-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Sunday, 2017-12-17 at 17:12 -0600, listreader wrote:
On Sun, 17 Dec 2017 23:26:33 +0100 (CET) "Carlos E. R." <> wrote:
An NVMe SSD is portable among all PCs that have NVMe boot support in the bios.
This. Data on a hardware encrypted NVMe (m.2) is transportable?
If the BIOS "salts" the password, no.
So, does that occur? Is the encryption completely in the NVMe (m.2) circuitry or does the machine have input?
I'm going by what happens on SATA disks, it is a standard. The encryption happens entirely inside the disk, but the user has to provide the password. The password is entered, on machines supporting it, on the BIOS booting sequence, ie, before anything can be read from the hard disk. According to the article I read, the BIOS modifies the password given by the user adding some string of its own. As you do not know this string, and other machines use a different string, no, you can not plug that disk on any other computer. There is software on Linux for manually entering the password and do things, but again, we do not know what was the real password given to the disk. Do you understand the issue now? And no, I have failed to locate that article again, so I can not post the link. Hopefully somebody will know. - -- Cheers, Carlos E. R. (from openSUSE 42.2 x86_64 "Malachite" at Telcontar) -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iEYEARECAAYFAlo3p08ACgkQtTMYHG2NR9XdDgCfZ/qJE01nPXFD6yFmXXgJG6RT BPwAoI/Ba2CcS2AmhrxpQz13uBF9RY6T =7MCi -----END PGP SIGNATURE----- -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org