I got my Corsair Flash Padlock yesterday and had some time to play with the beast a little. I didn't expect any silver-bullet type of thing and it provided exactly the features I expected. Remember Schneier's five-step risk analysis process (presented in Beyond Fear , and also described here , for example)? Second step is "What are the risks to the assets?". To determine whether the device would fit your purposes it is essential to understand who are you protecting your data against. You cannot expect any device without high-grade encryption (proven algorithm, strong password etc. - most of us know encryption is hard to implement properly) to provide any protection against determined attacker. Even with encryption, there are myriad of ways to attack the system - from shoulder-surfing to keyboard sniffers and " thermorectal cryptanalysis " ( in Russian ). But what about ordinary, non-corporate user? I'm sure in most cases people would worry about accidental disclosure of their private information rather than a determined (neighbor?) that will be able to disassemble the device and access data directly.
On the positive side authentication is performed in hardware and the device is platform independent and does not require installation of any software on the computer to use - meaning also no administrative rights are required for operation.
Обращаем внимание, что все материалы в этом блоге представляют личное мнение их авторов. Редакция SecurityLab.ru не несет ответственности за точность, полноту и достоверность опубликованных данных. Вся информация предоставлена «как есть» и может не соответствовать официальной позиции компании.
Хочешь поговорить с хакерами, профессорами и разработчиками не в чатике, а глаза в глаза?
Приезжай на Positive Hack Days Fest* 22–24 мая в Москве — здесь кибербез выходит в офлайн.
REPLY-TO-ALL is a double language blog (English/Russian) run by three information security practitioners. Want to discuss information security problems? This is the place.