Death On Demand Drive Tech 287
Xanderoth writes "Engadget has an article on 'Dead on Demand' technology to destroy your disk drive should it be compromised by any number of ways. From the article: 'Configurable triggers such as removal or tampering of the drive, removal of device from a resting GPS point, cellular telephone call, or even a change in temperature will release a chemical mist into the drive (not the computer) destroying it layer by layer.' Of course the drives, due out next year, are expected to be priced between $2,500 to $9,000 each, plus a yearly fee."
"plus a yearly fee" ... (Score:5, Funny)
Re:"plus a yearly fee" ... (Score:3, Insightful)
Re:"plus a yearly fee" ... (Score:5, Funny)
"Ominous" is a fitting word...
Re:"plus a yearly fee" ... (Score:3, Funny)
Re:"plus a yearly fee" ... (Score:2)
Re:"plus a yearly fee" ... (Score:5, Insightful)
"Other solutions exist to delete data or lock the computer if a user enters too many failed passwords or does not login at all over a specified length of time -- Beachhead Solutions will sell you their offering for $129 a year per computer."
Clearly, I can see ... (Score:2, Interesting)
What drive do you want to nuke today?
Can't wait for the first Windows malware... (Score:5, Insightful)
What I can't wait for... (Score:4, Funny)
If someone tries to kidnap them, they blow up! If I can't have them no one can!
Disclaimer: Don't worry, I don't actually have kids.
Re:Can't wait for the first Windows malware... (Score:2)
Notice: Your annual fee is past due (Score:4, Interesting)
Please note that this is for your protection - since if your drive is not protected against theft, we will activate the antitheft device to ensure that your data won't fall into the wrong hands.
Technology in use for years... (Score:5, Funny)
Any number of triggers activate self destruct mode...
Defragging the hard drive
Installing a new OS
Turning the machine on
Re:Technology in use for years... (Score:2)
I wonder if one these new drives dies without being triggered (all drives die eventually..), would you get a refund? ;-)
Re:Technology in use for years... (Score:2)
Re:Technology in use for years... (Score:3, Interesting)
Why Bother? (Score:5, Funny)
Re:Why Bother? (Score:5, Funny)
That's why I now use an automated system involving monks and papyrus scrolls for all my data.
Those famous dead sea scrolls lasted how long?
Those famous dead sea scrolls lasted how long? (Score:2)
Those famous dead sea scrolls... (Score:2)
A thousand years from now someone will find Those famous high-desert DVD-Rs... which some freak of preserving environments will have saved.
Re:Why Bother? (Score:3, Funny)
a 2000 year life span for the data if it's properly preserved? phaw, I have a dedicated array of Neanderthals drawing painting in caves. depending on geological stability I demand 35,000+ years of data storage life.
Re:Why Bother? (Score:2)
Re:Why Bother? (Score:2)
OTOH, I've overall had good luck with HDs, the other one I had fail (2 total over 10 years of use) was after being out of a PC for 6 months, used as a doorstop being hit by a doo
Re:Why Bother? (Score:2)
Software Encryption (or Destruction) Instead? (Score:5, Insightful)
Why destroy when you can simply have everything be encrypted? It's cheaper too, in fact there are some free / open source on the fly encryption programs that can do large partitions:
Do any of the Linux distributions do encryption, of even full partition/harddrive encryption? That maybe ideal.
Re:Software Encryption (or Destruction) Instead? (Score:5, Insightful)
If there's an encryption scheme, there's a key. And depending on who's looking for it, they may resort to coercive measures to get that key. Or, for that matter, attempting to get the key and the medium simultaneously -- e.g raiding your place and seizing anything that could provide the key, including you.
The greater the physical destruction and the lower probability that the data would be recoverable, however, the less productive it becomes for someone to try, and the less likely that even if they DO try that the information will be compromised.
Re:Software Encryption (or Destruction) Instead? (Score:2)
Although some people might find it hard to believe, this certainly does happen [theregister.co.uk] (via Risks [ncl.ac.uk] digest).
Re:Software Encryption (or Destruction) Instead? (Score:2)
Depends on the threat level.
Nope. Well, unless you think the attacker may be able to defeat modern ciphers. If your enemy is that capable, though, just give up now.
If there's an encryption scheme, there's a key. And depending on who's looking for it, they may resort to coercive measures to get that key.
This is no different from someone resorting to coercive measures to acquire your non-destroyed hard drive.
The reason that encrypting the data is better, from a security perspective, is that it
Re:Software Encryption (or Destruction) Instead? (Score:2)
Not only that, but an IBM 4758 can be had for about $1500, and it'll encrypt data for as many drives as you want. So it's not only more secure, it's cheaper, too.
I should add that if you're truly paranoid, and money is really no object, then you might use a 4758 or similar and then use a self-destructing drive, too. Just in case your enemy can defeat, say, AES-256.
Re:Software Encryption (or Destruction) Instead? (Score:3, Interesting)
If the key is destroyed, all you have to do is look through 2^256 or however many combinations and see which of them decrypts the drive.
LOL!!!
You obviously have no idea just how large 2^256 is.
An interesting analysis of exactly that is found in Bruce Schneier's _Applied Cryptography_. He looked at the problem from a thermodynamic point of view, asking the question: "Assuming a maximally-efficient computer that used a minimum quantity of energy per bit transition, how much power would it take to
Re:Software Encryption (or Destruction) Instead? (Score:3)
http://www.pcworld.com/resource/article/0,aid,121 5 22,pg,1,RSS,RSS,00.asp [pcworld.com]
Although it isn't nearly as cool as toxic mist spewing out all over the place as conjured by a phone call, it makes a lot more sense and would not bear an annual fee.
Besides, a HD could be copied 100s of times over before you had a chance to make that phone call. In fact, there are relatively simple workarounds for all lines of defense on these destructive drives -
Re: Software Encryption (or Destruction) Instead? (Score:2)
> Why destroy when you can simply have everything be encrypted?
These are probably for people who collect kiddie porn, and don't want to go to jail for failing to deliver the password when subpoena'd.
Also, as others have pointed out, encryption schemes haven't exactly proven to be enduring.
Re:Software Encryption (or Destruction) Instead? (Score:2, Interesting)
Loop-AES even goes so far as to scrub the RAM locations containing the key to avoi
Re:Software Encryption (or Destruction) Instead? (Score:2)
Funny I'd read about this today, just a cpl of hours ago I added a "shutdown -h now"-button on my cellphone; which, of course, shutsdown my computer, making sure that the encrypted parts of it aren't accessable by anyone.
The 'phone-computer connection is using bluetooth, so this is basically for if someone's entered my home; whenever I leave my computer it isn't shutdown, but the screensaver kicks in, which is secure enough for most situatio
Re:Software Encryption (or Destruction) Instead? (Score:2)
Re:Software Encryption (or Destruction) Instead? (Score:2)
(Anecdote: I did a little work at the NSA several years ago. The guy escorting me said that they measure their computing power in acres. As in a acres of computers...lots of horsepower for a brute-force attack. Sorta like taking the 'imagine a beowulf cluster' joke to the extreme)
For you and me, encryption will be ple
Re:Software Encryption (or Destruction) Instead? (Score:3, Funny)
1. Had no clue about what weapons and forces Iraq really had.
2. Still can't find Waldo.
3. No clue where Bin Laden is.
4. No idea in advance about 9/11.
They might have acres of Vic-20's maybe. Sometimes I think they pay people to flood forums and what not talking about their amazing powers. Because the record clearly shows if they actually are good at doing anything it has nothing to do with what everyone claims they are amazing at.
Re:Software Encryption (or Destruction) Instead? (Score:2)
I do computer forensics. If we find an encrypted drive it's a bad sign. We'll get a supeona from the judge and let the cops get the decryption keys from the drive owner.
If we find a drive that has a hardware failure, there isn't much we can do. Unless it's a huge deal (FBI, NSA, etc) nobody is going to open the drive and do a chemical analysis to see if the drive has been melted by death-rays on purpose.
Of course, once we get to know which
Re:Software Encryption (or Destruction) Instead? (Score:2)
1 - encrypted filesystem.
2 - primercord wrapped around the hard drive with a battery operated trigger.
If the explosion that will cut the drive into pieces and kills the guy trying to take the computer doesn't destroy the data, the encryption will slow them down significantly to the point that when they crack the remaining fragments the data will be of little use.
I really like the explosives option... but then it makes a computer failure a bit more nervous for the owner.
fina
Re:Software Encryption (or Destruction) Instead? (Score:2)
Encryption can be cracked... if your hard drive is turned into a pile of goo, I doubt they have some sort of reverse-deterministic machine to reconstruct the magnetic data.
Even Windows lets you encrypt your hard drive... but encryption can and will be cracked if someone desires it bad enough. Destroying it physically (if you do a good enough job) should be fail safe.
Re:Software Encryption (or Destruction) Instead? (Score:3, Interesting)
My cryptographic filesystem addresses this problem:
http://sourceforge.net/projects/ecryptfs/ [sourceforge.net]
It's got a pluggable PKI interface to facilitate integration into enterprise environments. But if all you need is plain old passphrase-based protection, it provides that too. It has Trusted Platform Module support, and it will soon have GnuPG support.
It's current
Re:Combo Attack (Score:3, Informative)
Great Business Model (Score:3, Funny)
I'd like to see them fire me then!
"I'm fired. Oh really?" - presses speed dial 1 on cellphone.
"There go the production servers hard drives. Lets discuss my retirement package quickly. Maybe we won't lose all the offsite backups."
The first user of this technology... (Score:2)
Re:The first user of this technology... (Score:2)
Doorframe HERF trap (Score:2)
Can't wait... (Score:2)
Re:Can't wait... (Score:2, Funny)
Imagine the scene if you will.
RING RING RING RING
Click
"Hello, this is john from [company] we are calling to confirm you have won the prize draw you entered..."
(sound of mist being deployed in the background)
Much more malicious, and also much greater chance of it occuring.
Yearly Fee... (Score:5, Funny)
Re:Yearly Fee... (Score:2)
If you don't pay the yearly fee... (Score:2)
Ah, the good ole days (Score:5, Funny)
The stage is set.
So, a month after I get access I'm hanging out on the BBS at about 11pm and there's a knock at my door. I look through the window and see a police officer. I run the script and answer the door with as much composure as I can muster.
The police officer looks at me strangely like he was expecting me to react in some way. He then asked if I called. When I said no, he realized that he was at the wrong apartment.
GPS is baaaad idea! (Score:5, Funny)
Re:GPS is baaaad idea! (Score:2)
Re:GPS is baaaad idea! (Score:3, Interesting)
how will the hard drive see a GPS signal sitting in a HDD case, in a rack, in a room, in a building.
My garmin starts to bitch if I am under a tree and hey I am almost on the equator with 10+ satellites showing full reception
Actually it happened that with a clear view of the sky I just happened to be in the middle of the Atlantic ocean - well according to my gps.
No radio tower/cellphone station or any well seen human cause interference
Re:GPS is baaaad idea! (Score:2)
Wow. (Score:5, Insightful)
Of course, I can just see it going in the PGP direction: "He felt the need to buy a $9K hard drive to protect his stuff! He MUST have had something to hide! Guilty!"
Well sure (Score:2, Informative)
Yes, its overstated, because child pornography is the most common excuse used for violating our civil rights.
"We can't allow [insert something the cops fear here] because it will only aid child pornographers. Thank heavens for 9/11 and terrorists; it allows the cops and politicians to work another cliche for a decade or two.
Re:Well sure (Score:4, Informative)
How stupid is that? (Score:4, Interesting)
"Ooops -- oh, crap."
Is Murphy's Law just not taught any more?
My datacenter door is a HUGE magnet. (Score:2)
Yeah I have a data center like I have no plaurized this idea from the Cryptonomicon
magnetic door - mu-metal - isolation chamaber (Score:2)
Using obvious tricks for free. (Score:3, Interesting)
I created some user induced destructing car stereo amplifiers.
I removed the painted on "Pos(+)" and "Neg(-)" markings from the power terminals and painted new labels on them that were backwards. I also used a black wire for the positive wire and a red for the negative. I used stencils from some old electronic hobby kits I had laying around and they matched perfectly. Jump ahead about 5 years and sure enough, those amplifiers were stolen as well. I can only hope that the person that attempted to hook them up the first time fried them in the process. Yes, I had some free time on my hands back then but I was so frustrated when my stereo was taken the first time that the relabeling the replacement equipment did not seem like a such a waste of time. The fact that there is a good chance this equipment will be ruined does make me feel a little bit better.
Obligatory TSS comment (Score:3, Insightful)
What if we used the solar (Score:2)
no fee for 'dead on demand' (Score:3, Informative)
from TFA -
"The drives will be available "early next year" for between $2,500 to $9,000 each."
the yearly fee is only the for the other solutions that are already available like -
"Other solutions exist to delete data or lock the computer if a user enters too many failed passwords or does not login at all over a specified length of time -- Beachhead Solutions will sell you their offering for $129 a year per computer."
To summarize, the new drives aren't on a yearly fee, only the other offerings mentioned that are already on the market.
Holy Shizza!! (Score:2)
hackaday project (Score:3, Interesting)
It'd be much cooler too.
Re:hackaday project (Score:2)
Wasting money and valuable data. (Score:5, Insightful)
Change of temperature of the drive: Ok Smart one. You power down the system to do some maintenance poof there goes your drive. Or Your AC dies, Or you get a new cooler AC in. Or you do some unusual heavy processing. That is a wast.
removal of the device from a resting GPS point: Doesn't GPS need line of site. I know when I am driving my cars GPS will not work if there are to many trees overhead. Opps a war just started, in canada. GWB first order turn off a civilian GPS so we can have a greater tactical advantage.
Cell Telephone Call. I can see it someone one has the number and code in their host list and acidently hit the button. Poof. Also hacker with a war dialer.
Removal or Tampering: The system needs to be fixed (because your second mirror self destructing drive died) Well lets take out the drive... Opps wrong one. Poof!
This technology can lead to to much stupid mistakes. Issues such as high levels of encryption. Putting the system in a secure computer room with a heavy door and lock. and keep it locked. Good security and IT policies in place.
Re:Wasting money and valuable data. (Score:2)
Really, what else do you need? In commercial applications companies can afford to lock up systems thus making this pointless. I assume this is really geared towards home "hobbiest" types. And by hobbiests I mean those partaking in illegal activities.
Physical security is just as important, and let me point out that data loss prevention is yet another form of security. This is a silly idea, and will only be bought by those who think it
Data protection... (Score:2)
And what about these backups?
Or is that what teh annual fee is for... providing online backup service....?
Ok so someone steals your drive and gives it to those you do not want to have it.... that is solved here by what..... you giving your data to those you don't want to have it?
I think the 1999 Ig Nobel Peace Prize winners... (Score:2)
Re:I think the 1999 Ig Nobel Peace Prize winners.. (Score:2)
Make your own. (Score:3, Informative)
Senator Hatch will be delighted (Score:2)
dialing wrong numbers..... (Score:3, Funny)
I bring you the Haliburton Hard Drive (Score:2)
Why so complicated?? (Score:3, Interesting)
When the cops come to raid you they will just hit the power and rip the machine off your desk (how many times have you seen cops carrying computers out of raids on the news?), and viola, not only have they destroyed the evidence (technically it was their incompetence and nothing to do with you), they have _also_ destroyed the data copying program (which also copied into RAM) so there's no evidence that there was any evidence in the first place.
Remember just destroying something is useless if you're left with a charred remains, that's evidence in itself and can get you into allot of trouble.
The great advantage of this method is its hardware independent - you could potentially install it on any system in minutes, its untraceable in almost every way (buying a physical piece of hardware might be tracable, especially if your credit card bill says 'data safe hard disk' on it) and with the insane explosion in memory you can easily fit most things on it.
The only downside would be unreliability if you lost power or had a crash but this can be over come with additional systems and UPS.
I just hope that in this day and age we're not breaking any laws by just talking about data destruction.
Aaaargh! What happen??? (Score:2, Funny)
From TFA:
Damnit! I had this exact same idea over a year ago!
Actually, it wasn't exactly the same...*my* idea involved C4.
....which makes it EVEN BETTER , IMNSHO...
If I had just mark
Re:Aaaargh! What happen??? (Score:3, Insightful)
No, I recommend a concealed thermite charge. Turn the drive into a hissing, glowing, molten mass in the bottom of the enclosure. Of course, it would be a good idea to line the case with asbestos or something similar.
Re:Aaaargh! What happen??? (Score:3, Funny)
Hmmm... (Score:5, Informative)
All I see there, on not4chan.org [not4chan.org], are drawings. In some areas they are illegal I'm sure (along with 'regular' pornography too). However - at least in the United States - drawings are deemed legal since no person was harmed in the process.
:).
Pretty good principle, if an action or behaviour by a person harms no one (or only the person themself) then it should be allowed. I'd call it the harm principle I'd call it the harm principle [wikipedia.org] or maybe negative liberty [wikipedia.org]
Re:Hmmm... (Score:3, Informative)
Re:Hmmm... (Score:2)
Re:Death On Demand Drive Tech? (Score:2, Insightful)
Practically no system is secure from an attack by someone who knows what they are doing when that person is in front of it. Does not matter if it's a Mac, Linux, OpenBSD, etc.
Re:Why not just encrypt the drive? (Score:2)
Re:Why not just encrypt the drive? (Score:2)
Re:Why not just encrypt the drive? (Score:5, Interesting)
Not as a primary means of data protection, but they love it as a secondary means. They'd buy these drives *AND* run encrypted filesystems on them. Remember the spy plane that was forced to land in China? When the Chinese military stormed the plane, the comms op was hacking the crypto equipment to bits -- literally, with a large axe. Official recommended procedure, after going through the electronic sterilization steps. Execute all designed-in electronic destruction measures, then follow up with as many physical destruction measures as you have time for.
Re: (Score:3, Interesting)
Re:Why not just encrypt the drive? (Score:3, Informative)
Don't you just love it when an AC without a clue says someonelse needs one?
The EP-3 is the elextronic surveillence version of the P-3 (the US's land based MPA). It is used to intercept ellectonic transmissions (among
The hundred ways to destroy a hard drive thread (Score:3, Interesting)
Many of us think the same - nothing like powdered aluminium and iron with a bit of heat to turn a drive into molten metal - of course molten metal tends to do horrible things to everything around it.
Explosives - an intensive enough shock wave through the platter is going to have the same effect as raising the metal above the curie temperature - all magnetic in
Re:The hundred ways to destroy a hard drive thread (Score:2, Interesting)
Re:Has struck my mind before (Score:2, Informative)
1) would just require a bit of experimentation on old dead drives. I believe you can get away with using fairly little thermite (although some overkill doesn't hurt) - you don't have to melt the entire hard drive, casing and all, you just have to scorch the platters beyond recovery.
2) should also be quite doable - since
Re:Has struck my mind before (Score:2)
Re:Has struck my mind before (Score:2)
Re:too late for WORLDCOM (Score:2)
might be handy (Score:3, Interesting)
Maybe I'm served with a subpoena requiring me to give the drive to the FBI or whoever. Or maybe it's my data, but the drive is sitting in a colocation slot -- Federal Marshalls swoop down on the ISP, seize the drive.
Might be handy if the drive self-destructed
-kgj
Re:might be handy (Score:2)
redundant self-destruction (Score:2)
Okay, for the sake of argument, I've got a backup or two
-kgj
Re:This is so stupid (Score:3, Insightful)
A thermite coupled over a drive might be the wiser thing, with an (internal uplinked) serial device that ignites the thermite using outlet power (which you can derive from power supply.
Then, there's fire hazard....... and Thermite reactions are mighty hard to sto