<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: Crucial X10 Pro 20Gbps 4TB Portable SSD Review &#8211; An Affordable Media Professional Solution	</title>
	<atom:link href="https://www.thessdreview.com/hardware/portable-ssds/crucial-x10-pro-20gbps-4tb-portable-ssd-review-an-affordable-media-professional-solution/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.thessdreview.com/hardware/portable-ssds/crucial-x10-pro-20gbps-4tb-portable-ssd-review-an-affordable-media-professional-solution/</link>
	<description>The Worlds Dedicated SSD Education and Review Resource &#124;</description>
	<lastBuildDate>Tue, 10 Jun 2025 12:23:23 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>
		By: Les Tokar		</title>
		<link>https://www.thessdreview.com/hardware/portable-ssds/crucial-x10-pro-20gbps-4tb-portable-ssd-review-an-affordable-media-professional-solution/#comment-95908</link>

		<dc:creator><![CDATA[Les Tokar]]></dc:creator>
		<pubDate>Sun, 08 Jun 2025 11:18:01 +0000</pubDate>
		<guid isPermaLink="false">https://www.thessdreview.com/?p=109478#comment-95908</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://www.thessdreview.com/hardware/portable-ssds/crucial-x10-pro-20gbps-4tb-portable-ssd-review-an-affordable-media-professional-solution/#comment-95823&quot;&gt;James&lt;/a&gt;.

One of the most important considerations of self-encrypting drives is that they are hardware and not software based, providing little if any performance lost in the encryption process.  Does this mean that if I remove my SSD and place it in another PC it can&#039;t be read?  Absolutely not, however, when combined with programs such as BiLocker, SSDs comply with TCG Opal 2.0 and FIPS 140-2 standards and cannot be compromised. TCG Opal compliance also enables companies such as MacAfee, Symantec etc to take advantage of the encryption. An example of this is specific to the X10 which does not have AES 256-bit encryption like the X10 Pro. It is this encryption that allows Crucial to provide software for the extra password security of the X10 Pro.  Very very important consideration is that, if you lose the password, you will not gain access to the protected data.  Period. It is lost.]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://www.thessdreview.com/hardware/portable-ssds/crucial-x10-pro-20gbps-4tb-portable-ssd-review-an-affordable-media-professional-solution/#comment-95823">James</a>.</p>
<p>One of the most important considerations of self-encrypting drives is that they are hardware and not software based, providing little if any performance lost in the encryption process.  Does this mean that if I remove my SSD and place it in another PC it can&#8217;t be read?  Absolutely not, however, when combined with programs such as BiLocker, SSDs comply with TCG Opal 2.0 and FIPS 140-2 standards and cannot be compromised. TCG Opal compliance also enables companies such as MacAfee, Symantec etc to take advantage of the encryption. An example of this is specific to the X10 which does not have AES 256-bit encryption like the X10 Pro. It is this encryption that allows Crucial to provide software for the extra password security of the X10 Pro.  Very very important consideration is that, if you lose the password, you will not gain access to the protected data.  Period. It is lost.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: James		</title>
		<link>https://www.thessdreview.com/hardware/portable-ssds/crucial-x10-pro-20gbps-4tb-portable-ssd-review-an-affordable-media-professional-solution/#comment-95823</link>

		<dc:creator><![CDATA[James]]></dc:creator>
		<pubDate>Sat, 07 Jun 2025 13:11:24 +0000</pubDate>
		<guid isPermaLink="false">https://www.thessdreview.com/?p=109478#comment-95823</guid>

					<description><![CDATA[Just a quick question:  Without enforcing that a password be set on the drive, does the automatic encryption at rest actually do anything for security?  Or is it just a marketing checkpoint?

If plugging in/powering on  the drive automatically enables encrypt/decrypt silently in the background, the data is not in any way protected that I can see.  

I like the idea of encryption at rest, but if it&#039;s security theater, then it is the same as any other drive.

To be clear, this isn&#039;t specific to this drive, just the call out in the article made me wonder more about its usefulness.]]></description>
			<content:encoded><![CDATA[<p>Just a quick question:  Without enforcing that a password be set on the drive, does the automatic encryption at rest actually do anything for security?  Or is it just a marketing checkpoint?</p>
<p>If plugging in/powering on  the drive automatically enables encrypt/decrypt silently in the background, the data is not in any way protected that I can see.  </p>
<p>I like the idea of encryption at rest, but if it&#8217;s security theater, then it is the same as any other drive.</p>
<p>To be clear, this isn&#8217;t specific to this drive, just the call out in the article made me wonder more about its usefulness.</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
