{"id":172,"date":"2010-06-06T10:04:17","date_gmt":"2010-06-06T10:04:17","guid":{"rendered":"http:\/\/timbrison.wordpress.com\/?p=172"},"modified":"2014-02-01T09:54:48","modified_gmt":"2014-02-01T09:54:48","slug":"usb-encryption-hideously-broken","status":"publish","type":"post","link":"https:\/\/www.uktech.co.uk\/blog\/2010\/06\/usb-encryption-hideously-broken\/","title":{"rendered":"USB Encryption Hideously Broken"},"content":{"rendered":"<p style=\"text-align: center;\"><a href=\"http:\/\/uktech.co.uk\/blog\/wp-content\/uploads\/2010\/06\/screenshot-169.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-173 pic aligncenter\" alt=\"screenshot.169\" src=\"http:\/\/uktech.co.uk\/blog\/wp-content\/uploads\/2010\/06\/screenshot-169.jpg\" width=\"293\" height=\"206\" \/><\/a><\/p>\n<p>Hardware encrypted USB sticks have been shown to be easily circumvented, <a href=\"http:\/\/www.h-online.com\/security\/news\/item\/NIST-certified-USB-Flash-drives-with-hardware-encryption-cracked-895308.html\" target=\"_blank\">I read recently<\/a>.<\/p>\n<blockquote><p><span style=\"font-style: italic; line-height: 1.5em;\">So, how safe is your data? Do you even care?<\/span><\/p><\/blockquote>\n<p><!--more--><\/p>\n<p>I find no surprise these days, in what sort of data people routinely carry around &#8211; on their person. While this may not seem particularly un-safe, it may be wise toi reflect on this: laptops are almost always stolen when they get <strong><em>moved<\/em><\/strong>. This is because people are not perfect &#8211; they forget and leave things unattended &#8211; all the time.<\/p>\n<p>You might think your USB key is extra safe, because it is &#8216;hardware&#8217; encrypted, which we all <em><strong>know <\/strong><\/em>is the best &#8211; but is it?<\/p>\n<blockquote><p>This article clearly demonstrates that security isn&#8217;t something you can buy &#8211; it is a state of mind.<\/p><\/blockquote>\n<p>All sorts of vendors make huge claims for the security of their products, but when it comes to encrypting data, these claims can be <em><strong>very <\/strong><\/em>difficult to verify. Much worse, these devices were given the &#8216;all clear&#8217; by certifying them as FIPS 140-2 compliant, which is a NIST security standard &#8211; any non security expert, is going to read this as some kind of guarantee.<\/p>\n<blockquote><p>So, what can you do?<\/p><\/blockquote>\n<p>Bruce Schneier (industry expert) wrote an essay on how to define the good from the bad, <a href=\"http:\/\/www.schneier.com\/crypto-gram-9902.html\" target=\"_blank\">but as you can see<\/a>, it&#8217;s not for the faint hearted!<\/p>\n<p>As for me, I put Mr. Schneider&#8217;s essay to the test and reviewed many of the available encryption packages. To this day I have yet to find a better solution than <a href=\"http:\/\/www.truecrypt.org\/\" target=\"_blank\">Truecrypt <\/a>&#8211; though I do not endorse any products &#8211; Truecrypt does appear to check all the boxes. (Within the corporate enterprise though, I would probably choose SafeBoot &#8211; Bitlocker is ok, but Safeboot is easier to manage in the enterprise.)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hardware encrypted USB sticks have been shown to be easily circumvented, I read recently. So, how safe is your data? Do you even care?<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,7],"tags":[85,86],"class_list":["post-172","post","type-post","status-publish","format-standard","hentry","category-encryption","category-security","tag-encryption","tag-security"],"_links":{"self":[{"href":"https:\/\/www.uktech.co.uk\/blog\/wp-json\/wp\/v2\/posts\/172","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uktech.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.uktech.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.uktech.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uktech.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=172"}],"version-history":[{"count":4,"href":"https:\/\/www.uktech.co.uk\/blog\/wp-json\/wp\/v2\/posts\/172\/revisions"}],"predecessor-version":[{"id":899,"href":"https:\/\/www.uktech.co.uk\/blog\/wp-json\/wp\/v2\/posts\/172\/revisions\/899"}],"wp:attachment":[{"href":"https:\/\/www.uktech.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=172"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.uktech.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=172"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.uktech.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=172"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}