Skip to content

Commit 79e65c2

Browse files
gjbauerdavide125
authored andcommitted
removed extra and from security.md
Signed-off-by: gjbauer <[email protected]>
1 parent 80962b6 commit 79e65c2

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

docs/platform/security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@ has powered on and the SEP is satisfied with the state of iBoot and the system f
141141
When FileVault is enabled for an APFS volume, the VEK and xART are wrapped with a Key Encryption Key (KEK), which is backed
142142
by user credentials from the macOS container in question. The machine will be unable to read the user data volume of the
143143
protected container until these credentials are provided at startup. Enabling this is instantaneous on Apple Silicon machines, since
144-
the only required operation is generating the KEK and and a recovery key. The system snapshot, Preboot, and
144+
the only required operation is generating the KEK and a recovery key. The system snapshot, Preboot, and
145145
recovery volumes are not protected by FileVault. These partitions are immutable, backed by the SEP, and contain no user data
146146
and therefore do not particularly benefit from FileVault. All encryption keys are destroyed by the SEP
147147
when the Machine Owner requests the machine to be wiped, guaranteeing that any residual data is indecipherable even to data recovery

0 commit comments

Comments
 (0)