Agree to the FUD. Like not trusting the encryption key to be destroyed.
That assumes they use an on-disk encryption mechanism or, perhaps, the TPM
in the PC. And that the key destruction method is flawed.

Software-based full disk encryption (Bit locker, McAfee/SafeBoot, etc.)
should be just fine.


On Tue, Feb 22, 2011 at 12:16 PM, Bill <brobins3d@xxxxxxxxx> wrote:


http://www.infoworld.com/t/solid-state-drives/flash-based-solid-state-drives-nearly-impossible-erase-263

A bit on the FUD side of reporting, but an interesting read.

Bill
--
This is the PC Technical Discussion for iSeries Users (PcTech) mailing list
To post a message email: PcTech@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/pctech
or email: PcTech-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/pctech.





As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.