This message is from the T13 list server.
On Mon, May 16, 2005 at 08:54:29AM -0700, Curtis Stevens wrote: > I agree with Jim. In addition, this is only a threat to people who > do not use a password. If the drive has an existing password, the password > must be entered to gain access to the drive. > > [EMAIL PROTECTED] wrote > > The problem is NOT that ATA security is broken. > The problem is that most/many BIOSes and OS's do not issue the SECURITY > FREEZE LOCK command to ANY/ALL devices (not just the boot device). > > This is NOT a device failure. > This is NOT a 'broken standard'. > > This <IS> about major host software vendors NOT using the tools it has had > <<SINCE 1997>> to protect itself and the host system. Let me see whether I understand the reasoning. The T13 people add a new feature to their disks, that has the potential of causing lots of trouble, like inaccessible data. However, if the rest of the world changes their code and firmware, then there is no problem. And now it turns out that the rest of the world didnt do that. Of course it is their fault. [By the way - was it widely advertized that the rest of the world should do this? I must have overlooked.] If this disk-locking worm really happens then I suspect that many will try to hold the disk drive manufacturers responsible. I hope that there is an easy backdoor that can be revealed at such a moment. Andries
