Rod Speed said:
Irrelevant to what is no hassle if you are using XP.
Huh? Here is what you wrote:
Message-ID: <4ulnhbF197v3rU1@mid.individual.net>
Date: Mon, 18 Dec 2006 07:27:21 +1100
Completely trivial to encrypt that too if you consider the risk of
it getting seen by anyone when you return the drive matters.
That doesn't say anything about XP. XP is something you sprung
afterwards. Why should I care about XP? Why should I assume anyone
is using XP?
Anyway I'm not so convinced it's so trivial in XP, because people ask
about it regularly on sci.crypt (but I don't pay much attention since
I don't use XP).
Its pure bullshit when you are just encrypting
'confidential business data and correspondence'
I wouldn't count on it.
And XP encryption works fine for video recordings.
You missed that the hard drive is embedded inside a camcorder. The
data is written on it by the camcorder firmware. Not XP. The hard
drive in the camcorder is as capable of crashing and needing warranty
repairs as a desktop HD. What now?
Irrelevant what you believe, its true anyway.
Weren't we just talking about HD throughput in the 80+ MB/sec range?
Show me some software encryption that goes that fast without using
enough of the CPU to slow down the application.
Backup to anything but tape. Its the only backup medium that has
that particular problem.
DVD doesn't have it (buffer underrun blah blah)?
Sure, but there are obvious ways around it with them.
You mean staging on a disk drive? Yeah that's common but not
universal, and creating extra requirements is hassle by definition.
Tape is WAY past its useby date for personal desktop backup.
Lousy value basically.
Lousy value perhaps but all the alternatives seem worse. Main
drawback of tape is the drive is more expensive than I'd like.
16x DVD = 21.5MB per sec, you need 2x that if you want to decrypt the
disk and encrypt the DVD on the fly.
Nope, completely automatic with some approaches to backup like imaging.
Now you're constraining your backup methods, more hassle. What if you
want to back up only part of the file system, or not use the same key
on the HD and the backup medium. What if you want to do differential
backups. On-the-fly makes everything a lot simpler. Look what you're
saying anyway, first that encryption imposes no performance hit, but
then that you can avoid the performance hit by limiting yourself to
specific backup strategies with various drawbacks. Either way, it's a
hassle.
Do you ever use this stuff in real life? If not, why do you think
your opinions are something other than worthless?
The drafts are available for free.
Thanks, that helped, I found
http://www.seagate.com/support/disc/manuals/ata/d1153r17.pdf
("Working T13 Draft 1321D") through Google. It mentions some commands
like "security set password" but this seems to be an access password
like the one on Travelstar drives, not drive content encryption.
Although removing those passwords is apparently not trivial, it's
known to be possible. See:
http://www.nortek.on.ca/Password Removal/PasswordFaq.aspx
Most laptop drives and plenty of desktop drives.
But it appears to not encrypt the drive.
Irrelevant to what is no hassle if you are using XP.
You don't get to decide who uses XP and who doesn't. You have a
pretty weird idea of "trivial" if it includes "switch whatever
computers you're using to Wintel". And if your theory about XP
encryption is as accurate as your theory about ATA security then it's
not reliable.
Here's an article about Windows EFS, which does make it sound somewhat
reasonable:
http://en.wikipedia.org/wiki/Encrypting_File_System
However it's limited to NTFS. You mentioned thumb drives and those
typically use FAT32 (yeah you could reformat but you wouldn't be able
to interchange across OS's. Yes I do want encrypted thumb drives to
interchange across OS's and it's a hassle if they don't). Also not
clear is what you have to do to encrypt the swap area (I'm not sure if
that's outside the filesystem in XP). And what about the system
partition? If you normally have to mount the EFS as drive
D/E/F/whatever and leave the C partition unencrypted, you have to be
very careful with configuration to avoid leaking plaintext into the
registry, temp files, etc. Again it may be possible to get this right
but it's easy to make mistakes.
Anyway I appreciate your wisdom about drive hardware but I think we've
plumbed the depths of your encryption knowledge at this point.