Veracrypt system encryption on SSD, do I have to trim the disk right after finishing? How?

I want to encrypt my OS that is on an SSD (Windows 7, x64, mbr partition style).
From what I know Veracrypt will encrypt the whole disk, not only the actual data.
Not only! it will “fill” the empty space (inside the decrypted… Continue reading Veracrypt system encryption on SSD, do I have to trim the disk right after finishing? How?

How does full disk encryption cater for overprovisoned disk space in flash devices and can this result in data leakage?

My understanding is that flash based devices such as SSDs are over-provisioned and do not advertise the additional blocks of storage available to the operating system. The over-provisioned blocks of storage is to support effe… Continue reading How does full disk encryption cater for overprovisoned disk space in flash devices and can this result in data leakage?

Does the destruction of sensitive information limit the choice of hard drives to non-flash based devices?

Working with a non-profit organization,it’s common to reuse hard drives that have previously stored highly sensitive information such as medical and financial records. This is primarily driven by cost-saving measures to reduce purchasing n… Continue reading Does the destruction of sensitive information limit the choice of hard drives to non-flash based devices?

The Space Station has a Supercomputer Stowaway

The failed launch of Soyuz MS-10 on October 11th, 2018 was a notable event for a number of reasons: it was the first serious incident on a manned Soyuz rocket in 35 years, it was the the first time that particular high-altitude abort had ever been attempted, and most importantly it ended with the rescue of both crew members. To say it was a historic event is something of an understatement. As a counterpoint to the Challenger disaster it will be looked back on for decades as proof that robust launch abort systems and rigorous training for all contingencies can …read more

Continue reading The Space Station has a Supercomputer Stowaway

Botnet, Phineas Fisher, and SSD – Hack Naked News #196

Vulnerabilities in SSD Encryption, Bypassing Windows UAC, Botnet Pwns over 100,00 routers w/ ancient security flaw, Google hit with IP Hijack, and 1 thing you can do to make your internet safer and faster! Jason Wood from Paladin Security joins us for … Continue reading Botnet, Phineas Fisher, and SSD – Hack Naked News #196

Steady Hand Repurposes Cheap SSD Modules

For hackers, cheap (and arguably disposable) consumer hardware makes for a ready supply of free or low-cost components. When you can walk into a big box store and pick up a new low-end laptop for $150, how many are going to spend the money to repair or upgrade the one they have now? So the old ones go to the bin, or get sold online for parts. From an ecological standpoint our disposable society is terrible, but at least we get some tech bargains out of the deal.

Case in point, the dirt cheap 32 GB eMMC SSDs [Jason Gin] …read more

Continue reading Steady Hand Repurposes Cheap SSD Modules

Researchers crack disk encryption in popular Samsung and Crucial SSDs

Researchers at Netherlands-based Radboud University, which is active in almost all scientific fields, have discovered grave security flaws in several popular solid-state drives (SSD) that promise full disk encryption. In a nutshell, they can be cracked… Continue reading Researchers crack disk encryption in popular Samsung and Crucial SSDs