Date: Tue, 26 Feb 2008 11:28:27 +0100 From: Achim Patzner <ap@bnc.net> To: Uwe Doering <gemini@geminix.org> Cc: freebsd-hackers@freebsd.org, "David E. Thiel" <lx@FreeBSD.org> Subject: Re: Security Flaw in Popular Disk Encryption Technologies Message-ID: <9111966B-DB9C-41E3-9D30-168D668585A9@bnc.net> In-Reply-To: <47C345C9.8010901@geminix.org> References: <20080223010856.7244.qmail@smasher.org> <20080223222733.GI12067@redundancy.redundancy.org> <31648FC5-26B9-4359-ACC8-412504D3257B@bnc.net> <47C345C9.8010901@geminix.org>
next in thread | previous in thread | raw e-mail | index | archive | help
--Apple-Mail-55-228725498 Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Am 25.02.2008 um 23:48 schrieb Uwe Doering: > Since it hasn't been mentioned so far: There are hard disk drives > that do encryption on the firmware level, so you don't have to store > keys on the OS level. I wouldn't go that far as there isn't (better: I didn't find) enough documentation on their mechanisms to satisfy my curiosity. You might want to take a look at eNova (http://www.enovatech.net/) who are pointing at interesting hardware using their crypto technology. Achim --Apple-Mail-55-228725498--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?9111966B-DB9C-41E3-9D30-168D668585A9>