Bright personality with premature verbal evacuation, shut your mouth to accuse of lying. Are you familiar with the criminal offense of defamation on the internet? Disappear into the mist.
How are you going to argue with that and accuse me of lying?
https://www.passware.com/kit-forensic/
Do you understand how ridiculous your defamation bluster is? You're posting under a pseudonym, and criminal defamation isn't even a thing where I live.
Also, what you didn't see (because the moderation team here chose to edit it out of my post) is that I offered a second possibility: that you were just ignorant. I think that's what we have here.
There is nothing known that can recover data from a T2 or Apple Silicon Mac which has been erased with Apple's "Erase all content and settings" feature. To understand why, we will have to do a shallow dive into how Apple's disk encryption feature works on these computers, and into how that Passware product works. I am going to gloss over a lot of details to avoid going too deep into the weeds.
To unlock a FileVault volume, roughly the following steps take place:
1. User credentials (username/PW) are submitted to Apple's Secure Enclave (SE)
2. SE uses these credentials to decrypt a volume encryption key (VEK)
3. (Operational mode) SE uses the VEK to encrypt disk writes and decrypt disk reads
The important thing to understand is that user data is not encrypted directly with the user's password, only with the VEK, and the VEK never leaves the Secure Enclave. It's generated by a true random number generator (TRNG) inside the SE when you create the volume. The SE stores the VEK and other secrets it holds on behalf of the user inside a nonvolatile secure memory cryptographically paired to that specific Secure Enclave.
For all practical purposes, it's impossible to guess the VEK. Nobody has broken AES in its two decades of existence so far, and a 256-bit key means a brute force guessing attack would take an absurd length of time (think billions of years minimum) to complete.
The vulnerable link in this chain is the user's password, because it decrypts the VEK. People can't memorize 256 bits of pure randomness, so inevitably their passwords are much weaker than the VEK itself. In fact, most people choose really bad passwords. So, Apple's SE has two features to protect against brute force password guessing. One is that it rate-limits how fast you can try passwords, the other is that after too many consecutive wrong guesses it will erase all secrets protected by the user's credentials, including the VEK. Erasing such secrets can also be done on request; this is how Apple's "Erase all content" feature works. Once the VEK is gone, user data is effectively gone, same as if you'd erased all the flash.
So what does Passware actually do, then? To start with, they are not selling a product which can recover data from an erased Mac. Instead, they are selling a forensics solution intended to recover data from an un-erased device - typically, a computer seized by law enforcement.
Their product only covers Intel Macs, both with and without T2 chips. The "Intel without T2" case means there's no Secure Enclave in the picture, which makes it far simpler to do brute force password attacks. You can even image the machine and do them offline.
For T2 Intel Macs, Passware relies on the "checkm8" exploit. This is a security flaw in Apple's A10 boot ROM; it affects T2 as well because T2 was an A10 derivative. checkm8 doesn't give an attacker total control over A10/T2 - most notably, you don't get arbitrary code execution on the Secure Enclave Processor (SEP). However, what Passmark was able to do is figure out a technique to prevent the SE from erasing secrets after too many wrong guesses.
That opens the door to password cracking, but guesses are still rate-limited by the Secure Enclave. Therefore, Passware's product is based on reducing the search space by trying a dictionary of common bad passwords, and passwords obtained from data breaches.
Passware's T2 password recovery product will not work on:
1. Any Apple Silicon Mac - there are no known boot ROM exploits like checkm8 for A12 onwards, so they do not claim it can work on anything but T2 Macs
2. A T2 Intel Mac secured by a password that is (a) strong and (b) unique to that Mac (meaning it cannot be revealed by a website data breach - don't re-use passwords, folks)
3. Any Mac erased by Apple's "Erase all content and settings" feature
1 & 3 are hard fails, zero chance of success for Passmark. 2 is a soft fail because in principle the attacker can try random passwords long enough to find the real one. The rate limit is about 15 password tries per second, so you may have to wait years to crack a strong password. On the other hand, if the password is something weak like a couple English dictionary words pasted together, it's probably going to crack it quite fast.