Acer Laptop W/Fingerprint Recognition System 246
Dekaner writes "Acer has announced the TravelMate 740 with a built-in fingerprint recognition security system. The fingerprint sensor is part of the notebook? s palm rest. Users must train the recognition system, which is then used to boot the machine or to decrypt files stored on the hard disk. The TravelMate has a 1.2 GHz Pentium III processor, a 15-inch screen with a resolution of 1400 by 1050 pixels, built in 56K modem and Ethernet connection, and it can be supplied with either 128 or 256 MB of memory. It can be configured with a second hard disk, CD-ROM, DVD, or a DVD-CD-RW drive. It will go on sale in October."
Not for use with *really* valuable data (Score:5, Funny)
Don't keep data on this thing that's worth dismemberment, because scary terrorist-types will cut your fingers off.
Re:Not for use with *really* valuable data (Score:2, Interesting)
Nah - these things can tell a dead finger - blood, pulse, rigor mortis etc. You need to have it attached to you when you use it. Of course, this presents a problem if you do something disfiguring to your finger (don't joke, it happens!), and you can't get at your files. What's more, someone can just hold a gun to your head until you put your finger on the pad...so it's by no means foolproof.
Re:Not for use with *really* valuable data (Score:2)
With a standard passwd, you had to consent to give this valuable information to a bad guy.
With this system, you just have to stand nearby, and, whether you agree or not, a pirate will find it less difficult to *borrow* you to hack into your computer.
In conclusion, this fingerprint system will make both our lives and computers less secure.
I have to disagree (Score:2, Insightful)
Re:Not for use with *really* valuable data (Score:2)
Some do. The question is, can Acer's?
Re:Not for use with *really* valuable data (Score:1)
Re:Not for use with *really* valuable data (Score:2)
It would suck to have one of these and not be able to scan in other people's prints, and play with the resulting images.
Apple's voiceprint secuirty is like that: The only way to "save" a voiceprint is to create another user in the Multiple Users control panel. They built a whole extension for vioce recognition, you'd think they'd make it accessible to more than one place!
I'm sure someone will make a linux driver with all imaginable options. Right? Right?
Demolition Man? No...Red Dwarf ! (Score:5, Funny)
They come upon a door.
KRYTEN: Uh-oh, a door. We'd better use an air vent.
LISTER: No need.
KRYTEN: Sir?
LISTER: Look, I'm gonna do something now, Kryten, that's totally, totally
gross. I don't want you to look. Turn around.
KRYTEN: What?
LISTER: Trust me, you don't wanna know!
KRYTEN reluctantly turns around. LISTER pulls the object he picked up
earlier out of his jacket: it's a hand. He presses the severed hand to
the palm-print device, and the door opens. He puts the hand back in his
jacket and turns around. KRYTEN has a sick look of realization on his
face.
KRYTEN: Logically, sir, there is only one way you could have possibly
have opened that door. I feel quite nauseous. Where is it?
LISTER: Where's what?
KRYTEN: Oh, sir!! You've got it in your jacket!!
LISTER: I got us out of the hold, didn't I?
KRYTEN: Sir, you are sick! You are a sick, sick person! How can you
possibly even conceive of such an idea?
LISTER: Cheer up! Or I'll beat you to death with the wet end!
KRYTEN: Sir, if mechanoids could barf, I'd be onto my fifth bag by now.
You're a sick person! Sick! Sick!
high tech sneaker defense. (Score:3, Funny)
As the NRA says (Score:2)
New Crypto Rules (Score:5, Funny)
Re:New Crypto Rules (Score:2)
Well, they've been collecting fingerprints for years and years now...
well it's about freakin time... (Score:2)
These small, integrated fingerprinter scanners have been in the works for a while now. It's good to see that they're finally being put to use. What's next? Fingerprint ID car-starters? Cell-phones? so many possibilities...
Fun with reading comprehension! (Score:2)
"Users must train the recognition system, which is then used to boot the machine or to decrypt files stored on the hard disk."
Re:Fun with reading comprehension! (Score:2)
decrypt files stored on the hard disk
And where exactly is that decryption key stored? If it's something volatile, you're in big trouble if it gets accidently erased (or the person dies in a big fire). Otherwise, just get the key after disabling the fingerprint mechanism. Unless the fingerprint itself is the key (in which case it can be copied), I don't think you can come up with a non-self-destructing system which would not be subject to physical attack.
Re:well it's about freakin time... (Score:2)
Apparently it uses infra-red light to take a sub-dermal photo of your hand to compare with a stored image. No match, gun doesn't work. Interesting idea, but I wonder what happens if a police officer NEEDS to shoot and the gun mis-scans.
reset? (Score:1)
If not, how could you ever sell it, or let anyone else use it?
Re:reset? (Score:4, Funny)
George inherits this laptop, only to find it's fingerprint protected, so at the funeral, he tries to sneak it up to the corpse to get the print...
Yadda yadda yadda....
Re:reset? (Score:2)
I had a DEC PC that had a bios recovery mode that would reflash the bios from floppy without a flash program or a bootable floppy. The catch was you had to make a recovery floppy before you foobar'd the machine. I presume it was just a raw dump to disk media of the old bios.
Whatever ROM the machine had was capable of doing disk reads and flash writes.
I'm sure there's a way to make this one go into "recovery" mode which would at least make it a working laptop.
So I ask you this... (Score:1)
What stops you from reformatting the hd to get rid of this thing?
Re:So I ask you this... (Score:1)
If you reformat the hard drive, then whoever had valuable secret data in there has nothing to worry about it getting out in the open or in the wrong hands.
Re:So I ask you this... (Score:1)
Re:So I ask you this... (Score:2)
Re:So I ask you this... (Score:2, Informative)
Re:So I ask you this... (Score:2)
There's always a way around security...it just depends on how much that data is worth. And if it's worth so much that someone would be willing to manually decrypt an entire HDD, then maybe that data shouldn't be on a laptop in the first place.
Re:So I ask you this... (Score:2, Informative)
Re:So I ask you this... (Score:1)
Does this mean (Score:1)
Dang (Score:1)
It is interesting... (Score:4, Interesting)
The article is short on details but it seems not to be very reliable. In corporations, the IT department usually has a master key so that even when the employee leaves, the company can still retrieve the data. What about this fingerprint-recognition system?
Second, this article makes me wonder if Slashdot will consider inserting text ads like Google by masquerading as submissions. I think it is a great way to get income to maintain this heavyly used site (banners at the top are no longer very effective), given the financial conditions of the parent company VA Linux.
Quite simple (Score:1)
You leave. Your finger stays.
Re:Quite simple (Score:1)
Which btw could evolve into a real problem after you switched your job the 5th time.
But what about it's innards? (Score:2)
Indeed, if we don't know how it works internally, how do we know that Acer hasn't built a huge backdoor into it (like how their CEO's fingerprints or an easily reproducable pattern will always work)?
I expect it uses some system to "hash" fingerprints into simpler indentifiers, but how do we know that this function is unique? I've already dealt with iris-identification products that, given a large enough input sample, start incorrectly identifying people since the hashing function didn't produce unique hashes.
Re:It is interesting... (Score:2)
The BIOS probably interacts with this and tells you to put your finger on it before it will complete booting. There's probably a finger-less way to update the bios which puts the laptop back into "new" mode, forgetting its fingerprint settings. This seems like the most likely way to override this security as a method of getting a working laptop.
Presumably this wouldn't allow decryption of files encrypted to use fingerprint as an access method to some other encryption keys, but it would make the laptop a functional computer again.
Regardless of the fingerprint system, it still seems possible to part the laptop out as individual components (of limited usability since its a laptop) as well as replace the motherboard or flash RAM if its socketed.
This computer is kind of confusing because its trying to solve two problems: laptop security (keep the laptop from functionality if stolen) as well as data security (protect the data even if the computer is made workable).
The latter is hard, but the former is very desirable to me as a corporate IT guy. I'd love a hardware-key system that would render the laptop useless if stolen. Fingerprint is a PITA since they're kind of tied to humans, but access cards would be great since presumably there could be many cards capable of accessing or modifying the laptops (ie, master key).
It still might not prevent disassembly or other hardware attacks, but my guess is that most laptops that are stolen are stolen to be resold as complete units, not sent to back-alley chopshops to be sold as parts..
Re:It is interesting... (Score:2)
What's so special about this article in particular that made you start suspecting this ? The situation you propose is already here: the book reviews already look very much like text ads, very very big text ads that come with very large endorsements from -presumably- unbiased reviewers and that come complete with hyperlinks to buy product. From this admittedly jaded perspective it comes as little surprise that 1) the majority of book reviews are very positive; anyone who reads many tech books would be suspicious at this alone, 2) a suspiciously large number of them seem to be published by O'Reilly, who as I recall run banner ads here.
I wouldn't trust it (Score:1, Flamebait)
Re:I wouldn't trust it (Score:2)
While Acer Desktops aren't exactly cream-of-the-crop, their laptops aren't bad at all. I personally own an Extensa 501T and it runs Slackware Linux. Everything works beautifully - Display, Sound, and there's even support for the Winmodem. I've enjoyed this laptop for the past four years, and I've only ever had trouble with the floppy drive.
In that event, Acer paid to have it returned to the factory, fixed it, and had it back to me the same week.
I would definitely recommend Acer laptops. I've had nothing but good things to say about mine.
Re:I wouldn't trust it (Score:2)
That's unfair! There's nothing wrong with my Travelmate 507, apart from the faded keys, jerky touchpad, cracking hinges, heavy weight, crappy video card, noisy hard drive, crackly sound, fragile modem socket, erratic parallel port, blocky display, overheating CPU, short battery life, sluggish system speed, minimal upgradability, and the lack of WinME/Win2K/WinXP support for all of the wierd hardware in it.
</sarcasm> (OK, OK, but it was cheap, the CD reads burned discs very well, and it runs Linux better than it runs the bundled Win98SE)
A valid reason (Score:2, Informative)
Btw: for all the l337 hackers suggesting cutting off fingers: proper finger recognition systems can sense whether the finger being scanned is attached to a living body by checking for temperature, pulse etc. So instead of just stealing your thumb and laptop, they will have to steal you as well.
Tech Support (Score:1)
Rebooting the laptop (Score:2, Redundant)
Ctrl-Alt-middle finger, indeed.
Linux fingerprint software (Score:1)
Good for corporate types (Score:2, Insightful)
For the same reasons it should be popular with MI6 who last year seemed to be losing a laptop a month.
So long as it's implemented sensibley, I think Acer are on a winner here.
When is the verification done? (Score:1)
Re:When is the verification done? (Score:1)
Possible maybe BIOS level though.. it'd be alot nicer to lock the OS out totally(waay too easily bypassed)
Re:When is the verification done? (Score:1)
This is neat, but not really useful (Score:5, Interesting)
Don't get me wrong -- I can see this being very useful for corporations and governments who have valuable information to keep encrypted. For those applications, this is a good idea.
The problem I see is that fingerprint sensors require maintenance. The human fingertip exudes oil, used to increase the traction of the fingertip. This is not good for a sensing surface, and will necessitate regular cleaning. Anyone who has owned a trackball can tell you that anything the finger touches regularly, builds up gunk quickly.
Another problem is susceptibility to damage -- scratches in particular. I wouldn't want to be locked out of my files due to clumsiness. Also, damage to the recognition system through any form of clumsiness will keep you out of your encrypted files. Using an ordinary encryption method, you'd just hook the HD up to a different machine and be back in business.
I'll assume that the device is good enough to detect your print accurately. I wouldn't think the company would willingly release a half-engineered product in such an important area as authentication.
Another reason it might not be useful (Score:4, Interesting)
How many bits worth of unpredictable information, exactly, is in a fingerprint? I know it's "a lot", but is it enough? 48 bits is "a lot" too, but it has been demonstrated to be not enough for protection against a simple brute-force attack.
Ultimately, it's all just bits. This fingerprint-recognition device ultimately must convert your fingerprint into a binary key, and use that key to perform the encryption/decryption. If someone can get a copy of your encrypted data, they could run it through software which tried binary keys until it found the right one. If the adversary could lift your fingerprint from something you've touched, that might give them information which helps them narrow down the search.
Until I found out just how many keys they'd have to try before exhausting the keyspace, I wouldn't trust this to be secure. A good mixed-case/numbers password with a - or ! (et al) thrown in can easily have 67**8 > 48-bit strength. A 5-word english passphrase can have up to 38619 ** 5 > 76-bit strength (38619 words in
Seriously, though, does anyone know the strength of a key generated by Acer's gizmo? And how much it might be narrowed down with a sample fingerprint to work from?
-- TTK [ciar.org]
Re:This is neat, but not really useful (Score:2)
She said that other people in her house were all pissy (girls, go figure
Seems to work just fine. Kinda cool as far as I am concerned. Although I really don't know how effective this is for stopping stealing.
In combination with... (Score:1)
and
Body Powered Batteries -- Thermoelectrics [slashdot.org]
and you have total wearible personalized computer!
cool idea but (Score:1)
At least this is a step in the right direction.
seems unnecessary... (Score:2)
This should definitely add to the FUD-factor at your local Best Buy, though...i can see it now:
Salesman: But if you don't have fingerprint recognition, ANYONE can get into your private personal super-top-secretest files!!! Even TERRORISTS!!!!
Customer: I'll take fifteen of 'em!!!
And if it fails?? (Score:1)
I like the idea of a backup password to allow you to still boot the machine should fingerprint ID not work. It's not quite as secure as the standard "Have something, know something" protocol, but it'd at least let you check your email until the scanner could be replaced.
questions (Score:2)
BTW, what if I scorch my finger?(I guess it could work but I would like to be sure)
Finally, some more details are given just a click deeper [acer.com]...
Next idea:Thief Identification Honeypot (Score:1)
Damn, I should've patented this instead of releasing it to public domain by posting in a public forum!
Re:Next idea:Thief Identification Honeypot (Score:2)
finger print loggin for linux (Score:1)
Anyone wanna help?
anyone know? (Score:1)
finger print reader?
Acer (Score:1)
Is there any reason that we would want to buy a piece of malfunctioning junk like that again, even if it does have it's own paranoia system installed?
Perhaps if it were a company that didn't make utter junk, I would consider it. But then again, I'm not stupid enough to put data that sensitive on a bloody laptop!
It's to protect data only, right? (Score:1)
This is not new (Score:1)
I don't use it because I'm worried I won't be able to get back in. (apparently even different levels of grease on your fingers can throw off the sensor)
If you use it for you hard drive, and you get locked out, you have to ship the drive back to the manufacturer so they can physically reset it.
I'll stick to passwords for now.
Hope the thief reads the sticker... (Score:1)
a) Read the warning label before taking it, or;
b) Take it and see what he's got later?
If b), you've lost it anyway...
Yeah, it's redundant but... (Score:2, Funny)
WOW! (Score:1)
When will these types of screens be available in standard laptops??? I'm not interested in the finger print technology, I just want that display!!!
Re:WOW! (Score:2)
Dell has been selling their Inspiron 8000 with 1400x1050 and 1600x1200 screens for quite some time. I have the 1400x1050 display, and it's very nice indeed. Not to mention the Dolby Digital sound, TV out, dual monitor capability (LCD + external), or 1394 port.
bah (Score:2)
1400 by 1050 pixels? That's better than my desktop's!
Secure One touch logins for Linux? (Score:1)
False security is worse than no security (Score:5, Insightful)
Using what encryption key? Your fingerprint? Does anyone believe that your fingerprints are secret? You are putting thousands of copies of your prints on various objects every day. You probably have several fingerprints on your laptop! And once your secret encryption key becomes known, how do you change your key?
The key (sorry) to good encryption security is to change your keys often.
Until a good technical description on the security is provided I will regard this laptop as techno-babble trying to impress PHB types.
Re:False security is worse than no security (Score:3, Informative)
Obviously not. More likely, a key generated at some point in the setup process, and your fingerprint is merely the passphrase to access the key. Same way PGP does it, really.
Re:False security is worse than no security (Score:2)
Re:False security is worse than no security (Score:4, Informative)
Actually, the problem is that you have to keep a copy of the fingerprint to match. Getting a copy of this fingerprint from disk or memory would be fairly simple.
Also, you can not hash a fingerprint. Each scan of the same fingerprint is different from the previous one. You can't protect the b' enrolled fingerprint.
The only way this would work is by:
(a) using a dual password/biometric. The password would unlock the b' biometric(enrolled) and the fingerprint would be used to extract it.
(b) using a hardware protection and matching system. Whereby the hardware is responsible for protecting itself. Simular to a smart card concept, the hardware would encrypt the data on disk, and also gather and match the fingerprints. Still, a bit of reverse engineering could defeat this. Also, a cheap fingerprint scanner could probably be fairly suseptable to rubber finger attacks.
Pan
Re:False security is worse than no security (Score:5, Insightful)
CFR 21:11 [gpo.gov] , the Code of Federal Regulations, goes through this fully. In order to be "validated" as the real person, you must hold at least two of three key pieces of information:
This is how our Federal Government looks at it anyway.
Biometrics have come a long way, and contrary to popular belief, this fingerprint-style technology does not compare a "picture" of your finger. It measures datapoints (the FingerChip [thomson-csf.com] for example, measures many more datapoints than most biometric scanners, and is a fraction of the size).
The "retraining" you have to do is so that your "personality" is measured as one of the datapoints. If this was a signature capture biometric, it would measure whether or not you dot your "i" before your words are finished, or after. That "personality" is set in the equation as part of the measurement. This is why even if you have someone's signature on paper, and can replicate it perfectly freehand, a good biometric will rule it out, since the "personality" (speed to write, dot i's first/last, etc.) will certainly not match.
Re:False security is worse than no security (Score:2)
And when I have stolen your laptop, and I remove the disk and put it in my own Linux-controlled laptop, exactly how is the fingerprint scanner protecting the disk / flash ROM?
And how is the "passphrase" in the scheme above secret? And how do I change it once it has become known?
How does a "fingerprint scanning device" that operates with known inputs make ANY memory device (bar smartcards which isn't used here) on your stolen laptop "secret" from me?
Re:False security is worse than no security (Score:2)
The fingerprint idea will basically keep folks entertained at your next 2600 meeting, but it won't keep anybody out of your data other than casual intruders, who would have been just as easily kept out by a BIOS password. This product is snake-oil.
sounds great! (Score:2)
Acer laptops are impressive (Score:4, Interesting)
I looked at a variety of other laptops, especially Dell and Compaq, and none could build in everything (she wanted wireless ethernet for use at college and in the future) at such a low weight. The price wasn't too bad either, for last June - about $2100 including Windows 2000 and Office 2000 from CDW.
When it arrived, there was a feature I sort of brushed over - a smart card reader. Its primary purpose in this laptop is to restrict access if the card is not installed. It looks like a credit card, and is easily removable. By default, the security settings are such that the smart card must be installed for the computer to boot. Of course, this isn't perfect protection against things like theft, but it is more convenient than a boot password to prevent people from simply using the laptop.
So I am not surprised to see that Acer is leading the way with more laptop security features. I absolutely hate the many old desktops that I have had to fix over the years, but the quality of the laptops is quite nice. They fit a lot of features, including some pioneering ones, into a laptop that is comparable in price to Toshiba and Dell with less weight.
Re:Acer laptops are impressive (Score:2, Funny)
And without Windows 2000 installed it was only 1 pound right?
Re:Acer laptops are impressive (Score:2)
The bottom can get kind of warm for your lap if you're doing higher powered things, because normally the processor is clocked down using Intel Speedstep (to preserve battery length and heat). It didn't strike me as being any more or less noisy than the average quality laptop - I didn't really pay attention to it though.
Hope it's in the BIOS... (Score:1)
I've got my Vaio now, life is much better.
Gun to your head; your finger on the sensor. (Score:2)
Re:Gun to your head; your finger on the sensor. (Score:2)
Biometric Authentication Experience (Score:4, Troll)
We tried registering all of my fingers to no avail. In the end, I got a magnetic card to get in.
I had tried one of those systems where you sign for authentication, too. But it turns out that I can't write my own signature the same twice. I haven't had much luck in having biometric authentication figure out who I am.
Re:Biometric Authentication Experience (Score:2)
--Blair
"Requirements-based testing: it's not just for breakfast any more."
Yeah right (Score:2)
Yeah right. You're really just worried because your fingerprints might be hard to read after those late nights reading playboy.com
positive feedback (Score:2)
Locked out, standing in the cold, your hands getting dryer and less likely to work the next day. Oh my!
We use a hand and plastic card system here for entry. It seems to work well. Key numbers work where there is no card reader or if you forget your card. The hand readers themselves tollerate changes in my hands from exercising, but not gloves, and are speedy. This might not work for a laptop, but it's tops for building entry.
Creepy (Score:2, Insightful)
This trend towards biometrics just seems like a way to make security somewhat brainless. The big problem is that security that is brainless isn't security.
Clones (Score:2)
Re:Clones (Score:2)
Your data will be totally secure! (Score:2)
Re:Your data will be totally secure! (Score:2)
total data loss? (Score:2)
Will this drive up the incidence of finger mutilation as people could potentially try to hijack your computer?
Re:total data loss? (Score:2)
Capacitance Detection for Living Humans (Score:2, Funny)
After being unable to activate my touchpad with anything other than my finger, my curiosity had been captured. After a great deal of experimentation, and actually getting 5 other engineers running around looking for something to fool the touchpad, we finally resorted to technical support. Here was my letter:
I have a prosthetic limb which I am unable to use
the synaptics touchpad with. I am unaware of the type of touch sensing it uses, and have been unsuccessful in my attempts to 'simulate' a fingertip on my prosthesis.
I even bought a rubber hand and cut the finger off
and stuck it to my prosthesis, but to no avail.
I have also tried heating the prosthesis to my body temperature.
The pad works fine for the other engineers in the
group with real fingers, so I don't believe there is a problem with the pad itself.
Do you have any suggestions for a tip I can use to
properly activate the touchpad?
If not, do you plan on releasing something I would
be able to activate
with a prosthesis?
And their reply was:
Hi Chris,
Unfortunately, as you have discovered, our touchpad uses finger-sensing technology. Basically, the touchpad determines that a touch is made through the capacitance of the human body.
I'm very sorry to say that we cannot recommend a
product you can use to activate it at this time.
Best regards,
So what have we learned other than how fun messing with tech support can be? Even a heated pulsing finger isn't going to work if the electrical properties aren't right. Capacitance is a tough thing to trick. Try putting probe leads on two parts of a finger, and plot the voltage / current patterns. Very, very difficult to duplicate.
Of course, medical science will always find a way to stick severed fingers on hands, and we know that your average bin Laden follower won't scoff at the replacement of one of his fingers with a victims...
Umm, this is OLD. (Score:4, Interesting)
The fingerprint recognition was OK for one person, but as soon as we tried to configure it to recognize two people, we had horrible problems. It seemed like there were differences between the BIOS level recognition and the software OS level recognition. We were eventually both locked out and just sent the laptop in to be reset.
.. probably runs windows.. (Score:2)
what is the scanning method ? geographic or photo? (Score:2)
Is it photographic ? That is, the mechanism captures a photo of the fingerprint using lighting differences to create a pattern. If so, then what happens when I get the errant pen mark or paper cut across my finger ?
Is it geographic ? There are some nifty technologies out there that either through sonographic or similar means create a viritual image of the fingerprint pattern. These are far more accomodating in ignoring things like dust, dirt, pen marks, paper cuts, chaffing/sluffed skin, boogers and other stuff that sticks to our hands.
Does anyone know which type is being used on this laptop ?
cool... (Score:2)
More details on the chip itself... (Score:2)
Ye Gads (Score:2)
(1) Their illustration of a Pentium III-M processor is good for a laugh. Check out the lower-right corner of the second page of the brochure [acer.com], and tell me that isn't an FCPGA Coppermine Pentium III sitting on top of a circuit board.
(2) More than likely, they've implemented the hard drive protection using an IBM Travelstar [ibm.com] hard drive, which has a password-protection option (although this is very rarely used in the real world). Why am I poopooing this? Keep reading.
Section 11.8 of the Travelstar 48GH Specifications [ibm.com] (page 87, PDF page 101) details IBM's security system. I would imagine this can be circumvented in one of two ways, the first being in the hard drive itself and the second being part of the notebook's security implementation.
First, there's a Master Password in addition to the normal User Password. If you don't know what the Master Password is, and don't know that only you know both passwords, anyone with access to the Master Password (quite likely any high-level Acer technician) can send a Device Unlock command to the drive along with the Master Password and voilà, the oyster opens to reveal the pearls inside. (No, you can't read the passwords out of the drive's EEPROM; it's stored in a non-externally-addressable area of the disk. Even if you know and control both passwords, though, I'd imagine there are undocumented commands to reset the password or unlock the drive regardless of the password. If you're thinking that IBM would need to be able to unlock drives to refurbish/repair them, they wouldn't, because there's a command which will write zeroes to every externally-addressable sector on the drive then unlock the drive and erase the password. No hard drive maker that I know of guarantees the integrity of the data on any hard drive that's sent to them.)
Second, I'd be very surprised if they had gone any further than storing the Travelstar's access password in CMOS or an EEPROM part, and sending it to the drive if the fingerprint matches what's stored there as well. (They couldn't store a one-way hash of the drive password, because any obfuscation would have to be reversable to be able to feed the password to the drive.) Therefore, anyone with an SMD rework station and an EEPROM reader could probably extract the password from the CMOS/EEPROM.
In summary, I wouldn't trust state secrets to this. I would recommend PGP Corporate Desktop [pgp.com] instead as the closest thing a mortal can get to decent data security. (An interesting aside: You know how the government erases drives holding classified information before they're resold? They don't. The drives are physically destroyed. For good reason. [google.com])
Re:Needs Saying (Score:2)
-sam