Forum Discussion
Can I ask a Bitlocker question?
- Jun 21, 2017
Wear levelling algorithms are proprietary per drive manufacturer. An attacker would have to work around the firmware to even check out spare blocks, and then hope to understand how data is scattered to piece something meaningful together. Attacking data that way is likely quite difficult, but theoretically possible. The risk to any data present prior to encryption would go down over time after encryption as the drive is used, and spare blocks get reused for wear levelling but of course you’ll never know for sure if everything is encrypted.
Your best bet is to always to encrypt from the start, regardless of the encryption solution which all share the same issue, before any sensitive data is on the drive, so you can achive the assurance you're looking for.
It would appear that you have a choice:
- Encrypt used disk space only
- Encrypt entire drive (slower) - for drives already in use
- SigurdWernerJun 21, 2017Iron Contributor
Just what the is shown to the OS by the SSD, but in the moment a new, never used before cell is activated it will be encrypted, so no need to encrypt 'everything' upfront, exept for a very small performance impact
- Todd GodchauxJun 21, 2017Brass ContributorThat's along the lines of what I was thinking. My worry though is a machine that has already been in use, then full-drive encrypted... is there a chance that a file deleted in the shell (marked for deletion by the OS) but later goes dormant by the firmware for wear leveling?
Meaning the data is still there, but not seen by the OS, but could be activated at a later time. A bit "tin-foil-hat" I know, but if there's valuable corporate assets (HR, Credit cards, PII) on the drive, it's a real concern. For instance on a tablet that needs warranty repair by a 3rd party, we can't remove the drive so we must rely on encryption alone.- Chris HallumJun 21, 2017Former Employee
Wear levelling algorithms are proprietary per drive manufacturer. An attacker would have to work around the firmware to even check out spare blocks, and then hope to understand how data is scattered to piece something meaningful together. Attacking data that way is likely quite difficult, but theoretically possible. The risk to any data present prior to encryption would go down over time after encryption as the drive is used, and spare blocks get reused for wear levelling but of course you’ll never know for sure if everything is encrypted.
Your best bet is to always to encrypt from the start, regardless of the encryption solution which all share the same issue, before any sensitive data is on the drive, so you can achive the assurance you're looking for.
- Stephen HoganJun 21, 2017Iron Contributor
My understanding is that the full disk encryption would be for the entire volume.