[Cryptography] Data remanence on solid state storage

Kent Borg kentborg at borg.org
Mon Aug 19 12:28:33 EDT 2024


On 8/18/24 12:06, Ron Garret wrote:
> Worse news: hard (actually impossible) to know for sure what is going on inside*any*  modern electronic device.

Effectively, supply chain attacks.

Very true.

That's why long ago and far away, so to speak, when I once worked for a 
fab-less semiconductor company doing SoCs for laser printers (that dates 
it pretty well), I asked my boss a question that puzzled him. The 
question was roughly: How easily could the fab change our design to add 
a backdoor? He understood the question. What was puzzling was my asking 
it. I don't think anyone else in the company was considering such 
things, and this certainly wasn't my job. But I'm weird, that's why I'm 
on this list.

(Shortish answer, mixing in what I know now: Doable, but involved, and 
even if this were something they were doing to every chip, not cheap. We 
did the design, from IP we bought and our own circuitry, *and* we did 
the layout. I'm pretty sure we only sent the layout to the fab, for we 
wouldn't have had the rights to send higher level "sources" and I don't 
think we were paying them for layout services. So making a change would 
require reverse engineering from our layout, changing the circuit, and 
redoing the layout. Analogous to patching a binary, but harder. We were 
much more at risk of a backdoor in some mostly opaque block that we 
purchased, say our ethernet interface.)


Yes, your point holds, but one can still know a lot about ones gear. 
Magical supply chain criminals aren't going to, say, squeeze 
undocumented TBs of storage or high bandwidth digital transceivers into 
something that doesn't take up enough space, cost enough money, get hot 
enough, draw enough power, nor have the bandwidth to get a hold of ones 
data, etc. Also, at least for users of things like Linux, one can know a 
lot about and influence what data the OS is hurling where. And, in the 
case of SSDs, one can do very powerful things such as never storing 
anything on the SSD that the SSD could differentiate from gibberish. 
I.E., only store encrypted data. (Those links John Gilmore posted did 
not mention using encrypted file systems, alas. Though they were MS 
Windows-centric and I suppose such things are harder over there.)


Supply chain attacks are a very serious problem, but both individually 
and as an industry, we are not completely defenseless.


-kb, the Kent who finally had to bite a bullet he can't really afford 
and order a replacement for his dying laptop, which has him now 
suffering over all the details of how he will set it up, specifically 
around the SSD, and its partitioning and formatting, etc, because that 
is hard to change after-the-fact.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://www.metzdowd.com/pipermail/cryptography/attachments/20240819/3a51680f/attachment.htm>


More information about the cryptography mailing list