Re: self-encrypting drives (SED)

2015-11-22 Thread Pascal Hambourg
Pascal Hambourg a écrit : > Andrew McGlashan a écrit : >> On 22/11/2015 8:01 PM, Pascal Hambourg wrote: >>> How would a flaw in the motherboard BIOS/UEFI firmware allow to bypass >>> the disk password ? >> If it is able to snoop on your keyboard input. > > I would not call this a flaw but actual m

Re: self-encrypting drives (SED)

2015-11-22 Thread Pascal Hambourg
Andrew McGlashan a écrit : > > On 22/11/2015 8:01 PM, Pascal Hambourg wrote: >> How would a flaw in the motherboard BIOS/UEFI firmware allow to bypass >> the disk password ? > > If it is able to snoop on your keyboard input. I would not call this a flaw but actual malware.

Re: self-encrypting drives (SED)

2015-11-22 Thread Andrew McGlashan
On 22/11/2015 8:01 PM, Pascal Hambourg wrote: > Andrew McGlashan a écrit : >> >> On 22/11/2015 6:11 AM, Pascal Hambourg wrote: >>> Andrew McGlashan a écrit : > Assuming the vendor firmware has no backdoor or flaw allowing to bypass > the user-defined password. Ditto for the drive's o

Re: self-encrypting drives (SED)

2015-11-22 Thread Pascal Hambourg
Andrew McGlashan a écrit : > > On 22/11/2015 6:11 AM, Pascal Hambourg wrote: >> Andrew McGlashan a écrit : Assuming the vendor firmware has no backdoor or flaw allowing to bypass the user-defined password. >>> Ditto for the drive's own firmware. ;-) >> That's what I was referring to as "

Re: self-encrypting drives (SED)

2015-11-22 Thread Pascal Hambourg
Andrew McGlashan a écrit : > > On 22/11/2015 6:17 AM, Pascal Hambourg wrote: >> I do not see how this "solution" protects against tampering of the >> unencrypted boot part. > > True, physical access and you are still toast. The only solution I have read about to protect the boot part on the inte

Re: self-encrypting drives (SED)

2015-11-21 Thread Andrew McGlashan
On 22/11/2015 6:17 AM, Pascal Hambourg wrote: > Andrew McGlashan a écrit : > What problem does it solve exactly, besides the need of a keyboard ? > I do not see how this "solution" protects against tampering of the > unencrypted boot part. True, physical access and you are still toast. A.

Re: self-encrypting drives (SED)

2015-11-21 Thread Andrew McGlashan
On 22/11/2015 6:11 AM, Pascal Hambourg wrote: > Andrew McGlashan a écrit : >>> Assuming the vendor firmware has no backdoor or flaw allowing to bypass >>> the user-defined password. >> >> Ditto for the drive's own firmware. ;-) > > That's what I was referring to as "vendor firmware". The disk ve

Re: self-encrypting drives (SED)

2015-11-21 Thread Pascal Hambourg
es not protect against tampering, as the boot >>> part cannot be encrypted. >> >> As I understand it, self-encrypting drives (SED) encrypt >> everything (including the boot partition). > > You can do full disk enccryption, but you are right that you need > somethi

Re: self-encrypting drives (SED)

2015-11-21 Thread Pascal Hambourg
Andrew McGlashan a écrit : > > On 21/11/2015 8:17 PM, Pascal Hambourg wrote: >> David Christensen a écrit : >>> As I understand it, self-encrypting drives (SED) encrypt everything >>> (including the boot partition). To use this feature, you need a >>> co

Re: self-encrypting drives (SED)

2015-11-21 Thread Andrew McGlashan
On 21/11/2015 8:17 PM, Pascal Hambourg wrote: > David Christensen a écrit : >> >> As I understand it, self-encrypting drives (SED) encrypt everything >> (including the boot partition). To use this feature, you need a >> computer with BIOS/ UEFI that supports it -

Re: self-encrypting drives (SED)

2015-11-21 Thread Andrew McGlashan
tampering, as the boot >> part cannot be encrypted. > > As I understand it, self-encrypting drives (SED) encrypt > everything (including the boot partition). You can do full disk enccryption, but you are right that you need something to "boot" ... my solution is to use dro

Re: self-encrypting drives (SED)

2015-11-21 Thread hdv
and read or modify it with another >> machine. >> >> To protect against this you can use encryption or set up a password >> on the disk (ATA security functions). Note that encryption alone does >> not protect against tampering, as the boot part cannot be encrypted. &

Re: self-encrypting drives (SED)

2015-11-21 Thread Pascal Hambourg
David Christensen a écrit : > > As I understand it, self-encrypting drives (SED) encrypt everything > (including the boot partition). To use this feature, you need a > computer with BIOS/ UEFI that supports it -- e.g. the BIOS will prompt > you for the password during POST; if

self-encrypting drives (SED)

2015-11-20 Thread David Christensen
use encryption or set up a password on the disk (ATA security functions). Note that encryption alone does not protect against tampering, as the boot part cannot be encrypted. As I understand it, self-encrypting drives (SED) encrypt everything (including the boot partition). To use this feature