Talk:Self-Encrypting Drives

From ArchWiki
Jump to: navigation, search

Disadvantages

It may be possible to use a Trusted Platform Module to perform the authentication.
  • The TPM could potentially be used to unlock the drive when waking from sleep (S3) mode
  • The TPM may enable authentication methods beyond password entry, such as fingerprint recognition
Before this is researched, the TPM article will need some major revisions.
DCengineer (talk) 06:51, 5 July 2017 (UTC)
Where did you lean about this possibility? Please provide some links. Libgxps (talk) 23:10, 24 January 2018 (UTC)

Linux support

There is someone working on automatic creation of uefi pba images for arch [1] R00KIE (talk) 23:24, 20 March 2016 (UTC)
I will be setting up a new system with an NVMe SSD. Several binaries exist, but it may work better to generate the PBA. DCengineer (talk) 06:43, 5 July 2017 (UTC)

Misc update proposals

  • The 1.15 version of sedutil uses a differently named option and the behavior probably changed too:
   # sedutil-cli --setSIDPassword oldpassword newpassword device

now also sets the admin1Pwd, so it is not necessary to execute. The user should at least be informed about this.

  • The links to the PBA image is broken and the ones that work point to broken builds.

Libgxps (talk) 23:10, 24 January 2018 (UTC)

Suspend doesn't work properly

Suspend locks the drive (Dell E6410 + Samsung EVO 850) and drive is not accessible after wake up. One solution is to disable Suspend - see https://wiki.archlinux.org/index.php/Polkit#Disable_suspend_and_hibernate

Is possible to unlock drive after wake up?