HFS+ or AFPS for basic 'drag and drop' hard drive backup

I recently upgraded from a late 2013 iMac (1TB storage) to 2024 Mac Mini (4TB storage) and have purchased new external hard drives to hold my backups.


I have an 8TB hard drive that I have been backing up Time Machine to, but would like to back up to the 4TB hard drive by simply drag-and-dropping files manually in Finder so that it is less reliant on special software or one specific computer to access the files. I would also like to encrypt the 4TB hard drive with a password. I wouldn't be saving versions of files, just overwriting old copies as Time Machine is for saving versions.


Recovery would likely involve a Mac computer as, other than a Samsung phone, I only own Mac though friends and family own PC.


Which format is better to use for the 4TB hard drive, HFS+ or AFPS?


Thanks for any advice you have!

Mac mini, macOS 15.7

Posted on Oct 19, 2025 2:40 AM

Reply
Question marked as Top-ranking reply

Posted on Oct 19, 2025 2:27 PM

etresoft wrote:
Mac OS Extended (Journaled) is "aka HFS+". Encryption on HFS+ drives used the awful Core Storage technology which is no longer supported, and hasn't been for years. HFS+ encryption gone ? - Apple Community

I did notice this warning in the Disk Utility Guide. Its first appearance was for macOS Catalina, so I guess all encrypted disks are now APFS as you said earlier.


WARNING: When you encrypt a disk or other media, the disk format is converted to the APFS format and then encrypted. Macs with older versions of macOS that don’t support the APFS format will not be able to read the device’s data. Consider whether you need to connect the media to a Mac with an older version of macOS before you encrypt the data. You can also update your other Mac to the latest version of the macOS that supports the APFS format.



17 replies
Question marked as Top-ranking reply

Oct 19, 2025 2:27 PM in response to etresoft

etresoft wrote:
Mac OS Extended (Journaled) is "aka HFS+". Encryption on HFS+ drives used the awful Core Storage technology which is no longer supported, and hasn't been for years. HFS+ encryption gone ? - Apple Community

I did notice this warning in the Disk Utility Guide. Its first appearance was for macOS Catalina, so I guess all encrypted disks are now APFS as you said earlier.


WARNING: When you encrypt a disk or other media, the disk format is converted to the APFS format and then encrypted. Macs with older versions of macOS that don’t support the APFS format will not be able to read the device’s data. Consider whether you need to connect the media to a Mac with an older version of macOS before you encrypt the data. You can also update your other Mac to the latest version of the macOS that supports the APFS format.



Nov 2, 2025 1:36 AM in response to Limnos

Servant of Cats wrote:

If you want to make backups that are "less reliant on special software or one specific computer to access the files", would suggest making additional backups using Carbon Copy Cloner or SuperDuper! .

These applications can make full and incremental clone backups – a system which is more reliable than attempting to manually keep track of which files you have backed up, and which you haven't. But you can access the backups in the same way that you would browse the original disk.

The one thing that is getting harder these days – because of Apple's security changes – is making bootable cllone backups. (Because of this, CCC's default is now to make non-bootable backups.)


Thank you very much everyone for your suggestions and advice! I've decided to try Carbon Copy Cleaner (especially since it has a trial period) and failing that, manually back-up files. However, it has been helpful to get the clear answer to my original question that AFPS is the only option now as I was not aware of that since I've come up from Mac OS Catalina straight to Mac OS Sequoia.


Thanks again all!

Oct 19, 2025 8:02 AM in response to MartinR

MartinR wrote:

Mac OS Extended (Journaled, Encrypted) aka HFS+ formatting is supported up to macOS Sequoia, which is what the OP appears to be running (15.7). My understanding is that Tahoe (macOS 26) can read & write HFS+ drives, just not format them.

Mac OS Extended (Journaled) is "aka HFS+". Encryption on HFS+ drives used the awful Core Storage technology which is no longer supported, and hasn't been for years. HFS+ encryption gone ? - Apple Community


Tahoe can still format HFS+ drives, just not encrypted ones.


FWIW, in present circumstances I wouldn't encrypt the entire drive. I think that's asking for trouble in the future. If there is something the OP needs to protect, I'd suggest creating an encrypted sparse disk image file (.dmg) instead. This, too has changed in Tahoe to Apple Sparse Image (ASIF).

I wouldn't touch any sparse disk image format, especially not an encrypted one. That's just asking for corruption.


I always encrypt all of my drives. Theft is my primary concern.


Oct 19, 2025 4:37 AM in response to AglaVerin

If you want to make backups that are "less reliant on special software or one specific computer to access the files", would suggest making additional backups using Carbon Copy Cloner or SuperDuper! .


These applications can make full and incremental clone backups – a system which is more reliable than attempting to manually keep track of which files you have backed up, and which you haven't. But you can access the backups in the same way that you would browse the original disk.


The one thing that is getting harder these days – because of Apple's security changes – is making bootable cllone backups. (Because of this, CCC's default is now to make non-bootable backups.)

Oct 19, 2025 7:40 AM in response to etresoft

etresoft wrote:
It's 2025. You don't have the option anymore. If you want an encrypted hard drive, you must use APFS.

Mac OS Extended (Journaled, Encrypted) aka HFS+ formatting is supported up to macOS Sequoia, which is what the OP appears to be running (15.7). My understanding is that Tahoe (macOS 26) can read & write HFS+ drives, just not format them.


If the OP is using traditional spinning HDDs, HFS+ would be preferable ... unless the OP upgrades to Tahoe first, in which case there is no choice but to format as APFS.


FWIW, in present circumstances I wouldn't encrypt the entire drive. I think that's asking for trouble in the future. If there is something the OP needs to protect, I'd suggest creating an encrypted sparse disk image file (.dmg) instead. This, too has changed in Tahoe to Apple Sparse Image (ASIF).

Oct 19, 2025 4:49 PM in response to MartinR

MartinR wrote:

Interesting. I have used encrypted sparse disk images for years, on multiple Macs & versions of macOS. I have never had a problem with any of them, ever.

Interesting. First time I tried an encrypted sparse image it corrupted almost immediately.


The problem is, you never know what someone is going to use a particular feature for. If they only use it for exactly the same things that you've tried, on exactly the same hardware and software, then it should be fine. But what if they try something clever? What if they think an encrypted sparse image would be a great encrypted cloud solution because only the modified parts would need to be synced. Well, maybe you didn't test that.


And this is Apple 2025. I think any proprietary Apple data format is risky for people who don't have multiple machines of varying vintages. Just the other day I finally got around to rebuilding one particular disk image that would kill the Finder in Sequoia every time I tried to open it. This image isn't sparse or encrypted. It just isn't supported anymore. Oh wait, my bad. It's totally supported by Apple. It just kills the Finder every time I try to open it. But I could just copy the image to a Big Sur machine and re-create it there. Now it's fine. But not everyone can do that. Lucky for me I never trade anything in.

Oct 21, 2025 9:17 AM in response to Servant of Cats

Servant of Cats wrote:

If you want to make backups that are "less reliant on special software or one specific computer to access the files", would suggest making additional backups using Carbon Copy Cloner or SuperDuper! .

These applications can make full and incremental clone backups – a system which is more reliable than attempting to manually keep track of which files you have backed up, and which you haven't. But you can access the backups in the same way that you would browse the original disk.

The one thing that is getting harder these days – because of Apple's security changes – is making bootable cllone backups. (Because of this, CCC's default is now to make non-bootable backups.)

I suppose another possible issue is my Mac Mini has 4TB storage and the external drive in question is 5TB in size (sorry guys, I realised in my question I got the size wrong), so may be too small for versioning software like Time Machine and CCC.

Nov 2, 2025 7:31 AM in response to AglaVerin

I'll second CarbonCopyCloner.


I was using CarbonCopyCloner before Apple rolled out Time Machine and it's still my main go to for backups. I dabbled with Time Machine over the years, but never used it to recover files or to migrate to a new Mac. I always found that it was much faster, easier and more reliable to migrate from a CCC clone. Currently I have 5 Tasks setup (1 daily, 2 weekly, 2 monthly) and rotate the weekly and monthly drives. All CCC Tasks are set to update when the source drive is mounted. My daily CCC drive stays local, but not connected 24-7. My weekly and monthly CCC drives are retrieved from their hiding places for updates. Years ago I started out with all HDDs, but over time I have replaced all but the monthly CCC drives with SSDs.

Oct 19, 2025 2:17 PM in response to etresoft

etresoft wrote:
I wouldn't touch any sparse disk image format, especially not an encrypted one. That's just asking for corruption.

Interesting. I have used encrypted sparse disk images for years, on multiple Macs & versions of macOS. I have never had a problem with any of them, ever.


I'm not especially concerned about theft, especially of my backup disks, which are kept in safe places (that I'm not identifying for security reasons). But I am concerned about protecting certain more sensitive information from prying eyes, which is my reason for using encrypted sparse disk images instead of encrypting the entire disks.




Oct 20, 2025 6:20 AM in response to MartinR

MartinR wrote:


etresoft wrote:
I wouldn't touch any sparse disk image format, especially not an encrypted one. That's just asking for corruption.
Interesting. I have used encrypted sparse disk images for years, on multiple Macs & versions of macOS. I have never had a problem with any of them, ever.


I have a single, relatively small (couple of MB) sparse disk image I have been using for at least 7 years now. I have very little data that truly needs security. I too haven't had any issues with the encrypted sparse disk image transitioning from Mavericks through to Sequoia.

Oct 21, 2025 9:11 AM in response to Servant of Cats

Servant of Cats wrote:

If you want to make backups that are "less reliant on special software or one specific computer to access the files", would suggest making additional backups using Carbon Copy Cloner or SuperDuper! .

These applications can make full and incremental clone backups – a system which is more reliable than attempting to manually keep track of which files you have backed up, and which you haven't. But you can access the backups in the same way that you would browse the original disk.

The one thing that is getting harder these days – because of Apple's security changes – is making bootable cllone backups. (Because of this, CCC's default is now to make non-bootable backups.)

Thank you for the suggestion. Looking at Carbon Copy Cloner, that seems good and at a good price, especially how as it doesn't save the files in proprietary format. I suppose I'm still a bit iffy about using some kind of software on all my backups but at least they are different software and as you said CCC doesn't save in propriety format. Looks like I could also encrypt the hard drive using my Mac first so that covers the password protection part.

Oct 21, 2025 9:59 AM in response to AglaVerin

AglaVerin wrote:
I suppose another possible issue is my Mac Mini has 4TB storage and the external drive in question is 5TB in size (sorry guys, I realised in my question I got the size wrong), so may be too small for versioning software like Time Machine and CCC.

You would just find there isn't much room for older versions if you do a lot of changing of your files. I used CCC on a 3TB backup volume with a 1TB main drive in my computer and I had 3 year old files still on the backup volume.


Remember that none of those backup utilities will backup the core system files anymore, so you don't have the basic system taking up space on a backup drive. They backup your settings, etc, but anything that gets installed by the system installer won't be backed up since with newer macOS versions the idea is if you need to rebuild a drive from scratch you install the system as-new and then migrate your personal files from a backup.

Nov 2, 2025 11:16 AM in response to den.thed

I'll third CarbonCopyCloner!!


Like @den.thed, I have a set of CCC scheduled backup tasks that run daily, monthly and every 6-months. The 2x daily backup is to a locally-connected drive and it's only certain folders that hold important data that I know changes frequently. The monthly & 6-month backups each consist of two sets of drives that I rotate, so there are always a 1-month & 2-month backup (stored offline, locally) and a 6-month & 12-month backup (stored in my safe deposit box at my bank).


I don't use Time Machine because over the years I have seen too many people find out the hard way that they couldn't use their TM backups to restore their files (for a variety of reaons). With CCC, your backup copies are exact copies of your original files and they are not held inside anything that could become a data jail.

HFS+ or AFPS for basic 'drag and drop' hard drive backup

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.