
Recovery KeyĮxtraction: search, cloud acquisition (coming to Elcomsoft Phone Breaker 6.0), request from Apple Note that it is no longer possible to run a FireWire attack on locked or sleeping Macs due to Mac OS X security restrictions, so the RAM capturing tool must be executed on a running computer with FileVault 2 container unlocked and a user logged in. In order to recover these keys, one would need to dump the content of the computer’s RAM into a file. Once the FileVault 2 volume is unlocked, the XTS-AES key is stored in the computer’s RAM. The 256-bit XTS-AES key is the actual encryption key that is used by the system to encrypt and decrypt data. Location: RAM (only while the encrypted volume is mounted)

This method requires additional steps to activate, and is typically used in organizations with centralized keychain management. These recovery keys are created when system administrators enable FileVault 2 encryption with FileVaultMaster.keychain. There is also an additional unlock method available called Institutional Recovery Key.
