On 01/14/2013 06:23 PM, André Rebentisch wrote: > fyi, André > > -------- Original-Nachricht -------- > Betreff: [Crypto Stick News] Vulnerabilities of Self-Encrypted SSDs > Datum: Mon, 14 Jan 2013 17:14:51 +0100 > Von: n...@crypto-stick.com > Antwort an: webmas...@crypto-stick.com, n...@crypto-stick.com > An: n...@crypto-stick.com > > > > Researchers found vulnerabilities of self-encrypted SSDs. From the abstract: > "Self-encrypting drives (SEDs), such as Intel's SSD 320 and 520 series, are > widely believed to be a fast and secure alternative to software-based > solutions like TrueCrypt and BitLocker. [...] In this sense, hardware-based > full disk encryption (FDE) is as insecure as software-based FDE. We also show > that (2) there exists a new class of attacks that is specific to > hardware-based FDE [Full Disk Encryption]. Roughly speaking, the idea of > these attacks is to move an SED from one machine to another without cutting > power, i.e., by replugging the data cable only. [...] Some machines are > arguably more vulnerable when using SEDs." Watch the videos... [1] > > This article: http://www.crypto-stick.com/node/74 > > [1] https://www1.cs.fau.de/sed > > > -- > Unsubscribe, change to digest, or change password at: > https://mailman.stanford.edu/mailman/listinfo/liberationtech > > Here is a german speech from the 29C3 in Hamburg, Germany, where the problems of SEDs are also mentioned: Unsecure SEDs Youtube <http://www.youtube.com/watch?feature=player_embedded&v=IzE2SKVP-MQ#%21>
-- Unsubscribe, change to digest, or change password at: https://mailman.stanford.edu/mailman/listinfo/liberationtech