this post was submitted on 21 Oct 2023
246 points (95.6% liked)

Technology

34920 readers
110 users here now

This is the official technology community of Lemmy.ml for all news related to creation and use of technology, and to facilitate civil, meaningful discussion around it.


Ask in DM before posting product reviews or ads. All such posts otherwise are subject to removal.


Rules:

1: All Lemmy rules apply

2: Do not post low effort posts

3: NEVER post naziped*gore stuff

4: Always post article URLs or their archived version URLs as sources, NOT screenshots. Help the blind users.

5: personal rants of Big Tech CEOs like Elon Musk are unwelcome (does not include posts about their companies affecting wide range of people)

6: no advertisement posts unless verified as legitimate and non-exploitative/non-consumerist

7: crypto related posts, unless essential, are disallowed

founded 5 years ago
MODERATORS
all 50 comments
sorted by: hot top controversial new old
[–] NocturnalMorning@lemmy.world 61 points 1 year ago (2 children)

Doesn't really seem like news to me, encryption makes communication slower, that's pretty standard.

[–] TWeaK@lemm.ee 12 points 1 year ago (2 children)

Sure, but 20-40% slower? That points to something being poorly optimised.

[–] SheeEttin@lemmy.world 3 points 1 year ago (1 children)

Yes, that's what happens when there's no hardware acceleration and it fails back to software.

[–] nybble41@programming.dev 1 points 1 year ago

They should still be using the CPU's built-in AES hardware acceleration, yes? It seems they have good reason not to trust the SSD to handle the encryption but that doesn't mean it has to be entirely implemented in software. CPU-accelerated AES shouldn't be that much slower.

load more comments (1 replies)
[–] flying_monkies@kbin.social 25 points 1 year ago (1 children)

It sounds like the article is an update to the age old performance issue discussions between hardware and software RAID solutions.

If you use a software solution for anything where there's a dedicated hardware solution, the software solution is always slower due to CPU overhead.

Article recommendation boils down to: If you're going to use encryption, and you want your full disk speed, use a hardware encryption solution. In their test their hardware supported OPAL.

[–] skullgiver@popplesburger.hilciferous.nl 7 points 1 year ago* (last edited 11 months ago) (1 children)

[This comment has been deleted by an automated system]

[–] flying_monkies@kbin.social 4 points 1 year ago* (last edited 1 year ago)

If you set up hardware encryption, be sure to change the master password and set the security level to maximum.

Be aware, this password is different than the Physical Secure ID (PSID) printed on the front of the disk. PSIDs are used when the release to reset command doesn't work, typically due to key issues, and the drive gets "locked".

You use the PSID to run a revert to factory defaults command, unlocking the drive. Since this triggers the drive to release its' key, the drive is considered "cryptographically erased" when you do this.

If you revert the drive, data on it is unrecoverable.

If you're going to revert a drive, I suggest using a QR Code reader to get the PSID off the drive. Some venders are sadists with the font they choose making it so much fun to figure out if it's a 1, l i I I O or 0...

[–] Granixo@feddit.cl 11 points 1 year ago (2 children)

More reason not to switch. 🙂👍

[–] mojo@lemm.ee 15 points 1 year ago (2 children)

This is not a reason to prevent switching, quite the opposite. Encryption is an awesome thing, and should always be used. It also inevitably causes slowdowns, but the best case is that it's practically nonexistent of a performance hit. Not a lot of Linux distros let you set up luks root encryption in the installer, and it's still pretty tricky to setup. But also if you're using Linux, you should always be using luks encryption if you can as well.

[–] skullgiver@popplesburger.hilciferous.nl 3 points 1 year ago* (last edited 11 months ago)

[This comment has been deleted by an automated system]

load more comments (1 replies)
[–] KairuByte@lemmy.dbzer0.com 6 points 1 year ago (1 children)

The… need to flip a switch?

[–] WaterWaiver@aussie.zone 4 points 1 year ago (1 children)

I think Granixo is referring to Windows 11, not disk encryption.

[–] KairuByte@lemmy.dbzer0.com 4 points 1 year ago

Yes, and saying that the need to flip “do the thing” to “don’t do the thing” is a reason to not upgrade to 11.

[–] Romkslrqusz@lemm.ee 10 points 1 year ago* (last edited 1 year ago) (1 children)

This article starts off with some inaccurate information right from the onset, so it leaves me with some credibility concerns that incline me to do some of my own testing.

Since Windows 10 1803, both Windows 10 and 11 Home and Pro have automatically enabled Bitlocker Encryption during the Out Of Box Experience (OOBE) as long as the following conditions are met:

  • The device is UEFI and Secure Boot enabled
  • The device has a TPM2.0 device that is enabled
  • There are no un-allowed Direct Memory Access (DMA) capable devices on a DMA capable bus.
  • The user signed in using a Microsoft Account and had an active internet connection at the time.

It is not specific to Windows 11 and has nothing to do with Home/Pro. This has been going on since 2018.

They also mention encryption built-in to SSDs. That is a fundamentally different kind of encryption. With Bitlocker, removing an SSD from a device or accessing it from anything but the original Windows environment will require the user to enter a 25-digit key to gain data access. Without Bitlocker, the on-disk encryption does not prevent data access in those scenarios. That encryption key exists primarily so that you can secure erase the disk by changing the encryption key. The alternative is a block-level erasure, which would put wear and tear on the SSD.

Pretty disappointing to see this coming from an otherwise reputable source like Tom’s Hardware.

[–] tias@discuss.tchncs.de 4 points 1 year ago* (last edited 1 year ago)

You're off with your claims about built-in encryption. While there are drives that do what you describe, there are also drives that require a key to be provided to the drive for unlocking it. There's an entire specification for how the authentication to the hard drive is made at boot or when mounting it.

[–] redw0rm@kerala.party 8 points 1 year ago (1 children)

First thing i do is disable bitlocker. Its PITA when dualbooting too

[–] TWeaK@lemm.ee 6 points 1 year ago (2 children)

With such a severe slowdown, does that also mean it's going to be increasing usage of the drive and therefore shorten its lifespan?

[–] AProfessional@lemmy.world 11 points 1 year ago (2 children)

No, it’s limited by CPU time. The drive neither knows or cares about encryption.

[–] SheeEttin@lemmy.world 6 points 1 year ago* (last edited 1 year ago)

Some drives do, but it doesn't affect lifespan either way. Writing 10GB of encrypted data is the same as 10GB unencrypted.

[–] TWeaK@lemm.ee 2 points 1 year ago

Yeah, I was thinking maybe the data would be written out of order or something, but that wouldn't be the case. The data will be garbled by the encryption, but still written sequentially, or however the internal drive controller decides is best.

[–] blindsight@beehaw.org 5 points 1 year ago

Isn't it CPU overhead for the encryption? It needs to encrypt like 3-400 MB/s, so it seems pretty reasonable that it's a lot slower. The drive's lifespan shouldn't be affected for any reason I can think of.

[–] autotldr@lemmings.world 3 points 1 year ago

This is the best summary I could come up with:


While many SSDs come with hardware-based encryption, which does all the processing directly on the drive, Windows 11 Pro force-enables the software version of BitLocker during installation, without providing a clear way to opt out.

While we have results for higher queue depths, note that the QD1 numbers are far more meaningful in the real world, as this is the most common type of file access in typical operating system environments... and that's where software BitLocker impacted performance the most.

Lower latency delivers snappier performance in day-to-day use, and it's the primary reason the industry at large has moved from slow rotating hard drives to faster SSDs.

Given that this extra layer of latency, albeit at varying degrees, will also be added to slower types of SSDs, like QLC or low-tier drives, this could have a much bigger real-world impact in some systems.

Windows 11 disk caching might be a factor there, but QD256 is basically fantasy land for storage workloads (remember, low queue depths are the most common), so we don't put too much weight on it.

There's a curious "bump" with the 990 Pro that we've noted before on the read speeds, but write performance shows a smoother line with the software BitLocker trailing up until the 256KiB block size.


The original article contains 2,491 words, the summary contains 212 words. Saved 91%. I'm a bot and I'm open source!