The tradeoff between security and liberty often comes up in the USA. The context is usually infringement of civil rights vs the threat of terrorism. This tradeoff is seen in an entirely different context when Apple’s approach to data security on its newer Mac computers.
For the last four years or so, most Mac machines have had their disks encrypted in hardware:
Mac computers that have the Apple T2 Security Chip integrate security into both software and hardware to provide encrypted-storage capabilities. Data on the built-in, solid-state drive (SSD) is encrypted using a hardware-accelerated AES engine built into the T2 chip. This encryption is performed with 256-bit keys tied to a unique identifier within the T2 chip… The advanced encryption technology integrated into the T2 chip provides line-speed encryption
Another Apple document goes into more detail:
On Mac computers with the Apple T2 Security Chip, encrypted internal storage devices directly connected to the T2 chip leverage the hardware security capabilities of the chip. After a user turns on FileVault on a Mac, their credentials are required during the boot process… Without valid login credentials or a cryptographic recovery key, the internal APFS volume… remains encrypted and is protected from unauthorized access even if the physical storage device is removed and connected to another computer… all FileVault key handling occurs in the Secure Enclave; encryption keys are never directly exposed to the Intel CPU
But. To accomplish this, the hard drive must be soldered on to the same board that the T2 chip is. The same Apple doc clarifies:
Encryption of removable storage devices doesn’t utilize the security capabilities of the Apple T2 Security Chip, and its encryption is performed in the same manner as Mac computers without the T2 chip.
Which means that when you buy a computer with such a T2 chip, you get the benefit of high-grade default-on encryption at nearly zero overhead, but at the cost of never being able to upgrade your hard drive size for the lifetime of the device.
In addition, replacements to other components must be verified by running a tool whose distribution Apple closely controls:
… the T2 chip could render a computer inoperable if, say, the logic board is replaced, unless the chip recognizes a special piece of diagnostic software has been run. That means if you wanted to repair certain key parts of your MacBook, iMac, or Mac mini, you would need to go to an official Apple Store or a repair shop that’s part of the company’s Authorized Service Provider (ASP) network…
For Macs with the Apple T2 chip, the repair process is not complete for certain parts replacements until the AST 2 System Configuration suite has been run. Failure to perform this step will result in an inoperative system and an incomplete repair.
I see Apple’s gravitational pull make privacy more widely discussed than otherwise, causing other major tech companies to pay at least lip service to it. In the next few years, I think we will see new companies emerge that take a bold privacy-first stand because of Apple’s position on this. We’ve already seen Apple, Cloudflare and Fastly collaborate on a new privacy-oriented enhancement to an already privacy-oriented DNS lookup standard.
However, it increasingly seems that in its own ecosystem, Apple’s making it clearer than ever that the cost of this security is inherently going to be near-zero freedom to customise, repair or upgrade your hardware.