top | item 12607246

(no title)

uxcn | 9 years ago

ORWL was designed specifically to prevent undetected tampering with any of its electrical components, including the entire motherboard and storage drive. When tampering is detected, ORWL immediately and irrevocably erases all your data, even if it is unplugged at the time.

and...

Upon any tampering, the secure microcontroller instantly erases the encryption key, causing all data on the SSD to be irrevocably lost.

If only the key is deleted, wouldn't that leave the drive susceptible to brute force?

discuss

order

kevhito|9 years ago

There are reasonable issues that could be raised about various meta-data leaks with full-disk encryption. For example, in a completely naive per-file encryption scheme, the (approximate) file sizes would be visible. But I don't think "brute force" is a concern for reasonably modern encryption schemes. Of course, if they are using weak/short pins with a key derivation function, then that is vulnerable to brute force.

pstrateman|9 years ago

Uhh.. yes but enjoy brute forcing a 256 bit key.

See you in a few trillion years.

libeclipse|9 years ago

Quite a lot more than a few trillion.

CIPHERSTONE|9 years ago

NSA Engineer: Hey boss, this one's using a 256 bit key.

NSA Manager: Connect it to the quantum computer that doesn't "exist".

Five minutes later..

NSA Engineer: We now have access.

libeclipse|9 years ago

I assume the encryption is strong so brute force would be useless.