Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Sounds like it's pretty easy to compromise this kind of encryption if you steal a laptop that's suspended [1]. One of the easiest attacks mentioned is to just keep the drive powered and plug the sata data port into another computer.

Another risk is that you don't know if the crypto is secure. There are lots of possibilities to get things wrong [2].

It seems inevitable that the further you get from end-to-end crypto, the less secure it is.

[1] https://www.blackhat.com/docs/eu-15/materials/eu-15-Boteanu-... [2] https://en.wikipedia.org/wiki/Disk_encryption_theory



None of the scenarios detailed in your 1st reference are an inherent vulnerability of SEDs it is describing vulnerabilities in the software that drives the SEDs or physical designs of the computers they are installed in. Also, reset attacks apply to software encryption as well as SED's.

Check out the sedutil project on Github it's an opensource implementation of software to manage SED's

https://github.com/Drive-Trust-Alliance/sedutil




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: