Skip to main content

Questions tagged [disk-encryption]

Disk encryption is a special case of data at rest protection when the storage media is a sector-addressable device (e.g., a hard disk).

Filter by
Sorted by
Tagged with
0 votes
2 answers
175 views

Embedded and IoT systems power on autonomously, without user input (unlike PCs or phones requiring a PIN/password). If the manufacturer wants to encrypt the flash storage: Must the decryption key be ...
allexj's user avatar
  • 537
2 votes
1 answer
168 views

I have two related questions about BitLocker’s key handling: 1) After the system boots and BitLocker unlocks the drive, TPM releases the Volume Master Key (VMK) and from now on it is resident in ...
allexj's user avatar
  • 537
1 vote
2 answers
178 views

For context, my question relates to the use of the systemd-cryptenroll and the related TPM enrollment options where one set of options "configures a TPM2 signed PCR policy to bind encryption to.&...
Hari's user avatar
  • 109
4 votes
3 answers
565 views

Does erasing and then encrypting a previously unencrypted HDD secure all data previously written to it?
Lou_Mitrev's user avatar
0 votes
1 answer
225 views

I have been reading about NVS flash partitions for use in embedded systems and that the NVS key-value data can be encrypted by using a symmetric key. This symmetric key is then stored in a separate ...
Engineer999's user avatar
12 votes
3 answers
4k views

I read the following article and it says to "Stuff random data to the device" (using shred) before encrypting with LUKS. How to enable LUKS disk encryption with keyfile on Linux Why would ...
AlanQ's user avatar
  • 121
1 vote
0 answers
162 views

Say you have a machine where the disk (eMMC) is non-removable like the Surface Go. If the UEFI configuration is protected with a long password, USB + network boot is disabled, and your user has a long ...
Jan Sommer's user avatar
2 votes
3 answers
1k views

Question 1: Can you confirm that in a full disk encryption setup like BitLocker, when we normally boot the system, use the password, and log in, the key to decrypt the disk is loaded into RAM? If so, ...
allexj's user avatar
  • 537
10 votes
3 answers
3k views

We want to dispose of an old notebook whose display frame is damaged. It's a Windows device with a BitLocker (TPM+PIN) encrypted SSD. I am trying to devise a strategy for protecting the data on the ...
Heinzi's user avatar
  • 3,950
9 votes
4 answers
5k views

I have learned about attacks where the BitLocker master key can be sniffed on its way from the CPU to the TPM using a logic analyzer. However, in computer configurations without TPMs, this is ...
the_endian's user avatar
  • 1,362
1 vote
1 answer
144 views

Given the following use & threat models, what is the optimal encryption implementation? Optimal is defined as the approach best matching the use model. Use Model Computer must be optimized for ...
Amazon Dies In Darkness's user avatar
2 votes
1 answer
252 views

I found that Thinkpads have hdd password support, which in terms uses some bizarre password hashing and ends up with 90 bits of entropy, which is again used as ATA security password to SED, which in ...
mmja's user avatar
  • 103
0 votes
1 answer
320 views

As far as I'm aware, a locked iOS is considered very safe. No one, who does not know the PIN cannot unlock the phone. While the PIN seems weak on the first glance (4 digits?) it is actually strong, ...
gaazkam's user avatar
  • 6,851
0 votes
1 answer
160 views

I have recently set up a computer with full disk encryption, and I decided not to encrypt the swap partition for performance reasons. I have been using ssh-agent on another computer to load my private ...
rcomeau's user avatar
0 votes
0 answers
465 views

Modern Android devices have encryption for the storage. It is secured with a key which is derived from the lock screen and a hardware bound key. We know that the rate limiting mechanism prevents brute ...
Michael Tsang's user avatar
0 votes
0 answers
98 views

Due to certain circumstances, we are forced to keep some copyrighted data in an external hard disk. due to privacy concerns, we want to allow this data to be accessed only from a trusted/office ...
John's user avatar
  • 1
1 vote
2 answers
242 views

I want to use my PC both for gaming and for stuff like keeping cryptocurrency wallets, online banking, etc. I need to install games as admin but of course I don't want them to be able to access my ...
Vlad's user avatar
  • 111
0 votes
0 answers
120 views

Is it possible? How? Should I encrypt my swap partition? If I don't encrypt it, basically I make encryption in the main partition useless.
Allexj's user avatar
  • 137
2 votes
2 answers
286 views

I need to set up full disk encryption on my linux laptop. Questions: Does an encryption key on a USB pendrive protect against rubber-hose cryptanalysis? Is it true that the key on a pendrive is ...
whiteman808's user avatar
2 votes
0 answers
1k views

I bought a new 2 TB SSD (NVMe). I want to turn it entirely into a veracrypt volume, nearly all of the drive being for a hidden volume. First, I told it to do a "quick format", which was done ...
Make42's user avatar
  • 121
3 votes
2 answers
3k views

The luksFormat command accepts iteration time as a parameter, not iterations. That obviously leads to quite different number of iterations depending on the hardware doing the encryption. However if ...
graywolf's user avatar
  • 445
0 votes
0 answers
172 views

When considering external drives for secure long-term storage of sensitive data, what are the pros and cons of using the same password for encrypting all files versus using random passwords for each ...
S. G.'s user avatar
  • 173
1 vote
1 answer
394 views

Consider a home user who runs Linux on a laptop with full-disk encryption and uses a cloud-based password manager. Assume the laptop is firewall-protected with no SSH access. It seems reasonable to ...
jth's user avatar
  • 123
0 votes
0 answers
244 views

I've been trying to get a reliable, and decently secure setup on a device for a little while now, and I feel like I may be overthinking some things but I am unsure. Just to clear things up, this is ...
Kalcifer's user avatar
  • 173
0 votes
1 answer
300 views

The recent faulTPM paper (https://arxiv.org/pdf/2304.14717v1.pdf) deals mostly with Bitlocker and only mentions LUKS to note the differences. The authors state: With a passphrase, however, the same ...
Leprechaun's user avatar
1 vote
2 answers
760 views

I encrypted my Ubuntu Desktop 20.04.3 with LVM/LUKS during the installation process. If I turn off the computer, is the brute force the only attack available for getting the password and accessing the ...
Chris Garcia's user avatar
1 vote
1 answer
355 views

I'm in the process of figuring out an encryption strategy for a personal Linux system. My laptop is almost always on, or in sleep mode, except for longer travels. My main threats are theft of my ...
CryptGuest's user avatar
1 vote
1 answer
229 views

Relevant question for Python: Stack Exchange: https://stackoverflow.com/questions/75739308/aead-authentication-with-huge-input-that-doesnt-fit-into-ram Top Answers: https://topanswers.xyz/python?q=...
user2373145's user avatar
1 vote
2 answers
4k views

FDE tools like VeraCrypt will encrypt the whole system drive when the machine uses legacy boot mode (MBR). But they will only encrypt the system partition if the machine uses EFI boot mode (the EFI ...
stackprotector's user avatar
1 vote
3 answers
843 views

I use this initramfs-based FDE on my headless server. My motivation is to secure my system against physical tampering. I am aware that securing an untrusted hardware is not possible. This question is ...
pico_prob's user avatar
  • 113
15 votes
2 answers
8k views

I have a 4TB mechanical hard drive that was encrypted before I ever wrote any file on it. I used a 25 character password with symbols. Before I sold it, I unmounted the disk while it was still ...
alexx0186's user avatar
  • 321
1 vote
3 answers
488 views

Encryption with plain dm-crypt is often positioned as encryption that cannot be recognized. But is it really so? Are there ways to prove that the data is encrypted with plain dm-crypt? How to bypass ...
gin's user avatar
  • 11
1 vote
1 answer
346 views

I want to make a VMWare (VMWare is first preference but any alternative can be used as well) virtual machine completely digital forensics-proof. I am protecting against someone getting physical access ...
Shy's user avatar
  • 139
0 votes
0 answers
257 views

Let's for a moment forget about the possible drawbacks of SEDs themselves. One of the upsides of SEDs is that the encryption key never leaves the drive but wouldn't using eDrive negate this advantage ...
Brickwall's user avatar
1 vote
1 answer
541 views

I want to encrypt my system, but I don't want the hassle of having to put in two passwords on boot; I just want to put in one password on login that would decrypt the other partitions. I have heard ...
Kalcifer's user avatar
  • 173
0 votes
1 answer
3k views

I'm looking to buy an ~8TB NAS* for my home office (I guess it's called a "private cloud"). I want to connect to it from Windows, Linux, Mac, Android, and iOS. How can I ensure that the ...
Ryan's user avatar
  • 335
1 vote
0 answers
673 views

I am helping with an interesting data recovery issue. The laptop was running Debian 11 Linux with LUKS full disk encryption on a Samsung 970 Evo Plus 2TB SSD for quite many months. Suddenly the LUKS ...
stackrunner's user avatar
0 votes
0 answers
44 views

If I lose my external HDD and somebody finds it and tries to hack, will he succeed?Is it possible to get data from encrypted disk by disassembling it and working with platters? HDD is APFS AES 256 ...
alexandergill's user avatar
2 votes
1 answer
1k views

I'm using a MacBook and want to store confidential data (financial documents, passwords, private photos, etc.) on an external HDD disk. How safe is setting up APFS AES 256 encryption with disk ...
alexandergill's user avatar
0 votes
1 answer
171 views

I use LUKS encryption on my entire drive. Do SSD drives ship with any storage areas which store unencrypted data, even though the data is saved encrypted on user-available SSD storage? Maybe inside ...
CurtisB's user avatar
  • 43
1 vote
0 answers
314 views

This assumes that: Machine is powered off No UEFI backdoors No Reflashing the firmware No clearing the NVRAM (The point is to modify/read a small amount of NVRAM, instead of resetting it) Device ...
A-random-nerd's user avatar
0 votes
1 answer
2k views

I own a Samsung 980 Pro which, according to its own specification, supports Class 0, TCG/Opal 2.0 and IEEE16667. Since it's an NVMe drive, I cannot use hdparm in order to set up class 0 encryption but ...
Brickwall's user avatar
0 votes
0 answers
270 views

As I got from my preliminary research, there is an established standard TCG Opal 2.0 which defines in specification the principles of SED encryption thus enabling the interoperability between vendors. ...
Suncatcher's user avatar
1 vote
0 answers
42 views

So I had linux mint with fde, had sensitive files on it, shut down my pc, and reinstalled a new linux mint OS with fde. What are the chances of data recovery from the first OS?
Gateejunle's user avatar
1 vote
1 answer
145 views

Assuming I boot up a fully encrypted OS from a portable flash drive and do some tasks in this running OS; then abruptly disconnect this flash drive from my computer and a malicious actor gets their ...
saferugdev's user avatar
2 votes
1 answer
705 views

Another thread addresses the question of what can count as "military-grade encryption." In this case, I see that CyberLink Power2Go software boasts "advanced military-grade 256-bit ...
Ray Woodcock's user avatar
1 vote
2 answers
2k views

Here's the scenario: I have an external harddrive encrypted with bitlocker. I disconnect that drive from the PC that encrypted it, and connect it to a different PC. Surprisingly, when I do this, all ...
Drew's user avatar
  • 135
0 votes
3 answers
2k views

I have encrypted a disk on my Ubuntu machine using sudo cryptsetup luksOpen /dev/sdb1 sdb1 I'm wondering how difficult is it to decrypt this disk using bruteforce password guessing? What does the ...
blnks's user avatar
  • 373
0 votes
1 answer
105 views

When using asymmetric encryption, signing and encryption are the same, but opposite, operations. Say I have my drive encrypted with asymmetric encryption. If I save a signed file to that drive, using ...
Jonathan's user avatar
0 votes
1 answer
1k views

I'm interested in buying a Yubikey but want to know if you can use a Yubikey to generate a symmetric key for file encryption on selected files on a PC. Or if you need some sort of extension like HMAC-...
romes's user avatar
  • 3

1
2 3 4 5
13