![]() |
Self destructing USB drive.
Not sure it's useful to me, but I think it's cool. :)
Passwords can be hacked, but not the IronKey. It's built to withstand attacks both virtual and physical. 10 incorrect password attempts, and the encryption chip self-destructs, making the contents of the flash drive totally unreadable. The contents of the drive are filled with epoxy, so if a hacker tries to physically access the chips, he'd more likely damage them instead. Even if he did get access to the memory chips, they'd be worthless without the encryption chip. Electron-shielded, even a scanning electron microscope can't get inside. |
That's pretty cool.
I don't have any state secrets worthy of such high tech security though. :) |
Even better, use Write Only Memory (WOM).
http://en.wikipedia.org/wiki/Write_Only_Memory Then you never have to worry about somebody getting your data. :D |
Originally Posted by Bobster
(Post 8399101)
Even better, use Write Only Memory (WOM).
http://en.wikipedia.org/wiki/Write_Only_Memory Then you never have to worry about somebody getting your data. :D |
Jack Bauer had a self destructing one. He "programmed" it to burn itself up if used in any other PDA than his.
I don't think the TSA would allow any USB drives with detonators through security. Or maybe since it isn't a liquid, it is OK. |
Corsair also do a "Padlocked" pendrive at http://www.corsair.com/products/padlock.aspx
Its a case of entering the PIN in before using it .... *Good Morning Mr Phelps....Your mission, should you decide to accept it....... .... this pendrive will self destruct in 5 seconds* :D |
So I bought a 4GB IronKey a couple of weeks ago. I really love this device.
Like most of us, I have dozens of accounts on-line, each with a unique ID/Password combination. Many of these accounts I access only rarely. Since I never write down passwords anywhere, and don't duplicate passwords, I often find myself in a lengthy password recovery process each time I need to access the account. I now have access to all my password protected accounts from a device that lives in my pocket. The IK comes with a password manager and a portable version of FireFox to allow portable sessions to be created from any system with a USB connection. Remove the IK and you remove your presence from that machine. Access to the IK is via a single user-settable password. Data on the IK is protected by AES 256 encryption (Son of DES). Enter the password incorrectly 10 times and the data on the drive is physically, albeit silently, destroyed. I know there are freeware programs like KeePass that can be loaded on conventional thumb drives, but they don't satisfy my sense of paranoia like the IK does. :D It's not perfect, by any means, and I don't have 4GB of data that I need to protect, but it really suits my needs. |
From painful experience, but not as painful as yours will be if .....
I now have access to all my password protected accounts from a device that lives in my pocket. (Speaking from experience, but not a fail ten times and it dies in front of your eyes painful experience. :eek: ) SC |
Originally Posted by ShaneCulver
(Post 8506064)
For your sake, back it up often.
(Speaking from experience, but not a fail ten times and it dies in front of your eyes painful experience. :eek: ) Even if it died and I had no backups I could use the site password recovery tools like I always have. |
I'm afraid I don't see the point - if the encryption is any good (e.g. truecrypt) then it doesn't matter if they get your USB disk. It is secure against any number of password attempts.
|
Chuck Norris already hacked it.
|
Originally Posted by pteron
(Post 8507471)
I'm afraid I don't see the point - if the encryption is any good (e.g. truecrypt) then it doesn't matter if they get your USB disk. It is secure against any number of password attempts.
If someone stole my laptop, and my laptop had an encrypted file with all my passwords. I would still feel compelled to go change all those passwords. The IK also has a password generator, so my individual account passwords are now secure as well. |
My firm handed out tens of thousands of devices like these - the Kingston DTE - about three years ago. Everything is encrypted and 10 failed attempts at the password re-formats the drive. We are required to use if for managing all client- and firm-related data. I don't know if it's physically secure (potted with epoxy), but the encryption should be as good on the bare chip as it is through the USB port.
I suppose throwing super-computer-class processing power at breaking the 256-bit AES hardware-based encryption is a possibility, but I'm not too worried |
Originally Posted by skofarrell
(Post 8507761)
Chuck Norris already hacked it.
|
This part doesn't seem very secure:
- If your Ironkey is lost, you can restore from a secure backup to a new Ironkey in minutes (because I bet the backup machine doesn't self-destruct if someone tries to hack into it... not to mention all the people that have legitimate access to it) |
| All times are GMT -6. The time now is 3:18 pm. |
This site is owned, operated, and maintained by MH Sub I, LLC dba Internet Brands. Copyright © 2026 MH Sub I, LLC dba Internet Brands. All rights reserved. Designated trademarks are the property of their respective owners.