Content deleted Content added
replace incorrect plural with correct possessive |
m →Characteristics: Added two commas around "except for bootup authentication", thus making the sentence easier to read. Added a third comma after "like any drive". |
||
Line 33:
==Characteristics==
Hardware-based encryption when built into the drive or within the drive enclosure is notably transparent to the user. The drive, except for bootup authentication, operates just like any drive, with no degradation in performance. There is no complication or performance overhead, unlike [[disk encryption software]], since all the encryption is invisible to the [[operating system]] and the host [[Central processing unit|computer's processor]].
The two main use cases are [[Data at Rest]] protection, and Cryptographic Disk Erasure.
|