It's one thing to demonstrate a PoC live on life/safety critical systems, it's another to brag about sources & methods on social media, leave your machine powered-on and blab contents to anyone and everyone whom can be called as a witness (whether hostile, material or voluntary).<p>0. NEVER TALK TO THE COPS. [0]<p>1. NEVER LEAVE ENCRYPTED MACHINES HOT (decryption keys or filesystem cache in memory). FireVault 2 optionally leaves keys in memory [1, 2]<p>2. NEVER REUSE PASSWORDS OR PREVIOUSLY CONFISCATED GEAR (start fresh, beware of firmware and other hard-to-detect hw mods)<p>Presume mil/gov vuln shops have high cost USB, FireWire and Thunderbolt DMA memory cloning capabilities. If a machine has gone out of your possession, good luck finding which injection-molded part now contains a keylogger which will allow them to unlock your cloned disk images and RAM image after-the-fact (to get your password to get your fv key). (It's not tinfoil far-fetched if you go out of your way to get on one of the various govts department's radar.)<p>BTW, laptop was a MacBook Pro (Retina, 15-inch, Late 2013)<p>Valid Purchase Date
A validated purchase date lets Apple quickly find your product and provide the help you need.<p>Telephone Technical Support: Expired
You are eligible to purchase telephone technical support from an Apple Advisor.
Contact Apple Support<p>Repairs and Service Coverage: Expired
Our records indicate that your product is not covered under Apple's 1-year limited warranty or AppleCare Protection Plan for hardware repairs and service based on the estimated expiration date.<p>References:<p>0: <a href="https://youtu.be/6wXkI4t7nuc" rel="nofollow">https://youtu.be/6wXkI4t7nuc</a><p>1: destroyfvkeyonstandby <a href="https://developer.apple.com/library/mac/documentation/Darwin/Reference/ManPages/man1/pmset.1.html" rel="nofollow">https://developer.apple.com/library/mac/documentation/Darwin...</a><p>2: <a href="https://security.stackexchange.com/questions/18720/how-secure-is-filevault-2-while-the-computer-is-in-sleep-mode" rel="nofollow">https://security.stackexchange.com/questions/18720/how-secur...</a>