Wipe or Kill Your Laptop, On or Off, if Stolen

Status
Not open for further replies.

jhansonxi

Distinguished
May 11, 2007
1,262
0
19,280
I hope the remote commands are strongly authenticated else there will be lots of hacker fun with remote wiping of your drive while the laptop is still in your possession.
 

haricotvert

Distinguished
Mar 26, 2009
16
0
18,510
I assume Toshiba would also find a way to reverse the process. For the times a stolen/lost laptop is recovered/found, you'd probably want a working system with all your data back.

Giving customers the tools to remotely brick their mobile system is just asking for costly and proprietary methods of undoing said bricking. I am sure Toshiba has not overlooked the profitability of this, especially if they are the *only* one who can provide the service.
 

4Tun3c00k13

Distinguished
May 8, 2009
4
0
18,510
This old key and lock approach is a definitely a step up from traditional "careful" approach. However, assuming key, cell phone or whatever the remote device, is portable, if key is stolen it could easily turn into hostage situation quickly at ease.

it's a double edge sword.
 

akoegle

Distinguished
Mar 5, 2009
38
0
18,530
If you're the thief bypassing this would be as simple as immediately removing the battery or hard drive from the laptop.
 
G

Guest

Guest
@akoegle That's not bypassing it from a security standpoint. You couldn't rip the data due to the encryption on the drive. and as soon as you DID plug it in, the kill command would be received. Not much of a way around that.
 

xantech22

Distinguished
Mar 30, 2008
16
0
18,510
since the encryption keys is stored on the chip it self it may render the hardrive useless, no matter what you can do, someone looking for personal data can always take the hd out put it on an enclosure and voila! they have acces to your drive.

This unless the owner "wipes" it from a cellphone? But what if they don't in hopes of retrieving the laptop back with "precious" data? It's a risk, besides who's smart enough to always back-up every important info? only then wiping the drive makes more sense.
 

orizvi

Distinguished
Mar 19, 2008
3
0
18,510
I don't believe that this technology wipes the drive by writing 0's or something along those lines. I'd imagine its more along the lines of since everything is encrypted, once the key is erased - none of the data can be decrypted. In the case that the portable device is recovered, the key could be reprogrammed into the chip and viola! You'd have instant access to your data. So if they used a simple method such as plugging in a flash drive with the key after the laptop is recovered to restore the key to the laptop's chip, I don't think anyone would have any reluctance at all to immediately locking down their laptop the moment its stolen.
 

Vettedude

Distinguished
Apr 10, 2009
661
0
19,060
This is great!

I have noticed that the first comment is always from the author and has the first line of the story now. Why does it do this, because it is annoying the heck out of me.
 

jsloan

Distinguished
Sep 24, 2008
444
0
18,780
the question is whether the user will have access to the information when the user is in an area where the signal does not reach.

what if the laptop is turned on in an environment outside the range of the signal. so when you steal it you remove the battery, then you disable the antenna or place the laptop in a place where the signal is not in reach and then you turn on the laptop.
 

tuannguyen

Distinguished
Jul 22, 2008
488
0
18,780
[citation][nom]vettedude[/nom]This is great! I have noticed that the first comment is always from the author and has the first line of the story now. Why does it do this, because it is annoying the heck out of me.[/citation]

Yeah, it's an annoying bug that popped up.
We're fixing it, so the auto posting of the first post should disappear soon.

/ Tuan
 

Regulas

Distinguished
May 11, 2008
1,202
0
19,280
I hope microsoft does not get in on this. Your activation key is wrong, shut down their computer. All your base belong to us.
 

christop

Distinguished
I think a self destruct would be the shit.. The thief steals you laptop and you send a signal and cause it to burst into flames and burn the thief to death... Ok went to far but it would be cool.... I bet it would cut down on laptop crooks...
 

SirCrono

Distinguished
Sep 9, 2006
463
3
18,785
[citation][nom]jsloan[/nom]the question is whether the user will have access to the information when the user is in an area where the signal does not reach.what if the laptop is turned on in an environment outside the range of the signal. so when you steal it you remove the battery, then you disable the antenna or place the laptop in a place where the signal is not in reach and then you turn on the laptop.[/citation]

That's why the service is rolling on japan first, small island, one hell of a wireless network.
 
G

Guest

Guest
I think that if the information on a laptop was important enough and was stolen by a government agency, a powerful company or an organized crime group, they would easily have the resources to quickly crack the encryption on the drive.

Take a really good system loaded with at least four of nVidia's most powerful graphics cards in SLI mode and use that Russian decryption program which uses the nVidia GPUs and the encryption would be cracked with less than a day or at the most, within a few days.
 
G

Guest

Guest
I think encryption is sufficient in and of itself, as the article states, usually the company is more concerned about the hardware. This is pretty much using the same TPM backdoor that are already on pretty much every modern laptop, but with additional functionality for the end user/adminstrator.
 

NightbladeXX

Distinguished
Nov 4, 2007
49
0
18,530
[citation][nom]Renegade_Warrior[/nom]I think that if the information on a laptop was important enough and was stolen by a government agency, a powerful company or an organized crime group, they would easily have the resources to quickly crack the encryption on the drive.Take a really good system loaded with at least four of nVidia's most powerful graphics cards in SLI mode and use that Russian decryption program which uses the nVidia GPUs and the encryption would be cracked with less than a day or at the most, within a few days.[/citation]

Place a failsafe on the hard drive that only accepts 5 - 10 attempts before the drive is wiped
 
Status
Not open for further replies.