CPUs have had hardware acceleration for AES encryption/decryption operations for well over a decade now, which basically eliminates overhead even when dealing with fast NVMe SSDs. So if that's the one you want to use, then you might have to jump through a few extra hoops these days.īut for multiple reasons, I would strongly encourage you to consider software encryption, using BitLocker or VeraCrypt if you don't have access to BitLocker and/or prefer open source solutions. Granted that was a while ago and they didn't test a ton of SSDs, but they also found serious problems with 100% of the SSDs they checked. As for eDrive, Microsoft switched to disabling BitLocker's support for relying on hardware encryption by default after security researchers found massive flaws in how multiple SSD vendors implemented their hardware encryption. TCG/OPAL as I noted is typically only enabled by enterprise-oriented, centrally managed, disk encryption solutions. To my knowledge, Dell systems still don't support HDD passwords on NVMe SSDs, which if true would rule out using Class 0. The 970 Evo supports a variety of hardware encryption types, including Class 0 (which relies on an HDD password set in the BIOS), TCG/OPAL (used by enterprise applications), and BitLocker eDrive.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |