Re: [Cryptography] trojans in the firmware

2015-02-25 Thread grarpamp
On Tue, Feb 24, 2015 at 10:48 AM, Kay Rydyger wrote: > > The question was [... firmware spies] > The answer is [...] to encrypt data. No, reading bits from platters or the bus is a partial analysis of the whole firmware question. It's already been suggested in links how firmware can hook the user

Re: [Cryptography] trojans in the firmware

2015-02-24 Thread RW
On Mon, 23 Feb 2015 12:45:02 +1300 Peter Gutmann wrote: > Henry Baker writes: > > >BTW, what's the point of AES encryption on this pre-p0wned device? > >More security theatre? > > Almost. Its sole use is for very fast "drive erasure", i.e. you > change the key and the data on it becomes inacce

Fwd: [Cryptography] trojans in the firmware

2015-02-23 Thread grarpamp
on the common script kid will be too. Unix is under attack and this stuff can't be ignored as "too rare and/or hard and/or low market share to be relavent" anymore. -- Forwarded message -- Date: Mon, Feb 23, 2015 at 12:10 PM Subject: Re: [Cryptography] trojans in the firm

Re: [Cryptography] trojans in the firmware

2015-02-23 Thread Tom Mitchell
On Sun, Feb 22, 2015 at 3:45 PM, Peter Gutmann wrote: > Henry Baker writes: > > >BTW, what's the point of AES encryption on this pre-p0wned device? More > >security theatre? > > Almost. Its sole use is for very fast "drive erasure", i.e. you change the > key and the data on it becomes inaccess

Re: [Cryptography] trojans in the firmware

2015-02-22 Thread Peter Gutmann
Henry Baker writes: >BTW, what's the point of AES encryption on this pre-p0wned device? More >security theatre? Almost. Its sole use is for very fast "drive erasure", i.e. you change the key and the data on it becomes inaccessible. Have a look at this presentation: http://www.snia.org/sites/

trojans in the firmware

2015-02-22 Thread grarpamp
On Sat, Feb 21, 2015 at 8:41 AM, Kay Rydyger : Please do not quote 200 lines of text just to insert your ten. And if using the digest, use the original subject line. Else it's lazy bad form at the expense of other readers of the list. >> > Alfred Hegemeier saith: >> > just encrypt the whole hard

Re: [Cryptography] trojans in the firmware

2015-02-20 Thread grarpamp
These were the links I was referring to that never made it past moderation/spam... > Alfred Hegemeier saith: > just encrypt the whole hard drive with Geli. GELI works under your control for what you store on the drive, and you can even enable the AES encryption feature of the drive itself as a n

Re: [Cryptography] trojans in the firmware

2015-02-20 Thread Jon Callas
On Feb 19, 2015, at 8:12 AM, Henry Baker wrote: > I would love to be able to program this device myself, instead of relying on > Samsung's firmware. > > BTW, what's the point of AES encryption on this pre-p0wned device? More > security theatre? NAND memory runs faster when the hamming weigh

Re: [Cryptography] trojans in the firmware

2015-02-20 Thread grarpamp
On Fri, Feb 20, 2015 at 4:50 PM, grarpamp wrote: > These for starters, then all the public hacker malware versions of > the same thing both extant and coming... Note the explicit references to FreeBSD and UFS in those links. Linux and EXT FS as well. These OS are not immune to 0-day and other exp

Re: [Cryptography] trojans in the firmware

2015-02-20 Thread Jerry Leichter
On Feb 19, 2015, at 11:12 AM, Henry Baker wrote: > I would love to be able to program this device myself, instead of relying on > Samsung's firmware. Good luck with that. SSD performance and even proper operation is still somewhat of a black art; much of the value of the device comes from the

Re: [Cryptography] trojans in the firmware

2015-02-19 Thread Poul-Henning Kamp
In message , Henry Baker writes: >BTW, what's the point of AES encryption on this pre-p0wned device? >More security theatre? > >http://hothardware.com/reviews/samsung-portable-ssd-t1-review It's so that you can decommision the drive without destroying it. Pulverizing electronics gets y

Re: [Cryptography] trojans in the firmware

2015-02-19 Thread Karl Denninger
On 2/18/2015 5:12 PM, grarpamp wrote: On Wed, Feb 18, 2015 at 5:16 PM, Tom Mitchell wrote: The critical stage is the boot ROM (BIOS) and the boot device. Once Linux has booted a lot is possible but too much has already taken place. A BIOS that allows booting from a Flash memory card must be tr

Re: [Cryptography] trojans in the firmware

2015-02-19 Thread Henry Baker
I would love to be able to program this device myself, instead of relying on Samsung's firmware. BTW, what's the point of AES encryption on this pre-p0wned device? More security theatre? http://hothardware.com/reviews/samsung-portable-ssd-t1-review Samsung Portable SSD T1 Review: Blazing Fast

Re: [Cryptography] trojans in the firmware

2015-02-19 Thread grarpamp
On Wed, Feb 18, 2015 at 8:57 PM, Henry Baker wrote: > At 03:12 PM 2/18/2015, grarpamp wrote: >>Afaik, all vm's today simply pass through all drive commands. >> >>It seems a move all the BSD's and Linux could make today, >>without waiting on untrustable hardware vendors to roll out signature >>veri

Re: [Cryptography] trojans in the firmware

2015-02-18 Thread Henry Baker
At 03:12 PM 2/18/2015, grarpamp wrote: >On Wed, Feb 18, 2015 at 5:16 PM, Tom Mitchell wrote: >> The critical stage is the boot ROM (BIOS) and the boot device. >> Once Linux has booted a lot is possible but too much has already taken place. >> A BIOS that allows booting from a Flash memory card mu

Re: [Cryptography] trojans in the firmware

2015-02-18 Thread grarpamp
On Wed, Feb 18, 2015 at 5:16 PM, Tom Mitchell wrote: > The critical stage is the boot ROM (BIOS) and the boot device. > Once Linux has booted a lot is possible but too much has already taken > place. > A BIOS that allows booting from a Flash memory card must be trusted. > > Virtual machines may h