<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://replica.wiki.extremist.software/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Guido</id>
	<title>Noisebridge - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://replica.wiki.extremist.software/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Guido"/>
	<link rel="alternate" type="text/html" href="https://replica.wiki.extremist.software/wiki/Special:Contributions/Guido"/>
	<updated>2026-04-05T11:48:33Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.39.13</generator>
	<entry>
		<id>https://replica.wiki.extremist.software/index.php?title=Surreptitious_RAM&amp;diff=60853</id>
		<title>Surreptitious RAM</title>
		<link rel="alternate" type="text/html" href="https://replica.wiki.extremist.software/index.php?title=Surreptitious_RAM&amp;diff=60853"/>
		<updated>2017-10-02T01:46:09Z</updated>

		<summary type="html">&lt;p&gt;Guido: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Control.png]]&lt;br /&gt;
Bunnie Huang wrote about &amp;quot;surreptitious RAM&amp;quot; on p. 206 of his book &#039;&#039;Hacking the Xbox&#039;&#039;.  Surreptitious RAM refers either to memory modules or memory module adapters that provide some interface other than the commands coming from the memory bus on the motherboard.  For example, we can imagine a memory module that has a standard DIMM form factor and interface but that also provides an external USB interface which lets another computer read (and maybe write) the current contents of RAM as a USB mass storage device.  The ability to access the contents of RAM over an external interface provide a convenient way to defeat any memory protection policies enforced by the operating system and MMU (even on systems where DMA can be disabled).  This is pretty powerful for forensics, debugging, or computer security attacks (given physical access to a PC); Bunnie and trusted computing developers have also described it as a practical way of attacking the implementation of TPMs in PCs.  Does anyone want to try to make some surreptitious RAM or a surreptitious RAM adapter? [[User:Schoen|Schoen]] 16:38, 30 January 2009 (PST)&lt;br /&gt;
&lt;br /&gt;
=== Relevant literature ===&lt;br /&gt;
[http://books.google.com/books?id=FdPNE6beKcMC&amp;amp;pg=PA204&amp;amp;lpg=PA204&amp;amp;dq=surreptitious+RAM&amp;amp;source=web&amp;amp;ots=vwmKMThkKQ&amp;amp;sig=Vz5yf2Qhre3n8kuE-flaL25v-Ig&amp;amp;hl=en&amp;amp;sa=X&amp;amp;oi=book_result&amp;amp;resnum=2&amp;amp;ct=result Google books reference ]&lt;br /&gt;
&lt;br /&gt;
=== Pre-built Hardware interfaces ===&lt;br /&gt;
[http://www.busboards.com/products/memory/ddrii/ddrii400dc/ ddrii400dc]&lt;/div&gt;</summary>
		<author><name>Guido</name></author>
	</entry>
	<entry>
		<id>https://replica.wiki.extremist.software/index.php?title=Attacking_FDE_hardware_solutions&amp;diff=60852</id>
		<title>Attacking FDE hardware solutions</title>
		<link rel="alternate" type="text/html" href="https://replica.wiki.extremist.software/index.php?title=Attacking_FDE_hardware_solutions&amp;diff=60852"/>
		<updated>2017-10-02T01:45:58Z</updated>

		<summary type="html">&lt;p&gt;Guido: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Control.png]]&lt;br /&gt;
Many companies tout hard drives with built in encryption as the solution to the [http://citp.princeton.edu/memory/ Cold Boot Attack]. Additionally, these drives are sold as a major step forward in overall data security. In theory, this sounds like a good idea; in practice this could go horribly wrong.&lt;br /&gt;
&lt;br /&gt;
This project is currently in a research state to find different drives that claim to offer specific security properties. It is expected that many products will fail even the most cursory look.&lt;br /&gt;
&lt;br /&gt;
Please add links to products, vendors, standards, prices and places to purchase hardware. At some point, we&#039;ll start acquiring hardware to do specific implementation analysis.&lt;br /&gt;
&lt;br /&gt;
== Drive manufacturers and specific drive models  ==&lt;br /&gt;
&lt;br /&gt;
* Seagate&lt;br /&gt;
** [http://www.seagate.com/www/en-us/products/servers/cheetah/cheetah_15k.6/ Cheetah® 15K.6 and Cheetah FDE Hard Drives]&amp;lt;br&amp;gt;&#039;&#039;&amp;quot;The Cheetah 15K.6 FDE drive is available only to major OEM suppliers.&amp;quot;&#039;&#039;&lt;br /&gt;
* Hitachi&amp;lt;br&amp;gt;&#039;&#039;&amp;quot;Hitachi offers the BDE option on all new 2.5-inch SATA hard disk drive products beginning with those launched in 2007, including both the 7200 RPM and 5400 RPM product lines. Hitachi also offers the BDE option on Deskstar products introduced in 2008 and beyond.&amp;quot;&#039;&#039;&lt;br /&gt;
** [http://www.hitachigst.com/tech/techlib.nsf/techdocs/FFA370A7BF845F87862574FE0003054C/$file/TS5K500.B_DS_final.pdf Travelstar 5K500.B]&lt;br /&gt;
** [http://www.hitachigst.com/tech/techlib.nsf/techdocs/03E516A3C41738C78625743B005AD957/$file/TS7K320_DS.pdf Travelstar 7K320]&lt;br /&gt;
** [http://www.hitachigst.com/tech/techlib.nsf/techdocs/C51A283F52498251862573FA005A3C98/$file/Travelstar_5K320_DS.pdf Travelstar 5K320]&lt;br /&gt;
* IBM&lt;br /&gt;
** [http://www-03.ibm.com/systems/storage/product/systemx/scsi_raid.html IBM RAID products for System x (including support for disk encryption)]&lt;br /&gt;
* Lenovo&lt;br /&gt;
** [http://www-307.ibm.com/pc/support/site.wss/MIGR-68776.html ThinkPad 160GB and 200GB FDE 7200rpm Serial ATA Hard drives]&lt;br /&gt;
* Maxtor&lt;br /&gt;
** [http://www.maxtor.com/en/hard-drive-backup/external-drives/maxtor-blackarmor.html BlackArmor]&lt;br /&gt;
* Ironkey&lt;br /&gt;
** [https://www.ironkey.com/basic Basic]&lt;br /&gt;
** [https://www.ironkey.com/enterprise Enterprise]&lt;br /&gt;
&lt;br /&gt;
== Previously published research ==&lt;br /&gt;
&lt;br /&gt;
* Heise successfully attacked the [http://www.heise-online.co.uk/security/Enclosed-but-not-encrypted--/features/110136 Easy Nova Data Box PRO-25UE RFID]&lt;br /&gt;
&lt;br /&gt;
== Standards  and Whitepapers relating to FDE at the hardware level ==&lt;br /&gt;
* Trusted Computing Group&lt;br /&gt;
** [https://www.trustedcomputinggroup.org/specs/Storage/ Storage Specifications]&lt;br /&gt;
** [https://www.trustedcomputinggroup.org/specs/Storage/TCG_Storage_Architecture_Core_Specification_v01.9.pdf Storage Architecture Core Specification v1.0 rev0.9] this is what the drives implement&lt;br /&gt;
* IEEE&lt;br /&gt;
** http://en.wikipedia.org/wiki/IEEE_P1619&lt;br /&gt;
** [http://grouper.ieee.org/groups/1619/email/msg01842.html Letter of Assurance from IBM re P1619.1/D17]&lt;br /&gt;
&lt;br /&gt;
* Seagate&lt;br /&gt;
** http://www.seagate.com/staticfiles/SeagateCryptofaceoff.pdf&lt;br /&gt;
** http://www.seagate.com/staticfiles/docs/pdf/whitepaper/tp596_128-bit_versus_256_bit.pdf&lt;br /&gt;
** http://www.seagate.com/staticfiles/docs/pdf/security/Tech_Paper_Enables_Robust_Security.pdf&lt;br /&gt;
** http://www.seagate.com/docs/pdf/whitepaper/HDpasswrd_TP580-1-0710US.pdf&lt;br /&gt;
** http://www.seagate.com/docs/pdf/whitepaper/Seagate-crypto-bakeoff.pdf&lt;br /&gt;
** http://www.seagate.com/docs/pdf/whitepaper/tp596_128-bit_versus_256_bit.pdf&lt;br /&gt;
** http://www.seagate.com/docs/pdf/whitepaper/Server&amp;amp;Drive%20Security%20Threats%20rev%204%203.pdf&lt;br /&gt;
** http://www.seagate.com/docs/pdf/whitepaper/DataCtrSec_TP583-1-0711USr4.pdf Also mentions participation in IEEE 1619&lt;br /&gt;
&lt;br /&gt;
* Hitachi&lt;br /&gt;
** http://www.hitachigst.com/tech/techlib.nsf/techdocs/74D8260832F2F75E862572D7004AE077/$file/bulk_encryption_white_paper.pdf&amp;lt;br&amp;gt;The above whitepaper refers to FIPS 197 certification and the NIST AES Validation List, which informs us that Hitachi uses AES 128 or 256 in ECB mode: [http://csrc.nist.gov/groups/STM/cavp/documents/aes/aesval.html#751 Part # 1 entry, 128-bit] [http://csrc.nist.gov/groups/STM/cavp/documents/aes/aesval.html#749 Part # 4 entry, either 128-bit or 256-bit] (NB: large slow HTML table)&lt;br /&gt;
** [http://www.hitachigst.com/hdd/support/bulk_faqs.htm Bulk Data Encryption FAQ]&lt;br /&gt;
&lt;br /&gt;
== Other related documents ==&lt;br /&gt;
*[http://www.full-disk-encryption.net/Full_Disc_Encryption.html List of FDE (SW &amp;amp; HW) providers]&lt;br /&gt;
*[http://www-307.ibm.com/pc/support/site.wss/document.do?sitestyle=lenovo&amp;amp;lndocid=MIGR-69621 IBM FAQ on FDE]&lt;br /&gt;
*[http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;amp;articleId=9126869&amp;amp;intsrc=hm_ts_head Computer World (heavy on the marketing)]&lt;br /&gt;
== Terminology ==&lt;br /&gt;
* FDE - Full Disk Encryption&lt;br /&gt;
* BDE - Bulk Data Encryption&lt;br /&gt;
* OTFE - [http://en.wikipedia.org/wiki/OTFE On-the-fly encryption]&lt;/div&gt;</summary>
		<author><name>Guido</name></author>
	</entry>
	<entry>
		<id>https://replica.wiki.extremist.software/index.php?title=User:RobGisborne175&amp;diff=60851</id>
		<title>User:RobGisborne175</title>
		<link rel="alternate" type="text/html" href="https://replica.wiki.extremist.software/index.php?title=User:RobGisborne175&amp;diff=60851"/>
		<updated>2017-10-02T01:45:24Z</updated>

		<summary type="html">&lt;p&gt;Guido: Created page with &amp;quot;File:Control.png&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Control.png]]&lt;/div&gt;</summary>
		<author><name>Guido</name></author>
	</entry>
	<entry>
		<id>https://replica.wiki.extremist.software/index.php?title=User_talk:Ioerror&amp;diff=60849</id>
		<title>User talk:Ioerror</title>
		<link rel="alternate" type="text/html" href="https://replica.wiki.extremist.software/index.php?title=User_talk:Ioerror&amp;diff=60849"/>
		<updated>2017-10-02T01:44:35Z</updated>

		<summary type="html">&lt;p&gt;Guido: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Control.png]]&lt;/div&gt;</summary>
		<author><name>Guido</name></author>
	</entry>
</feed>