On Tue, Feb 24, 2015 at 10:48 AM, Kay Rydyger wrote:
>
> The question was [... firmware spies]
> The answer is [...] to encrypt data.
No, reading bits from platters or the bus is a partial analysis of
the whole firmware question. It's already been suggested in links
how firmware can hook the user
On Mon, 23 Feb 2015 12:45:02 +1300
Peter Gutmann wrote:
> Henry Baker writes:
>
> >BTW, what's the point of AES encryption on this pre-p0wned device?
> >More security theatre?
>
> Almost. Its sole use is for very fast "drive erasure", i.e. you
> change the key and the data on it becomes inacce
on the common
script kid will be too. Unix is under attack and this stuff can't be
ignored as "too rare and/or hard and/or low market share to be
relavent" anymore.
-- Forwarded message --
Date: Mon, Feb 23, 2015 at 12:10 PM
Subject: Re: [Cryptography] trojans in the firm
On Sun, Feb 22, 2015 at 3:45 PM, Peter Gutmann
wrote:
> Henry Baker writes:
>
> >BTW, what's the point of AES encryption on this pre-p0wned device? More
> >security theatre?
>
> Almost. Its sole use is for very fast "drive erasure", i.e. you change the
> key and the data on it becomes inaccess
Henry Baker writes:
>BTW, what's the point of AES encryption on this pre-p0wned device? More
>security theatre?
Almost. Its sole use is for very fast "drive erasure", i.e. you change the
key and the data on it becomes inaccessible. Have a look at this
presentation:
http://www.snia.org/sites/
On Sat, Feb 21, 2015 at 8:41 AM, Kay Rydyger :
Please do not quote 200 lines of text just to insert your ten.
And if using the digest, use the original subject line. Else
it's lazy bad form at the expense of other readers of the list.
>> > Alfred Hegemeier saith:
>> > just encrypt the whole hard
These were the links I was referring to that
never made it past moderation/spam...
> Alfred Hegemeier saith:
> just encrypt the whole hard drive with Geli.
GELI works under your control for what you store on the
drive, and you can even enable the AES encryption feature
of the drive itself as a n
On Feb 19, 2015, at 8:12 AM, Henry Baker wrote:
> I would love to be able to program this device myself, instead of relying on
> Samsung's firmware.
>
> BTW, what's the point of AES encryption on this pre-p0wned device? More
> security theatre?
NAND memory runs faster when the hamming weigh
On Fri, Feb 20, 2015 at 4:50 PM, grarpamp wrote:
> These for starters, then all the public hacker malware versions of
> the same thing both extant and coming...
Note the explicit references to FreeBSD and UFS in those links.
Linux and EXT FS as well. These OS are not immune to 0-day
and other exp
On Feb 19, 2015, at 11:12 AM, Henry Baker wrote:
> I would love to be able to program this device myself, instead of relying on
> Samsung's firmware.
Good luck with that. SSD performance and even proper operation is still
somewhat of a black art; much of the value of the device comes from the
In message , Henry Baker
writes:
>BTW, what's the point of AES encryption on this pre-p0wned device?
>More security theatre?
>
>http://hothardware.com/reviews/samsung-portable-ssd-t1-review
It's so that you can decommision the drive without destroying it.
Pulverizing electronics gets y
On 2/18/2015 5:12 PM, grarpamp wrote:
On Wed, Feb 18, 2015 at 5:16 PM, Tom Mitchell wrote:
The critical stage is the boot ROM (BIOS) and the boot device.
Once Linux has booted a lot is possible but too much has already taken
place.
A BIOS that allows booting from a Flash memory card must be tr
I would love to be able to program this device myself, instead of relying on
Samsung's firmware.
BTW, what's the point of AES encryption on this pre-p0wned device? More
security theatre?
http://hothardware.com/reviews/samsung-portable-ssd-t1-review
Samsung Portable SSD T1 Review: Blazing Fast
On Wed, Feb 18, 2015 at 8:57 PM, Henry Baker wrote:
> At 03:12 PM 2/18/2015, grarpamp wrote:
>>Afaik, all vm's today simply pass through all drive commands.
>>
>>It seems a move all the BSD's and Linux could make today,
>>without waiting on untrustable hardware vendors to roll out signature
>>veri
At 03:12 PM 2/18/2015, grarpamp wrote:
>On Wed, Feb 18, 2015 at 5:16 PM, Tom Mitchell wrote:
>> The critical stage is the boot ROM (BIOS) and the boot device.
>> Once Linux has booted a lot is possible but too much has already taken place.
>> A BIOS that allows booting from a Flash memory card mu
On Wed, Feb 18, 2015 at 5:16 PM, Tom Mitchell wrote:
> The critical stage is the boot ROM (BIOS) and the boot device.
> Once Linux has booted a lot is possible but too much has already taken
> place.
> A BIOS that allows booting from a Flash memory card must be trusted.
>
> Virtual machines may h
16 matches
Mail list logo