<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Intel 320-series SSD and FDE (Full Disk Encryption) questions... in Archive</title>
    <link>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8835#M7730</link>
    <description>&lt;P&gt;I had a bit more time to play around with my disks on the weekend and, regardless of how secure FDE implementation is, I don't know if I'm going to end up using it.  I'm a bit disappointed because a lack of FDE was one of the main reasons I took so long to make the jump to SSDs and the promise of FDE was the main reason I bought Intel drives.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In terms of usability (security related below this):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First off, I can't use FDE on my desktop because my motherboard (Gigabyte P35-DS3R) doesn't support ATA password and none of the alternative methods for unlocking the drive work for me.  Booting into linux with the drive locked, unlocking it and then rebooting adds about 80 seconds (POST + disk timeouts) to the boot process and using IDE mode incurs too much of a performance penalty, so the ATA Security eXtension BIOS isn't an option.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IMO, this is a big problem for the average user:&lt;/P&gt;&lt;P&gt;SSDelightful wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4.   In order to provide the absolute best security possible, there are no available password recovery solutions.  If you lose or forget your ATA User Password and Master Password, your SSD will remain locked without access to read, write, or erase any data within the device.  In this case, your SSD and your data are lost, and cannot be recovered by Intel.&lt;/P&gt;&lt;P&gt;Pit wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. Let's assume that User had set his own ATA User Password and Master  Password and then he forgot both of them. Now he's returning the drive  as broken. Does his warranty still valid? I can understand that ATA  locked device is unreadible, unwritable and unerasable. But is it unservicable?&lt;/P&gt;&lt;P&gt;SSDelightful wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Warranty is not valid since SSD works per specification.  It is not serviceable by Intel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's an example of someone that has a bricked drive because of a problem that shouldn't exist:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/message/131126 &lt;A href="http://communities.intel.com/message/131126" rel="nofollow noopener noreferrer"&gt;http://communities.intel.com/message/131126&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I say the problem shouldn't exist, because the Intel SSD Toolbox should check the 'Master Password Revision Code' (Word 92) and offer to change it as an optimization if it's never been set.  At least that way the (average) user has a BIOS independent way of recovering the disk if the need arises.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Like the poster in the linked thread, I also have a Dell laptop.  I locked the drive, put it in my desktop (which doesn't support ATA password) and tried to unlock it using 'hdparm'.  Dell must transform the password somehow before passing it to the disk since, AFAIK, the ATA password spec doesn't forbid doing so.  That means the password could be padded, hashed, salted or transformed in pretty much any way before being passed to the disk.  I couldn't figure out what it was and ended having to put the disk back into my laptop to unlock it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, I have no problem losing all my data if I forget my password or my laptop sets it to something weird, but to make the drive unserviceable...  The average user might still use the FDE since a bricked drive if their laptop dies is still better than their data being open to casual snooping if the forget their laptop somewhere.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, if I were a corporate user, I'd be hesistent to buy these if I were tasked with buying drives that support FDE.  Running software based FDE like TrueCrypt or BitLocker isn't a very good option and dealing with forgotten passwords is a huge pain.  Setting a master password negates the issue, but there isn't a supported tool for setting the master password (that I can find) and, worse yet, there's no best practices documentation (that I can find) for dealing with forgotten user passwords.  Do I need to boot into linux, hotplug my disk and use hdparm (this is how I did it)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll likely use a bootable linux disc to set a master password and use the built in ATA password support of my laptop.  At least that way I know I can recover the disk if my laptop dies.  I had to give up on my desktop.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-----------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In terms of the FDE implementation, it definitely needs some clarification.&lt;/P&gt;&lt;P&gt;SSD Delightful wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, ATA password is used to encrypt the encryption keys stores on the SSD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm &lt;I&gt;&lt;B&gt;extremely skeptical&lt;/B&gt;&lt;/I&gt; of this claim unless there are actually two copies of the AES encryption key stored on the disk.  I booted up my machine with a Debian Live CD and did the following testing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;a) set the user and master password&lt;/P&gt;b) power the disk off / onc) unlock the disk with the user passwordd) mount a partition, access data, unmount the partitione) power the disk off / onf) unlock the disk with the master passwordg) mount a partition, access data, unmount the partition&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was able to access my data using either password.  So, if a key derivation function (&lt;A href="http://en.wikipedia.org/wiki/Key_derivation_function" rel="nofollow noopener noreferrer"&gt;http://en.wikipedia.org/wiki/Key_derivation_function&lt;/A&gt; &lt;A href="http://en.wikipedia.org/wiki/Key_derivation_function" rel="nofollow noopener noreferrer"&gt;http://en.wikipedia.org/wiki/Key_derivation_function&lt;/A&gt;) of some type is being used to encrypt the AES key, there has to be two copies of the AES key stored on the disk; one for each password, right?  Hopefully someone can repeat my test and confirm it just to be sure I didn't screw something up.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The cut and paste from earlier reads a bit different.&lt;/P&gt;&lt;P&gt;SSDelightful wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The encryption keys are securely held within the SSD device, hidden and encrypted using standard security techniques.  These keys cannot be read by the user.  All Intel SSD 320 Series drives do this.  No user intervention is needed to enable data encryption on the NAND devices within the SSD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What are 'standard security techniques'?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IMO it's far more likely the user / master password is being used to unlock the disk and the disk won't give up the encryption keys until the drive gets put into an 'unlocked' state.  Then storing a hash on disk makes sense too since it gets used for password verification.  Hopefully I'm wrong.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe the intern that implemented the FDE scheme finished their internship and isn't available to explain how it works &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 09 Jan 2012 13:28:46 GMT</pubDate>
    <dc:creator>idata</dc:creator>
    <dc:date>2012-01-09T13:28:46Z</dc:date>
    <item>
      <title>Intel 320-series SSD and FDE (Full Disk Encryption) questions...</title>
      <link>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8724#M7619</link>
      <description>&lt;P&gt;I am considering to buy a couple of new solid state drives for my company. A requirement is FDE and according to some info I found the new 320 series should support this. I have a few questions:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. As far as I know none of our computers have any support in BIOS for disk password. Is this required for FDE to work with the 320 series or how exactly does the encyption / password entry work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. If we would like to use a RAID configuration (RAID 0 striping) is it still possible to use FDE and if so do one have to enter a password for each disk?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. What about using two disks in the samer computer (non-raid) that is used to dual boot two different operating systems (say Linux and Windows 7) installed one OS on each drive - does FDE work in this case and would one have to enter a password twice?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4. Is the FDE solution dependent on some support in the OS (in that case what OS does it work with) or is it independent?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5. Do you have some white paper about the FDE with for instance information about how much slower it is compared to a non FDE drive?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6. I have read that TRIM does not work with SSDs in RAID configuration. Is this still the case and how dependent is the 320-series of TRIM?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Trist&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CORRECTION : I just found that our Dell Precision M6500 computers do have a field in the BIOS for disk password so I am interested in the questions above (two disks in the machine with or without RAID) also for this configuration. How do I know if the 320-serias FDE is compatible with the disk password setting in the dell M6500 machines? Is there a standard for this that all BIOS manufacturers follows or??&lt;/P&gt;</description>
      <pubDate>Sat, 26 Mar 2011 15:14:41 GMT</pubDate>
      <guid>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8724#M7619</guid>
      <dc:creator>idata</dc:creator>
      <dc:date>2011-03-26T15:14:41Z</dc:date>
    </item>
    <item>
      <title>Re: Intel 320-series SSD and FDE (Full Disk Encryption) questions...</title>
      <link>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8725#M7620</link>
      <description>&lt;P&gt;I'm not sure but it seems that Intel approach is no differ then SandForce 12xx one. It means: this is ONLY internal encryption with random generated passwords and without user defined passphrese. This solution does NOT increase security against thieves. It speeds secure erasing and add minor layer of security against controller switching (for ATA-pass overriding) and flash memory dumping. Highly rare and uncommon situations these days.&lt;/P&gt;</description>
      <pubDate>Sun, 27 Mar 2011 17:28:21 GMT</pubDate>
      <guid>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8725#M7620</guid>
      <dc:creator>idata</dc:creator>
      <dc:date>2011-03-27T17:28:21Z</dc:date>
    </item>
    <item>
      <title>Re: Intel 320-series SSD and FDE (Full Disk Encryption) questions...</title>
      <link>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8726#M7621</link>
      <description>&lt;P&gt;Hmmm in that case it is pretty lame - moving a disk between two controllers is even something I WANT TO BE ABLE TO DO.... it is really the data theft issue one want to address (in particular on laptops)....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Trist&lt;/P&gt;</description>
      <pubDate>Mon, 28 Mar 2011 07:01:14 GMT</pubDate>
      <guid>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8726#M7621</guid>
      <dc:creator>idata</dc:creator>
      <dc:date>2011-03-28T07:01:14Z</dc:date>
    </item>
    <item>
      <title>Re: Intel 320-series SSD and FDE (Full Disk Encryption) questions...</title>
      <link>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8727#M7622</link>
      <description>&lt;P&gt;The controller switching is rather outdated hack method (mainly for platter drives) based on swapping hdd's electronic board (containing drive's controller and internal bios) to bypass some security methods. It does not concern motherboard controller, the drive's electronics only.&lt;/P&gt;&lt;P&gt;There are IMO much better solutions for securing mass storage these days. Much more flexible then bios-based passwords (with its 8 characters limitation - too small against brute force attacks). All of them are based on preboot authentication (and to be honest they have theirs own issues) but I highly dubt Intel implemented that. We are talking about budget drives.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Mar 2011 16:02:49 GMT</pubDate>
      <guid>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8727#M7622</guid>
      <dc:creator>idata</dc:creator>
      <dc:date>2011-03-28T16:02:49Z</dc:date>
    </item>
    <item>
      <title>Re: Intel 320-series SSD and FDE (Full Disk Encryption) questions...</title>
      <link>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8728#M7623</link>
      <description>&lt;P&gt;Hey tristpost,&lt;/P&gt;&lt;P&gt;Just want to let you know that I'm working on answers for you! Everyone else should look for a 320 post sometime today. Thx!&lt;/P&gt;&lt;P&gt;-Scott, Intel Corporation &lt;/P&gt;</description>
      <pubDate>Mon, 28 Mar 2011 18:44:00 GMT</pubDate>
      <guid>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8728#M7623</guid>
      <dc:creator>idata</dc:creator>
      <dc:date>2011-03-28T18:44:00Z</dc:date>
    </item>
    <item>
      <title>Re: Intel 320-series SSD and FDE (Full Disk Encryption) questions...</title>
      <link>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8729#M7624</link>
      <description>&lt;P&gt;Requires BIOS level password setup to enable user-unique encryption.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;According to&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://download.intel.com/design/flash/nand/325212.pdf" rel="nofollow noopener noreferrer"&gt;http://download.intel.com/design/flash/nand/325212.pdf&lt;/A&gt; &lt;A href="http://download.intel.com/design/flash/nand/325212.pdf" rel="nofollow noopener noreferrer"&gt;http://download.intel.com/design/flash/nand/325212.pdf&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Mar 2011 19:30:55 GMT</pubDate>
      <guid>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8729#M7624</guid>
      <dc:creator>idata</dc:creator>
      <dc:date>2011-03-28T19:30:55Z</dc:date>
    </item>
    <item>
      <title>Re: Intel 320-series SSD and FDE (Full Disk Encryption) questions...</title>
      <link>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8730#M7625</link>
      <description>&lt;P&gt;I would like to know the answer as well. Is the ATA password set in the BIOS directly linked to the key stored in the Intel 320 drive? If not, the encryption feature in the drive wouldn't really be accessable to the user.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Mar 2011 21:12:35 GMT</pubDate>
      <guid>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8730#M7625</guid>
      <dc:creator>idata</dc:creator>
      <dc:date>2011-03-28T21:12:35Z</dc:date>
    </item>
    <item>
      <title>Re: Intel 320-series SSD and FDE (Full Disk Encryption) questions...</title>
      <link>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8731#M7626</link>
      <description>&lt;P&gt;Bump for information!&lt;/P&gt;</description>
      <pubDate>Tue, 29 Mar 2011 13:14:51 GMT</pubDate>
      <guid>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8731#M7626</guid>
      <dc:creator>idata</dc:creator>
      <dc:date>2011-03-29T13:14:51Z</dc:date>
    </item>
    <item>
      <title>Re: Intel 320-series SSD and FDE (Full Disk Encryption) questions...</title>
      <link>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8732#M7627</link>
      <description>&lt;P&gt;While many bios seem to have 8 character limitations, is there any technical reason for it? As far as the ATA specs go, up to 32 characters should be fine to use.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Mar 2011 17:41:09 GMT</pubDate>
      <guid>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8732#M7627</guid>
      <dc:creator>idata</dc:creator>
      <dc:date>2011-03-29T17:41:09Z</dc:date>
    </item>
    <item>
      <title>Re: Intel 320-series SSD and FDE (Full Disk Encryption) questions...</title>
      <link>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8733#M7628</link>
      <description>&lt;P&gt;@Atavism&lt;/P&gt;&lt;P&gt;AFAIK there in no technical reason for 8 chars limitation. And you are absolutely right. ATA security specification defines 32-bytes for pasphrase. Well... it seems that unofficial bios modding for adding security ATA extensions will be more common these days. This is the only way I can think of... I've lost any hope that my desktop mobo's manufacturer get rid of the essential flaws in its BIOS anytime soon. Adding security module sounds like sci-fi for me and it is unreal for most of us, unfortunately.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/message/119280# 119280 tristpost asked excellent question about passwords linking. This is the clue.&lt;/P&gt;&lt;P&gt;Intel's documentation suggests that AES keys are generated during Secure Erase procedure. And this is understandable. But the thing is: ATA password seems to be unrelated to AES encryption engine which to be honest reverse the proper implementations upside down. In truecrypt (and many soft-based solutions) for instance password is the first and based on it and random or pseudo-random generator (mouse based in truecrypt) final AES keys are obtained.&lt;/P&gt;&lt;P&gt;Intel's paper suggests that in 320 case AES encryption and SATA pass are separated. You can use AES (well you are forced to, but not complaining) and NOT use ATA-pass at the same time. ATA pass is optional.&lt;/P&gt;&lt;P&gt;These two security mechanisms are not nested. They are not nested!&lt;/P&gt;&lt;P&gt;When you crack ATA password AES becomes obsolete and vice-versa. They are not in logical conjunction.&lt;/P&gt;&lt;P&gt;Impications? Well look at the market. Dozens of manufacturers and theirs ATA pass implementations. And you can crack almost any of them. There are specialized commertial firms witch offer ATA pass removal. And all these security implementation are hardware!! ATA pass is stored in drives firmware or data firmware areas!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only solution to secure such encryption mechanism I can think of is to encrypt (strong encrypt) generated AES keys with ata pass internally.&lt;/P&gt;&lt;P&gt;Otherwise sooner or later some skilled hacker will find "authorization bit" and this whole sophisticated AES will be absolutely useless.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In my opinion this is not looking like enterprice class security. If I'm wrong, feel free to prove otherwise.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Mar 2011 20:22:53 GMT</pubDate>
      <guid>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8733#M7628</guid>
      <dc:creator>idata</dc:creator>
      <dc:date>2011-03-29T20:22:53Z</dc:date>
    </item>
    <item>
      <title>Re: Intel 320-series SSD and FDE (Full Disk Encryption) questions...</title>
      <link>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8734#M7629</link>
      <description>&lt;P&gt;I'm also interested in this, any word from Intel yet?&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2011 15:19:16 GMT</pubDate>
      <guid>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8734#M7629</guid>
      <dc:creator>idata</dc:creator>
      <dc:date>2011-03-30T15:19:16Z</dc:date>
    </item>
    <item>
      <title>Re: Intel 320-series SSD and FDE (Full Disk Encryption) questions...</title>
      <link>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8735#M7630</link>
      <description>&lt;P&gt;Looking forward to your "official" answer. Still mostly speculation in the thread....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Trist&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2011 16:05:14 GMT</pubDate>
      <guid>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8735#M7630</guid>
      <dc:creator>idata</dc:creator>
      <dc:date>2011-03-30T16:05:14Z</dc:date>
    </item>
    <item>
      <title>Re: Intel 320-series SSD and FDE (Full Disk Encryption) questions...</title>
      <link>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8736#M7631</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;another interesting question is (in my opinion) how the Intel 320-series FDE could work together with a new MacBook Pro (early 2011).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Because there's no BIOS - 'only' EFI.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm really looking forward to your answer! (hopefully for all questions in the thread)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Shiek&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2011 16:39:50 GMT</pubDate>
      <guid>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8736#M7631</guid>
      <dc:creator>idata</dc:creator>
      <dc:date>2011-03-30T16:39:50Z</dc:date>
    </item>
    <item>
      <title>Re: Intel 320-series SSD and FDE (Full Disk Encryption) questions...</title>
      <link>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8737#M7632</link>
      <description>&lt;P&gt; Hi  SSDelightful . We are still waiting for the answers you promised two days ago. Please respond. Thx&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2011 16:57:55 GMT</pubDate>
      <guid>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8737#M7632</guid>
      <dc:creator>idata</dc:creator>
      <dc:date>2011-03-30T16:57:55Z</dc:date>
    </item>
    <item>
      <title>Re: Intel 320-series SSD and FDE (Full Disk Encryption) questions...</title>
      <link>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8738#M7633</link>
      <description>&lt;P&gt;Another interesting question:&lt;/P&gt;&lt;P&gt;What about Intel's FDE and hot-swapping ATA password secured SSD Drive? Is it hot plug/hot swap possible with such security system enabled?&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2011 18:01:44 GMT</pubDate>
      <guid>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8738#M7633</guid>
      <dc:creator>idata</dc:creator>
      <dc:date>2011-03-30T18:01:44Z</dc:date>
    </item>
    <item>
      <title>Re: Intel 320-series SSD and FDE (Full Disk Encryption) questions...</title>
      <link>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8739#M7634</link>
      <description>&lt;P&gt;Let's just cut to the chase:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which of the recently released Intel desktop motherboards support the ATA Password feature.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2011 18:20:32 GMT</pubDate>
      <guid>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8739#M7634</guid>
      <dc:creator>idata</dc:creator>
      <dc:date>2011-03-30T18:20:32Z</dc:date>
    </item>
    <item>
      <title>Re: Intel 320-series SSD and FDE (Full Disk Encryption) questions...</title>
      <link>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8740#M7635</link>
      <description>&lt;P&gt;Lets cut the security thing also:&lt;/P&gt;&lt;P&gt;&lt;B&gt;&amp;nbsp;&lt;/B&gt;&lt;/P&gt;&lt;P&gt;&lt;B&gt;Are 320-series SSDs FIPS 140-x certified?&lt;/B&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would really appreciate Security Policy Documents from Intel directly.&lt;/P&gt;&lt;P&gt;This is how it looks in case of other manufacturers:&lt;/P&gt;&lt;P&gt;&lt;A href="http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp1299.pdf" rel="nofollow noopener noreferrer"&gt;http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp1299.pdf&lt;/A&gt; &lt;A href="http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp1299.pdf" rel="nofollow noopener noreferrer"&gt;http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp1299.pdf&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2011 18:43:53 GMT</pubDate>
      <guid>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8740#M7635</guid>
      <dc:creator>idata</dc:creator>
      <dc:date>2011-03-30T18:43:53Z</dc:date>
    </item>
    <item>
      <title>Re: Intel 320-series SSD and FDE (Full Disk Encryption) questions...</title>
      <link>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8741#M7636</link>
      <description>&lt;P&gt;Why isn't Intel answering our question? &lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2011 21:09:09 GMT</pubDate>
      <guid>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8741#M7636</guid>
      <dc:creator>idata</dc:creator>
      <dc:date>2011-04-01T21:09:09Z</dc:date>
    </item>
    <item>
      <title>Re: Intel 320-series SSD and FDE (Full Disk Encryption) questions...</title>
      <link>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8742#M7637</link>
      <description>&lt;P&gt;The thing is that we have some precedences from the past which indicate that the drive could support internal AES128 encryption along with ATA password and NOT be more secure against thieves than conventional typical &lt;A href="http://hdd.It" rel="nofollow noopener noreferrer"&gt;hdd.It&lt;/A&gt; is worth to addmit that ATA password could be set on any drive supporting Security ATA Extension Feature Set and most of the devices available today allow that.&lt;/P&gt;&lt;P&gt;All SandForce 12xx equipped drives offer internal AES128 and at the same time OCZ officially states that in his Vertex2 both mechanisms: ATA pass and AES128 are chained which means that if someone will broke &lt;B&gt;any&lt;/B&gt; (whichever) of these two protections the whole security is defeated.&lt;/P&gt;&lt;P&gt;This is unacceptable considering how easy is to broke ATA password. The manufacturers used to save them in plain text (sic) on the firmware areas of their drives. They are not even hashed !!&lt;/P&gt;&lt;P&gt;So the whole matter is &lt;B&gt;not&lt;/B&gt; a made up problem.&lt;/P&gt;&lt;P&gt;Clarifications are required.&lt;/P&gt;&lt;P&gt;We all are deeply interested in intel's new 320 series drives and some of us want to use them in the environment which requires security. And before making purchase decision we have to be sure that the confidential data of our firms could not be as easy to retrieve from stolen devices as in the case of competitive products.&lt;/P&gt;&lt;P&gt;Wrong thinking that you are secure is much worse then not being secured at all.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2011 22:54:51 GMT</pubDate>
      <guid>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8742#M7637</guid>
      <dc:creator>idata</dc:creator>
      <dc:date>2011-04-01T22:54:51Z</dc:date>
    </item>
    <item>
      <title>Re: Intel 320-series SSD and FDE (Full Disk Encryption) questions...</title>
      <link>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8743#M7638</link>
      <description>&lt;P&gt;I believe that the ATA password and the disk encryption system are two totally separate items. All data written to the SSD is encrypted by the disk controller. It operates transparently without any user input. It is also completely useless you can restrict access to the SSD. Setting an ATA password is the key. ATA passwords are well known to be hardware crackable but only if the disk is unencrypted. If the disk is encrypted then the password cannot be recovered. Does the Intel 320 store the ATA password in encrypted form? Presumably it does. If this is indeed the case then data stored on the SSD will be secure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, there are two ATA passwords, User and Master. Some computer's BIOS only allow you to set the User password. The manufacturer-set Master password is not accessable. Anyone that knows the manufacturers password will be able to access your data (they may be only able to delete it, depending on whether the ATA security level is set to High or Maximum, a setting you probably do not have access to). Without being able to set a Master password your data is not secure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The operative words in what I wrote are the first two, I believe.  I only believe that what I wrote is correct I don't know for sure. Only Intel can come up with the answers to the questions this topic has asked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lew&lt;/P&gt;</description>
      <pubDate>Sun, 03 Apr 2011 15:46:21 GMT</pubDate>
      <guid>https://community.solidigm.com/t5/archive/intel-320-series-ssd-and-fde-full-disk-encryption-questions/m-p/8743#M7638</guid>
      <dc:creator>idata</dc:creator>
      <dc:date>2011-04-03T15:46:21Z</dc:date>
    </item>
  </channel>
</rss>

