Flutterby™! : SSD "encryption"

Next unread comment / Catchup all unread comments User Account Info | Logout | XML/Pilot/etc versions | Long version (with comments) | Weblog archives | Site Map | | Browse Topics

SSD "encryption"

2018-11-06 16:40:46.396166+01 by Dan Lyke 0 comments

Solid state of fear: Euro boffins bust open SSD, Bitlocker encryption (it's really, really dumb) — Security experts frantically facepalming at stupid design

A paper [PDF] drawn up by researchers Carlo Meijer and Bernard van Gastel at Radboud University in the Netherlands, and made public today, describes these critical weaknesses. The bottom line is: the drives require a password to encrypt and decrypt their contents, however this password can be bypassed, allowing crooks and snoops to access ciphered data.

Seems to impact several models of Crucial and Samsung SSDs, and Bitlocker.

There's also the more general problem that architecture should allow unencrypted data on as few external buses as possible, so any solution which puts the encryption in the disk hardware is a bad idea. But this is pretty much dong nothing.

[ related topics: Graphic Design Cryptography Currency Education Architecture Handicaps & Disabilities Public Transportation hubris ]

comments in ascending chronological order (reverse):