Beta

×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Full disk encryption is too good, says US intellig

MrSeb (471333) writes | more than 2 years ago

Encryption 4

MrSeb writes "A new research paper, titled "The growing impact of full disk encryption on digital forensics," illustrates the difficulty that CSI teams have in obtaining enough digital data to build a solid case against criminals. According to the researchers, one of which is a member of US-CERT — the US government's primary defense against internet and digital threats — there are three main problems with full disk encryption (FDE): First, evidence-gathering goons can turn off the computer (for transportation) without realizing it's encrypted, and thus can't get back at the data (unless the arrestee gives up his password, which he doesn't have to do); second, if the analysis team doesn't know that the disk is encrypted, it can waste hours trying to read something that's ultimately unreadable; and finally, in the case of hardware-level disk encryption, tampering with the device can trigger self-destruction of the data. The paper does go on to suggest some ways to ameliorate these issues, but ultimately the researchers aren't hopeful: "Research is needed to develop new techniques and technology for breaking or bypassing full disk encryption.""
Link to Original Source

cancel ×

4 comments

Sorry! There are no comments related to the filter you selected.

15 minutes and a soldering iron (1)

evanism (600676) | more than 2 years ago | (#38104020)

I have a friend in the intel community. They can bypass the security password using a $20 soldering iron in about 15 minutes. Sometimes they reveal it in under 5 :)

Re:15 minutes and a soldering iron (1)

stating_the_obvious (1340413) | more than 2 years ago | (#38104534)

doubtful.

Re:15 minutes and a soldering iron (2)

evanism (600676) | more than 2 years ago | (#38105520)

Oh, my friend... perhaps I wasn't clear. The soldering iron isn't for the hard disk.

Re:15 minutes and a soldering iron (1)

russotto (537200) | more than 2 years ago | (#38105614)

Soldering irons leave permanent marks. A true artist can obtain the password without even leaving a bruise.
Check for New Comments
Slashdot Login

Need an Account?

Forgot your password?
or Connect with...

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>