Copy Gigabytes of Data Between Macs with Target Disk Mode

Apple makes it easy to move data between Macs. You can send files via AirDrop, attach them to an email message, put them in a Messages conversation, turn on and connect via File Sharing, or use a file-sharing service like iCloud Drive, Dropbox, or Google Drive as an intermediary, to name just a few of the more obvious approaches.

But what if you have a lot of data—say tens or even hundreds of gigabytes—to transfer from one Mac to another? The techniques listed above might work, but we wouldn’t bet on it. If you had an external drive with sufficient free space handy, you could copy all the data to it from one Mac and then copy the data from it to another Mac. To cut the copy time in half, try Target Disk Mode instead. You may even be able to use Target Disk Mode on an older Mac to transfer an account with Migration Assistant when setting up a new Mac.

What Is Target Disk Mode?

Target Disk Mode is a special boot mode for Intel-based Macs and an option in macOS Recovery on Macs with Apple silicon that enables one Mac to behave like an external drive for another Mac. Target Disk Mode is nearly universal, easy to set up, and one of the fastest methods of moving files between Macs. Let’s unpack that statement:

  • Nearly universal: Every Mac sold in the last decade supports Target Disk Mode, so you can be sure it will work with any modern Mac. That’s true of both Intel-based Macs and Macs with Apple silicon.
  • Easy setup: Because Apple has baked Target Disk Mode into the Mac firmware, the version of macOS is irrelevant beyond the Thunderbolt cable requirement discussed below. There’s no software to configure nor any permissions to worry about. Putting a Mac into Target Disk Mode is particularly simple on Intel-based Macs, but it’s also easy on Macs with Apple silicon.
  • Speed: Because you’re connecting one Mac directly to another using Thunderbolt, you’ll get the fastest transfer speeds available.

If either Mac has macOS 11 Big Sur or later installed, you’ll need to connect them with a Thunderbolt cable—it’s fine to use Apple’s Thunderbolt 3 to Thunderbolt 2 adapter for connecting newer and older Thunderbolt-capable Macs. If both Macs are running an earlier version of macOS, you can use Thunderbolt, USB, or FireWire, depending on the available ports. (Note that the Apple USB-C Charge Cable that comes with the Apple power adapter doesn’t support Target Disk Mode, so if that’s the cable you were planning to use, sorry, but you’ll need to buy a real Thunderbolt cable.)

Step-by-Step Instructions for Intel-based Macs

To put an Intel-based Mac into Target Disk Mode for copying data, follow these steps:

  1. Connect the source Mac to the destination Mac with an appropriate cable.
  2. On the source Mac, either:
    • Restart the Mac, and once it starts booting, hold down the T key until you see the Target Disk Mode screen with a bouncing Thunderbolt logo.
    • Open System Settings/Preferences > Startup Disk, click Target Disk Mode, and then click Restart.
  3. The source Mac’s data and applications volume appears on the destination Mac’s Desktop like an external drive; if the source Mac is encrypted with FileVault, give it a minute to appear on the destination Mac, after which you’ll need to enter its password.
  4. Transfer the files as you would normally.
  5. When you’re done, unmount the source Mac’s drive by dragging it to the Trash in the Dock. Then press and hold the power button on the source Mac for a few seconds to shut it down.

Step-by-Step Instructions for Macs with Apple Silicon

The process is somewhat more involved for Macs with Apple silicon, where the shared drive or volume appears like a network volume:

  1. Connect the source Mac to the destination Mac with an appropriate cable.
  2. On the Mac with Apple silicon, choose Shut Down from the Apple menu to turn it off.
  3. Press and hold the power button until “Loading startup options” appears.
  4. Click Options, and then click Continue to enter macOS Recovery.
  5. Select a user, click Next, enter the user’s password, and click Continue.
  6. Choose Utilities > Share Disk.
  7. Select the drive or volume you want to share, and click Start Sharing. (If the drive is encrypted using FileVault, click Unlock and enter the FileVault password first.)
  8. On the destination Mac, open a Finder window and click Network (under Locations) at the bottom of the sidebar.
  9. In the Network window, double-click the Mac with the shared drive or volume, click Connect As, select Guest in the Connect As window, and then click Connect. The shared drive or volume becomes available like any other external hard drive.
  10. Transfer the files as you would normally.
  11. When you’re done, unmount the shared drive or volume by dragging it to the Trash, then click Stop Sharing on the source Mac.

Although it’s not something you’ll use every day, Target Disk Mode is one of the unsung innovations that has made Macs easier to use for decades, and it’s well worth keeping in mind whenever you need to move lots of data between machines.

(Featured image by Adam Engst)

LastPass Security Breach: Here’s What to Do

Password management company LastPass has announced that it suffered a security breach in which attackers stole both encrypted customer account data (which is bad) and customer vaults containing encrypted usernames and passwords (which is much, much worse). On the positive side, the data of users who abided by LastPass’s defaults and created master passwords of at least 12 characters in length will likely resist cracking attempts.

Although 1Password is the most popular password manager for Apple users, we’ve mentioned LastPass as an alternative in previous articles, so here’s what happened and how LastPass users should react. For those who don’t use LastPass, we also discuss ways your organization can improve its online security by learning from LastPass’s mistakes and misfortunes.

The Breach

According to LastPass, the breach started in August 2022 when an attacker compromised a developer’s account. The attacker then leveraged information and credentials from that initial breach to target another LastPass employee’s account, where they were able to steal data from cloud-based storage that LastPass used for backup.

The main lesson here is that a dedicated attacker will probe all points of access into a company’s digital infrastructure—everyone must be mindful of security at all times. It also seems that LastPass may have been paying more attention to its on-premises production systems than its cloud-based backup storage. Any organization can learn from that error—if backups contain sensitive data, they should be equally protected.

What Was Stolen

LastPass says that the stolen data included unencrypted customer account information such as names, addresses, and phone numbers, but not credit card details. In the customer vaults, LastPass did secure usernames, passwords, secure notes, and form-filled data using 256-bit AES encryption, so they can be decrypted only with a unique encryption key derived from each user’s master password. However, for inexplicable reasons, LastPass failed to encrypt website URLs associated with password entries.

Because LastPass left this information unencrypted, it’s now available for the attacker to use (or sell for others to use) in targeted phishing attacks. A forged password reset request from an unusual website you regularly use has a better chance of fooling you than a generic one for a big site that millions of people use. It’s even possible that the unencrypted website URLs could lead to extortion attempts, as in the infamous Ashley Madison data breach.

The larger lesson is that a high-value attack target like LastPass should never have stored customer data in unencrypted form. If your company handles customer data along these lines, ensure that it’s always stored in encrypted form. You may not be able to prevent attackers from accessing your network, but if all the data they can steal is encrypted, that limits the overall damage that can ensue.

Potential Problems

By default, LastPass requires master passwords to be at least 12 characters in length. Plus, LastPass applies 100,100 iterations of the PBKDF2 password-strengthening algorithm to make it harder for brute-force attacks to crack passwords. The company says:

If you use the default settings above, it would take millions of years to guess your master password using generally-available password-cracking technology. Your sensitive vault data, such as usernames and passwords, secure notes, attachments, and form-fill fields, remain safely encrypted based on LastPass’ Zero Knowledge architecture. There are no recommended actions that you need to take at this time.

Unfortunately, LastPass increased the master password minimum length only in 2018 and did not require users with shorter master passwords to reset them at that time. Similarly, the PBKDF2 setting now uses 100,100 iterations, but it previously used 5000, and some long-time users report it being set to 500.

LastPass was correct to increase the default level of security for new accounts as hardware cracking capabilities became faster. However, allowing users to continue using insecure master passwords that were too short and not forcing higher PBKDF2 iteration counts was a major mistake. If your organization steps up its security policies, bite the bullet and ensure that no accounts or users are grandfathered in with old, insecure options.

By not recommending any actions, LastPass missed an opportunity to encourage users to increase their security through multifactor authentication. LastPass also downplayed the concern over phishing attacks. That was likely a decision made by PR (and possibly Legal), but the company could have served users better. Should your organization ever be involved in a breach, make sure that someone involved in the transparency discussions represents the users’ best interests alongside those of the organization. And consider requiring multifactor authentication!

Finally, it’s worth noting that other companies significantly increase the security of their systems by mixing passwords with additional device-based keys. Apple does this by entangling device passcodes and passwords with the device’s unique ID, and 1Password strengthens your passwords with a secret key. LastPass has no such additional protection.

What LastPass Users Should Do

There are two types of LastPass users in this situation: those who had long, secure master passwords and 100,1000 iterations of PBKDF2 and those who didn’t:

  • Strong master password users: Despite LastPass’s claim that you don’t need to do anything, we recommend enabling multifactor authentication. (For instructions, click Features & Tools and then Multifactor Authentication in the LastPass support portal.) You could change your master password too, but that won’t affect the data that was already stolen. That horse has already left the barn, whereas enabling multifactor authentication would prevent even a cracked master password from being used in the future.
  • Weak master password users: Sorry, but you have work to do. Immediately change your master password and increase your PBKDF2 iterations to at least 100,100. We also recommend enabling multifactor authentication because LastPass is such an important account. Next, go through all your passwords and change at least those for important websites. Start with the critical accounts that could be used to impersonate you, like email, cell phone, and social media, plus those that contain financial data.

Regardless of the strength of your master password, be on high alert for phishing attacks conducted through email and text messages. Because the stolen data included both personal information and URLs to websites where you have accounts, phishing attacks may be personalized to you, making them harder to detect. In short, don’t follow links in email or texts to any website where you have to log in. Instead, navigate to the website directly in your browser and log in using links on the site. Don’t trust URL previews—it’s too easy to fake domain names in ways that are nearly impossible to identify.

Should you switch from LastPass to another service, like 1Password? It comes down to whether you believe LastPass has both a sufficiently secure architecture despite not entangling the master password with some device-based key and sufficiently robust security practices despite having been breached. It would not be irrational to switch, and we would recommend switching to 1Password. Other password managers like Bitwarden and Dashlane may be fine too. If you have to change numerous passwords and choose to switch, it may be easier to change the passwords after switching—see how the process of updating a password compares between LastPass and 1Password or whatever tool you end up using.

We realize this is an extremely worrying situation for LastPass users, particularly those with weak master passwords or too-few PBKDF2 iterations set. Only you can reset your passwords, but if you need assistance switching to another password manager, don’t hesitate to contact us.

(Featured image by LastPass)

What Is Advanced Data Protection for iCloud? Should You Enable It?

In early December, Apple made a surprise announcement: Advanced Data Protection for iCloud. It’s not as though iCloud’s standard data protection is problematic, but it hinges on one architectural decision that makes some iCloud data theoretically vulnerable: Apple holds the encryption keys necessary to decrypt iCloud data. Because Apple controls those encryption keys, an attacker or rogue Apple employee who could gain access to them could theoretically steal iCloud data. (There are many more safeguards; it’s not like there’s a big printout of keys anywhere.) Plus, since Apple has the technical capability to read that data, law enforcement agencies could legally compel Apple to hand it over.

Not all iCloud data is vulnerable in this way. Of the 26 types of iCloud data, 14 already support end-to-end encryption, where you control the encryption keys. That’s true of Health data, Passwords and Keychain, Apple Card transactions, and so on. You may not realize you’re managing these keys because Apple has baked that into the security architecture of its overall ecosystem. Apple hadn’t previously extended end-to-end encryption to more iCloud data types because doing so prevents Apple’s support engineers from recovering accounts for users who forget their passwords. Even when Apple can recover an account, the end-to-end encrypted data isn’t included.

So that’s the tradeoff. Advanced Data Protection increases security by extending end-to-end encryption to 9 of the remaining 12 iCloud data types. Those include iCloud Backup, iCloud Drive, Photos, Notes, Reminders, Safari Bookmarks, Siri Shortcuts, Voice Memos, and Wallet passes. But if you turn on Advanced Data Protection and forget your password, Apple won’t be able to help you recover your data.

Apple isn’t being cavalier about this risk. When you enable Advanced Data Protection, you must set up an alternate recovery method, preferably two. The simplest is a printed recovery key that you should store with other important papers, perhaps in a safe deposit box, and the other is an account recovery contact, a trusted person who can verify your identity and help you regain access to your account.

Nor is Advanced Data Protection a one-way street. If you ever decide the risk of forgetting your password is too great, you can always turn it off and fall back to iCloud’s standard data protection.

Several types of iCloud data remain under the standard iCloud protection even after you turn on Advanced Data Protection. For iCloud Mail, Contacts, and Calendars, the need to interoperate with external email, contacts, and calendar systems requires that Apple manage the encryption keys. Similarly, the collaboration capabilities of Pages, Numbers, and Keynote and the Shared Albums feature of Photos don’t support Advanced Data Protection. Also, although Advanced Data Protection can protect shared notes, reminders, and iCloud Drive folders, plus iCloud Shared Photo Library, that’s true only if everyone involved in sharing has Advanced Data Protection turned on. If not, the shared content falls back to standard iCloud protection.

There are also two notable downsides to turning on Advanced Data Protection:

  • System requirements: All devices signed in with your Apple ID must be updated to at least iOS 16.2, iPadOS 16.2, macOS 13.1, tvOS 16.2, watchOS 9.2, or the latest version of iCloud for Windows. As a result, you’ll have to sign out of iCloud on any device too old to upgrade to the necessary operating system version. That may be a deal-breaker for some people. You must also have two-factor authentication enabled for your Apple ID and a password or passcode set on your devices, but everyone should already have done that, regardless of Advanced Data Protection.
  • iCloud.com Web access: Turning on Advanced Data Protection automatically disables Web access to data at iCloud.com. You can re-enable Web access, but every subsequent visit to iCloud.com requires authorization from a trusted device, and the connection only lasts for an hour. If you make heavy use of iCloud.com, Advanced Data Protection may be burdensome.

So, should you use Advanced Data Protection? As long as all your devices support it, you’re not perturbed about the repeated iCloud.com authorizations, and you’re capable of maintaining both account recovery methods, go ahead. Although the benefit to most people isn’t huge—Apple’s security is excellent, and most people won’t be targeted by law enforcement—the downside is minimal as long as you understand the risk of Apple not being able to recover your account.

To enable the feature, navigate to Settings > Your Name > iCloud > Advanced Data Protection, tap Turn On Advanced Data Protection, and follow the prompts. Remember that you’ll need to set up the Account Recovery options before turning on Advanced Data Protection, and you may need to remove older devices from your iCloud account.

(Featured image by iStock.com/TU IS)

Apple Delivers Promised Features in End-of-Year OS Updates

Every year at its Worldwide Developer Conference in June, Apple previews planned features in the upcoming versions of macOS, iOS, iPadOS, watchOS, and tvOS. However, not all of those features are necessarily ready for the initial releases of those operating systems. In part, that’s because iOS must ship in sync with the latest iPhone models that Apple releases in September, whereas iPadOS and macOS often come out later. Even then, some of Apple’s promised features may not be ready for public consumption until the .1 or .2 updates.

Just before the holidays, Apple released a full set of updates, including iOS 16.2, iPadOS 16.2, macOS 13.1 Ventura, watchOS 9.2, and tvOS 16.2. Between those updates and the ones immediately preceding them, Apple has now delivered on all of its 2022 promises.

Here is a rundown of what’s now possible. Some features are specific to one of Apple’s operating systems; others cut across several and may work only on updated devices or even require that all your devices be upgraded:

  • iCloud Shared Photo Library: Starting in iOS 16.1, iPadOS 16.1, and macOS 13.0, you can create another photo library and share it with family and close friends. It’s a great way to create a single shared space for photos and videos, but note that everything you contribute moves out of your Personal Library and into the Shared Library. Plus, everyone with whom you’re sharing has equal permissions to add, edit, and delete content in the Shared Library. The person who creates the Shared Library must have space in iCloud for it; it doesn’t count against anyone else’s iCloud storage.
  • Live Activities: With iOS 16.1, Apple also unveiled Live Activities, a new type of dynamic notification that can appear on the iPhone’s Lock Screen or the iPhone 14 Pro’s Dynamic Island. Live Activities allow apps to display data like live sports scores (from the TV app), active weather (in CARROT Weather, below), flight tracking (in Flighty), and more.
  • Freeform: The most notable addition in iOS 16.2, iPadOS 16.2, and macOS 13.1 was Freeform, Apple’s digital whiteboard app designed for collaborative brainstorming. It enables users to lay out a wide variety of content on a flexible canvas without worrying about fixed layouts or restrictive page sizes. Boards can contain text, hand-drawn graphics, sticky notes, shapes, and attachments—nearly any file on your Mac, iPad, or iPhone. Data syncs to your other devices through iCloud, and you can invite others (who must also be running a supported operating system) to collaborate on a board in real time.
  • New Home architecture: Apple promised that the new Home architecture would be more reliable and efficient, although it’s not clear what that means. It does require an explicit upgrade, and once upgraded, devices that aren’t running the latest versions of iOS, iPadOS, macOS, watchOS, tvOS, and HomePod Software won’t be able to access the home. Apple has temporarily removed the option to upgrade after problems were reported, so perhaps wait until the company restores the upgrade and others have had a chance to test it.
  • Stage Manager on external displays: The feature that initially caused iPadOS 16 to be delayed was Stage Manager, Apple’s new windowing paradigm for the iPad and the Mac. However, even when it first shipped in iPadOS 16.1, Stage Manager didn’t support external displays on the iPad. With iPadOS 16.2, you can finally have four apps in Stage Manager on the iPad display and another four on an external display. However, using Stage Manager on an external display requires an M1 iPad, which means the fifth-generation iPad Air, the third-generation 11-inch iPad Pro and later, and the fifth-generation 12.9-inch iPad Pro and later.
  • Race Route and automatic track detection: In watchOS 9.2, the new Race Route feature gives you the option of racing your last or best time on any route you’ve run or biked at least twice. Plus, if you start an Outdoor Run workout while at a track, you’re prompted to begin a Track workout that optionally provides track-specific metrics like lap time and pace.
  • Advanced Data Protection: In a surprise announcement in December, Apple unveiled Advanced Data Protection for iCloud, which extends end-to-end encryption to many more types of data in iCloud. For those concerned about breaches of Apple’s security or overreach by law enforcement, Advanced Data Protection is a very good thing. The downside is that when the feature is enabled, Apple cannot recover your data if you forget your iCloud password. For most people, the standard iCloud data protection remains sufficient. If you want to upgrade, note that all devices that you want to connect to your iCloud account must be running the latest operating system versions, which may not be possible for some otherwise fully functional older devices.
  • Apple Music Sing: If you’ve been hankering to sing along with your favorite songs, Apple Music Sing is essentially karaoke for Apple Music subscribers on the iPhone, iPad, and third-generation Apple TV. Alcohol not included.

Between these new features and some important security updates, we strongly encourage anyone running iOS 16, iPadOS 16, watchOS 9, and tvOS 16 to update to iOS 16.2, iPadOS 16.2, watchOS 9.2, and tvOS 16.2. And if you’re still running an earlier version of one of those operating systems, you can upgrade to the latest at any time—they’re fine.

Similarly, if you’re already running macOS 13 Ventura—perhaps on a newly purchased Mac— you should update to version 13.1 to take advantage of security fixes. However, if you haven’t yet upgraded from macOS 12 Monterey, perhaps wait a little longer. There has been only one macOS update with bug fixes since the initial release of Ventura, so it feels as though another bug fix update might arrive soon, after which we may recommend general upgrades.

(Featured image based on original by iStock.com/champpixs)