InvestorsHub Logo
icon url

cosign

06/19/07 10:26 AM

#146575 RE: Vacationhouse #146574

Thanks Vaca Casa///now maybe we can have some fun! don't like the key mgt specs being another months out though...or is this good for Wavx...since they already have the key mgt taken care of?
icon url

helpfulbacteria

06/19/07 10:52 AM

#146578 RE: Vacationhouse #146574

Vacacasa... And to the list...

Lovely find. And to the list of the REASONS why Wave is central to the work of the TCG and its approach to trusted computing, let us not forget that Mike Willett (who I had the pleasure of meeting way back at a CMU conference some four or more years ago) of Seagate used to be Mike Willett of Wave Systems.

THOSE THAT STUBBORNLY AND, AT TIMES, INCOHERENTLY ARGUE THAT WAVE IS NOT AT THE CENTER OF THE TCG'S WORK DON'T READ, DON'T RESEARCH OR AREN'T ABLE TO MAKE THE RATHER OBVIOUS CONNECTIONS. That seems like a neural deficit to me. But I'm not a doctor. :)

Best Regards,

c m
icon url

dude_danny

06/19/07 12:12 PM

#146585 RE: Vacationhouse #146574

icon url

bbigtim

06/19/07 1:46 PM

#146598 RE: Vacationhouse #146574

Vacationhouse's eetimes Article/Role of TPMs

In this article, you will find the following interesting nugget:

"Instead of a TPM, the storage spec relies on an existing storage controller to generate and manage keys that are securely saved on extra space traditionally available on the storage device. Disk drive makers, for example, typically have access to a secure area of a couple hundred megabytes for storing systems management programs on a typical disk drive."

This sounds like storing the encryption keys using a storage controller will be the principal mode for the FDE drives, rather than just an alternative that can be used when a TPM is not available.

First, does anyone know if the TCG specification expresses a preference for using a TPM when storing encryption keys? My knowledge in this area is limited, but it seems likely to me that it would be easier to recover the keys in the scenario described in the article than with any strategy that requires a TPM.

Second, doesn't storing the encryption keys on the hard drive mean that you either have to back up the data on the hard drive onto a central server in a non-encrypted form, or that you have to back up the keys too in the event of hard drive failure? This would be an important scenario over time, significantly more likely to occur than theft of the PC.

Third, is the non-TPM scenario the one where Secude offers an alternative? I remember they were working with Seagate too.