Date: Thu, 29 Oct 2015 16:24:00 -0700 From: John-Mark Gurney <jmg@funkthat.com> To: Lyndon Nerenberg <lyndon@orthanc.ca> Cc: freebsd-current Current <freebsd-current@freebsd.org> Subject: Re: Depreciate and remove gbde Message-ID: <20151029232359.GQ65715@funkthat.com> In-Reply-To: <D06BBE98-3C1B-400E-8069-57FD37A6FF98@orthanc.ca> References: <6216.1445631619@critter.freebsd.dk> <201510241559.t9OFwsiF078038@fire.js.berklix.net> <20151024190611.GE65715@funkthat.com> <D06BBE98-3C1B-400E-8069-57FD37A6FF98@orthanc.ca>
next in thread | previous in thread | raw e-mail | index | archive | help
Lyndon Nerenberg wrote this message on Mon, Oct 26, 2015 at 19:06 -0700:
> On Oct 24, 2015, at 12:06 PM, John-Mark Gurney <jmg@funkthat.com> wrote:
>
> > The thing I like most about encryption is that when I RMA a bad
> > drive, I don't have to worry about my data leaking if I am unable
> > to overwrite all the data...
>
> You are optimistic if you believe that. We ($WORK) factor the cost of DOA/warranty drives into our operational budget. They never get RMAed. We drill them when they die.
Being a personal user, and having close to a 10% RMA rate on recent
hard drives, that would be a bit costly...
I consider a HD defective if it's under waranty and it's performance
drops below 80% of new, i.e. 130MB/sec normal sequential write drops
below 100MB/sec..
The weekest point is the passphrase/passfile protecting the master
key... In my case, I use a random passfile for these drives... If
someone is able to break the passfile, or the AES-256 encryption, then
they must really want my data... It'd be easier, even for governments,
to do a black bag job than recover partial data (it's one drive of a
RAIDZ array)...
--
John-Mark Gurney Voice: +1 415 225 5579
"All that I will do, has been done, All that I have, has not."
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20151029232359.GQ65715>
