TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Analysis of an encrypted HDD [pdf]

26 pointsby 2510c39011c5about 10 years ago

3 comments

DanBCabout 10 years ago
See also &quot;enclosed but not encrypted&quot; for an attack on an encrypted hard drive enclosure.<p><a href="http:&#x2F;&#x2F;www.h-online.com&#x2F;security&#x2F;features&#x2F;Enclosed-but-not-encrypted-746199.html" rel="nofollow">http:&#x2F;&#x2F;www.h-online.com&#x2F;security&#x2F;features&#x2F;Enclosed-but-not-e...</a>
joostersabout 10 years ago
<i>While we know the crypto design is a fail, because all the encryption related data is stored on the drive itself,</i>...<p>I don&#x27;t see why this makes it weaker, could someone explain?<p>The only apparent weakness I see from this page is that the secret key is a 4-8 digit number, meaning that the device could be realistically brute-forced by someone who knew the encryption algorithm.
评论 #9670531 未加载
评论 #9670290 未加载
risabout 10 years ago
Regardless of vulnerabilities, from a data safety&#x2F;recoverability point of view it never seems like a good idea to me to use an encryption system that doesn&#x27;t have a documented on-disk format.