* Disclaimer: As Windows XP and Windows 2003 do not provide any API for encryption of hibernation files, TrueCrypt has to modify undocumented components of Windows XP/2003 in order to allow users to encrypt hibernation files. Therefore, TrueCrypt cannot guarantee that Windows XP/2003 hibernation files will always be encrypted. In response to our public complaint regarding the missing API, Microsoft began providing a public API for encryption of hibernation files on Windows Vista and later versions of Windows (for more information, see the Version History, section TrueCrypt 5.1a). Since version 7.0, TrueCrypt has used this API and therefore has been able to safely encrypt hibernation files under Windows Vista and later versions of Windows. Therefore, if you use Windows XP/2003 and want the hibernation file to be safely encrypted, we strongly recommend that you upgrade to Windows Vista or later and to TrueCrypt 7.0 or later.The native encryption uses a secure algorithm, but the storage of that password can be dubious. I don't know of significant research in this side of things yet.
We could also debate about whether or not the wear leveling would leave plaintext in some nook or cranny. My answer is probably not -- since the WDE process is doing a sweep across the drive, it has to hit every sector. But of course, there are extra sectors for bad block replacement as well. We quickly get into the area where there's no possible definitive statement. However, if one is really paranoid, it should be obvious that it is better to encrypt the disk *before* you put sensitive data on it, because that will always be protected.This is what TC says as well (unlikely but the possibility exists), encrypt before any data that is sensitive is placed on the drive. But I do stand corrected on the reduces the life of the drive, once it's encrypted, it should be like any other drive in that way. I don't see TC saying anything that PGP now Symantec isn't, however I do have to question the tone of finality of the link/quote from symantec, and the gibberish that they work on some level that others don't. Most if not all FDE work below the FS layer, it's no secret Symantec :p
1) [MAIN QUESTION] Will enabling the SSD's encryption functionality (by enabling the BIOS hard drive password) have any effect on the performance of the SSD Drive that is already encrypted with TrueCrypt (Full Disk)?Bios password is bypassable by plugging HD into an adapter or another bios, or resetting the bios etc... FDE of the drive won't have anything to do with the bios. ATA(sata) passwords are also bypassable.
2) Would this be redundant to have both the SSD AES encryption enabled and TrueCrypt enabled? My understanding is that onboard SSD encryption (key storage method and location unknown) may not be as secure TrueCrypt.I think it would be redundant, but I don't believe the passwords are kept in plain-text, but you never know.
Bios password is bypassable by plugging HD into an adapter or another bios, or resetting the bios etc... FDE of the drive won't have anything to do with the bios. ATA(sata) passwords are also bypassable.
On the 840 Evo all data is encrypted. The block cipher key is stored on flash. When the ATA password gets enabled the SSD erases that key and stores an encrypted key that can only be decrypted with the ATA password. That is how it is supposed to work, at least.from: http://www.tomshardware.com/answers/id-1876643/setting-password-samsung-evo-840-bios.html
2. Encrypting data that is already encrypted seems very redundant and necessary. As for which is more secure, unknown... If you create the private key for both, then I would think they are going to be equivalent.
3. Anyone who tells you to do this without having a complete backup and the time to do a full restore if it doesn't also has a snow-cone shop for sale in Antarctica. You can encrypt things as many times as you want and theoretically it should work fine. Having not tried what you are proposing, I would just tell you to be cautious.
I would throw in some personal insight... Why in the world do you want to do such a thing anyway. Seems like a project that will cause more headache than solve. My $.02 YMMV