

- Carbon copy cloner encryption for mac#
- Carbon copy cloner encryption upgrade#
- Carbon copy cloner encryption password#
Once booted into an external drive, open Finder, right click on the Macintosh HD disk in the sidebar and select Encrypt.ĭon't forget to securely wipe the external drive.

CCC is also excellent to manage the Recovery HD partition if you end up nuking it.īoot pressing option to select the boot disk. The easiest way to do this is by using Carbon Copy Cloner to make a bootable drive. You first need to boot from an external drive. This is a little trickier, and I wouldn't do this without a backup. Choose "Mac OS Extended (Journaled, Encrypted)" and select your FDE passphrase.Įxit Disk Utility, connect to Wi-Fi, and (re)install macOS on the Macintosh HD partition. Then, select the Macintosh HD partition (not the whole drive, you don't want to kill the Recovery HD and make the installer shrink your partition to make a new one) and click Erase. If you are installing a new machine and don't care about wiping the entire thing, it's fairly easy.įirst, boot into recovery mode by pressing ⌘-R while starting the machine, and select Disk Utility. Getting there is not easy, but once we do the firmware just happily asks for our "Disk Password", unlocks the disk, and continues booting. What we want is a mix of the external drive encryption with its custom passphrase and the Recovery HD boot process. In that case there is no Recovery HD, and there is a single encrypted partition, which can be unlocked not by username/password pairs, but by plain disk passwords. The FileVault 2 encryption is controlled by the resident OS and unlockable by a set of username/password accounts.įileVault 2 can also be used to encrypt external drives. So the default FileVault 2 FDE setup involves a unencrypted hidden Recovery HD, and an encrypted container partition, with your actual partitions inside. This is the system that decrypts the main partition and then boots from it when you have FDE enabled. How it does that is with an EFI firmware, and the support of a couple hidden partitions, one of them called Recovery HD. If you boot pressing ⌘-R, for example, it will boot into a recovery mode capable of reinstalling the system. MacOS can do a lot of things before booting the main system. However, support for it is present in the firmware. There is no documented way of setting different passwords for the disk encryption and the OS user.
Carbon copy cloner encryption password#
Overloading the login/unlock/sudo password is an understandable UX simplicity choice, but makes it very hard to manage the security tradeoff: you want an easy to type password for login (which can't be bruteforced offline), but you want a complex long passphrase for FDE. Normally, it's turned on from System Preferences, and locks the disk with the passwords of all the users allowed to unlock the machine.

Carbon copy cloner encryption for mac#
Carbon copy cloner encryption upgrade#
It is not the easiest process ever, forcing you to upgrade the graphics card, have access to a spare SATA HDD, and go through a couple of dozen or so more steps inside Chameleon bootloader, terminal, and elsewhere.
:max_bytes(150000):strip_icc()/CarbonCopyCloner-5a480abab39d0300371abf66.jpg)
As pointed out by OWC, a step-by-step instruction guide has popped up courtesy of Mac user Jabbawok that details the steps necessary to get Mountain Lion running on a MacPro1.1 (the models first introduced in 2006).
