site_archiver@lists.apple.com Delivered-To: darwin-dev@lists.apple.com - Dave On Jan 2, 2008, at 11:10 AM, Robert T Wyatt wrote: Not if the EFI or Open Firmware password have been set. _______________________________________________ Do not post admin requests to the list. They will be ignored. Darwin-dev mailing list (Darwin-dev@lists.apple.com) Help/Unsubscribe/Update your Subscription: http://lists.apple.com/mailman/options/darwin-dev/das%40doit.wisc.edu _______________________________________________ Do not post admin requests to the list. They will be ignored. Darwin-dev mailing list (Darwin-dev@lists.apple.com) Help/Unsubscribe/Update your Subscription: http://lists.apple.com/mailman/options/darwin-dev/site_archiver%40lists.appl... No. The firmware password can be easily and trivially defeated with unfettered physical access (change physical amount of RAM in the machine, and zap PRAM). And I was about to respond to the last post, too, and thought better of it...but anyway, yes, it is a moot point and mostly a ridiculous argument, but *technically*, if a thief could somehow easily do this, it would render FileVault useless for a logged-in user. Why it would be necessary to close the lid as opposed to just taking it is beyond me, but as long as we're considering every fringe case, there's another one. Matt Burnett wrote: Thats a moot point. If a thief has physical access to a machine, he wont care if its logged in or not. If he wants the data, he can boot off a CD, if they want a machine, then well, they all ready have it. On Jan 2, 2008, at 9:50 AM, Robert T Wyatt wrote: Too bad that this may be a mechanism for a thief to use to leave one's machine running and logged in while they move it to another location. This email sent to das@doit.wisc.edu This email sent to site_archiver@lists.apple.com
participants (1)
-
Dave Schroeder