Search Mailing List Archives


Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] Fwd: [Crypto Stick News] Vulnerabilities of Self-Encrypted SSDs

Julian Oliver julian at julianoliver.com
Mon Jan 14 09:34:52 PST 2013


"Roughly speaking, the idea of these attacks is to move an SED from one machine
to another without cutting power, i.e., by replugging the data cable only."

Ouch.

..on Mon, Jan 14, 2013 at 06:23:41PM +0100, André Rebentisch wrote:
> 
> fyi, André
> 
> -------- Original-Nachricht --------
> Betreff: 	[Crypto Stick News] Vulnerabilities of Self-Encrypted SSDs
> Datum: 	Mon, 14 Jan 2013 17:14:51 +0100
> Von: 	news at crypto-stick.com
> Antwort an: 	webmaster at crypto-stick.com, news at crypto-stick.com
> An: 	news at crypto-stick.com
> 
> 
> 
> Researchers found vulnerabilities of self-encrypted SSDs. From the abstract:
> "Self-encrypting drives (SEDs), such as Intel's SSD 320 and 520 series, are
> widely believed to be a fast and secure alternative to software-based
> solutions like TrueCrypt and BitLocker. [...] In this sense, hardware-based
> full disk encryption (FDE) is as insecure as software-based FDE. We also show
> that (2) there exists a new class of attacks that is specific to
> hardware-based FDE [Full Disk Encryption]. Roughly speaking, the idea of
> these attacks is to move an SED from one machine to another without cutting
> power, i.e., by replugging the data cable only. [...] Some machines are
> arguably more vulnerable when using SEDs." Watch the videos... [1]
> 
> This article: http://www.crypto-stick.com/node/74
> 
> [1] https://www1.cs.fau.de/sed
> 
> 
> --
> Unsubscribe, change to digest, or change password at: https://mailman.stanford.edu/mailman/listinfo/liberationtech

-- 
Julian Oliver
http://julianoliver.com
http://criticalengineering.org



More information about the liberationtech mailing list