Which to use: Client Security or Vista BitLocker?

T60/T61 series specific matters only
Post Reply
Message
Author
jgrobertson
Sophomore Member
Posts: 230
Joined: Thu Oct 21, 2004 2:13 pm
Location: Rockville, MD

Which to use: Client Security or Vista BitLocker?

#1 Post by jgrobertson » Sun Jun 01, 2008 9:38 pm

On a T60P with Vista 64.

Anyone have experience or inside knowledge about which is better for HD encryption, the Lenovo/IBM Client Security or the Vista BitLocker?

What about the fingerprint reader. Can that be used with BitLocker or does it need Client Security?
jgrobertson

SHoTTa35
ThinkPadder
ThinkPadder
Posts: 1597
Joined: Tue May 29, 2007 6:20 pm
Location: Wash, DC
Contact:

#2 Post by SHoTTa35 » Sun Jun 01, 2008 10:28 pm

i don't think CSS does disk encryption unless i just missed that. The usual comparison is usually between BDE (Bulk Disk Encryption) Drives or BitLocker. If you have the support then people say BitLocker works as it should. The TPM does it's job and it's always in the machine, so it almost foolproof.

It would be sweet if you could use your fingerprint as the key instead of a cryptographic key that you gotta backup. Maybe they are working on that.
Current - Thinkpad T410si - Core i3 330m, 4GB, 250GB 5400RPM, WXGA+, FPR, BT, Camera, DVDRW, Gobi2000, Win7 Pro x32
Past - Thinkpad T410 - T400 - T61 - T60 - T43 - T42 - T41 - T40 - T23 - 600X

hellosailor
Senior Member
Senior Member
Posts: 647
Joined: Sat Jan 05, 2008 1:52 pm
Location: NY, NY

#3 Post by hellosailor » Mon Jun 02, 2008 12:14 pm

jg-
If you ordered your Thinkpad with the TPM chip and the fingerprint reader, my understanding is that this blocks drive access at the hardware level and even if someone physically has access to your hard drive, they cannot access it by a brute force (dictionary) attack.
But Bitlocker apparently CAN be defeated if someone actually has your drive, they can attack the password store and crack the password.

There was a bit of a fuss last month when it was disclosed that MS has been distributing a forensic package (from a third party vendor, formerly free now sold) to law enforcement agencies which is capable of cracking many encryptions, including Bitlocker.

"Using an external USB drive, the authors were able to identify and extract the key and mount a BitLocker-encrypted volume in about 25 minutes."
http://arstechnica.com/news.ars/post/20 ... -hack.html

From what I can see, if you have both--use both. They work in different ways and the combination should add security.

jgrobertson
Sophomore Member
Posts: 230
Joined: Thu Oct 21, 2004 2:13 pm
Location: Rockville, MD

#4 Post by jgrobertson » Mon Jun 02, 2008 6:59 pm

I am a bit confused now. I thought CSS did a full HD encryption. If so, is the key stored in the TPM chip? I am at the Techno Security conference and I asked a vendor who claimed to be able to crack ALL passwords if they could get into the TPM and they said no.
jgrobertson

hellosailor
Senior Member
Senior Member
Posts: 647
Joined: Sat Jan 05, 2008 1:52 pm
Location: NY, NY

#5 Post by hellosailor » Mon Jun 02, 2008 8:36 pm

I'm not sure, jg. I'm first digging into what the chip will or won't do, but so far I'm hearing that it is more secure than Bitlocker.

http://www.scmagazineus.com/Hard-encryp ... le/107192/

The answer seems to be both yes and no, depending on who you ask and how they qualify using the tpm chip.

SHoTTa35
ThinkPadder
ThinkPadder
Posts: 1597
Joined: Tue May 29, 2007 6:20 pm
Location: Wash, DC
Contact:

#6 Post by SHoTTa35 » Mon Jun 02, 2008 9:56 pm

i thought BitLocker used the TPM to do it's job. Not just some software encryption? Unless it has both in some form where if you are using Ultimate and your machines doesn't have a TPM it just does it using software but with the TPM it just interfaces with it to get the job done?
Current - Thinkpad T410si - Core i3 330m, 4GB, 250GB 5400RPM, WXGA+, FPR, BT, Camera, DVDRW, Gobi2000, Win7 Pro x32
Past - Thinkpad T410 - T400 - T61 - T60 - T43 - T42 - T41 - T40 - T23 - 600X

hellosailor
Senior Member
Senior Member
Posts: 647
Joined: Sat Jan 05, 2008 1:52 pm
Location: NY, NY

#7 Post by hellosailor » Mon Jun 02, 2008 10:45 pm

AFAIK Bitlocker does not use the TPM but uses software encryption and keeps the keys on the new partition it creates, making them susceptible to brute force attacks.

I've been trying to get a few hours to sit down and come up to speed on all this, but SOMEthing always gets in the way.

SHoTTa35
ThinkPadder
ThinkPadder
Posts: 1597
Joined: Tue May 29, 2007 6:20 pm
Location: Wash, DC
Contact:

#8 Post by SHoTTa35 » Tue Jun 03, 2008 12:37 pm

Here's how it works. Bitlocker is a hardware-backed encryption feature that protects an entire hard drive from being hacked. It integrates with a TPM 1.2 chip and leverages an 128-bit or 256-bit AES encryption algorithm. (You can optionally use Bitlocker on non-TPM systems as well, but in such a case you must supply a USB memory key or an alphanumeric password in order to access the system.) Bitlocker interacts with TPM-enabled systems and is thus secure even during the boot-up process when used in conjunction with TPM. (On non-TPM systems, Bitlocker cannot guarantee boot file integrity.)
http://www.winsupersite.com/showcase/wi ... locker.asp

So that's weird you say it stores it on the same partition. As far as i remember the above is correct. If you don't have a TPM you store you key on a USB drive or something. Did that get changed recently or did i miss something?
Current - Thinkpad T410si - Core i3 330m, 4GB, 250GB 5400RPM, WXGA+, FPR, BT, Camera, DVDRW, Gobi2000, Win7 Pro x32
Past - Thinkpad T410 - T400 - T61 - T60 - T43 - T42 - T41 - T40 - T23 - 600X

crashnburn
ThinkPadder
ThinkPadder
Posts: 1643
Joined: Sat Apr 22, 2006 4:26 pm
Location: TX, USA & Bombay, India

#9 Post by crashnburn » Tue Jun 03, 2008 7:00 pm

I know someone who disabled TP Disk encryption and it takes them LOADS of time to just bootup.
T61 8892-02U: 14.1"SXGA+/2.2C2D/4G/XP|Adv Mini Dock|30" Gateway XHD3000 WQXGA via Dual-link DVI
X61T 7767-96U: 12.1"SXGA+/1.6C2D/3G/Vista|Ultrabase
W510 4319-2PU: 15.6"FHD/i7-720QM/4G/Win7Pro64 (for dad)
T43 1875-DLU: 14.1"XGA/1.7PM-740/1G/XP (Old)

jgrobertson
Sophomore Member
Posts: 230
Joined: Thu Oct 21, 2004 2:13 pm
Location: Rockville, MD

#10 Post by jgrobertson » Wed Jun 04, 2008 7:11 am

A lot of inconsistent information here. The quote in the second message above is from a 2006 article. So I am still not clear. Again the original question was about the comparison between CSS and BitLocker. Does CSS also encrypt the HD with the key in the TPM?
jgrobertson

jgrobertson
Sophomore Member
Posts: 230
Joined: Thu Oct 21, 2004 2:13 pm
Location: Rockville, MD

#11 Post by jgrobertson » Wed Jun 04, 2008 7:16 am

Another question comes up about the reported situation where the US Government found that Lenovo had designed a back door into Thinkpads such that when the blue Thinkpad (ThinkVantage) button is pushed, communication is established with a server in China and data is uploaded. This was treated as espionage and the Government reportedly no longer used Lenovo.

It all of this is true, then I presume that the encryption from Lenovo, CSS would also be unsafe and that the encrypted data would be available to the Chinese Government.

Any information on this?
jgrobertson

Dead1nside
Senior Member
Senior Member
Posts: 780
Joined: Mon Jul 24, 2006 8:32 pm
Location: Reading, UK
Contact:

#12 Post by Dead1nside » Wed Jun 04, 2008 10:47 am

Wow that's paranoid jgrobertson. I didn't think they actually found any evidence of espionage such as this. If you want to keep your information secure just use TrueCrypt or an encrypted file system on Linux.
T41p 2373-GHG / 1.5Ghz 'Banias' / NMB Keyboard
T61 14.1'' 7661-CTO / Vista Business / WXGA / T7300 / 2GB RAM / 80GB HDD / X3100 / 3945ABG / NMB KB /
T400 14.1'' 2768-CTO / Vista Business / WXGA / P8400 / 4GB RAM / 200GB 7200RPM / HD 3470 / 5300AGN / WWAN / NMB KB

hellosailor
Senior Member
Senior Member
Posts: 647
Joined: Sat Jan 05, 2008 1:52 pm
Location: NY, NY

#13 Post by hellosailor » Wed Jun 04, 2008 2:02 pm

I'm learning more every time I get a chance to wade through more hits on Bitlocker. Apparently, IF your system has a TPM v.1.2 then Bitlocker will work with it--if you set it up to do so. And if you do, then Bitlocker is supposedly invulnerable. (If you don't, you need an external USB stick or something else to use as a "key" to access the machine.)

On the other hand, Windows system updates CANNOT be installed routinely, you must disable/decrypt the system before installing them. That sounds like a great way to "oopsie" and trash the system for most users, I'd want to stick a post-it nore on my screen reminding me to disable updates and disable MS's clever way of contiunually RE-enabling them with each new SP.<G>


jg, you can' t be too paranoid in this day and age but rumours and 'reports' that don't cite a primary source and don't cite anything you can look and and confirm or refute, are just internet fearmongering. Terrorism under another name.


Lenovo's Client Security Solution? More research to do! But after seeing how easily mainstream drivers, AV software, updates and the like can hose a Vista system, I'm frankly AFRAID of anything that might make recovery harder. [censored] if you do, [censored] if you don't. SNAFU.

khaverblad
Freshman Member
Posts: 106
Joined: Fri Feb 18, 2005 3:46 pm
Location: Malmoe, Sweden
Contact:

#14 Post by khaverblad » Sun Dec 14, 2008 6:42 pm

jgrobertson wrote:I am a bit confused now. I thought CSS did a full HD encryption. If so, is the key stored in the TPM chip? I am at the Techno Security conference and I asked a vendor who claimed to be able to crack ALL passwords if they could get into the TPM and they said no.
No CSS does NOT by itself do full disk encryption; but it's an optional feature that you can provide by using SafeGuard Easy (among other). But, using SafeGuard Easy you will get support to use the fingerprint scanner to login.

TPM chip has a generator that generates random numbers. SafeGuard Easy uses this mechanism to generate session keys and random keys. The TPM chip is also used to bind a hard disk to one specific TPM. If the hard disk is stolen, it can no longer be used in any other computer, even if the password is known.
Kim Haverblad
Malmö, Skåne, Sweden
http://kim.haverblad.se

Post Reply
  • Similar Topics
    Replies
    Views
    Last post

Return to “ThinkPad T6x Series”

Who is online

Users browsing this forum: No registered users and 8 guests