How a Macfax cert is bound to one specific Mac.
The five components that make a Macfax cert un-replayable across devices. Plain-English first; cryptographic depth as you scroll.
Server-issued nonce
Every cert request begins with a server-issued nonce. The seller's app embeds it in the diagnostic payload. This prevents replay attacks where a seller would save an old cert and reuse it for a different device.
Apple's Activation Lock attestation
Before any heavy diagnostic runs, we check Apple's Activation Lock and Find My state. A device with Activation Lock on cannot be transferred to a buyer; we surface that immediately rather than letting the seller waste 45 minutes on burn-in.
Secure Enclave signature (App Attest)
The diagnostic payload is signed by the Mac's Secure Enclave key via Apple's App Attest API. The enclave key is fused to the logic board at manufacture and cannot be moved between devices. This is the load-bearing primitive; without it, the cert would be a glorified PDF.
Hardware fingerprint hash
We hash the chassis serial, logic-board serial, and model identifier together. On a logic-board swap (a real Mac Studio attack vector), the chassis and logic-board serials disagree, and the hash changes. The cert records the hash; mismatch is detectable.
Time-bounded validity (30 days)
Every cert expires 30 days from issuance. This forces fresh certs on listings that linger and prevents stale certs from being sold years later as 'still valid.' Re-issuance is free within 14 days for the same device.
How buyer-side re-attestation closes the loop.
Every cert URL has a .json twin.
Append .json to any cert URL to get the structured payload, useful for programmatic verification by escrow agents, marketplaces, or third-party tools.
Ready to certify your Mac?
$39 one-time. Refund if generation fails. No account, no subscription.