Wiping would be easy. If all the data is, and always has been encrypted
than you simply need to overwrite the public part of the key (1024
bits?) a couple dozen times after that you couldn't access it even with
the correct privat key.
Steve.
[EMAIL PROTECTED] wrote:
http://www.seagate.com/cda/newsinfo/newsroom/releases/article/0,,2732,00.html
When someone gets a chance to play with one of these, please post.
An open and self-contained crypto infrastructure on a hard drive that is "useless" until the BIOS
recognizes it with a password key. Reminds me a little of the "locks" some manufactures have that
can be enabled in the BIOS for some drives. Although, it is easy to just call up the manufacture and get the
back-door key for locked drives (done many times with basic data recovery jobs or just hook up to another
computer and not boot from it), according to Seagate, there is no "back-door" access here. If the
key is lost, stolen, or just not available for investigations/recoveries, there will be no way to access/read
the FDE (Full-Disk Encryption) drive.
Also, it has a "wiping" technique that supposedly can "wipe" a drive in less then a
second and be "secure". I would like to know more about this. If anyone has any information, please
post. Thanks.