Re: [liberationtech] Fwd: [Crypto Stick News] Vulnerabilities of Self-Encrypted SSDs

2013-01-14 Thread Julian Oliver

Roughly speaking, the idea of these attacks is to move an SED from one machine
to another without cutting power, i.e., by replugging the data cable only.

Ouch.

..on Mon, Jan 14, 2013 at 06:23:41PM +0100, André Rebentisch wrote:
 
 fyi, André
 
  Original-Nachricht 
 Betreff:  [Crypto Stick News] Vulnerabilities of Self-Encrypted SSDs
 Datum:Mon, 14 Jan 2013 17:14:51 +0100
 Von:  n...@crypto-stick.com
 Antwort an:   webmas...@crypto-stick.com, n...@crypto-stick.com
 An:   n...@crypto-stick.com
 
 
 
 Researchers found vulnerabilities of self-encrypted SSDs. From the abstract:
 Self-encrypting drives (SEDs), such as Intel's SSD 320 and 520 series, are
 widely believed to be a fast and secure alternative to software-based
 solutions like TrueCrypt and BitLocker. [...] In this sense, hardware-based
 full disk encryption (FDE) is as insecure as software-based FDE. We also show
 that (2) there exists a new class of attacks that is specific to
 hardware-based FDE [Full Disk Encryption]. Roughly speaking, the idea of
 these attacks is to move an SED from one machine to another without cutting
 power, i.e., by replugging the data cable only. [...] Some machines are
 arguably more vulnerable when using SEDs. Watch the videos... [1]
 
 This article: http://www.crypto-stick.com/node/74
 
 [1] https://www1.cs.fau.de/sed
 
 
 --
 Unsubscribe, change to digest, or change password at: 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

-- 
Julian Oliver
http://julianoliver.com
http://criticalengineering.org
--
Unsubscribe, change to digest, or change password at: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Fwd: [Crypto Stick News] Vulnerabilities of Self-Encrypted SSDs

2013-01-14 Thread Andreas Bader
On 01/14/2013 06:23 PM, André Rebentisch wrote:
 fyi, André

  Original-Nachricht 
 Betreff:  [Crypto Stick News] Vulnerabilities of Self-Encrypted SSDs
 Datum:Mon, 14 Jan 2013 17:14:51 +0100
 Von:  n...@crypto-stick.com
 Antwort an:   webmas...@crypto-stick.com, n...@crypto-stick.com
 An:   n...@crypto-stick.com



 Researchers found vulnerabilities of self-encrypted SSDs. From the abstract:
 Self-encrypting drives (SEDs), such as Intel's SSD 320 and 520 series, are
 widely believed to be a fast and secure alternative to software-based
 solutions like TrueCrypt and BitLocker. [...] In this sense, hardware-based
 full disk encryption (FDE) is as insecure as software-based FDE. We also show
 that (2) there exists a new class of attacks that is specific to
 hardware-based FDE [Full Disk Encryption]. Roughly speaking, the idea of
 these attacks is to move an SED from one machine to another without cutting
 power, i.e., by replugging the data cable only. [...] Some machines are
 arguably more vulnerable when using SEDs. Watch the videos... [1]

 This article: http://www.crypto-stick.com/node/74

 [1] https://www1.cs.fau.de/sed


 --
 Unsubscribe, change to digest, or change password at: 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech


Here is a german speech from the 29C3 in Hamburg, Germany, where the
problems of SEDs are also mentioned:
Unsecure SEDs Youtube
http://www.youtube.com/watch?feature=player_embeddedv=IzE2SKVP-MQ#%21

--
Unsubscribe, change to digest, or change password at: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech