throwawayacc0430@sh.itjust.works to Privacy@lemmy.mlEnglish · edit-26 days agoAre there any use-case for those SSDs with hardware-based encryption? Is it a good idea to use one of those over software-based encryption?message-squaremessage-square22linkfedilinkarrow-up130arrow-down10file-text
arrow-up130arrow-down1message-squareAre there any use-case for those SSDs with hardware-based encryption? Is it a good idea to use one of those over software-based encryption?throwawayacc0430@sh.itjust.works to Privacy@lemmy.mlEnglish · edit-26 days agomessage-square22linkfedilinkfile-text
I mean those ones with a pin entry keypad/touchscreen built onto the device and has limits on number of attempts.
minus-squareAngular@lemmy.mllinkfedilinkarrow-up1·23 hours agoNot if the vulnerability is in the hardware circuitry implementation.
Not if the vulnerability is in the hardware circuitry implementation.