On Wed, Mar 09, 2011 at 01:39:02PM -0800, Christian Kennedy wrote:
On Mar 9, 2011, at 12:46 PM, Eric Smith wrote:
That's why the "secure erase"
commands were added to the ATA command set, and the drive is supposed to erase even the
spared blocks.
Sandforce takes this one step further in that their SSD drives have AES
encryption turned on by default. If you issue a ATA secure delete to
the drive the key is wiped and regenerated, rendering all of the data
in flash, both primary and spare, into garbage.
Sounds all nice and peachy ... but I'd rather trust a disk encryption
system that can is open and can be properly verified, like the Linux
dmcrypt layer.
Kind regards,
Alex.
--
"Opportunity is missed by most people because it is dressed in overalls and
looks like work." -- Thomas A. Edison