0 Members and 1 Guest are viewing this topic.
and everything almost inside is encrypted. even if you move the chips, you won't be able to read anything but garbage.
- fuse, and only the fuse blew (haha)
Quote from: kripton2035 on June 08, 2020, 07:00:16 pmand everything almost inside is encrypted. even if you move the chips, you won't be able to read anything but garbage.Theoretically speaking, would it be possible to transplant the chips to a drive of the same model and be able to access the data? Just thinking out loud, if all the data needed to decrypt the data (encryption keys, etc) on the chips is located on the chips themselves and nothing is left on the old drive (in the controller perhaps or some kind of support ram/eeprom), it might be possible to extract that data?
Do you have the original SSD that was - I assume - inside the external eSATA case? If so, what is the make and model? A photo of the SSD to help answer your question?
Quote from: kripton2035 on June 08, 2020, 07:00:16 pmand everything almost inside is encrypted. even if you move the chips, you won't be able to read anything but garbage.As far as I'm aware, most models don't encrypt data unless instructed to do so.
Someone brought me an eSATA SSD from Dell XPS laptop that stopped being recognized by BIOS. They replaced it with a new SSD but want to save the data. It is mainly family photos so do not grant $2000+ fee that a business that specializes in data retrieval wants. I myself do not have the experience and equipment to try to move the chips to another board.
Quote from: Mr. Scram on June 08, 2020, 08:24:38 pmQuote from: kripton2035 on June 08, 2020, 07:00:16 pmand everything almost inside is encrypted. even if you move the chips, you won't be able to read anything but garbage.As far as I'm aware, most models don't encrypt data unless instructed to do so.AIUI most models now encrypt the data by default. The encryption key is stored within the controller. The data are decrypted transparently on the fly without the user realising that this is happening. The only time the user gets involved is when they set a password. This password encrypts the key. The SSD can be cryptographically erased in an instant by throwing away the original key and creating a new one.
The researchers were able to successfully attack the following SSD models:Crucial MX100, MX200 and MX300Samsung Samsung 840 EVO, 850 EVO, T3 Portable and T5 Portable
No proper link between the DEK and the AK.The researchers said they were able to connect to the drive’s debug interface on its circuit board. This gave them direct access to the drive’s firmware, enabling them to modify the password-checking routine to accept any passphrase.A blank master password by default.With the Crucial MX 300 SSD, the researchers found that the device’s master password was set as an empty string by default. If this remained unaltered, it meant that the data could be unlocked simply by submitting an empty field!
QuoteThe researchers were able to successfully attack the following SSD models:Crucial MX100, MX200 and MX300Samsung Samsung 840 EVO, 850 EVO, T3 Portable and T5 PortableQuoteNo proper link between the DEK and the AK.The researchers said they were able to connect to the drive’s debug interface on its circuit board. This gave them direct access to the drive’s firmware, enabling them to modify the password-checking routine to accept any passphrase.A blank master password by default.With the Crucial MX 300 SSD, the researchers found that the device’s master password was set as an empty string by default. If this remained unaltered, it meant that the data could be unlocked simply by submitting an empty field!