Originally Posted by Garak
I'm not well versed in SSDs, but if that is the case (and it certainly is, or read, should be with encrypted HDs), then "throwing away the key" is nearly infallible, assuming the private key legitimately disappears.
Except some locks can be picked without using a key (to put it in layman's term).
Depends on what you want from the system. If you have really valuable stuff (defense), then people can open up the drive, wire out the NAND chips, read it with another equipment, and start cracking it in the cloud (i.e. crypto mining style).
Most people won't bother with it, even if it is to prosecute child pornography. If you have national security worthy stuff or $20B worth of trade secret, then maybe.
There is a reason why cloud service providers crush their drives and have a "no drive come out unless they are crushed" policy. You can't assume the manufacturers didn't have a backdoor in there, intentionally or unintentionally.
I'm not well versed in SSDs, but if that is the case (and it certainly is, or read, should be with encrypted HDs), then "throwing away the key" is nearly infallible, assuming the private key legitimately disappears.
Except some locks can be picked without using a key (to put it in layman's term).
Depends on what you want from the system. If you have really valuable stuff (defense), then people can open up the drive, wire out the NAND chips, read it with another equipment, and start cracking it in the cloud (i.e. crypto mining style).
Most people won't bother with it, even if it is to prosecute child pornography. If you have national security worthy stuff or $20B worth of trade secret, then maybe.
There is a reason why cloud service providers crush their drives and have a "no drive come out unless they are crushed" policy. You can't assume the manufacturers didn't have a backdoor in there, intentionally or unintentionally.
Last edited: