Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 8 Sep 2015 13:52:24 -0600
From:      Richard Hodges <richard@hodges.org>
To:        freebsd-hackers@freebsd.org, "Li, Xiao" <xaol@amazon.com>
Cc:        Igor Mozolevsky <igor@hybrid-lab.co.uk>, Analysiser <analysiser@gmail.com>
Subject:   Re: Passphraseless Disk Encryption Options?
Message-ID:  <201509081352.25700.richard@hodges.org>
In-Reply-To: <D2147761.1A53%xaol@amazon.com>
References:  <8B7FEE2E-500E-49CF-AC5E-A2FA3054B152@gmail.com> <CADWvR2iVubsBQjnvQ8mDGGS7ujsR8wPQ2RAxn=kvFkmVGQkXiQ@mail.gmail.com> <D2147761.1A53%xaol@amazon.com>

index | next in thread | previous in thread | raw e-mail

On Tuesday 08 September 2015,"Li, Xiao via freebsd-hackers" <freebsd-hackers@freebsd.org> 
wrote:
> Agreed, thatıs why Iım stuck in here: it seems like something either
> unachievable or havenıt been done before. 

The decryption key has to come from somewhere. Usually someone types it in, but they key 
could be on removable media, like a USB memory stick, a CD ROM, floppy, etc.

I think you hinted at secure boot. Do you trust the security of the motherboard? But if 
someone steals your hard drives, can't they also steal your other hardware?

It might be interesting to think about an external key, such as in a USB stick, that could 
be set to self-destruct (eg, overvoltage) coupled with a tamper sensor.

If you could describe your threat model in more detail, and tell exactly what parts are 
trusted, someone might have a helpful idea.

-Richard


help

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201509081352.25700.richard>