Quantcast
Channel: Comments on APFS in Detail: Conclusions
Browsing all 10 articles
Browse latest View live

By: Rich Teer

I respectfully disagree (although I do advocate for ECC as much as possible) with your assertion that disk checksums only make sense on ECC systems. That is akin to stating that locks are only of use...

View Article



By: derek

I remember doing this when i supported windows NT. I don’t remember why now, but we did a lot of installs onto FAT and converted to NTFS after.

View Article

By: 一个ZFS开发者眼中的苹果最新文件存储系统APFS – Log@X.X.B

[...] 该博客分为六个部分,原文地址: APFS in Detail: Overview APFS in Detail: Encryption, Snapshots, and Backup APFS in Detail: Space Efficiency and Clones APFS in Detail: Performance APFS in Detail: Data Integrity...

View Article

By: Andy Lawrence

This is similar to one of the features that I have designed into a new system I am developing. The idea is to have a simple ‘list’ object for every application. The list would contain the object IDs...

View Article

By: Andy Lawrence

They were doing this back in about 1997 or 1998 if my memory serves. I was working on a few disk utilities (PartitionMagic and Drive Image) at the time and we had to do some special things in order to...

View Article


By: Tanj Bennett

I’m shocked Apple still treats Flash as a block device with HDD semantics and layers abstractions like snapshots, metadata, transactional changes, RAID, sumchecks over top. Since they’ve been the...

View Article

By: Karl Ivar Dahl

I believe that bit rot in combination with encryption is a particular devastating combination. Would not a single bitflip carry over to all the subsequent data when decrypted?

View Article

By: Andy Lawrence

It would depend on the encryption algorithm. If you used a simple XOR operation (just obfuscation, not encryption in my book) then only the current byte would be affected. But if you used any of the...

View Article


By: Sam

You forget that Apple does indeed have checksumming, and monitoring thereof, of code on mobile devices. iOS only executes cryptographically signed code. This is likely why they are confident in their...

View Article


By: Meda Pastor

Howdy First of all I would like to say what a great post! I had a short question that I’d like to ask if you don’t mind. I was curious to understand how you center yourself and clear your thoughts...

View Article
Browsing all 10 articles
Browse latest View live




Latest Images