Wiping would be easy. If all the data is, and always has been encrypted than you simply need to overwrite the public part of the key (1024 bits?) a couple dozen times after that you couldn't access it even with the correct privat key.

Steve.



[EMAIL PROTECTED] wrote:

http://www.seagate.com/cda/newsinfo/newsroom/releases/article/0,,2732,00.html

When someone gets a chance to play with one of these, please post.

An open and self-contained crypto infrastructure on a hard drive that is "useless" until the BIOS 
recognizes it with a password key. Reminds me a little of the "locks" some manufactures have that 
can be enabled in the BIOS for some drives. Although, it is easy to just call up the manufacture and get the 
back-door key for locked drives (done many times with basic data recovery jobs or just hook up to another 
computer and not boot from it), according to Seagate, there is no "back-door" access here. If the 
key is lost, stolen, or just not available for investigations/recoveries, there will be no way to access/read 
the FDE (Full-Disk Encryption) drive.

Also, it has a "wiping" technique that supposedly can "wipe" a drive in less then a 
second and be "secure". I would like to know more about this. If anyone has any information, please 
post. Thanks.


Reply via email to