Seagate To Encrypt Data On Hard Drives 321
Krishna Dagli writes "Seagate, using their new DriveTrust Technology, will automatically encrypt every bit of data stored on the hard drive and require users to have a key, or password, before being able to access the disk drive."
No back doors? (Score:5, Insightful)
Would Seagate really attempt to market a drive that was going to protect pedophiles and terrorists? (Not to mention us ordinary citizens who don't wholly and utterly trust the organs of the state to act systematically in our best interests.)
If so, it's a brave move. But somehow it just seems so unlikely...
Re: (Score:2)
Re: (Score:2, Insightful)
The best security IMHO is linux with GPG and mix 'n matched off the shelf hardware. This way the HDD doesnt know what/where the encryption key is, or even that the data is being encrypted.
In my opinion, mass distributed software based encryption is easier to trust (because it's easier to verify the i
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
I fear that at some point Joe Public will think "encryption = pedophiles and terrorists". Maybe that's already the case.
Re: (Score:2)
Yes (Score:3, Insightful)
Re: (Score:3, Insightful)
Actually that's quite wrong. The difference is that you're for some reason expecting the populous to be fight
Re: (Score:3, Interesting)
To meet any reasonsable security policy one would need a "yes" to each of the questions: Is the source code for the encryption routines provided? Is a complete API provided? And can the owner of the hardware verifiably replace every digital key in the device?
If the answer to any of these is no
Re: (Score:2, Funny)
Calling Seagate Tech Support:
Seagate: Welcome to Seagate, the current wait time is... 12 days, 6 hours and 32 minutes.. please hold....
*Music Plays*
*12 days later*
Seagate Tech: Welcome to Seagate Tech Support, How can I assist you today?
Customer: hi ummm... I lost my password for this new Encrypted Hard Drive, can you help me?
Seagate: Sure can, ok at the prompt type the following: Lieutenant General Keith B. Alexander
Customer: hmmm ok, HEY!! it works thank you!!
Seagate: Not a problem, have a wo
Re: (Score:2, Funny)
And while we're at it let's all stop using SSL and the like. Anyone who continues to do so is clearly a terroristic pedophile and may be gunned down in cold blood; better safe than sorry I say.
Re: (Score:3, Funny)
Re: (Score:2)
Key == serial number (Score:2)
Re: (Score:2, Insightful)
Re: (Score:3, Interesting)
Umm, I'm guessing people who realized it was insightful.
The closest the US gov't has come to regulating the domestic use of encryption was the aborted "clipper chip" fiasco. Traditionally government spooks have relied upon the eggheads at the NSA to be one step ahead of civilian encryption, not secretly leaning on manufacturers to force them to put in back doors.
Riiiiiight. And I'm guessing they take encryption a lot less seriously than paper printed on laserjets
Re: (Score:2)
Re:No back doors? (Score:5, Funny)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
For the record, even though the RIP act has been law for some years now, the schedule under which contains the laws under which the police can demand decryption keys has not yet been made active.
Re: (Score:2)
Re: (Score:2)
Re: (Score:3, Funny)
Re: (Score:3, Informative)
You mean before being arrested, I presume. Once you've been arrested, they immediately inform you of miranda, BECAUSE they can't use anything you say before that point.
They don't gag you when you decide to remain silent. You can change your mind at any time, of course.
Re:No back doors? (Score:5, Informative)
truecrypt [truecrypt.org] allows you to create a double encrypted volume. 2 passphrases. 1 - lets your torturers into a set of incriminating looking but innocent files, the other lets you into the real files. there is NO WAY to detect or extract the real files from the planted files.
look innocent to the coppers while you continue to hide the goodies.
looks even better if you have other things that use the same planted password and are your tax info
Re:No back doors? (Score:5, Insightful)
Journaled Filesystems can give them away. (Score:3, Informative)
Actually, if they monitor changes to the drive on the sector level, they would see the blocks of the hidden volume changing, which would make no sense if they exist in a section of the (outer) TrueCrypt volume that contain no files. And these changes would be visible on a journalling filesystem. So it's recommended you don't use one.
(this is all in the TrueCrypt FAQ's by the way)
Re: (Score:2)
Re: (Score:3)
Wow (Score:3, Insightful)
Even data-recovery specialists would not be able to help if the assigned password somehow gets lost, said Scott Shimomura, a senior product marketing manager at Seagate.
Good thing passwords are never forgotten.
Re: (Score:3, Interesting)
Good thing people have backup systems in case their mobile computer gets stolen or faces some other mishap.
Really, if you've got valuable enough data to be encrypting it, you'd be nuts to not have it properly backed up as well. Though I guess bad decisions happen...
Re: (Score:2)
Re: (Score:2)
Why would an "I broke the cupholder" home user use an encrypted drive?
Encryption takes some knowledge to actually work reliably, and the dumb home user that you invented for your own purposes (noone was talking about that) doesn't probably have it.
Re: (Score:3, Insightful)
Remote access *is* a consideration. (Score:3, Interesting)
All of these solutions are mostly aimed at PCs used by users right at the local console, but I could see a lot of good reasons for wanting encryption on a server, or other colocated computer. Or maybe I just want to make sure that my desktop workstation doesn't hang forever after a power outage, waiting for someone to put a password in on its local console.
It would be nice if there was a way to mount one of these drives by giving it a password over a secure networked conne
Except... (Score:2)
Re: (Score:2)
Nope. It just requires a password to get access to the drive. And it stores the password in a small eeprom inside the drive bubble so getting at it is a pita. There are several data recovery houses that will crack it for you, and they only require one of two things:
1. An invoice with the machine's serial number.
2. A request on letterhead of any law enforcement agency.
Safe against random stupid criminal
Mis-named (Score:2, Insightful)
Re: (Score:2, Insightful)
If you can feel relatively confident that a lost or stolen laptop (or desktop for that matter -- they get stolen too) will not in any way reveal confidental data, then I would say it gives you a lot more trust in the media, hence the name.
Re: (Score:2, Insightful)
It's all irrational fear perpetrated by the bogeyman.
Proprietary algorithm. (Score:2, Interesting)
Re: (Score:2)
Most idiotic home users that I have the misfortune to deal with bring their computer to me when the hard drive is making horrible noises, Windows is broken or there some hardware problem.
Then, and only then, do they worry about how they're going to recover the five years worth of digital photos and financial information that they have never backed up. Since half of them don't even remember their email passwords, I highly doubt t
Re: (Score:2)
The way I see it, there will be a couple people losing their data.
Most idiotic home users won't know enough about it to use this tech. Either they'll be specialty drives or it will require an added bit of voodoo to enable the features, but either way it won't be used on most systems. Most IT departments will be smart enough to know when to use this technology, and the rest will be too dumb to worry about technology at all.
There will be a few tinkerers who, out of misguided fantasies of being James Bond,
I thought AES is publishe? (Score:2)
Re: (Score:2)
The technology isn't the news (Score:2, Informative)
This should be good when it's released, but I've long since stopped holding my breath.
Encryption vs ATA Security Mode (Score:2)
Re: (Score:2)
Not in my IT department! (Score:4, Insightful)
Because I don't want one more password per computer that I, as an IT admin, need to keep track of.
Because I don't want even the operating system, swap, graphics, and music files encrypted.
Because new technology like this *never* causes any issues with the system's operation.
No, not in my IT department.
And maybe you don't need it.. (Score:5, Insightful)
If your company does handle this kind of data (or worse), maybe you should be re-examining your role as a sys-admin or manager. It's not all about making your life easier you know. There are of course risks and costs to maintaining a database of passwords, small performance costs for encrypting/decrypting the HD, and possible incompatibilities. There's also risks and costs associated with someone losing the laptop and the big headlines in the newspaper about how your company now looks like a bunch of ass-hats for losing 200,000 CC #s, 50,000 medical records, etc. Security and administration is about managing risk. If the overall risk is lower with this drive (and the price is right), you do it.
Re: (Score:2)
-That's why this is marketed towards laptops, and as an IT admin, Your policy should be fairly clear that laptop data recovery is best-effort (drives crash fairly frequentl
Re:Not in my IT department! (Score:5, Insightful)
Re: (Score:2)
Part of me does not like this because companies like Enron and Diebold would have a field day with this. No proof of anything and timb bombed documents protected by TCPA to delete evidence would make it impossible to prove guilt.
Re: (Score:2)
Re:Not in my IT department! (Score:4, Insightful)
What? Sorry if that's the impression you got, I must have mis-typed. We aren't trying to keep auditors out of the files, we are trying to keep thieves out of the files. We've had laptops stolen while our auditors were out in the field before. The last thing we want is for our client's data to find its way into the wild. If we were working on your tax return, wouldn't you prefer that *if* it was copied to a laptop HD, that the laptop HD be encrypted? Protecting information if very important to us.
Encryption wouldn't have helped cover up Enron. Even if your drives were 100% encrypted, you still have paper copied the Feds could go after. Even if you shred all your paper (which would look very fishy, even in a 'paperless office'), you still have backup tapes. And if every single one of your backup tapes were encrypted AND you just happen to have 'forgot' the password to the tapes as well... well, I think the judge will have you for obstruction at that point.
Trust me.. accountants aren't the most tech savvy individuals. They just do their job and get the hell outta here. Enron and AA had some bad people at the top. A few bad apples which hurt a lot of very good people. They may have been very good at fudging some numbers, but when it comes to "tech savvy'ness".... well, there's a reason that in all the scandle movies.. the only things accounts know how to do is shred paper.
Re: (Score:3, Insightful)
1. I've seen all sorts of problems with encrypting certain system files on a hard drive. Perhaps that's because the encryption has been software based, but key system files seem to have problems when encrypted.
2. How will you enforce strong passwords? How will you enforce password change policies? Can you even change the password once it has been set? If the user and IT agree on a passowrd, can we be sure tha
Re:NTFS EFS (Score:2)
How about the Encrypting File System that's already available in Windows XP Pro? Just wondering how the BitLocker is something worth eagery awaiting...
Re: (Score:2)
To my knowledge, EFS doesn't allow you to encrypt the entire OS partition. We'd want the entire drive to be encrypted and I believe this is something allowed with BitLocker.
Re: (Score:2)
Re: (Score:3, Insightful)
If you don't want the swap encrypted, then why bother encrypting any of the data at all?
Next time RIAA asks your HD... (Score:3, Insightful)
Re: (Score:2)
you're much better off using something that cannot be identified as being encrypted.
Re: (Score:2)
Re: (Score:3, Interesting)
If you actually care about protection from governments, legal actions from private parties, or malicious foreign enti
No Thanks. (Score:2)
Re: (Score:2)
Actually I insisted he completely remove the doors, but he came up with some bullcrap about how the car would no longer be street legal and that he couldn't let me drive it off the lot.
Progressive decoding (Score:3, Interesting)
Roadmap To DRM'd PC (Score:3, Interesting)
It's not about end-user encryption, it's about the OS using encryption in some form to eliminate your personal freedoms.
The price will be right though, so most users won't know or care.
The DRM noose around the average user's neck is being sold like a nice, new necktie. Most users will have one in 3-5 years. Then it is only a matter of tightening the noose. If you want it loosened, pay and pay some more.
Finally, there is no market mechanism so the price of loosening the noose around your neck is made by the producer. (A price maker: http://en.wikipedia.org/wiki/Monopoly#Coercive_mo
If you value your personal freedom, you will switch to something freer, then you will tell your friends and help them to do the same. Perhaps a Linux or BSD desktop is a good start.
Re: (Score:2)
The product mentioned in TFA is all about controlling your computer and your data and keeping unauthorised people from abusing it. What kind of crack is the parent smoking?!
-b.
Sign me up! (Score:2)
I deal with a lot of my customer's data from time to time and it would be nice to have extra safeguards in place IF my laptop or desktop machine was stolen. It would also be nice to be able to protect all my source code. Just because they can't log into the OS doesn't mean they can't copy the data off the drive. This would pre
The protection is not necessarily for YOUR data... (Score:2)
This can keep YOU from accessing the data on the hard drive, you know, the data you gave away your rights for when you clicked that license or bought that TIVO, etc.
Simply couple that technology with Trusted Computing and you no longer control the hardware you payed for.
I am sure this is obvious to those already in-the-know, but is meant as a Public Service.
Good for Seagate, Bad for Users. (Score:2)
1) Contact Seagate and ask for help. They'll tell you it's impossible to access the drive. After all, it's much better for them if you have to purchase a new one.
2) Contact some 3rd party service that is able to crack the drive. Si
Great in theory (Score:2)
If on the positive side this does work as advertised then boy is there going to be a lot of teeth gnashing in the Fatherland.
Note to self: avoid Seagate HDs. (Score:2)
First, the FEDS will require an NSA-type back door so that they can decipher the terrorists latest plots.
Second, unless you require a password for every HD sector accessed encryption will be just another pseudo-security pacifier, but making HDs more expensive - READ: more profits for HD manufacturers.
Third, blackhats will crack it in record time. The best security is a locked door or a good hammer.
Troubling implications (Score:3, Interesting)
I also am concerned about the DRM implications of this. Could for instance, in the future, the disk perhaps allow Windows to request that an NTFS filesystem be locked and Linux not be allowed to access it? Could this be used by Microsoft to lock open source programs out of reading data from other programs?
No thanks (Score:2)
If I want to do encryption, I'll do it myself with a partition of my own choosing.
No-win (Score:2)
Anyone who really wants encryption won't trust it regardless. I sure won't.
no 2nd hand PC market? (Score:2)
This seems like something easy to brute force since most people won't use strong passwords anyway.
Regardless, I suspect this will be optional and 99% of users won't enable it. Those who already use a BIOS power on password will use it and few others will. As others have said, the first time someone at a company quit and
Did I step in to the Wayback Machine again? (Score:2)
And while I'm here, I'll nod in agreement with some of the other posts...especially in this era of George W. Brezhnev and his minions, I don't trust my encryption to anything that isn't open source and peer reviewed.
trolls? (Score:3, Funny)
2. ???
3. Gay!!!!
Re: (Score:3, Insightful)
Um, out of curiosity, how is this any different than any other form of data storate crypto, when it comes to a civil suit over whether your box's MAC address, etc., is clearly publishing copyrighted material a thousand "friends" you've never met before? Whether you're hiding data through drive-level encryption, or doing it with an app that runs a few layers farther up the stack, you're still going to have to face a court ord
The 5th... (Score:2)
Given that:
Re: (Score:2)
The *IAA are pressing criminal charges.
Woops! Stop right there, I'm afraid. Not a given, at all. Typically such cases are not criminal proceedins, but civil suits. Very different set of stuff going on. In effect, you've got the legal representatives of the publisher, who is working on behalf of the artist that hired them to be their publisher, suing on behalf of the person claiming that someone is violating their copyright - typically by re-publising their work in a way that violates those
Re: (Score:3, Informative)
Civil suits are a load of crap. (Score:2)
Of course, you can still be slapped with a large enough financial burden to ruin your life and make you sell everything you own; but you can't be put in jail so it's all good -- right?
You can refuse to give up your encryption key, but then you CAN be found Guilty/Not Guilty of contempt of court or violating laws that require you to give up encryption keys. Y
Re: (Score:2)
In a criminal case, very little. In a civil case, the standard is "preponderance of evidence, as in more probable than not which means you have absolutely no evidence to support your theories about hackers or open wi-fi or whatever. With 99,9% security the judge will say something to the effect of "Whil
Not protection really... (Score:2)
FTA:
It only partially protects the user from RIAA.That is to say,if RIAA were to seize a hard drive,they would require the password to see the data.However,when the user is working on the hard drive(or has torrent turned
Re: (Score:2)
They will take it. THEY asked for it. (Score:2)
This drive is designed for easy implementation of DRM.
If you used it for the personal purposes you suggest, you would simply be forced to reveal the password by court order.
Regardless, simple passwords are easily brute-forced, so this is really just a check box to help them differentia
Re: (Score:3, Insightful)
Re: (Score:2)
Re: (Score:2)
Nah, password support will likely be built into the BIOS, making the product OS-agnostic and less prone to keyloggers operating at the lowest levels of the OS. Remember also that the *whole* drive is encrypted in this case, not just the data directories, so the OS won't even boot without a password.
-b.
Re: (Score:2)
Re: (Score:2)
Why bother storing the passphrase. If you enter the wrong passphrase, the output of the drive will simply be scrambled and unreadable/unbootable. I suppose that they may include a passphrase check for user-friendlyness though. The bigger worry is that many of the passphrases will be (a) short and/or (b) based on comm
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
It doesn't *have* to be set up that way. You can have a C: Programs and D: Data drive in the same system. Better yet (not sure about XP, but you can do this on Server 2k3) you can mount the second drive in a directory of the main C: file system, like in UNIX. So C:\Documents and Settings can be on a different physical drive than the rest of C:
Of course, th