in a Mac, and then proceed to talk about disk encryption and encrypting ...
Get Take Control of Securing Your Mac, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.