Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 26 Feb 2008 11:28:27 +0100
From:      Achim Patzner <ap@bnc.net>
To:        Uwe Doering <gemini@geminix.org>
Cc:        freebsd-hackers@freebsd.org, "David E. Thiel" <lx@FreeBSD.org>
Subject:   Re: Security Flaw in Popular Disk Encryption Technologies
Message-ID:  <9111966B-DB9C-41E3-9D30-168D668585A9@bnc.net>
In-Reply-To: <47C345C9.8010901@geminix.org>
References:  <20080223010856.7244.qmail@smasher.org>	<20080223222733.GI12067@redundancy.redundancy.org> <31648FC5-26B9-4359-ACC8-412504D3257B@bnc.net> <47C345C9.8010901@geminix.org>

next in thread | previous in thread | raw e-mail | index | archive | help

--Apple-Mail-55-228725498
Content-Type: text/plain;
	charset=US-ASCII;
	format=flowed;
	delsp=yes
Content-Transfer-Encoding: 7bit


Am 25.02.2008 um 23:48 schrieb Uwe Doering:
> Since it hasn't been mentioned so far: There are hard disk drives  
> that do encryption on the firmware level, so you don't have to store  
> keys on the OS level.

I wouldn't go that far as there isn't (better: I didn't find)
enough documentation on their mechanisms to satisfy my curiosity.

You might want to take a look at eNova (http://www.enovatech.net/)
who are pointing at interesting hardware using their crypto technology.


Achim



--Apple-Mail-55-228725498--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?9111966B-DB9C-41E3-9D30-168D668585A9>