Boston Linux & UNIX was originally founded in 1994 as part of The Boston Computer Society. We meet on the third Wednesday of each month at the Massachusetts Institute of Technology, in Building E51.

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Discuss] CipherShed: TrueCrypt fork



On Wed, Oct 1, 2014 at 6:08 PM, Richard Pieri <richard.pieri at gmail.com> wrote:
> On 10/1/2014 11:19 AM, Bill Bogstad wrote:
>> Because you trust the firmware provided by the disk drive manufacturer?   You
>> clearly aren't wearing your tin foil hat today.
>...
>
> There is a clever SED attack: hotplug. If you disconnect the SATA data
> cable without disconnecting power then you can plug the drive into a
> different host and the data will be readable.

Nice.   I'll have to remember that one.

>This is easily foiled
> simply by turning off the computer when physical security is low.
>
> In short, SEDs do everything that software encryption can do, they do it
> faster, and they do it better.

Actually, they don't do everything that (open source) software encryption does.
They don't let you (or you an agent of your choice) audit the
encryption algorithms/implementation to verify that everything is
being done to spec.
Now I admit that I've suggested in another thread that for MOST people
ultimate security
isn't required, but that doesn't meant that it isn't sometimes a good
idea.   In this case, it
is more like not trusting firmware programmers not to screw things up
inadvertently rather
then being concerned about backdoors inserted by 3 letter agencies.

Bill Bogstad



BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org