Skip to main content

Questions tagged [disk-encryption]

Disk encryption is a special case of data at rest protection when the storage media is a sector-addressable device (e.g., a hard disk).

0 votes
2 answers
144 views

Embedded and IoT systems power on autonomously, without user input (unlike PCs or phones requiring a PIN/password). If the manufacturer wants to encrypt the flash storage: Must the decryption key be ...
allexj's user avatar
  • 537
2 votes
1 answer
166 views

I have two related questions about BitLocker’s key handling: 1) After the system boots and BitLocker unlocks the drive, TPM releases the Volume Master Key (VMK) and from now on it is resident in ...
allexj's user avatar
  • 537
1 vote
2 answers
172 views

For context, my question relates to the use of the systemd-cryptenroll and the related TPM enrollment options where one set of options "configures a TPM2 signed PCR policy to bind encryption to.&...
Hari's user avatar
  • 109
4 votes
3 answers
565 views

Does erasing and then encrypting a previously unencrypted HDD secure all data previously written to it?
Lou_Mitrev's user avatar
0 votes
1 answer
219 views

I have been reading about NVS flash partitions for use in embedded systems and that the NVS key-value data can be encrypted by using a symmetric key. This symmetric key is then stored in a separate ...
Engineer999's user avatar
12 votes
3 answers
4k views

I read the following article and it says to "Stuff random data to the device" (using shred) before encrypting with LUKS. How to enable LUKS disk encryption with keyfile on Linux Why would ...
AlanQ's user avatar
  • 121
1 vote
0 answers
160 views

Say you have a machine where the disk (eMMC) is non-removable like the Surface Go. If the UEFI configuration is protected with a long password, USB + network boot is disabled, and your user has a long ...
Jan Sommer's user avatar
2 votes
3 answers
1k views

Question 1: Can you confirm that in a full disk encryption setup like BitLocker, when we normally boot the system, use the password, and log in, the key to decrypt the disk is loaded into RAM? If so, ...
allexj's user avatar
  • 537
10 votes
3 answers
3k views

We want to dispose of an old notebook whose display frame is damaged. It's a Windows device with a BitLocker (TPM+PIN) encrypted SSD. I am trying to devise a strategy for protecting the data on the ...
Heinzi's user avatar
  • 3,950
9 votes
4 answers
5k views

I have learned about attacks where the BitLocker master key can be sniffed on its way from the CPU to the TPM using a logic analyzer. However, in computer configurations without TPMs, this is ...
the_endian's user avatar
  • 1,362
1 vote
1 answer
143 views

Given the following use & threat models, what is the optimal encryption implementation? Optimal is defined as the approach best matching the use model. Use Model Computer must be optimized for ...
Amazon Dies In Darkness's user avatar
2 votes
1 answer
249 views

I found that Thinkpads have hdd password support, which in terms uses some bizarre password hashing and ends up with 90 bits of entropy, which is again used as ATA security password to SED, which in ...
mmja's user avatar
  • 103
0 votes
1 answer
318 views

As far as I'm aware, a locked iOS is considered very safe. No one, who does not know the PIN cannot unlock the phone. While the PIN seems weak on the first glance (4 digits?) it is actually strong, ...
gaazkam's user avatar
  • 6,851
0 votes
1 answer
159 views

I have recently set up a computer with full disk encryption, and I decided not to encrypt the swap partition for performance reasons. I have been using ssh-agent on another computer to load my private ...
rcomeau's user avatar
0 votes
0 answers
464 views

Modern Android devices have encryption for the storage. It is secured with a key which is derived from the lock screen and a hardware bound key. We know that the rate limiting mechanism prevents brute ...
Michael Tsang's user avatar

15 30 50 per page
1
2 3 4 5
42