Search Mailing List Archives

Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] Fwd: [Crypto Stick News] Vulnerabilities of Self-Encrypted SSDs

Andreas Bader noergelpizza at
Mon Jan 14 12:18:26 PST 2013

On 01/14/2013 06:23 PM, André Rebentisch wrote:
> fyi, André
> -------- Original-Nachricht --------
> Betreff: 	[Crypto Stick News] Vulnerabilities of Self-Encrypted SSDs
> Datum: 	Mon, 14 Jan 2013 17:14:51 +0100
> Von: 	news at
> Antwort an: 	webmaster at, news at
> An: 	news at
> Researchers found vulnerabilities of self-encrypted SSDs. From the abstract:
> "Self-encrypting drives (SEDs), such as Intel's SSD 320 and 520 series, are
> widely believed to be a fast and secure alternative to software-based
> solutions like TrueCrypt and BitLocker. [...] In this sense, hardware-based
> full disk encryption (FDE) is as insecure as software-based FDE. We also show
> that (2) there exists a new class of attacks that is specific to
> hardware-based FDE [Full Disk Encryption]. Roughly speaking, the idea of
> these attacks is to move an SED from one machine to another without cutting
> power, i.e., by replugging the data cable only. [...] Some machines are
> arguably more vulnerable when using SEDs." Watch the videos... [1]
> This article:
> [1]
> --
> Unsubscribe, change to digest, or change password at:
Here is a german speech from the 29C3 in Hamburg, Germany, where the
problems of SEDs are also mentioned:
Unsecure SEDs Youtube

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <>

More information about the liberationtech mailing list