![]() If you try to pry open an IronKey, it will destroy the media. ![]() A sticky epoxy inside a tough metal case ensures that. Also, the IronKey is physically protected, so trying to open up the drive to get at the flash memory is almost impossible without destroying the memory. With the IronKey, too many failed attempts turns the drive into slag, rather than just erasing the data. Unlike the IronKey secure drive, which the lab also uses, the actual drive of the BlackBox isn’t in any danger from incorrect password entering. So what’s the problem? Kingston isn’t saying how its drives can be hacked, but from what we found experimenting with ours, we can make an intelligent guess. The key drive continued to function normally, sans data. After the 11 th time an incorrect password was entered, all data on the drive was erased. This feature was tested during the review. The earliest models had this number set at 25 the one we tested dialed that down to 10. The revolutionary feature of the BlackBox was that it not only featured 256-bit, hardware-based Advanced Encryption Standard encryption and password protection, but could actually erase data if an incorrect password was entered too many times. The company today released a statement saying that a hacker “with the proper tools and physical access to the drives may be able to gain unauthorized access to data.” It turns out, however, that it’s not as secure as we thought. So when the Kingston DataTraveler BlackBox got a good review in the lab with its high security and good test results, we decided to make that the key drive we in the lab would use. One of the best things about working in the test lab for GCN is that we get to try all different types of technology, grade them and then pick the best ones to use ourselves (along with advising our readers).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |