My client has a requirement to encrypt their Macs after they are built
at a 3rd party build site. They should then be shipped to the users
encrypted and the users should be passed the credentials separately to
decrypt the device. This requirement is ...