On 11/01/2024 at 12:56, Luca Boccassi wrote:

Yes it is a firmware feature, so it depends on the hardware, and in all
drives I know of that will be the case, yes. From that point of view,
to me it doesn't seem that far away from dm-crypt using the CPU's AES-
NI to actually encrypt/decrypt data, or anything else implemented in
hardware/firmware that the installer now supports out of the box with
non-free-firmware being enabled by default. If I am trusting Intel to
handle my data in their wifi firmware, and in their CPU microcode, and
memory controllers, and whatever else is on my hardware, it seems
strange to start worrying once the line is crossed into the NVME
firmware...

Correct me if I'm wrong, but aren't CPUs and wifi controllers pass-through devices which do not persistently store encryption keys or data and whose encrypted output can be inspected to check if they are doing the right thing so that you do not have to blindly trust them ?

Self-encrypted drives persistently store encryption keys and data. Can their encrypted output reliably be inspected ? Can they be trusted if the manufacturer implemented some hidden mechanism allowing to recover the data when customers lost their password (like BIOS manufacturers do) which will be leaked sooner or later ?

Reply via email to