[ale] Encrypted filesystem on netbook

George Allen glallen01 at gmail.com
Wed Nov 25 07:26:15 EST 2009


>> Jim Kinney wrote:
>> The bit I don't have is how to set up the USB so a brute force attempt
>> will cause a secure wipe.

I missed the previous parts of this thread, but this is exactly what
IRONKEY usb drives are setup to do in hardware:
http://www.ironkey.com/

After a certain number of failed PIN attempts, the drive erases the
private keys, erases the data, and then tells the FGPGA containing the
keys and encryption side to wipe itself basically. So it's a hardware
self-destruct. They embed the whole think in metal and epoxy, and
supposedly the self-destruct can be triggered by either failed PIN
attempts - or physical tampering attempts - so that you can't even get
the data with a j-tag.


More information about the Ale mailing list