Seagate Ships World's Most Secure Hard Drive 148
An anonymous reader writes to let us know that after two years Seagate is finally shipping its full-disk encryption product, and you can get your hands on it in a laptop from system vendor ASI.
Worlds most secure cipher meet ... (Score:4, Insightful)
Also how are they using AES? I thought P1619 (XTS-AES) is still a draft. Are they betting it will get adopted unchanged? Or are they using some other thing? Please tell me it's not AES in ECB mode...
Tom
Re: (Score:3, Informative)
Re: (Score:2)
The whole idea of XTS is that you can get privacy without extra storage.
Tom
Re: (Score:3, Interesting)
Re: (Score:2)
Re: (Score:3, Informative)
This is how Linux's crypto-loop works. The CBC is run across only individual 512-byte blocks of the disk. I think they use the sector number as an IV.
Re:Worlds most secure cipher meet ... (Score:4, Informative)
For example, Loop-AES behaves like this in multi-key-v3 mode where CBC is used with an IV computed from a secret key, the sector number, and plaintext blocks [1..n-1] in the sector. This is also how Microsoft Bitlocker behaves because they combine CBC with the Elephant diffuser. When CBC is not used, this property can be achieved using LRW or XEX, or wide-block encryption.
No need to blame the user. (Score:5, Insightful)
worlds stupidest user with passwords like 'password' :-)
That's a joke, but some people really think that way. Blaming "stupid users" makes them feel more secure or helps them pass the buck for choosing systems with poor security. When you think about it, it's not very funny.
Passive encryption might be a step in the right direction, but I won't trust it as long as the software doing has owners and secrets kept from users. They can point to specs and tell me what they are doing, but that does not mean they are doing that. The owners can break in at will, the keys can be padded with zeros and finally, the owners can make mistakes.
Re: (Score:2)
What part of that can't be bypassed by somebody giving away what they know/have (Because their friend forgot theirs and really
Re: (Score:3, Interesting)
Take all these shops that you have to sign up with before buying something, all they store is your address, your email address, your email and on rare occasions order history (the ones that also store credit cards are a different matter but those are less common and I'm not talking about those here)
Why should I use one of my more secure passwords? I dont like to change pa
Re: (Score:2)
Secure like HDDVD? (Score:1, Troll)
Hacked in 3....2....1
gasmonso http://religiousfreaks.com/ [religiousfreaks.com]Re: (Score:3, Informative)
Most DRM hinges on the fact that the content must stay readable, in however limited a sense. In other words, you're giving the encrypted content to the attacker, who also has to have the key in order to use it. The attacker and the intended recipient are the same person.
When you take away that requirement, encryption actually becomes workable.
Worlds most secure? (Score:2, Interesting)
Is this really any more secure than dm-crypt? Faster, no doubt, but more secure?
Re: (Score:3, Informative)
Because it's the only (publicly available) HDD with *cryption functions built into the circuitry.
Is this really any more secure than dm-crypt? Faster, no doubt, but more secure?
Probably not. But simpler for users/admins to put out in the field.
But closed-source, so we really don't know how well it was implemented.
Re: (Score:2)
I mean, we still do software RAID, and find it pretty useful -- and it's at the point where there's plenty of "fakeraid" out there to deal with Windows' lack of good (cheap) RAID tools. So, why not just implement something similar -- BIOS crypto? That would make it easy enough, without actually having to put more circuitry on the drive.
For that matter, it seems to me like it would make much more sense to have a gener
Re: (Score:2)
Because that way the algorithm that *crypts the data always stays with it. If it were BIOS crypto, what happens when Phoenix uses AES and AMI uses Blowfish?
For that matter, it seems to me like it would make much more sense to have a generic hardware crypto device, so you can use it for other things
Single-use means: easier to implement and disseminate.
Re: (Score:2)
That's what standards are for, and AES is the standard. Or they could do what HD-DVD/Blu-Ray does and pick a few, and declare that those are possible standards.
Re: (Score:2)
And if, for "competitive advantage", Phoenix & AMI choose different standards?
Re: (Score:2)
Re: (Score:2)
Most things like this can be done in software or in hardware. Which is only part of the point.
Let me put it this way: How would you feel if you didn't buy a "video card", but rather a "Half-Life 2 card"? Video cards are as generic as they reasonably can be. This is hardware to help with encryption, and I don't see anything about it that would tie it to the hard drive other than user convenience. If you really need hardware-accelerated crypto -- and you probably don't; mod
Re: (Score:2)
In which case, wouldn't it be nice to be able to use the same hardware crypto for, say, your corporate VPN?
There are actually laptops with two-disk RAID in them.
Well, gen
3gb/s sata on a 5400 rpm drive? (Score:1, Insightful)
Re: (Score:2, Insightful)
Supply & Demand.
Re:3gb/s sata on a 5400 rpm drive? (Score:5, Insightful)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
What, precisely, makes you think also supplying PATA or an older SATA device would be cheaper? Perhaps it is cheaper for a manufacturer to not bother with multiple different SATAs, or fiddly, obsolete parallel buses and simply adopt one device across the board. In terms of R&D, supply chain, manufacturing and QA it is rather easy to imagine that obviating older standards is actually cheaper, but I don't know, because I don't manufacture millio
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Except in rare cases, you're not likely to replace the drive more than once or twice in the lifetime of the notebook, so the "nicer connectors" mean very, very little.
Re: (Score:2)
Suppose someone comes to me with a "dead" notebook hard drive. If the notebook won't boot enough for me to run a livecd, or if it doesn't even have a cdrom drive, I could still open it up, grab the SATA drive, and plug it into my desktop to test it there. Much more convenient with things like the Powerbook's FireWire target mode, but you get this one for free.
Re: (Score:2)
Re: (Score:2)
Extra cost for the chips, connectors, etc. Likely higher power requirements. The need to change your production line for the new interface. etc. etc.
You can do exactly the same with PATA, just about as easily. I've done so many, many times.
Unless you're doing this several times every day, the difference in connectors makes a trivially small difference.
Re: (Score:2)
Connectors are smaller and probably cheaper. Chips are likely cheaper, considering they've already changed their production line for a new interface anyway. And why don't you come back when you know for sure it's higher power requirements? I bet it's not.
My PATA doesn't support hotplugging.
Re: (Score:2)
Why don't you come back when you know for sure it's cheaper? I bet it's not.
If you have the right software, any PATA chipset can handle hot swapping. If not, ATA controllers that do are cheap. USB/Firewire converters are quite cheap. etc.
Besides, you absolutely do not need hot-swapping. It's an added convenience which, as I've said, is only significant if you're working with them constantly.
Re: (Score:2)
You just answered your own question.
The switch to SATA has only a small bit to do with sustained throughput. Other issues are paramount.
Burst transfer, for instance, can be as fast as whatever bus you're using, and with notebooks typically having a larger HDD cache, that could be significant.
More than that, SATA features, like NCQ, which have long speed-up the performance of SCSI drives before they even reac
Backdoored? (Score:5, Interesting)
Who knows what this thing is doing inside? They're using AES-128 so you may not have to worry about the encryption algo being unsecure, but who's to say this thing isn't caching the password in some place you don't know about (but that the manufacturer and your country's authorities do)?
Re: (Score:2)
Re: (Score:2)
Yes, if the government tried to prosecute someone for something discovered through this technique, it would be entered into evidence in a court proceeding and become public knowledge. But the government has more ways of going after people than through an open courtroom. For example, if they were using a backdoor in one of these drives for intelligence gathering, data gleaned from such would never make its way into a courtroom, and could still be used against someone in a variety of ways. I can't find the st
Re: (Score:3, Funny)
Sounds really useful. From what I hear, write-only memory is about as cryptographically secure as it comes.
Re: (Score:2, Funny)
NEWBIE!
Re: (Score:2)
Is the write-only memory that we're talking about volatile storage that'll blank when the power goes off, or just an otherwise-inaccessible part of the permanent media in the drive? In the latter situation, what's to prevent someone from taking the drive apart (forensic analysis) to circumvent whatever mechanisms that, under normal operating conditions, render that portion of the drive "write-only"?
Sounds like relying on a login prompt to protect your computer's data and forgetting someone with physical a
Re: (Score:2)
The idea is temporal security. In that, at some point the key goes over the bus [protected or otherwise] and cannot later be read back, that is, externally. Of course, inside the IC the memory is readable, how else would it use the key? But that's inside the IC with DPA/SPA resistance and the like...
There is a whole build up for "keywrap" standards which address this very p
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
There are hardware keyloggers out there, but I'm not sure how hard it's going to be to install them in someone's laptop. Certainly it's feasible. The question, as always, is whether it's practically worth the hassle. If we're talking about a product that targets a few CEOs and government executives, then I would worry about the possibility of a hardware keylogger. If we're talking about a random u
Re: (Score:2)
OS Compatibility? (Score:1)
Oh Goody! (Score:5, Insightful)
Who cares if this gets cracked by Tuesday, bitches?
The selling point is that the banks wont have to tell you when Bubba leaves his laptop on the CAL TRAIN with your credit card data in standby mode, cause its encrypted!
I feel so safe!
Re: (Score:2)
Re: (Score:3, Informative)
Don't be so sure.
I had to install PGP Desktop and encrypt my laptop's HDD, and when it asked me for th
Re: (Score:2)
Re: (Score:2)
The one I chose happens to be 22 characters. The trick is to choose a phrase that is meaningful to you but also not easily discovered thru social engineering.
Doable, but definitely requires forethought.
Re: (Score:2)
Not if you used a phrase such as "My name is Werner Brandes. My voice is my passport. Verify me." - A phrase isn't hard to remember.
Re: (Score:2)
There simply is no security scheme in all computing that has a chance against the stupid/lazy/uniformed end user.
Re: (Score:2)
Why is it so hard for banks and insurance companies to do the same?
It's not like
Re: (Score:2)
Because if you could do more than sit in meetings, drink coffee, and hire consultants to do everything else, you would not be caught dead working for a bank or insurance company.
My largest client is an International Bank in SFO. I've gone through the BART tunnel with THOUSANDS of person's credit information on my ThinkPad, because the bank's IT folks didnt have the ability to grant me access to their internal SQL machines. I still shake
And in next year's news... (Score:5, Funny)
Re: (Score:3, Insightful)
Financial fraud linked to stolen encrypted laptop
In the largest online fraud incident in history, experts linked the Personally Identifiable Information (PII) used in committing the fraudulent acts back to a laptop that was stolen over a year ago. Company X denies the experts' allegations saying "the laptop's hard drive was encrypted." Under this premise, Company X refrained from notifyi
Re: (Score:2)
real question (Score:3, Insightful)
If that were the case, it would be a simple matter to retrofit existing laptops (which use DriveLock to protect the disks) with the improved security of full-blown encryption. And it could be done without any perceptible changes to the user!
This could be a great product if they just Keep It Simple so that it works seamlessly with the already widely-deployed ATA Security Mode (DriveLock) protocol.
Re: (Score:2)
And as an added bonus, since most Laptops can only use the same password for the hard drive as they do for the Laptop lock, you can start up an extremely profitable business selling the hardware adapter to download the EPROM from popular Laptops, and the software which seeks to the proper address in the ROM dump, and prints out the password.
eg. http://www.ja.a [axxs.net]
I already have the world's most secure hard drive (Score:2, Funny)
Granted, getting data back is a bit, erm, difficult, but write only memory? That's pretty damn secure.
(And anticipating witty responses... I will accept that
Re:I already have the world's most secure hard dri (Score:2)
/dev/null is a beowulf cluster of damn secure (Score:2)
Back Door For Big Brother ? (Score:4, Insightful)
Re: (Score:2, Funny)
Re: (Score:2)
I'd trust it -- if I were using it here in the US. (Why would the Chinese share their backdoors with our cops?)
Re: (Score:3, Funny)
Re: (Score:2)
Of course. Stop living in 1993. (http://en.wikipedia.org/wiki/Clipper_chip [wikipedia.org])
without providing a back door for Big Brother to access?
Depends on whether or not they want to sell into the Chinese market.
Re: (Score:2)
"Then-Senator John Ashcroft was a leading opponent of the Clipper chip proposal, arguing in favor of the individual's right to encrypt messages and export encryption software."
Now there's an interesting little tidbit. I wouldn't have expected that from him. Unless wikipedia is wrong on that one.
Re: (Score:2)
I wonder where Richard M. Stallman gets his disks from? I don't know
Re: (Score:2)
This is actually a good reason to not trust disk-level encryption -- if the data is going to the disk in the clear and you're relying on the disk to encrypt it, are you even sure it really got encrypted? It could be getting copied somewhere else on the disk, accidentally or intentionally, and you'd never know.
But if your OS is doing full-disk encryption for you, so that no data ever even travels down the IDE cable before it's been encrypted, this particular worry can be put to rest. Let the disk make sixt
Re: (Score:2)
The incomplete article is missing any mention... (Score:5, Informative)
Only protects from theft! (Score:2)
If you want to proect files on your laptop from being accessed by a logged-in user, you need to use somet
Re: (Score:2)
What happens when the flash drive is lost / damaged / worn out may be a problem, though; I hope you can make a backup drive...
Re: (Score:2)
Video Camera Application? (Score:3, Informative)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Since the U.S. has a constitutional guarantee of free speech, a strong judiciary with no interest in prior restraint, as well as a vibrant free press, I don't think we qualify.
Re: (Score:2)
Get back or I shall slay you with my +9 Pork Chop of Gluttony!
Re: (Score:2)
I figured it out... (Score:2)
Re: (Score:2)
LaCie (Score:2)
http://www.lacie.com/us/products/product.htm?pid=
Re: (Score:2)
http://www.lacie.com/us/products/product.htm?pid=
and have been for many moons.
Secure from who? (Score:3, Funny)
Hibernate (Score:3, Insightful)
The real problem is not designing effective security, but getting people to use it properly. You can start on this by banning PostIt notes from the corporate environment -- or at least make them self-destruct.
Re: (Score:2)
Bah (Score:2)
Here I hoped they would have created the most secure harddrive in the world, one who withstand earthquakes, floods, car collisions, and 50+ years of continuous use. And then it turns out that it's just a layer of crypto.
How boring, we can do that in software already....
Top 10 Most Secure Hard Drives (Score:3, Insightful)
1. The world's most secure hard drive is the one not used to contain valuable confidential data (experts question its existence).
2. Doesn't exist.
3. Doesn't exist.
4. A hard drive that contains some valuable confidential data, but remains physically within a datacenter. The OS that accesses it does not share its data with other OSes, and runs the full gamut of controls (prevention, detection, correction).
5. Doesn't exist.
6. Doesn't exist.
7. Doesn't exist.
8. Doesn't exist.
9. A hard drive that contains some valuable confidential data, remains physically within a datacenter, but its OS shares data among other systems whose trust is "unknown" or "uncertain".
And tied for 10th place (by virtue of consolation):
10. An encrypted drive in a mobile device relying upon its user for security.
10. An unencrypted drive in a mobile device relying upon its user for security.
If the "laws of physics" of information security were known, we'd likely see a Newtonian-esque law that says something like (in a more scientific form): "any security system that relies upon a person to use the system correctly will fail [miserably]". What Seagate is trying to do is analogous to defying gravity or creating "information security perpetual motion". It just won't improve the situation for anyone (except perhaps the "checklist security" people who can tell their compliance regulation auditors that they can add a point to their useless overall score).
Seagate's security in my experience (Score:2)
Ok seriously, I did not RTFA and don't plan to. My guess is it is all hype and probably not something easily feasible for the wide spread market at large.
I am not saying I disagree with innovation or the concept in general, just that I doubt this will be a real mind blower of a product, especially in its initial implementation.
Just my -$.02
Re: (Score:2, Informative)
However, you could easily design a keypad that makes it nigh-impossible to lift a print. A simple rough textured finish on the top would do the trick.
Re: (Score:2)
Encrypt system drive (Score:2)
> since I can't encrypt the system drive
You can, using DCPP [securstar.com]