[Discuss] CipherShed: TrueCrypt fork
Bill Bogstad
bogstad at pobox.com
Wed Oct 1 17:48:27 EDT 2014
On Wed, Oct 1, 2014 at 6:08 PM, Richard Pieri <richard.pieri at gmail.com> wrote:
> On 10/1/2014 11:19 AM, Bill Bogstad wrote:
>> Because you trust the firmware provided by the disk drive manufacturer? You
>> clearly aren't wearing your tin foil hat today.
>...
>
> There is a clever SED attack: hotplug. If you disconnect the SATA data
> cable without disconnecting power then you can plug the drive into a
> different host and the data will be readable.
Nice. I'll have to remember that one.
>This is easily foiled
> simply by turning off the computer when physical security is low.
>
> In short, SEDs do everything that software encryption can do, they do it
> faster, and they do it better.
Actually, they don't do everything that (open source) software encryption does.
They don't let you (or you an agent of your choice) audit the
encryption algorithms/implementation to verify that everything is
being done to spec.
Now I admit that I've suggested in another thread that for MOST people
ultimate security
isn't required, but that doesn't meant that it isn't sometimes a good
idea. In this case, it
is more like not trusting firmware programmers not to screw things up
inadvertently rather
then being concerned about backdoors inserted by 3 letter agencies.
Bill Bogstad
More information about the Discuss
mailing list