On July 24, 2015 8:18:19 AM EDT, "Carlos E. R." <robin.listas@telefonica.net> wrote:
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
On 2015-07-24 14:06, greg.freemyer@gmail.com wrote:
A combination of a bios/uefi boot password and a hard drive ata drive password does work.
The ata drive password keeps the drive from working except in the computer it is paired to. The bios/uefi boot password prevents the bios from activating the drive.
I have seen that done in the real world, but encryption is much more common solution.
Doesn't it require support from the BIOS, to prompt for the password on each boot? I have not seen anybody using this method, with Linux (on boot/system disk).
It does need bios support, but it doesn't work as you describe from what I understand. The password is maintained by the bios. When the disk is powered on it initially refuses to accept read/write commands. The bios automatically sends the password and enables the drive. No user interaction required. Typically a user would also have a separate bios password setup that has to be entered. But that is a separate password, so the user only enters the ata password once when the bios and the drive are paired together. Makes it very easy to forget. Greg -- Sent from my Android device with K-9 Mail. Please excuse my brevity. -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org