On Jun 10, 2009, at 4:19 PM, travis+ml-cryptogra...@subspacefield.org
wrote:
Reading really old email, but have new information to add.
On Wed, Oct 03, 2007 at 02:15:38PM +1000, Daniel Carosone wrote:
Speculation: the drive always encrypts the platters with a (fixed)
AES
key, obviating
Reading really old email, but have new information to add.
On Wed, Oct 03, 2007 at 02:15:38PM +1000, Daniel Carosone wrote:
Speculation: the drive always encrypts the platters with a (fixed) AES
key, obviating the need to track which sectors are encrypted or
not. Setting the drive password
On Oct 3, 2007, at 4:39 AM, Florian Weimer wrote:
But this exhibits an issue with disk-based encryption: you can't
really know what they are doing, and if they are doing it right.
(Given countless examples of badly-deployed cryptography, this isn't
just paranoia, but a real concern.)
* Ivan Krstić:
On Oct 3, 2007, at 4:39 AM, Florian Weimer wrote:
But this exhibits an issue with disk-based encryption: you can't
really know what they are doing, and if they are doing it right.
(Given countless examples of badly-deployed cryptography, this isn't
just paranoia, but a real
I think the really interesting question is what happens when you lose
a FDE-ed hard drive. Do you still need to publish the incident and
contact potentially affected individuals? If the answer is no, I'm
sure this technology will be quickly adopted, independently of its
actual
On Tue, Oct 02, 2007 at 03:50:27PM +0200, Simon Josefsson wrote:
Without access to the device (I've contacted Hitachi EMEA to find out if
it is possible to purchase the special disks) it is difficult to infer
how it works, but the final page of the howto seems strange:
...
NOTE: All
* Simon Josefsson:
One would assume that if you disable the password, the data would NOT be
accessible. Making it accessible should require a read+decrypt+write of
the entire disk, which would be quite time consuming. It may be that
this is happening in the background, although it isn't
Following up on an old thread with some new information:
Hitachi's white paper is available from:
http://www.hitachigst.com/tech/techlib.nsf/techdocs/74D8260832F2F75E862572D7004AE077/$file/bulk_encryption_white_paper.pdf
...
The interesting part is the final sentence of the white paper:
On Tue, 02 Oct 2007 15:50:27 +0200
Simon Josefsson [EMAIL PROTECTED] wrote:
It sounds to me as if they are storing the AES key used for bulk
encryption somewhere on the disk, and that it can be unlocked via the
password.
I'd say decrypted by the password, rather than unlocked, but that's
Leichter, Jerry wrote:
First off, it depends on how the thing is implemented. Since the entire
drive is apparently encrypted, and you have to enter a password just to
boot from it, some of the support is in an extended BIOS or some very
early boot code, which is below any OS you might actually
Dave Korn wrote:
On 07 September 2007 21:28, Leichter, Jerry wrote:
Grow up. *If* the drive vendor keeps the mechanism secret, you have
cause for complaint. But can you name a drive vendor who's done
anything like that in years?
All DVD drive manufacturers. That's why nobody could
On 07 September 2007 21:28, Leichter, Jerry wrote:
Grow up. *If* the drive vendor keeps the mechanism secret, you have
cause for complaint. But can you name a drive vendor who's done
anything like that in years?
All DVD drive manufacturers. That's why nobody could write a driver for
On 9/6/07, Jacob Appelbaum [EMAIL PROTECTED] wrote:
Seagate recently announced a 1TB drive for desktop systems and a 250GB
laptop drive. What's of interest is that it appears to use a system
called DriveTrust for Full Disk Encryption. It's apparently AES-128.
Yes, but will it work on my
Jacob Appelbaum [EMAIL PROTECTED] writes:
Seagate recently announced a 1TB drive for desktop systems and a 250GB
laptop drive. What's of interest is that it appears to use a system
called DriveTrust for Full Disk Encryption. It's apparently AES-128.
The detail lacking press release is here:
14 matches
Mail list logo