BLU Discuss list archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Discuss] Server/laptop full-disk encryption
- Subject: [Discuss] Server/laptop full-disk encryption
- From: blu at nedharvey.com (Edward Ned Harvey (blu))
- Date: Wed, 1 Oct 2014 13:32:50 +0000
- In-reply-to: <CAJFsZ=rK+pys68ysVGw5Hs4gxv2oQhjh+_y271bxSsdc_n=bvA@mail.gmail.com>
- References: <fb73f4b8a491577a02de5fcaf7779293.squirrel@webmail.ci.net> <de529929c36240babe4229ad818da975@CO2PR04MB684.namprd04.prod.outlook.com> <542B5DBC.2090805@horne.net> <9c6cf155f2b6480985a30ea427dae562@CO2PR04MB684.namprd04.prod.outlook.com> <CAJFsZ=rK+pys68ysVGw5Hs4gxv2oQhjh+_y271bxSsdc_n=bvA@mail.gmail.com>
> From: Bill Bogstad [mailto:bogstad at pobox.com] > > It seems like > whenever people start talking about computer security, there is a > tendency to shoot for the maximum theoretically possible. We don't do > that when it comes to our cars or homes, but it does with computers. Along a similar vein - There was formerly a FAQ on Truecrypt's website about the TPM. They said something like "Using the TPM is the best sure way to guarantee you have no security. We refuse to work with the TPM." I recognize the grain of truth in there - that using the TPM and Bitlocker first of all guarantees that the "$5 wrench" technique of extracting a password from the user is sure to be effective (there is no plausible deniability), and second of all, if we assume that Intel or the NSA or whoever has backdoored the TPM, then there's another technique to extract the info. However, the place where I disagree with Truecrypt is here: When I deploy bitlocker, I am not deploying a system intended to thwart the NSA. I am deploying a system intended to thwart laptop thieves from retrieving the company financial data, credit card database, product design files, etc. which are valuable on the black market. I have actually worked at a chip company before, where we discovered our own product was pirated and sold on the black market. One of our sales reps went to a meeting in Taiwan, and in that meeting they asked us, "Why should we buy your product when we could get the same thing from these other guys?" And they proceeded to show us our own slides with some other company's logo on them. To protect against this type of attack, no we do not need 256 bit, or even 128 bit. To protect against this type of attack, the mere existence of a password prompt is probably sufficient - even if your password is "baby" but probably not if your password is "password." It's nice to eliminate the hassle of entering two passwords every time. I'm strongly in favor of using the TPM for everyday security, even if the NSA might have backdoored them all. You want something to thwart the NSA? You need plausible deniability.
- Follow-Ups:
- [Discuss] Server/laptop full-disk encryption
- From: bill at horne.net (Bill Horne)
- [Discuss] Server/laptop full-disk encryption
- References:
- [Discuss] Server/laptop full-disk encryption
- From: blu at nedharvey.com (Edward Ned Harvey (blu))
- [Discuss] Server/laptop full-disk encryption
- From: bogstad at pobox.com (Bill Bogstad)
- [Discuss] Server/laptop full-disk encryption
- Prev by Date: [Discuss] Server/laptop full-disk encryption
- Next by Date: [Discuss] CipherShed: TrueCrypt fork
- Previous by thread: [Discuss] Server/laptop full-disk encryption
- Next by thread: [Discuss] Server/laptop full-disk encryption
- Index(es):