[ale] Encrypted filesystem on netbook

Jim Kinney jim.kinney at gmail.com
Wed Nov 25 10:00:22 EST 2009


Ironkey is my hardware ideal. I'm looking at a way to replicate that
functionality so it can work with COTS usb drives.

On Wed, Nov 25, 2009 at 7:26 AM, George Allen <glallen01 at gmail.com> wrote:

> >> Jim Kinney wrote:
> >> The bit I don't have is how to set up the USB so a brute force attempt
> >> will cause a secure wipe.
>
> I missed the previous parts of this thread, but this is exactly what
> IRONKEY usb drives are setup to do in hardware:
> http://www.ironkey.com/
>
> After a certain number of failed PIN attempts, the drive erases the
> private keys, erases the data, and then tells the FGPGA containing the
> keys and encryption side to wipe itself basically. So it's a hardware
> self-destruct. They embed the whole think in metal and epoxy, and
> supposedly the self-destruct can be triggered by either failed PIN
> attempts - or physical tampering attempts - so that you can't even get
> the data with a j-tag.
> _______________________________________________
> Ale mailing list
> Ale at ale.org
> http://mail.ale.org/mailman/listinfo/ale
> See JOBS, ANNOUNCE and SCHOOLS lists at
> http://mail.ale.org/mailman/listinfo
>



-- 
-- 
James P. Kinney III
Actively in pursuit of Life, Liberty and Happiness
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mail.ale.org/pipermail/ale/attachments/20091125/cc9fb1de/attachment.html 


More information about the Ale mailing list