<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.thinkwiki.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mprefix</id>
	<title>ThinkWiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://www.thinkwiki.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mprefix"/>
	<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/wiki/Special:Contributions/Mprefix"/>
	<updated>2026-04-20T13:10:43Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.12</generator>
	<entry>
		<id>https://www.thinkwiki.org/w/index.php?title=Full_Disk_Encryption_(FDE)&amp;diff=48081</id>
		<title>Full Disk Encryption (FDE)</title>
		<link rel="alternate" type="text/html" href="https://www.thinkwiki.org/w/index.php?title=Full_Disk_Encryption_(FDE)&amp;diff=48081"/>
		<updated>2010-04-05T18:47:11Z</updated>

		<summary type="html">&lt;p&gt;Mprefix: Removed hint line as it contained por grammar and made no sense&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|style=&amp;quot;vertical-align:top&amp;quot; |&lt;br /&gt;
&amp;lt;div style=&amp;quot;margin: 0; margin-right:10px; border: 1px solid #dfdfdf; padding: 0em 1em 1em 1em; background-color:#F8F8FF; align:right;&amp;quot;&amp;gt;&lt;br /&gt;
=== Full Disk Encryption ===&lt;br /&gt;
Lenovo's 'Full Disk Encryption' (FDE) is a technology incorporated into some of Seagate's FDE-ready hard disks. It provides encryption of all of the contents of the hard disk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Features ===&lt;br /&gt;
* Multi platform (Linux, Windows).&lt;br /&gt;
* Protects the whole disk (including FAT partition...)&lt;br /&gt;
* No performance impact.&lt;br /&gt;
* Compatible with TPM&lt;br /&gt;
* AES (the chip  which performs AES encryption has been [http://www.seagate.com/ww/v/index.jsp?locale=en-US&amp;amp;name=null&amp;amp;vgnextoid=ade81f7095904110VgnVCM100000f5ee0a0aRCRD certified] by [http://csrc.nist.gov/cryptval/aes/aesval.html NIST] )&lt;br /&gt;
* Wiping the disk (for disposal...) takes just a second.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
|style=&amp;quot;vertical-align:top&amp;quot; |&lt;br /&gt;
[[image:momentus5400_3_fde_sm_106x106.gif|FDE Hard disk Photo, credits: seagate.com]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Using Seagate FDE ===&lt;br /&gt;
Using FDE as as easy as setting up the hard disk password (from BIOS). You can choose to have just a user password, or both a user and a master password.&lt;br /&gt;
You can export the key to an external storage, for password recovery (you need the password !!)&lt;br /&gt;
&lt;br /&gt;
N.B.: The [http://www-307.ibm.com/pc/support/site.wss/document.do?sitestyle=lenovo&amp;amp;lndocid=MIGR-69621 Lenovo FAQ on FDE] specifically states that on the T60 &amp;amp; T61, there is no means of backing up or exporting the key, but that the drive may be used in another system (it is evidently not tied to a motherboard [http://en.wikipedia.org/wiki/Full_disk_encryption#Full_disk_encryption_and_Trusted_Platform_Module Trusted Platform Module]).&lt;br /&gt;
&lt;br /&gt;
==== Lost password ====&lt;br /&gt;
Three possibilities :&lt;br /&gt;
* Use the master password to change the user key.&lt;br /&gt;
* Recover the password using the previously exported key. (See note from Lenovo FAQ, above.)&lt;br /&gt;
* Reset the encryption key (which causes the hard disk to be instantly &amp;quot;wiped&amp;quot;, and resets the &amp;quot;hard disk password&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
==== Wipe the disk ====&lt;br /&gt;
Wiping the disk is as easy as reseting the encryption key from the BIOS..&lt;br /&gt;
&lt;br /&gt;
==== TPM ====&lt;br /&gt;
It should be possible to use TPM (with fingerprint readers...) not tested yet.&lt;br /&gt;
* T61 with TPM &amp;amp; fingerprints, FDE password works with a configured fingerprint but you must use windows based software to program the imprint. By keeping a small windows partition, I am able to boot linux with a fingerprint, fingerprint passes the TPM power-on password AND the FDE disk 1 password, which is separate.&lt;br /&gt;
&lt;br /&gt;
=== Software alternatives ===&lt;br /&gt;
&lt;br /&gt;
It is possible to get similar security, at a very slight performance impact, by using appropriate software-based full disk encryption solutions. For example, under Linux, you can use &amp;lt;tt&amp;gt;dm-crypt&amp;lt;/tt&amp;gt; to encrypt the whole disk (including swap and root partitions) except for a bootloader. Numerous tutorials are available on the Internet.&lt;br /&gt;
&lt;br /&gt;
=== Links ===&lt;br /&gt;
* [http://www-307.ibm.com/pc/support/site.wss/document.do?sitestyle=lenovo&amp;amp;lndocid=MIGR-69621 Lenovo Full Disk Encryption Hard Disk Drive Frequently Asked Questions]&lt;br /&gt;
* [http://www-307.ibm.com/pc/support/site.wss/document.do?sitestyle=lenovo&amp;amp;lndocid=TPAD-SIMS Thinkpad Bios simulator] (R61/T61 not available yet, unfortunately)&lt;br /&gt;
* [http://www.seagate.com/www/en-us/products/laptops/momentus/momentus_5400_fde.2/ Seagate MoMentuS 5400 FDe.2]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Full_disk_encryption Wikipedia - Full disk encryption] (why FDE ??)&lt;br /&gt;
* [http://www.xml-dev.com/pipermail/fde/ Full-Disk-Encryption Mailing list]&lt;/div&gt;</summary>
		<author><name>Mprefix</name></author>
		
	</entry>
</feed>