Hardware-based full disk encryption: Difference between revisions

Content deleted Content added
Rhtcmu (talk | contribs)
Rhtcmu (talk | contribs)
No edit summary
Line 16:
 
[[Intel]] announced the release of the Danbury chipset<ref>[http://www.theregister.co.uk/2007/09/21/intel_vpro_danbury/ www.theregister.co.uk/2007/09/21/intel_vpro_danbury/]</ref> but has since abandoned this approach.
==See also==
*[[Disk encryption hardware]]
*[[Disk encryption software]]
 
==Feature - Benefits==
Line 29 ⟶ 26:
 
With Cryptographic Disk Erasure the drive is commanded, with proper authentication credentials, to self-generate a new media encryption key and go into a 'new drive' state. Unlike other forms of sanitization, this action takes a few milliseconds at most. So a drive can be safely repurposed very quickly.
 
==See also==
*[[Disk encryption hardware]]
*[[Disk encryption software]]
 
==References==