Doomer wrote:
You also need to be concerned of how exactly the data key(s) is generated. Because no matter how secure is the password hashing, if the key can be easily replicated - it's not secure. Also you don't know if vendor stores a copy of the key encrypted with some kind of "secret" password which is known only to certain people.
Generally speaking if you don't know how exactly the algorithm works inside those drives - you should be concerned. And you can't know it exactly, unless you do firmware/hardware RE on a very deep level. That's not an easy job and it is expensive, so I doubt you would have definitive answer to your question just by asking it on a forum.
In my opinion if you paranoid enough - you should use TrueCrypt, otherwise take vendor's word and assume that even if there is a backdoor, only small number of people knows it even exist and your data is relatively safe.
All very valid points. I didn't expect a definitive answer if it is secure, but I figured people who would know best are probably visiting this forum. Maybe some research has already been done that people would like to share. Also I am quite experienced pentester, but not so much at this low level for SSD/HDD. I am also trying to find out if this is an area worth researching and if it would be feasible to do it.
HaQue wrote:
I don't know the answers to your question. but as you seem interested in the same thinngs I do, I am sure you have seen the talk bunnie did on the SD card Hacking at 30c3.
I am half way and still have to finish it. On one hand it is similar on the other hand it is probably more difficult. It seems to me that a SSD or HDD has a more generic software interface through the ATA extensions. Still not for the faint of heart, but maybe you don't need to do so much hardware hacking in this case and my assumption is that it can all be done through software RE and the ATA bus.
HaQue wrote:
one way to asses which is a better/stronger method might be that if any DR company says they can recover data once encrypted, the take that as a mark against and a reason to use truecrypt. BTW truecrypt is getting an audit, I haven't heard if it is completed yet.
Yes, I have been looking for claims like that, but didn't find a clear answer. Some website seem to hint that they are capable of doing this, but the details for which brands and models are sparse.
So, one basic question I still have, can MHDD be used to access the firmware areas of a SSD? A starting point would be to use the vendor tools and change the ATA passwords and dump these areas before and after and see how much changes. Next step would be to RE the software further and see how it communicates with the drive.