Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

1) "AES-256 with a good enough password is unbreakable" is a provably incorrect statement. AES-256 used in ECB mode for example is incredibly breakable. And the modes available to you in FDE are compromises compared to what you would use for encrypting data in flight.

2) Windows is aiming for supporting a lot more than just powerful x86 CPUs though. You implied everyone wants this, not just people with CPUs with AES-NI instructions.

3&4&5) DPR = The guy who ran the silk road. So he had a lot more to hide than most people and was a lot more competent than most people but FDE didn't help him at all. It wasn't key disclosure - his computer was seized while it was still running. I don't think people are all that dumb. I think you need to be very very smart to fully understand the compromises involved with FDE, and if you're that smart you'll rely on something else entirely for the data most important to you.

I also think a lot of people, given the choice between "your data is sort of protected against theft, as long as the system is actually off not just suspended, and assuming you used a strong password" and "your data can be easily recovered when you hose your system and/or forget your password" would pick the latter.

A small side-note regarding key disclosure: not everyone is in the USA. Where I live, it's absolutely definitive that I hand over keys on request or I go to jail :(



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: