![]() |
|
|
#507 |
|
Bamboozled!
"𒉺𒌌𒇷𒆷ð’€"
May 2003
Down not across
250428 Posts |
More to the point, does the word "thermite" mean anything. Ernst has explained why.
|
|
|
|
|
|
#508 | |
|
Bamboozled!
"𒉺𒌌𒇷𒆷ð’€"
May 2003
Down not across
250428 Posts |
Quote:
Of course, this is still far from perfect (the firmware can use bad-block reserves for example) but it picks up the amateurs. |
|
|
|
|
|
|
#509 |
|
Undefined
"The unspeakable one"
Jun 2006
My evil lair
22×32×173 Posts |
Capacity loss should be evident. If it was falsely reported as the original size as stated on the cover then you would have the OS trying to put more data on there than is actually available. And if you are stealing just 100MB and reducing the reported capacity to show what is remaining then the user may wonder why.
I still stand by my comment about the "military-grade bullshit". For a home user I would agree that degaussing would be unlikely, but that is not military-grade. It doesn't make sense. For a reporter to use such buzz-terms is poor form IMO. A key logger from an HDD interface? The ATA spec I read doesn't mention anything about uploading driver data to the host for execution. Unless you are talking about some sort of malware already in the host driver code? But that would have to come from a different vector. Perhaps if this is part of a larger package it might make sense, but on its own from an HDD it doesn't seem plausible. It is certainly possible to capture the truecrypt keys from memory but that also requires associated code running on the host in kernel mode. The HDD firmware could encrypt whatever data it wanted to before sending it off to the host for decryption but that would require pre-knowledge of the keys and algorithms used. |
|
|
|
|
|
#510 |
|
"Mike"
Aug 2002
5·17·97 Posts |
On SSDs, you have over-provisioning to think about. Sometimes this over-provisioning is transparent to the user and even the interface.
<conspiracy-theory>Maybe "military-grade" erase techniques are purposely designed to stop most people from retrieving data but not all people. IOW, the obvious solution (physical destruction) is not desirable because then the NSA (?) wouldn't have any chance to read the drive.</conspiracy-theory> |
|
|
|
|
|
#511 | |
|
∂2ω=0
Sep 2002
República de California
19·613 Posts |
[underlines mine]
Quote:
Here's a question for the HD wonks - is there any excess memory associated with the HD firmware which someone sophisticated enough to rewrite said firmware could use as a storage locker? If the targeting is highly specific and the upload opportunities reasonably frequent, one might only need a few kB of such off-disk storage to be useful for snooping purposes. Since the firmware needs to reside somewhere (e.g. in an EPROM) and needs to be updatable, I'm guessing there is such memory, I'm curious as to the rough amount and whether one can transfer data from the system to it dynamically. (The 'ROM' aspect would seem to indicate not, but since there is the 'P' preceding it such memory is in fact writable, the question is how the write interface works. Again, assume we are dealing with folks who in many cases seem to know as much or more about the HD programming as the manufacturers themselves, or at least who are capable of using said programming in ways the manufacturers probably never even considered.) Last fiddled with by ewmayer on 2015-02-18 at 22:37 |
|
|
|
|
|
|
#512 |
|
"Gang aft agley"
Sep 2002
2·1,877 Posts |
That sounds like valuable IP. Step 5, profit.
|
|
|
|
|
|
#513 |
|
∂2ω=0
Sep 2002
República de California
265778 Posts |
|
|
|
|
|
|
#514 | |
|
Undefined
"The unspeakable one"
Jun 2006
My evil lair
22×32×173 Posts |
Quote:
Stealing sectors from the over provisioning portion is still going to be noticeable because the host software can allocate and query from that region. At some point you would see the difference. However it may be more feasible to mark a few sectors as bad and use the spare sectors to replace them. This way everyone sees the entire capacity and unless the host deliberately tries to read the bad sectors no one would get suspicious. Although having too many bad sectors is also a sign of problems and the user may not be happy. But I guess it all comes down to vigilance. Perhaps most users never care to look at the numbers. |
|
|
|
|
|
|
#515 | |
|
∂2ω=0
Sep 2002
República de California
2D7F16 Posts |
I'm afraid I have another depressing Ames piece to share, detailing the role of the "Vichy privacy advocates" at ACLU and EFF in passing another truly spectacular anti-privacy law:
Meet the serial failures in charge of protecting America’s online privacy Quote:
|
|
|
|
|
|
|
#516 | |
|
"Kieren"
Jul 2011
In My Own Galaxy!
2×3×1,693 Posts |
Quote:
|
|
|
|
|
|
|
#517 |
|
"Gang aft agley"
Sep 2002
1110101010102 Posts |
"THE GREAT SIM HEIST
HOW SPIES STOLE THE KEYS TO THE ENCRYPTION CASTLE" |
|
|
|
![]() |
| Thread Tools | |
Similar Threads
|
||||
| Thread | Thread Starter | Forum | Replies | Last Post |
| I'm rich AND on a government check. | jasong | jasong | 18 | 2013-08-12 18:21 |
| How does proper government manifest in regulation? | cheesehead | Soap Box | 10 | 2011-04-17 02:29 |