cryptsetup VS sedutil

Compare cryptsetup vs sedutil and see what are their differences.

InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
cryptsetup sedutil
55 28
- 589
- 1.7%
- 2.4
- 4 days ago
C++
- -
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

cryptsetup

Posts with mentions or reviews of cryptsetup. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-07-04.

sedutil

Posts with mentions or reviews of sedutil. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-04-12.
  • Can I change self-encrypting drive's firmware master key?
    1 project | /r/cybersecurity_help | 10 Dec 2023
    I'm afraid I can only set my level1 password, that's used to decrypt the actual level2 password stored somewhere on the drive. But I don't influence the level2 password, that's probably assigned by the manufacturer? Docs are ambigous on that.
  • Server backup with USB SED disks
    1 project | /r/DataHoarder | 7 Sep 2023
    I am trying to repurpose old laptop for backup of a server. Currently this is being done by PINE64 with 5x2.5' Seagate disks attached via usb. This backup runs once per week and stores latest ZFS snapshots using syncoid. The main server used Seagate EXOS x18 16TB SATA SED with active SED encryption (https://github.com/Drive-Trust-Alliance/sedutil ) and no ZFS encryption and the backup servers use ZFS encryption.
  • [FS] [US-OH] HGST HUC101212CSS600 1.2TB SAS 2.5" 10k RPM HDDs -- FREE SHIPPING!
    1 project | /r/homelabsales | 23 Jun 2023
    If you received encrypted drives, you'll also have to snag sedutil. The Github wiki page has good usage instructions (note the PSID revert page in particular). The package is also available in the AUR, so if you find yourself needing to live boot something just for this task Arch-based is pretty straightforward.
  • Self Encrypting Drives (SED) NVMEs as boot drives for linux
    2 projects | /r/homelab | 12 Apr 2023
    After more research I think everything I want is available in sedutil's Pre-Boot Authentication including unlocking multiple drives with the same password. I'm going to try it when all my parts arrive and hopefully report back findings and benchmarks in a month if anyone is interested.
  • Did eBay sell me a knock off Seagate Exos 16TB HDD?
    2 projects | /r/DataHoarder | 3 Mar 2023
  • Yoga Slim 7 Pro X Drive Password OPAL/SED compatibility
    1 project | /r/Lenovo | 18 Feb 2023
    Sedutil seems not to work on Ryzen 6000-Laptops as the Slim Pro X, as the keyboard is not detected due to the old kernel in the rescue image. Known Issue: https://github.com/Drive-Trust-Alliance/sedutil/issues/422
  • Using "sedutil" for SSD hardware-encryption on Windows non-operating-system SSD drives
    1 project | /r/crypto | 14 Feb 2023
  • Apple’s Mac security is so good, it’s sending used M1 MacBooks to the scrap heap
    2 projects | news.ycombinator.com | 27 Jan 2023
    The article is saying that people don't unlock their devices before recycling them.

    This could be true, but as I mentioned in another comment, as soon as it's removed from the original users iCloud account that lock will be removed.

    > how can you trust that the "erase everything" works?

    You can't remove it, but as long as nobody else can use the device to recover data then it's fine.

    FWIW it's actually pretty easy with SATA SSD's to set a device key, which then encrypts everything on the drive at full speed: https://github.com/Drive-Trust-Alliance/sedutil

    The drives are actually already doing this, it's just that the key is set to 0's.

    I can imagine that, given the drive is accessed via T2, that Apples NANDS are being accessed the same way, in which case scrambling the key is enough to make it unrecoverable permanently.

  • Samsung 980 Pro encryption vs KC3000 encryption
    1 project | /r/linuxquestions | 21 Dec 2022
    LUKS doesn't support the OPAL standard that these drives use, and the only utility I found that does is this one, and it seems like it only works with legacy BIOS. Even if you could use it, I'm not sure it's a good idea. If you CPU supports AES instructions there shouldn't be a performance difference and as far as encryption is concerned an opaque firmware blob on a flash controller is about the last thing I'd trust with keeping my data secure.
  • Selling SSD secured with LUKS question
    1 project | /r/linuxquestions | 7 Sep 2022

What are some alternatives?

When comparing cryptsetup and sedutil you can also consider the following projects:

LUKS2-docs

setblocksize - Fork of setblocksize

luks.go - Pure Golang library to manage LUKS partitions

hn-search - Hacker News Search

go-cryptsetup - Go bindings for libcryptsetup.

edgewalker - A DIY VPN setup script based on OpenBSD, OpenIKEd, Wireguard and Let's Encrypt

sbctl - :computer: :lock: :key: Secure Boot key manager

toolbox-images - deprecated

tang - Tang binding daemon

deadman - A usb-based dead man's switch

systemd - The systemd System and Service Manager

clevis - Automated Encryption Framework