Hvorfor ville en SSD internt kryptere data uden et kodeord?

Indholdsfortegnelse:

Video: Hvorfor ville en SSD internt kryptere data uden et kodeord?

Video: Hvorfor ville en SSD internt kryptere data uden et kodeord?
Video: iOS 15.3.1, watchOS 8.4.2, macOS 12.2.1 & AirTags UPDATES! - Das müsst ihr wissen 2024, Marts
Hvorfor ville en SSD internt kryptere data uden et kodeord?
Hvorfor ville en SSD internt kryptere data uden et kodeord?
Anonim
Mens mange mennesker aktivt vælger at kryptere deres data, kan andre blive overrasket over at finde ud af, at deres nuværende drev gør det automatisk uden input fra dem. Hvorfor det? Dagens SuperUser Q & A-indlæg har svarene på en nysgerrig læsers spørgsmål.
Mens mange mennesker aktivt vælger at kryptere deres data, kan andre blive overrasket over at finde ud af, at deres nuværende drev gør det automatisk uden input fra dem. Hvorfor det? Dagens SuperUser Q & A-indlæg har svarene på en nysgerrig læsers spørgsmål.

Dagens Spørgsmål & Svar session kommer til os med venlig hilsen af SuperUser-en underafdeling af Stack Exchange, en community-driven gruppe af Q & A-websteder.

Foto med tilladelse til Roo Reynolds (Flickr).

Spørgsmålet

SuperUser-læser Tyler Durden vil vide, hvorfor hans SSD internt krypterede data uden adgangskode:

I recently had an SSD fail and I am attempting to recover the data. The data recovery company has told me that it is complicated because the built-in drive controller uses encryption. I assume this means that when it writes data to the memory chips, it stores it in an encrypted format on the chips. If this is true, why would an SSD do that?

Hvorfor ville en SSD kryptere data internt uden et kodeord?

Svaret

SuperUser bidragyder DragonLord har svaret for os:

Always-on encryption allows you to secure your data by setting a password without having to wipe or separately encrypt the data. It also makes it fast and easy to “erase” the entire drive.

  • The SSD does this by storing the encryption key in plain text. When you set an ATA disk password (Samsung calls this Class 0 security), the SSD uses it to encrypt the key itself, so you will need to enter the password to unlock the drive. This secures the data on the drive without having to erase the entire contents of the drive or overwrite all data on the drive with an encrypted version.
  • Having all the data encrypted on the drive also brings another perk: the ability to effectively erase it instantly. By simply changing or deleting the encryption key, all data on the drive will be rendered unreadable without having to overwrite the entire drive. Some newer Seagate hard-drives (including several newer consumer drives) implement this feature as Instant Secure Erase (1).
  • Because modern hardware encryption engines are so fast and efficient, there is no real performance advantage to disabling it. As such, many newer SSDs (and some hard-drives) have always-on encryption. In fact, most newer WD external hard-drives have always-on hardware encryption.

(1) In response to some of the other comments: This may not be entirely secure considering that governments may be able to decrypt AES within the near future. It is, however, generally sufficient for most consumers and for businesses who are trying to reuse old drives.

Har du noget at tilføje til forklaringen? Ik anyik notk not notikkkkkk not not noting notkfikik not any anyik any for anyik notikikinging not Vil du læse flere svar fra andre tech-savvy Stack Exchange brugere? Tjek den fulde diskussionstråd her.

Anbefalede: