--
You received this message because you are subscribed to the Google Groups "DataRecoveryCertification" group.
To post to this group, send email to datarecovery...@googlegroups.com.
To unsubscribe from this group, send email to datarecoverycertif...@googlegroups.com.
For more options, visit this group at http://groups.google.com/group/datarecoverycertification?hl=en.
Thanks very much. That makes sense with respect to the Initio chip. If the drive is removed, it can’t be decrypted because it requires
access through the bridge. Therefore, perhaps it’s possible that this aspect exists regardless of whether the user employs SmartWare, but if he does not, wouldn’t the drive be viewable to anyone who plugs it in to USB? What also confuses me, is that the original tech claimed to have decrypted the image file that he created after the head job.
Jimmy
Thanks, Karlo. I guess if that’s possible, one should be able to simply take a (working) SATA drive from a MyBook and plug it into a suitable WD bridge and access the drive. So, unless you use SmartWare, there seems little sense in the Initio protection scheme, if all that it does is “protect” a removed drive. If, however, the drive is mated to the bridge, that’s another story. In my case, the tech said that the image file was encrypted by the WD “case” and that he used proprietary methods to decrypt the image.
Thanks very much, Karlo. I’m the law enforcement agent who received the drive for the forensics. Basically, a customer submitted the drive to the recovery company. They replaced the heads and acquired an encrypted image. They then produced a decrypted image, checked the file system, and found contraband. Now, it’s mine, and I intend to work from the decrypted image. It’s quite possible that the firm’s reps will have to testify, and I want to learn as much as possible about the procedures that were done to this point, so I can judge their validity and explain them to the prosecutor. At this point, I’m not sure whether I can obtain further details from the recovery firm. The firm is quite reputable, however, and I think that the evidence they recovered by and any that I recover will be admissible. It’s just that my understanding of WDs encryption scheme didn’t fit the firm’s explanation.
Your and the others advice helped quite a bit. I’m starting to think that the recovery firm actually restored the encrypted image to a good drive, installed the good drive to the bridge, and imaged it as any normal drive. That, however, wouldn’t work if SmartWare was in place, unless they have a way around that.
I agree and will post back if I learn more. At the moment, I don’t know whether the user employed SmartWare. If he didn’t, and if it’s as simple as restoing the encrypted image to a new drive, there’s no magic here.
Jimmy
From: datarecovery...@googlegroups.com [mailto:datarecovery...@googlegroups.com]
On Behalf Of Networks
Sent: Friday, September 02, 2011 8:05 AM
To: datarecovery...@googlegroups.com
Subject: Re: WD MyBook Encryption
Jimmy
I would be very interested to know how they were able to decrypt the WD drive. I know this issue has come up many times on other forums.
Jim
Exactly, if what I’m told is correct. I haven’t tested this. It’s basically that you need to read the drive through the bridge, and absent the use of SmartWare and a password, there is no encryption key or it’s null, for lack of a better word. I think that WD is marketing the drive as encryptable, as opposed to encrypted-out-of-box.
Jimmy