Stolen MacBook should I worry about my data?How to secure data before returning Macbook Air?Macbook pro, rootkithunterPatching Mac DMA attackShould I worry about a breach where my password was not revealed?Did I get “hacked”? Need helpIs non-malicious unauthorised usage likely to suggest a security compromise?How secure is the new MacBook Pro's Touch ID?MacBookPro's OSX install.log has entries that predate the initial unboxingHow to Best Minimize Damage After Loss of Computer

Shift lens vs move body?

How do we improve collaboration with problematic tester team?

A first "Hangman" game in Python

Why does matter stay collapsed in the core, following a supernova explosion?

Why is explainability not one of the criteria for publication?

What are the IPSE’s, the ASPE’s, the FRIPSE’s and the GRIPSE’s?

Why did James Cameron decide to give Alita big eyes?

Why is there not a willingness from the world to step in between Pakistan and India?

Can an object tethered to a spaceship be pulled out of event horizon?

Commercial company wants me to list all prior "inventions", give up everything not listed

Time difference between banns and marriage

Why does the weaker C–H bond have a higher wavenumber than the C=O bond?

Should I use the words "pyromancy" and "necromancy" even if they don't mean what people think they do?

Which meaning of "must" does the Slow spell use?

Did ancient peoples ever hide their treasure behind puzzles?

Half filled water bottle

Are strlen optimizations really needed in glibc?

Drawing probabilities on a simplex in TikZ

To what extent should we fear giving offense?

How many petaflops does it take to land on the moon? What does Artemis need with an Aitken?

Does the Reduce option from the Enlarge/Reduce spell cause a critical hit to do 2d4 less damage?

How to emphasise the insignificance of someone/thing – besides using "klein"

Federal Pacific 200a main panel problem with oversized 100a 2pole breaker

Force SQL Server to use fragmented indexes?



Stolen MacBook should I worry about my data?


How to secure data before returning Macbook Air?Macbook pro, rootkithunterPatching Mac DMA attackShould I worry about a breach where my password was not revealed?Did I get “hacked”? Need helpIs non-malicious unauthorised usage likely to suggest a security compromise?How secure is the new MacBook Pro's Touch ID?MacBookPro's OSX install.log has entries that predate the initial unboxingHow to Best Minimize Damage After Loss of Computer






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty margin-bottom:0;








3















Unfortunately, someone stole my laptop(Macbook) and I did not realize that for 48 hours. Now, this was a work laptop and my company's security team is going to wipe the laptop out remotely if it is on ASAP. Which is nice.



However, what I am worried about is more about what could happen in those first 48 hours.



  1. My passwords were all over the place(auto-fill on my browser etc)

  2. My evernote had some good amount of passwords

What I am guessing is that since it was stolen from my car, someone stealing it was interested more into selling parts of it or wipe it off and re-sell it(Not data). At least, I hope that.



Now, in worst case scenario, if it was stolen by a person who is dedicatedly interested in data. What are their options? Can they really crack open a Macbook and get my data?



If so, what are my options?










share|improve this question





















  • 2





    Given enough time and effort, in the worst case scenario, yes this would be possible. That's why we usually encrypt our drive(s) in order to prevent data leakage. In the meantime, you should change all your online passwords a.s.a.p.

    – Jeroen - IT Nerdbox
    9 hours ago

















3















Unfortunately, someone stole my laptop(Macbook) and I did not realize that for 48 hours. Now, this was a work laptop and my company's security team is going to wipe the laptop out remotely if it is on ASAP. Which is nice.



However, what I am worried about is more about what could happen in those first 48 hours.



  1. My passwords were all over the place(auto-fill on my browser etc)

  2. My evernote had some good amount of passwords

What I am guessing is that since it was stolen from my car, someone stealing it was interested more into selling parts of it or wipe it off and re-sell it(Not data). At least, I hope that.



Now, in worst case scenario, if it was stolen by a person who is dedicatedly interested in data. What are their options? Can they really crack open a Macbook and get my data?



If so, what are my options?










share|improve this question





















  • 2





    Given enough time and effort, in the worst case scenario, yes this would be possible. That's why we usually encrypt our drive(s) in order to prevent data leakage. In the meantime, you should change all your online passwords a.s.a.p.

    – Jeroen - IT Nerdbox
    9 hours ago













3












3








3


1






Unfortunately, someone stole my laptop(Macbook) and I did not realize that for 48 hours. Now, this was a work laptop and my company's security team is going to wipe the laptop out remotely if it is on ASAP. Which is nice.



However, what I am worried about is more about what could happen in those first 48 hours.



  1. My passwords were all over the place(auto-fill on my browser etc)

  2. My evernote had some good amount of passwords

What I am guessing is that since it was stolen from my car, someone stealing it was interested more into selling parts of it or wipe it off and re-sell it(Not data). At least, I hope that.



Now, in worst case scenario, if it was stolen by a person who is dedicatedly interested in data. What are their options? Can they really crack open a Macbook and get my data?



If so, what are my options?










share|improve this question
















Unfortunately, someone stole my laptop(Macbook) and I did not realize that for 48 hours. Now, this was a work laptop and my company's security team is going to wipe the laptop out remotely if it is on ASAP. Which is nice.



However, what I am worried about is more about what could happen in those first 48 hours.



  1. My passwords were all over the place(auto-fill on my browser etc)

  2. My evernote had some good amount of passwords

What I am guessing is that since it was stolen from my car, someone stealing it was interested more into selling parts of it or wipe it off and re-sell it(Not data). At least, I hope that.



Now, in worst case scenario, if it was stolen by a person who is dedicatedly interested in data. What are their options? Can they really crack open a Macbook and get my data?



If so, what are my options?







account-security macos apple






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited 8 hours ago









Conor Mancone

13.5k5 gold badges36 silver badges59 bronze badges




13.5k5 gold badges36 silver badges59 bronze badges










asked 9 hours ago









LostLost

1621 silver badge4 bronze badges




1621 silver badge4 bronze badges










  • 2





    Given enough time and effort, in the worst case scenario, yes this would be possible. That's why we usually encrypt our drive(s) in order to prevent data leakage. In the meantime, you should change all your online passwords a.s.a.p.

    – Jeroen - IT Nerdbox
    9 hours ago












  • 2





    Given enough time and effort, in the worst case scenario, yes this would be possible. That's why we usually encrypt our drive(s) in order to prevent data leakage. In the meantime, you should change all your online passwords a.s.a.p.

    – Jeroen - IT Nerdbox
    9 hours ago







2




2





Given enough time and effort, in the worst case scenario, yes this would be possible. That's why we usually encrypt our drive(s) in order to prevent data leakage. In the meantime, you should change all your online passwords a.s.a.p.

– Jeroen - IT Nerdbox
9 hours ago





Given enough time and effort, in the worst case scenario, yes this would be possible. That's why we usually encrypt our drive(s) in order to prevent data leakage. In the meantime, you should change all your online passwords a.s.a.p.

– Jeroen - IT Nerdbox
9 hours ago










2 Answers
2






active

oldest

votes


















6















If your laptop doesn't require a password, then they have your data.



If you had a password, and that password is required every time you open your screen, AND you had filevault turned on (or your company did), then they need to guess your password to decrypt the data.



But, if you had a dumb password, they can probably guess it. Check out haveibeenpwned.com to determine if you had a dumb password.



If you had a strong password, file vault, and your device requires you to enter a password, then you're probably ok.



Still, why not go through your accounts and reset them anyways. Now's a good of time as any. Get a password manager like 1password and let it autogenerate passwords for you. Choose a not-dumb password (like a truly random string of 10 characters - google a pw generator) for your password manager and memorize it.



Do the same for your new laptop password. You'll have to memorize two crazy passwords. Write them and put them in your wallet until you do remember them.






share|improve this answer




















  • 2





    While I generally agree with this response, I think it could be improved in a couple of ways. First, haveibeenpwned.com serves as a way to see if an email address has been associated with "dumps" containing a potential password to the account. It does not serve as a metric to measure password strength. Instead, I would reference a list of the most common passwords, as a thief who likely does not have password cracking skills is unlikely to manually test many besides these.

    – svartedauden
    8 hours ago






  • 2





    Second, while the suggestion of a password manager is good, I think the suggestion of a random string of 10 characters isn't in practice the ideal password for something like disk decryption or a password manager. While it's all up to personal preference, a set of words or a phrase could be easier to remember while being just as difficult if not more difficult to crack, depending on context.

    – svartedauden
    8 hours ago


















0















Even if you format (wipe) the data, someone clever enough can still recover it, but that requires some serious skills. Try to google "recovering formatted drives".



They would still need to crack your password as macs are encrypted.






share|improve this answer








New contributor



Puértolas Luis is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.























    Your Answer








    StackExchange.ready(function()
    var channelOptions =
    tags: "".split(" "),
    id: "162"
    ;
    initTagRenderer("".split(" "), "".split(" "), channelOptions);

    StackExchange.using("externalEditor", function()
    // Have to fire editor after snippets, if snippets enabled
    if (StackExchange.settings.snippets.snippetsEnabled)
    StackExchange.using("snippets", function()
    createEditor();
    );

    else
    createEditor();

    );

    function createEditor()
    StackExchange.prepareEditor(
    heartbeatType: 'answer',
    autoActivateHeartbeat: false,
    convertImagesToLinks: false,
    noModals: true,
    showLowRepImageUploadWarning: true,
    reputationToPostImages: null,
    bindNavPrevention: true,
    postfix: "",
    imageUploader:
    brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
    contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
    allowUrls: true
    ,
    noCode: true, onDemand: true,
    discardSelector: ".discard-answer"
    ,immediatelyShowMarkdownHelp:true
    );



    );













    draft saved

    draft discarded


















    StackExchange.ready(
    function ()
    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f216050%2fstolen-macbook-should-i-worry-about-my-data%23new-answer', 'question_page');

    );

    Post as a guest















    Required, but never shown

























    2 Answers
    2






    active

    oldest

    votes








    2 Answers
    2






    active

    oldest

    votes









    active

    oldest

    votes






    active

    oldest

    votes









    6















    If your laptop doesn't require a password, then they have your data.



    If you had a password, and that password is required every time you open your screen, AND you had filevault turned on (or your company did), then they need to guess your password to decrypt the data.



    But, if you had a dumb password, they can probably guess it. Check out haveibeenpwned.com to determine if you had a dumb password.



    If you had a strong password, file vault, and your device requires you to enter a password, then you're probably ok.



    Still, why not go through your accounts and reset them anyways. Now's a good of time as any. Get a password manager like 1password and let it autogenerate passwords for you. Choose a not-dumb password (like a truly random string of 10 characters - google a pw generator) for your password manager and memorize it.



    Do the same for your new laptop password. You'll have to memorize two crazy passwords. Write them and put them in your wallet until you do remember them.






    share|improve this answer




















    • 2





      While I generally agree with this response, I think it could be improved in a couple of ways. First, haveibeenpwned.com serves as a way to see if an email address has been associated with "dumps" containing a potential password to the account. It does not serve as a metric to measure password strength. Instead, I would reference a list of the most common passwords, as a thief who likely does not have password cracking skills is unlikely to manually test many besides these.

      – svartedauden
      8 hours ago






    • 2





      Second, while the suggestion of a password manager is good, I think the suggestion of a random string of 10 characters isn't in practice the ideal password for something like disk decryption or a password manager. While it's all up to personal preference, a set of words or a phrase could be easier to remember while being just as difficult if not more difficult to crack, depending on context.

      – svartedauden
      8 hours ago















    6















    If your laptop doesn't require a password, then they have your data.



    If you had a password, and that password is required every time you open your screen, AND you had filevault turned on (or your company did), then they need to guess your password to decrypt the data.



    But, if you had a dumb password, they can probably guess it. Check out haveibeenpwned.com to determine if you had a dumb password.



    If you had a strong password, file vault, and your device requires you to enter a password, then you're probably ok.



    Still, why not go through your accounts and reset them anyways. Now's a good of time as any. Get a password manager like 1password and let it autogenerate passwords for you. Choose a not-dumb password (like a truly random string of 10 characters - google a pw generator) for your password manager and memorize it.



    Do the same for your new laptop password. You'll have to memorize two crazy passwords. Write them and put them in your wallet until you do remember them.






    share|improve this answer




















    • 2





      While I generally agree with this response, I think it could be improved in a couple of ways. First, haveibeenpwned.com serves as a way to see if an email address has been associated with "dumps" containing a potential password to the account. It does not serve as a metric to measure password strength. Instead, I would reference a list of the most common passwords, as a thief who likely does not have password cracking skills is unlikely to manually test many besides these.

      – svartedauden
      8 hours ago






    • 2





      Second, while the suggestion of a password manager is good, I think the suggestion of a random string of 10 characters isn't in practice the ideal password for something like disk decryption or a password manager. While it's all up to personal preference, a set of words or a phrase could be easier to remember while being just as difficult if not more difficult to crack, depending on context.

      – svartedauden
      8 hours ago













    6














    6










    6









    If your laptop doesn't require a password, then they have your data.



    If you had a password, and that password is required every time you open your screen, AND you had filevault turned on (or your company did), then they need to guess your password to decrypt the data.



    But, if you had a dumb password, they can probably guess it. Check out haveibeenpwned.com to determine if you had a dumb password.



    If you had a strong password, file vault, and your device requires you to enter a password, then you're probably ok.



    Still, why not go through your accounts and reset them anyways. Now's a good of time as any. Get a password manager like 1password and let it autogenerate passwords for you. Choose a not-dumb password (like a truly random string of 10 characters - google a pw generator) for your password manager and memorize it.



    Do the same for your new laptop password. You'll have to memorize two crazy passwords. Write them and put them in your wallet until you do remember them.






    share|improve this answer













    If your laptop doesn't require a password, then they have your data.



    If you had a password, and that password is required every time you open your screen, AND you had filevault turned on (or your company did), then they need to guess your password to decrypt the data.



    But, if you had a dumb password, they can probably guess it. Check out haveibeenpwned.com to determine if you had a dumb password.



    If you had a strong password, file vault, and your device requires you to enter a password, then you're probably ok.



    Still, why not go through your accounts and reset them anyways. Now's a good of time as any. Get a password manager like 1password and let it autogenerate passwords for you. Choose a not-dumb password (like a truly random string of 10 characters - google a pw generator) for your password manager and memorize it.



    Do the same for your new laptop password. You'll have to memorize two crazy passwords. Write them and put them in your wallet until you do remember them.







    share|improve this answer












    share|improve this answer



    share|improve this answer










    answered 9 hours ago









    JonathanJonathan

    1,3987 silver badges12 bronze badges




    1,3987 silver badges12 bronze badges










    • 2





      While I generally agree with this response, I think it could be improved in a couple of ways. First, haveibeenpwned.com serves as a way to see if an email address has been associated with "dumps" containing a potential password to the account. It does not serve as a metric to measure password strength. Instead, I would reference a list of the most common passwords, as a thief who likely does not have password cracking skills is unlikely to manually test many besides these.

      – svartedauden
      8 hours ago






    • 2





      Second, while the suggestion of a password manager is good, I think the suggestion of a random string of 10 characters isn't in practice the ideal password for something like disk decryption or a password manager. While it's all up to personal preference, a set of words or a phrase could be easier to remember while being just as difficult if not more difficult to crack, depending on context.

      – svartedauden
      8 hours ago












    • 2





      While I generally agree with this response, I think it could be improved in a couple of ways. First, haveibeenpwned.com serves as a way to see if an email address has been associated with "dumps" containing a potential password to the account. It does not serve as a metric to measure password strength. Instead, I would reference a list of the most common passwords, as a thief who likely does not have password cracking skills is unlikely to manually test many besides these.

      – svartedauden
      8 hours ago






    • 2





      Second, while the suggestion of a password manager is good, I think the suggestion of a random string of 10 characters isn't in practice the ideal password for something like disk decryption or a password manager. While it's all up to personal preference, a set of words or a phrase could be easier to remember while being just as difficult if not more difficult to crack, depending on context.

      – svartedauden
      8 hours ago







    2




    2





    While I generally agree with this response, I think it could be improved in a couple of ways. First, haveibeenpwned.com serves as a way to see if an email address has been associated with "dumps" containing a potential password to the account. It does not serve as a metric to measure password strength. Instead, I would reference a list of the most common passwords, as a thief who likely does not have password cracking skills is unlikely to manually test many besides these.

    – svartedauden
    8 hours ago





    While I generally agree with this response, I think it could be improved in a couple of ways. First, haveibeenpwned.com serves as a way to see if an email address has been associated with "dumps" containing a potential password to the account. It does not serve as a metric to measure password strength. Instead, I would reference a list of the most common passwords, as a thief who likely does not have password cracking skills is unlikely to manually test many besides these.

    – svartedauden
    8 hours ago




    2




    2





    Second, while the suggestion of a password manager is good, I think the suggestion of a random string of 10 characters isn't in practice the ideal password for something like disk decryption or a password manager. While it's all up to personal preference, a set of words or a phrase could be easier to remember while being just as difficult if not more difficult to crack, depending on context.

    – svartedauden
    8 hours ago





    Second, while the suggestion of a password manager is good, I think the suggestion of a random string of 10 characters isn't in practice the ideal password for something like disk decryption or a password manager. While it's all up to personal preference, a set of words or a phrase could be easier to remember while being just as difficult if not more difficult to crack, depending on context.

    – svartedauden
    8 hours ago













    0















    Even if you format (wipe) the data, someone clever enough can still recover it, but that requires some serious skills. Try to google "recovering formatted drives".



    They would still need to crack your password as macs are encrypted.






    share|improve this answer








    New contributor



    Puértolas Luis is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
    Check out our Code of Conduct.

























      0















      Even if you format (wipe) the data, someone clever enough can still recover it, but that requires some serious skills. Try to google "recovering formatted drives".



      They would still need to crack your password as macs are encrypted.






      share|improve this answer








      New contributor



      Puértolas Luis is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.























        0














        0










        0









        Even if you format (wipe) the data, someone clever enough can still recover it, but that requires some serious skills. Try to google "recovering formatted drives".



        They would still need to crack your password as macs are encrypted.






        share|improve this answer








        New contributor



        Puértolas Luis is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
        Check out our Code of Conduct.









        Even if you format (wipe) the data, someone clever enough can still recover it, but that requires some serious skills. Try to google "recovering formatted drives".



        They would still need to crack your password as macs are encrypted.







        share|improve this answer








        New contributor



        Puértolas Luis is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
        Check out our Code of Conduct.








        share|improve this answer



        share|improve this answer






        New contributor



        Puértolas Luis is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
        Check out our Code of Conduct.








        answered 8 hours ago









        Puértolas LuisPuértolas Luis

        11 bronze badge




        11 bronze badge




        New contributor



        Puértolas Luis is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
        Check out our Code of Conduct.




        New contributor




        Puértolas Luis is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
        Check out our Code of Conduct.
































            draft saved

            draft discarded
















































            Thanks for contributing an answer to Information Security Stack Exchange!


            • Please be sure to answer the question. Provide details and share your research!

            But avoid


            • Asking for help, clarification, or responding to other answers.

            • Making statements based on opinion; back them up with references or personal experience.

            To learn more, see our tips on writing great answers.




            draft saved


            draft discarded














            StackExchange.ready(
            function ()
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f216050%2fstolen-macbook-should-i-worry-about-my-data%23new-answer', 'question_page');

            );

            Post as a guest















            Required, but never shown





















































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown

































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown







            Popular posts from this blog

            19. јануар Садржај Догађаји Рођења Смрти Празници и дани сећања Види још Референце Мени за навигацијуу

            Israel Cuprins Etimologie | Istorie | Geografie | Politică | Demografie | Educație | Economie | Cultură | Note explicative | Note bibliografice | Bibliografie | Legături externe | Meniu de navigaresite web oficialfacebooktweeterGoogle+Instagramcanal YouTubeInstagramtextmodificaremodificarewww.technion.ac.ilnew.huji.ac.ilwww.weizmann.ac.ilwww1.biu.ac.ilenglish.tau.ac.ilwww.haifa.ac.ilin.bgu.ac.ilwww.openu.ac.ilwww.ariel.ac.ilCIA FactbookHarta Israelului"Negotiating Jerusalem," Palestine–Israel JournalThe Schizoid Nature of Modern Hebrew: A Slavic Language in Search of a Semitic Past„Arabic in Israel: an official language and a cultural bridge”„Latest Population Statistics for Israel”„Israel Population”„Tables”„Report for Selected Countries and Subjects”Human Development Report 2016: Human Development for Everyone„Distribution of family income - Gini index”The World FactbookJerusalem Law„Israel”„Israel”„Zionist Leaders: David Ben-Gurion 1886–1973”„The status of Jerusalem”„Analysis: Kadima's big plans”„Israel's Hard-Learned Lessons”„The Legacy of Undefined Borders, Tel Aviv Notes No. 40, 5 iunie 2002”„Israel Journal: A Land Without Borders”„Population”„Israel closes decade with population of 7.5 million”Time Series-DataBank„Selected Statistics on Jerusalem Day 2007 (Hebrew)”Golan belongs to Syria, Druze protestGlobal Survey 2006: Middle East Progress Amid Global Gains in FreedomWHO: Life expectancy in Israel among highest in the worldInternational Monetary Fund, World Economic Outlook Database, April 2011: Nominal GDP list of countries. Data for the year 2010.„Israel's accession to the OECD”Popular Opinion„On the Move”Hosea 12:5„Walking the Bible Timeline”„Palestine: History”„Return to Zion”An invention called 'the Jewish people' – Haaretz – Israel NewsoriginalJewish and Non-Jewish Population of Palestine-Israel (1517–2004)ImmigrationJewishvirtuallibrary.orgChapter One: The Heralders of Zionism„The birth of modern Israel: A scrap of paper that changed history”„League of Nations: The Mandate for Palestine, 24 iulie 1922”The Population of Palestine Prior to 1948originalBackground Paper No. 47 (ST/DPI/SER.A/47)History: Foreign DominationTwo Hundred and Seventh Plenary Meeting„Israel (Labor Zionism)”Population, by Religion and Population GroupThe Suez CrisisAdolf EichmannJustice Ministry Reply to Amnesty International Report„The Interregnum”Israel Ministry of Foreign Affairs – The Palestinian National Covenant- July 1968Research on terrorism: trends, achievements & failuresThe Routledge Atlas of the Arab–Israeli conflict: The Complete History of the Struggle and the Efforts to Resolve It"George Habash, Palestinian Terrorism Tactician, Dies at 82."„1973: Arab states attack Israeli forces”Agranat Commission„Has Israel Annexed East Jerusalem?”original„After 4 Years, Intifada Still Smolders”From the End of the Cold War to 2001originalThe Oslo Accords, 1993Israel-PLO Recognition – Exchange of Letters between PM Rabin and Chairman Arafat – Sept 9- 1993Foundation for Middle East PeaceSources of Population Growth: Total Israeli Population and Settler Population, 1991–2003original„Israel marks Rabin assassination”The Wye River Memorandumoriginal„West Bank barrier route disputed, Israeli missile kills 2”"Permanent Ceasefire to Be Based on Creation Of Buffer Zone Free of Armed Personnel Other than UN, Lebanese Forces"„Hezbollah kills 8 soldiers, kidnaps two in offensive on northern border”„Olmert confirms peace talks with Syria”„Battleground Gaza: Israeli ground forces invade the strip”„IDF begins Gaza troop withdrawal, hours after ending 3-week offensive”„THE LAND: Geography and Climate”„Area of districts, sub-districts, natural regions and lakes”„Israel - Geography”„Makhteshim Country”Israel and the Palestinian Territories„Makhtesh Ramon”„The Living Dead Sea”„Temperatures reach record high in Pakistan”„Climate Extremes In Israel”Israel in figures„Deuteronom”„JNF: 240 million trees planted since 1901”„Vegetation of Israel and Neighboring Countries”Environmental Law in Israel„Executive branch”„Israel's election process explained”„The Electoral System in Israel”„Constitution for Israel”„All 120 incoming Knesset members”„Statul ISRAEL”„The Judiciary: The Court System”„Israel's high court unique in region”„Israel and the International Criminal Court: A Legal Battlefield”„Localities and population, by population group, district, sub-district and natural region”„Israel: Districts, Major Cities, Urban Localities & Metropolitan Areas”„Israel-Egypt Relations: Background & Overview of Peace Treaty”„Solana to Haaretz: New Rules of War Needed for Age of Terror”„Israel's Announcement Regarding Settlements”„United Nations Security Council Resolution 497”„Security Council resolution 478 (1980) on the status of Jerusalem”„Arabs will ask U.N. to seek razing of Israeli wall”„Olmert: Willing to trade land for peace”„Mapping Peace between Syria and Israel”„Egypt: Israel must accept the land-for-peace formula”„Israel: Age structure from 2005 to 2015”„Global, regional, and national disability-adjusted life years (DALYs) for 306 diseases and injuries and healthy life expectancy (HALE) for 188 countries, 1990–2013: quantifying the epidemiological transition”10.1016/S0140-6736(15)61340-X„World Health Statistics 2014”„Life expectancy for Israeli men world's 4th highest”„Family Structure and Well-Being Across Israel's Diverse Population”„Fertility among Jewish and Muslim Women in Israel, by Level of Religiosity, 1979-2009”„Israel leaders in birth rate, but poverty major challenge”„Ethnic Groups”„Israel's population: Over 8.5 million”„Israel - Ethnic groups”„Jews, by country of origin and age”„Minority Communities in Israel: Background & Overview”„Israel”„Language in Israel”„Selected Data from the 2011 Social Survey on Mastery of the Hebrew Language and Usage of Languages”„Religions”„5 facts about Israeli Druze, a unique religious and ethnic group”„Israël”Israel Country Study Guide„Haredi city in Negev – blessing or curse?”„New town Harish harbors hopes of being more than another Pleasantville”„List of localities, in alphabetical order”„Muncitorii români, doriți în Israel”„Prietenia româno-israeliană la nevoie se cunoaște”„The Higher Education System in Israel”„Middle East”„Academic Ranking of World Universities 2016”„Israel”„Israel”„Jewish Nobel Prize Winners”„All Nobel Prizes in Literature”„All Nobel Peace Prizes”„All Prizes in Economic Sciences”„All Nobel Prizes in Chemistry”„List of Fields Medallists”„Sakharov Prize”„Țara care și-a sfidat "destinul" și se bate umăr la umăr cu Silicon Valley”„Apple's R&D center in Israel grew to about 800 employees”„Tim Cook: Apple's Herzliya R&D center second-largest in world”„Lecții de economie de la Israel”„Land use”Israel Investment and Business GuideA Country Study: IsraelCentral Bureau of StatisticsFlorin Diaconu, „Kadima: Flexibilitate și pragmatism, dar nici un compromis în chestiuni vitale", în Revista Institutului Diplomatic Român, anul I, numărul I, semestrul I, 2006, pp. 71-72Florin Diaconu, „Likud: Dreapta israeliană constant opusă retrocedării teritoriilor cureite prin luptă în 1967", în Revista Institutului Diplomatic Român, anul I, numărul I, semestrul I, 2006, pp. 73-74MassadaIsraelul a crescut in 50 de ani cât alte state intr-un mileniuIsrael Government PortalIsraelIsraelIsraelmmmmmXX451232cb118646298(data)4027808-634110000 0004 0372 0767n7900328503691455-bb46-37e3-91d2-cb064a35ffcc1003570400564274ge1294033523775214929302638955X146498911146498911

            Черчино Становништво Референце Спољашње везе Мени за навигацију46°09′29″ СГШ; 9°30′29″ ИГД / 46.15809° СГШ; 9.50814° ИГД / 46.15809; 9.5081446°09′29″ СГШ; 9°30′29″ ИГД / 46.15809° СГШ; 9.50814° ИГД / 46.15809; 9.508143179111„The GeoNames geographical database”„Istituto Nazionale di Statistica”Званични веб-сајтпроширитиуу