Comment Re:Weakness? (Score 1) 220
If only one of the drives is encrypted, then remove it and recover it to a non-encrypted drive. Clearly this is not what you are talking about.
With several drives, all encrypted, you should be good, bugs in the _implementation_ notwithstanding.
Whether the drives have the same keys or not doesn't matter - a drive has to be block encrypted since it's random access and thus 5 drives with the same key aren't much different than 1 drive 5 times as large.
Any info that can leak out of five drives striped could just as easily leak out of a single appropriately arranged file on one drive.
If AES is implemented properly that would mean no significant info in both cases.
Since the application is closed source, in 'hardware' (firmware/fpga? who knows) we'll just hope it's secure. For a corp, it means that they are less likely to be successfully sued for being security idiots, though - which is likely what would drive such purchases.
With several drives, all encrypted, you should be good, bugs in the _implementation_ notwithstanding.
Whether the drives have the same keys or not doesn't matter - a drive has to be block encrypted since it's random access and thus 5 drives with the same key aren't much different than 1 drive 5 times as large.
Any info that can leak out of five drives striped could just as easily leak out of a single appropriately arranged file on one drive.
If AES is implemented properly that would mean no significant info in both cases.
Since the application is closed source, in 'hardware' (firmware/fpga? who knows) we'll just hope it's secure. For a corp, it means that they are less likely to be successfully sued for being security idiots, though - which is likely what would drive such purchases.