![]() |
I just had a weird thought - how do people who are concerned about security at such an extreme level account for the case where they are hit by the proverbial truck?
Does someone else have a copy of the key? How secure is it? Hidden under a stone in the fence by the big tree? In a safe deposit box? None of these are any more secure than the 256-bit key is. I guess a trusted friend could keep an encrypted copy of the key on his/her computer - but how is it protected? Strange game. The only winning strategy is to not play. |
I like to have my private data secured, but not sure self-destruct storage is the way to go. I use the simple but controversial (in corporate world) Microsoft Private Folder 1.0. Works OK.
|
Bigger Concerns
If perchance
I just had a weird thought - how do people who are concerned about security at such an extreme level account for the case where they are hit by the proverbial truck? Snicker, SC |
Originally Posted by birdstrike
(Post 8508085)
That is true for today, but it is statistical security. The key might be broken on the first try. The key to security is to make it cost more to get the goods than the goods are worth.
AES and its ilk have been extensively analysed by the best cryptographers in the world. Nobody (assuming they really want your data) is going to attempt to break your encryption by brute force; they will extract your password from you by fair means or fowl and in those circumstances your 10 attempt limit is irrelevant. |
Originally Posted by pteron
(Post 8512814)
...they will extract your password from you by fair means...
Originally Posted by pteron
(Post 8512814)
.... or fowl and in those circumstances your 10 attempt limit is irrelevant.
|
The device is marketed as allowing you to use untrusted machines, but it seems to me that it has significant limitations on them:
(1) You still have to enter your IronKey password in the clear. Allows for keyloggers to get your password, with which they have full access to your data. (2) Once the device is plugged in and decrypted, the machine will have full access to your data - it can just make a copy of it. (3) [for all machines] Is the backup to IronKey's computers optional or mandatory? How is the data secured in transit? Is it just HTTPS? (4) [regarding the device] Has anyone independent verified the security of the device? Is the code open source? |
10 attempts, 10 fingers. Ohhh I can think of ways to get the password.
|
Originally Posted by Doppy
(Post 9076679)
The device is marketed as allowing you to use untrusted machines, but it seems to me that it has significant limitations on them:
(1) You still have to enter your IronKey password in the clear. Allows for keyloggers to get your password, with which they have full access to your data.
Originally Posted by Doppy
(Post 9076679)
(2) Once the device is plugged in and decrypted, the machine will have full access to your data - it can just make a copy of it.
The password manager enters passwords directly into web pages, bypassing keystroke loggers. As far as I can tell, if you store an unencrypted document on the IronKey, plug it into a compromised machine, and unlock the drive, malware could indeed copy the file somewhere else. In any event, owning an IronKey does not absolve the user from practicing safe computing. It just makes it easier.
Originally Posted by Doppy
(Post 9076679)
(3) [for all machines] Is the backup to IronKey's computers optional or mandatory? How is the data secured in transit? Is it just HTTPS?
Personally, I'm annoyed that the only way to backup passwords is to use the "quick backup" option which -does- use the Ironkey server. They are fixing that, but still. :mad:
Originally Posted by Doppy
(Post 9076679)
(4) [regarding the device] Has anyone independent verified the security of the device? Is the code open source?
https://learn.ironkey.com/faqs/ I'm quite pleased with mine. It has already logged quite a few miles with me. I can't see traveling without it. |
Reminds me of a modern day Da Vinci cylinder.
|
Originally Posted by birdstrike
(Post 9076979)
You need the IronKey and the password to get access to the data on the drive. If a typical keylogger gets the password, it will have no idea what to do with it. Stored passwords are also a special case.
Personally, I'm annoyed that the only way to backup passwords is to use the "quick backup" option which -does- use the Ironkey server. They are fixing that, but still. :mad: Have you tried the included Tor application? How well does that work? |
Originally Posted by Doppy
(Post 9079883)
Not if it both captures your keystrokes and copies the data off the device.
If is a data copying malware thing, then you have already unlocked the device by entering the password yourself. Edit to say, the IronKey password is not part of the decryption process, so if you mean you could copy the encrypted data off the device, then use the keylogged password to read it later, that would not work. The password is only used to verify that you can access the real decryption key which is stored off the filesystem.
Originally Posted by Doppy
(Post 9079883)
So you can't just make a copy to your computer? That seems like a major negative. When is that going to be fixed?
There is supposed to be a new software release this month and that is on the enhancement list. We don't yet know what will actually be addressed in the next release.
Originally Posted by Doppy
(Post 9079883)
Have you tried the included Tor application? How well does that work?
Since the major search engines base some of their results on your location, Tor can generate some interesting results. |
I'm heavily leaning towards one of these, but I was a bit miffed when I found out that they chose to go with AES 128 instead of 256.
AES 128 is only certified by the NSA for SECRET, whereas I consider my FlyerTalk password to be TOP SECRET. :( (Of course, since FT doesn't provide a secure login, this may be moot.) While brute forcing AES 256 would require more energy than is available in the universe, brute forcing AES 128 would not. :( |
Originally Posted by coxta
(Post 9077277)
Reminds me of a modern day Da Vinci cylinder.
It sits on the mantlepiece. If it goes missing I will change all the passwords. If I travel it goes into my bank's vault. It's a pretty nifty device. It can of course be cut open, but this would be kind of noticeable since I physically see it every day. It can't be easily opened without the password for it - the combination has many false notches to prevent any attempt to just feel where the notches are. Audrey |
Duplicate, sorry!
|
that's cool. could be usefull to put copies of all your passport, DL, visa's, cc's, etc on it and take it when traveling.
|
| All times are GMT -6. The time now is 8:49 pm. |
This site is owned, operated, and maintained by MH Sub I, LLC dba Internet Brands. Copyright © 2026 MH Sub I, LLC dba Internet Brands. All rights reserved. Designated trademarks are the property of their respective owners.