>From Seagate: "allows hard drive data to be erased instantly" Three ways of doing this that I can think of at the moment: 1 - It purges/overwrites the encryption key(s) from whatever ASIC/EEPROM/security chip it stores it in. 2 - It writes (not flips) a number of bits on the disk, to corrupt the encrypted disk. It doesn't even need to be a random/pseudo-random pattern (although more secure if it is.) Since the state of the drive isn't likely to be known beforehand, even knowing which bits have been changed wouldn't render the process ineffective. 3 - They do both. Even on a 120GB drive that isn't going to take long. Would it 'Wipe' the drive? Not in the way we have historically referred to wiping, but effective nevertheless. If you have to go through n processes simply to get back to the state of having an encrypted drive, and then to have to break the encryption, I don't suppose there are too many people on this list with the facilities and capabilities to do that.
(There is of course another (im)possibility - that Seagate are shipping drives with micro EMP generators for that Mission Impossible-style sayonara to your data. They'd need to do something about a Big Red Button and getting a curling smoke effect for complete user satisfaction though.) -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of [EMAIL PROTECTED] Sent: 31 October 2006 13:52 To: [email protected] Subject: Hardware Based Disk Encryption http://www.seagate.com/cda/newsinfo/newsroom/releases/article/0,,2732,00 .html When someone gets a chance to play with one of these, please post. An open and self-contained crypto infrastructure on a hard drive that is "useless" until the BIOS recognizes it with a password key. Reminds me a little of the "locks" some manufactures have that can be enabled in the BIOS for some drives. Although, it is easy to just call up the manufacture and get the back-door key for locked drives (done many times with basic data recovery jobs or just hook up to another computer and not boot from it), according to Seagate, there is no "back-door" access here. If the key is lost, stolen, or just not available for investigations/recoveries, there will be no way to access/read the FDE (Full-Disk Encryption) drive. Also, it has a "wiping" technique that supposedly can "wipe" a drive in less then a second and be "secure". I would like to know more about this. If anyone has any information, please post. Thanks.
