Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Data Storage Encryption Security Hardware IT

Self-Wiping Hard Drives From Toshiba 268

Orome1 writes "Toshiba announced a family of self-encrypting hard disk drives engineered to automatically invalidate protected data when connected to an unknown host. Data invalidation attributes can be set for multiple data ranges, enabling targeted data in the drive to be rendered indecipherable by command, on power cycle, or on host authentication error."
This discussion has been archived. No new comments can be posted.

Self-Wiping Hard Drives From Toshiba

Comments Filter:
  • Re:TrueCrypt (Score:5, Informative)

    by Ruprecht the Monkeyb ( 680597 ) on Wednesday April 13, 2011 @01:24PM (#35809958)
    TrueCrypt is great in most circumstances. But if you need (for example) FIPS140-2 compliance, you' need something more.
  • Re:What... (Score:5, Informative)

    by vlm ( 69642 ) on Wednesday April 13, 2011 @01:49PM (#35810280)

    You had multiple disk corruption due to a common firmware bug on the drives themselves? That seems like its going to be pretty damn rare.

    Happens all the time because most RAID builders buy all their drives in one order from the same vendor. Heck they probably have sequential serial numbers. If there is a bug, they're going to totally lose that array because it'll hit all the drives.

    Let me guess, about a year ago or a bit more, he bought a set of Maxstor 541DX, Fireball 3, or DiamondMax Plus 8, the defect lists slowly started filling up, one drive finally failed outright, then during the restore/rebuild process multiple drives also failed because their defect lists filled up during the restoration, then the drive firmware literally crashed on the next boot leaving you with nothing at all but a set of paperweights that don't even show up in the BIOS list? Mmmm, just guessing?

    Always better off buying RAID drives from different vendors at different times, if you can.

  • Re:TrueCrypt (Score:2, Informative)

    by Anonymous Coward on Wednesday April 13, 2011 @02:19PM (#35810592)

    TrueCrypt is FIPS140-2 compliant, it just isn't certified as such. No one has yet volunteered to pay for it and it would be a recurring expense for every released version. Such a thing is generally unreasonable for an open source project unless it is sponsored by an interested third party.

    It is much the same situation as the Single UNIX Specification (http://en.wikipedia.org/wiki/Single_UNIX_Specification). There are only a few OSes that can call themselves certified UNIX, but there are hundreds if not thousands of open source projects that qualify. The problems are funding and release cycles, not compliance.

They are relatively good but absolutely terrible. -- Alan Kay, commenting on Apollos

Working...