[ / / / / / / / / / / / / / ] [ dir / animu / asmr / ausneets / clang / leftpol / sonyeon / vg / vichan ][Options][ watchlist ]

/tech/ - Technology

You can now write text to your AI-generated image at https://aiproto.com It is currently free to use for Proto members.
Email
Comment *
File
Select/drop/paste files here
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Expand all images

[–]

 No.995012>>995566 [Watch Thread][Show All Posts]

SSD hardware encryption is anything but:

https://www.ru.nl/publish/pages/909275/draft-paper_1.pdf

Quoting someone's summary on CuckerNews:

>Firmware protection in drives is almost uniformly broken, so that they can get code execution (through JTAG or through hacked firmware images) routinely. This is bad, but shouldn't be the end of the world, since in the drive encryption threat model you don't want to have to depend on the firmware anyways. But:

>Two Crucial SSDs encrypt the drive with a key unrelated to the password; the password check is enforced only with an "if" statement in the firmware code, which can be overridden.

>Another Crucial SSD uses PBKDF2 to derive keys, but then has a master override key, which is blank by default. It also has a multi-volume encryption interface (Opal) with slots for volume keys, all of which are populated whether they're in use or not, and if they're not in use, they're protected with an all-zeroes key that recovers the master key for the device.

>Two Samsung drives implement PBKDF2, but not in the default mode, which is "password is checked in an if statement, like the Crucial drive". Also, the wear-leveling logic in one of the drives doesn't zero out old copies of the master key, so that when you change your disk password (or set it for the first time), unprotected copies of the data encryption key are left in blocks on the device.

>The Samsung T3 portable drive uses the drive password in an "if" statement and is trivially unlocked through JTAG. Its successor, the T5, is no more cryptographically sound, but is simply harder to obtain code execution on.

No wonder the Chinese wanted to steal Micron's masterful SSD tech. Remember to use Bitlocker, everyone!

 No.995062


 No.995063>>995605

>hardware encryption

OP is truly a faggot.

Bet they don't program their own NAND flash


 No.995069

>encrypt the drive with a key unrelated to the password

I bet it's the same key in every model, isn't it. It would still be rubbish, but at least if the key was randomized it'd be harder for an average person to make the electronics to read out the real key.


 No.995566>>995774

>>995012 (OP)

>using full disk encryption or encrypting a partition

I SHIGGY DIGGY DO. You should be storing important files as encrypted archive using a utility of your choice that you trust. Not only are these files portable and easier to back up due to them being smaller than a whole disk image, you can also offload them to a server or flash drive or other storage medium and not have to encrypt that device. This means you can even upload them to untrusted cloud services and download them later. If you're worried about the archives being brute forced, just go ahead and treat them like matryoshka dolls and do layered archive encryption with 10 different passwords and algorithms.


 No.995576>>995582

Why do we have so much shit threads past few months? Maybe it's because I just heard totally normal people talking about muh dark web selling slaves and shit, but hey, they shouldn't even know how to use poogle.

So where do those fuckers come "informing" about obvious? It's something I would expect to be "discussed" on (((hackernews))).


 No.995582

>>995576

Because the majority of h8chan userbase are spics, they are flooding from South America.


 No.995605

>>995063

wash your NAND


 No.995774

>>995566

>(((((untrusted))))) cloud

don't, unless you'll cease existing in 10 years




[Return][Go to top][Catalog][Screencap][Nerve Center][Cancer][Update] ( Scroll to new posts) ( Auto) 5
8 replies | 0 images | Page ?
[Post a Reply]
[ / / / / / / / / / / / / / ] [ dir / animu / asmr / ausneets / clang / leftpol / sonyeon / vg / vichan ][ watchlist ]