TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Forget TrueCrypt, use self-encrypting drives. Gear-level crypto.

1 pointsby jjguyover 13 years ago

1 comment

reemrevnivekover 13 years ago
This does not compute. The linked page says <i>"Seagate Secure™ encryption hard drives keep your data safe even if your drives are lost, stolen, or misplaced."</i> This and other documentation, including the FAQ at <a href="http://www.seagate.com/docs/pdf/whitepaper/mb605_fips_140_2_faq.pdf" rel="nofollow">http://www.seagate.com/docs/pdf/whitepaper/mb605_fips_140_2_...</a>, constantly refer to physical drives getting out of users' control.<p>That FAQ describes the levels of security defined by FIPS 140-2 as:<p>&#62; Level 2 requires role-based authentication. (Individual user authentication is not required.) It also requires the ability to detect physical tampering by using physical locks or tamper-evident seals.<p>&#62; Level 3 adds physical tamper resistance to disassembly or modification ....<p>&#62; Level 4 includes advanced tamper protection and is designed for products that operate in physically unprotected environments.<p>Why is this not Level 4? Theft or loss are situations in which the product is in the most physically unprotected environment possible. It's in your attackers' clean room or EE lab, having the TPM die exposed, the keys read out, and the controller glitched to decrypt all the data.<p>Why wouldn't/couldn't Seagate get Level 4 protection for this device?