Talk:Hardware-based full disk encryption: Difference between revisions

Content deleted Content added
Neutral point of view issues: propose an outline?
Line 44:
 
::Agreed. The real problem with hardware encryption is that it's difficult to verify the crypto implementation (for backdoors and other weaknesses) and manufacturers have a track record of getting it wrong. Some relevant sources: [http://www.h-online.com/security/features/Enclosed-but-not-encrypted-746199.html] [http://www1.cs.fau.de/sed] [https://www.schneier.com/blog/archives/2005/09/the_doghouse_xo.html] [https://www.schneier.com/blog/archives/2008/09/the_doghouse_to.html] [https://www.schneier.com/blog/archives/2008/02/the_doghouse_dr.html] -- [[user:intgr|intgr]]&nbsp;<small>[[user talk:intgr|[talk]]]</small> 09:18, 17 April 2013 (UTC)
:::Anyone want to propose an alternate outline that we can start from with both sides covered? [[user:Music Sorter|'''<span style="font-family:veranda,sans-serif;background:lightblue;color:Blue">&sect;&nbsp;Music&nbsp;Sorter&nbsp;&sect;</span>''']] ([[User talk:Music Sorter#top|talk]]) 18:30, 30 April 2013 (UTC)