Not only does the IronKey employ military-grade AES hardware-based encryption, but 10 failed attempts will result in the IronKey “self-destructing” internally.
Essentially, every byte will be overwritten in hardware, rendering data completely unrecoverable, even with forensic tools.
The IronKey it does not rely on “homegrown” cryptographic algorithms that might not have been subjected to rigorous analysis. To this end, the IronKey uses only tested and well-established algorithms. According to their Web site:
The encryption keys used to protect your data are generated in hardware by a FIPS 140-2 compliant True Random Number Generator on the IronKey Cryptochip. This ensures maximum protection via the encryption ciphers. The keys are generated in the Cryptochip when you initialize your IronKey, and they never leave the secure hardware to be placed in flash memory or on your computer.
The best part is, there are no vendor-accessible backdoors to be found in this product: “Backdoor found in Quicken.” Also, the innards of the device is filled with black goo, effectively water-proofing it as well as preventing hardware crypto-analysis.
If you are like me and are wondering if the flash drive will really self-destruct, the FAQ says the following:
IronKey’s patent-pending “flash-trash” methodology incorporates an exhaustive hardware erase of all flash and Cryptochip memory. This is not a simple clearing of file allocation tables, but a secure overwriting of data. This is done in hardware rather than via a software application for the ultimate protection. You, personally, should not be physically harmed when this happens.
No comments:
Post a Comment