It seems like the benefits are having the device lock/wipe itself after a set amount of attempts in case of a brute force attack and not having to run software to decrypt the drive on the device you plug it into.

I included a picture of the IronKey Keypad 200 but that’s just because it’s the first result that came up when I was looking for an example. There seem to be a few other manufacturers and models out there and they probably have different features.

I am curious what do you think of them? Do you think they are useful? Do you find it more a novelty?


It was an ExplainingComputers video titled Very Useful Small Computing Things that made me think of them.

    • Corroded@leminal.spaceOP
      link
      fedilink
      English
      arrow-up
      30
      arrow-down
      3
      ·
      edit-2
      4 months ago

      It seems like these drives can use up to 15 digit pins and lock out after a set number of attempts. I don’t know if that would be a huge issue

    • fidodo@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      ·
      4 months ago

      Just press the rest of the keys after you unlock it. Or use all the keys in the password. Or purposefully scuff them up.

  • solrize@lemmy.world
    link
    fedilink
    arrow-up
    51
    arrow-down
    1
    ·
    edit-2
    4 months ago

    Ironkey has been more careful than some other vendors but the concept still seems dubious to me, if you are trying to stop serious attackers. You want the decryption key to be completely separated from the storage.

    • Corroded@leminal.spaceOP
      link
      fedilink
      English
      arrow-up
      10
      arrow-down
      1
      ·
      edit-2
      4 months ago

      Ironkey has been more careful than some other vendors

      In what aspects? I don’t know much about these specific devices

      • solrize@lemmy.world
        link
        fedilink
        arrow-up
        11
        ·
        edit-2
        4 months ago

        Cryptography and tamper resistance implementation. E.g. search “ironkey fips certification”. Ironkey is a Kingston brand now though, and Kingston has traditionally been crap, so be careful. Anyway if it’s for run of the mill personal files where you just want some extra protection, the device is probably ok if you don’t mind the semi-ridiculous cost. This is interesting though: https://www.wired.com/story/unciphered-ironkey-password-cracking-bitcoin/

        Also a teardown report: https://hardwear.io/netherlands-2021/presentation/teardown-and-feasibility-study-of-IronKey.pdf

        There are more serious technical approaches to data protection, but fairly quickly the weak spot becomes the humans in the loop, which are harder to handle with pure technology.

        • 9point6@lemmy.world
          link
          fedilink
          arrow-up
          4
          ·
          4 months ago

          I was going to suggest an attack similar to what I’d assume the guys in your link achieved—the actual data on the flash chip can be dumped easily, so if you can figure out the encryption algorithm used, you don’t need a whole lot of computational power to brute force a 15 digit numeric key (a couple of high end GPUs would probably get you there in an hour or so) and decrypt the dumped data.

          • solrize@lemmy.world
            link
            fedilink
            arrow-up
            5
            ·
            4 months ago

            the actual data on the flash chip can be dumped easily

            I’d stop short of saying “easily” since you have to get the epoxy potting off of the chip. But you are right that there doesn’t seem to be any active tamper reactance. The numeric key is apparently 8 digits. Since it’s a 10 digit keypad, at least 2 of the digits are unused, and you might be able to recognize those from the comparative lack of fingerprints and wear on those specific keys. So that narrows down the search range some more.

    • Lojcs@lemm.ee
      link
      fedilink
      arrow-up
      3
      ·
      4 months ago

      Does this matter if it needs a password? Luks stores the key in storage too

      • solrize@lemmy.world
        link
        fedilink
        arrow-up
        6
        ·
        4 months ago

        If I understand Luks, the raw key is encrypted using the passphrase, so that is an ok scheme if the passphrase itself is too random to attack by brute force (unlike the 8 digit code that the Ironkey device uses). Look up “diceware” for a reasonable way to generate random phrases. Luks with this approach can be pretty good, though still potentially vulnerable to key loggers and other such attacks. Basically, put careful attention into what you are trying to protect against. High security commercial crypto (e.g. for banking) uses hardware modules in secure data centers, surrounded by 24/7 video surveillance. Check out the book “Security Engineering” by Ross Anderson if this sort of thing interests you. 1st and 2nd editions are on his website, use web search. Parts of the current 3rd edition are there too).

    • Corroded@leminal.spaceOP
      link
      fedilink
      English
      arrow-up
      14
      arrow-down
      1
      ·
      edit-2
      4 months ago

      Can you think of some notable examples of hardware based encryption failing?

      Besides the actual device dying I mean

    • kevincox@lemmy.ml
      link
      fedilink
      arrow-up
      2
      ·
      4 months ago

      The downside with doing encryption in software is that you can’t limit attempts. If you are using a high-entropy key this is fine. But getting users to use high-entropy keys has problems. If there is an HSM integrated into the device you can limit the potential guesses before the key is wiped which is critical without high-entropy keys.

      A blog I follow recently had a good post about this: https://words.filippo.io/dispatches/secure-elements/

      Of course you are still better off with a high-entropy key and software. But if you trade off too much usability in the name of security you will likely find that your users/employees just work around the security.

        • kevincox@lemmy.ml
          link
          fedilink
          arrow-up
          3
          ·
          4 months ago

          That mitigates the problem but doesn’t solve it. If you want unlocking to be <1s and your adversary has 10k times the RAM and can take a month they can make 26 billion guesses. So unless your password is fairly high entropy it is at risk. Especially if they have more resources or more time. PINs are definitely out of the question, and simple passwords too.

  • csm10495@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    39
    ·
    4 months ago

    I had one of the SanDisk flash drives that had some launcher thing on it and I had a password for some reason on it.

    In high school, a classmate tried to guess it, 3 times and I lost everything on it forever, since it stupidly locked forever after 3 tries.

    I had software projects from back then that I can never get back… including a web browser. I could have had the next Firefox…

    If you’re out there, Liz: I’ll never forgive that.

  • makeasnek@lemmy.ml
    link
    fedilink
    English
    arrow-up
    27
    ·
    edit-2
    4 months ago

    Hardware signing devices have lots of utility because they keep the key from ever being on the machine (which is more likely to be compomised). Think ledger or trezor for your Bitcoin. Hardware encryption devices are just really expensive and black-box ways to avoid Veracrypt.

    If your encryption algorithm is secure, you have no use for automatic lock-out. If it’s not, automatic lockout won’t do much against an attacker with physical access to the device. Unless they are dumb enough to trigger the lockout AND the internal memory wipes itself sufficiently well AND/OR the attacker doesn’t have the resources to reverse engineer the device.

    • kevincox@lemmy.ml
      link
      fedilink
      arrow-up
      3
      ·
      4 months ago

      If your encryption algorithm is secure, you have no use for automatic lock-out.

      This isn’t true. You need your algorithm and your key to be secure. If the key needs to be remembered or entered often it probably can’t be secure. So brute force protection becomes very important.

      If it’s not, automatic lockout won’t do much against an attacker with physical access to the device.

      This isn’t true. Yes, with enough time and effort it is possible to extract any data from any device. But in practice physical HSMs do an excellent job at raising the cost of key extraction. I would much rather have an attacker steal my Yubikey than a USB with my GPG key lying on it.

    • Toribor@corndog.social
      link
      fedilink
      English
      arrow-up
      18
      ·
      4 months ago

      Like most things, it’s important to remember what threats you’re trying to protect yourself against.

      Are you trying to protect yourself against dropping a USB in a parking lot and someone picking it up? Or are you trying to protect yourself from a nation state?

      • potatopotato@sh.itjust.works
        link
        fedilink
        arrow-up
        9
        ·
        4 months ago

        Just my opinion but I don’t really like the common belief of separating nation and non nation state actors. We’re getting to the point where nation states are making up a large portion of the really damaging attacks, and it’s frequently ones own government or a government they’re in conflict with which means there are very kinetic consequences for failure even if you’re a nobody. It’s not just someone stealing some money anymore.

  • Imprint9816@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    18
    arrow-down
    1
    ·
    4 months ago

    Yeah i dont see how this would be better then a run of the mill thumb drive (that doesnt scream im worth stealing) and just creating a cryptomator vault on it.

      • Imprint9816@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        4
        ·
        edit-2
        4 months ago

        Its available on linux mac and windows so id say it’s pretty portable. You could even keep unencrypted installers on the same thumb drive in case internet access is an issue.

        • fidodo@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          4 months ago

          Available or built in? Because there are a lot of jobs and use cases where you need to transfer to systems you don’t have full control over.

          • Imprint9816@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            2
            ·
            edit-2
            4 months ago

            At that point you should probably use a cloud based solution anyway. Any decently secured system wouldn’t let you plug in a random usb drive anyway.

            I had assumed the use case was more for travel not for trying to access sensitive data on systems that you have limited access.

      • Pantherina@feddit.de
        link
        fedilink
        arrow-up
        4
        arrow-down
        1
        ·
        4 months ago

        No its not I think, at least Androids restricted af model doesnt allow that.

        Same with veracrypt

        • fidodo@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          4 months ago

          I view portability to be the main benefit of a hardware solution. I agree that software options will allow for better security, but imo a less secure hardware option is better than nothing if portability is a requirement.

  • alphafalcon@feddit.de
    link
    fedilink
    arrow-up
    17
    ·
    4 months ago

    They occupy a strange niche full of contradictions.

    Entering the code on the device itself should increase security as opposed to entering it on a compromised computer.

    But plugging it into a compromised computer means the data is compromised anyway.

    Their security is way harder to audit than a software solution like PGP. The actual “encryption” varies from actual decent setups to “entering the code connects the data pins with no actual encryption on the storage chip”

    Not having to instal/use software to use them means they are suitable for non-technical users which in turn means more support calls for “I forgot the pin, it wiped itself, can you restore my data”

    They are kind of useful to check the “data is transported on encrypted media” box for compliance reasons without having to manage something bigger.

  • NabeGewell@lemmy.world
    link
    fedilink
    English
    arrow-up
    16
    ·
    4 months ago

    I wouldn’t trust any part of its hardware and software to store anything worth encrypting on it

  • Gooey0210@sh.itjust.works
    link
    fedilink
    arrow-up
    15
    ·
    4 months ago

    Looks find to me, depending on your use case, everything would have a use case

    Many people mention airport red flags and checks, for me I never had any issues with the airport stuff, except one time in China when I had a full case of wires, really 10kg of wires, and they just asked me me to open and show, np

  • Count042@lemmy.ml
    link
    fedilink
    arrow-up
    12
    ·
    4 months ago

    I don’t trust hardware implementations of encryption in the same way I don’t trust hardware raid arrays.

  • Dyskolos@lemmy.zip
    link
    fedilink
    arrow-up
    10
    arrow-down
    1
    ·
    4 months ago

    Useful for what? Hiding stuff from family-member or coworkers? Yeah sure. Why not.

    Hiding stuff from professionals that really want your data? Probably not very helpful.

    Also what about backup? One controller-malfunction and your stuff goes poof. I just assume the data is somehow important or else you wouldn’t care about such a device 😊

    • Corroded@leminal.spaceOP
      link
      fedilink
      English
      arrow-up
      3
      ·
      4 months ago

      Those are some good points. The IronKey Keypad 200 says it has a self recharging battery but I wonder how long it would last sitting out of use as a backup or if plugging it in would always be enough.