@@jamesmendez1992 Technically, it's still secured, right; just can't access it. You do have a backup, right ? That's the issue with anything that is portable that can be stolen, lost, misplaced, fried electronically, etc.
If you haven't seen it yet, I'd highly recommend checking out the IODD line of drives, specifically the IODDMini. M.2 drive with the same encryption standard, but it also allows booting from the device as a USB DVD drive, virtual hard drive, or virtual floppy. Even works to direct boot VHD or VMDK files. They have a new one out also called the ST400 that works as a BYOD enclosure with encryption. Good stuff!
Hi Shannon, Really nice video. I love this idea and think it will become more widespread as time goes on. Unfortunately someone like me could never use it because the blind and vision impaired are never considered when manufacturers come up with ideas like this. Unless you can unlock it when you connect it to your computer with the keyboard there is no way we would be able to use it. You are spending so much on the device already, perhaps had they included a 3.5 mil jack for headphones then one could be guided by spoken prompts.
You can save money and have a faster transfer rate by purchasing something like the Samsung T7 2 TB, and with Win 11 Pro, you can create a Bitlocker encryption and if you use the WSL with Ubuntu, you can and LUKS. You would have two layers of encryption, with separate keys and still runs faster. I keep my VMs, etc. on such a device so, multiple layers of protection.
Why not just take any old SSD, put it in an enclosure and encrypt it with Versacrypt? As Versacrypt is supported by Windows, MAC-OS, ARM, Linux, and Raspberry Pi? It seems just as secure to me and at a fraction of the price.
I believe that one of the downsides is what if where you plug it in has a keylogger? And does versacrypt has a self destruct of data if you try to brute force it?
@@V1N_574 I don't believe a keylogger is an issue if it is your machine. If there is a keylogger on your machine, you would have a real issue with anything. As far as I know veracrypt does not have a self destruct or lock out function but it does have really good encryption. The only issue I thought of is I use Versacrypt on small chuncks of data usually a couple of gig. I am not sure how long it would take Versacrypt to unlock and lock a terabyte disk.
Can it be cracked open and the SSD then be added to a different case and the security be bypassed? Or is the drive then unusable after being disconnected from the case?
Mam I am from India,watching u on hack5 since 9th standard and hope I will get a job within 2years and buy something from ur store Appreciate it mam......
Great vid ma'am. Wow, at the price though. The IODD ST-400 I use is $80 then you just add your drive. Same level of encryption, and it offers a massive number of options to be used as a boot device.
Something like this is mostly ineffective at keeping secrets when used in many machines in a corporate environment. Plug in a USB drive, and it often gets scanned by multiple levels of malware scanners, uploaded to different servers for analysis, etc. Yes, you have to enter a code to unlock the device, but once it's unlocked, well... I work IT, and it's getting beyond ridiculous in some environments.. Something might be good for home or personal use; but I just use one of the samsung drives with the fingerprint reader. Far smaller and easier to carry with me when I need to.
A true hardware solution is going to work across multiple operating systems, it's not going to transmit the key to the operating system at any point, and if properly implemented, it's storing the key and performing all cryptographic operations within a purpose-built hardware security module, that means the key never leaves the chip, and the HSM provides resistance to brute force and physical tampering attempts by instantly destroying the key if such an attempt is detected. Disk encryption in software, or even a mix of hardware/software (such as Bitlocker), are all going to require OS support and will not be easily portable between different operating systems. This is also going to be weaker security for a few reasons - the disk can be imaged, allowing for unlimited decryption attempts, the operating system or bootloader can be compromised, leading to the attacker getting the key the next time the disk is unlocked, etc.
Besides helping against brute force attacks, I think the only advantage is you don't need to do anything on the device (mobile, linux, windows, etc) you're connecting to as it will appear like a standard drive once it's unlocked. I do wonder what's inside, mostly how hard would it be for an attacker to clone the storage to possibly ignore the self destruct.
@@StephanieDaugherty Gosh, this looks like something from NASA, I use Mac OS encryption and never touch a bloatware operating system called windows, in fact if you plug this drive or any drive in to Windows system you are already playing with yours chances and the encryption on the drive is basically useless. Now, for people that don't know how to work with computers, yeah, I guess that has some value and convenience, I will give you that, for me, I prefer to continue to format encrypt my external devices myself.
@@doodlebug1820 - Correctamundo! And you can have all of that _in your pocket_ for only $264! And I bet the guy who cracks hardware, crypto-wallets can still beat its security _in a matter of days._ Exploiting powering-on race-conditions with custom rewiring. As Pat Morita says, "If done right, no can defense. Bonzai!!!" 🥋😝
We've got your data secured whenever you're on the convention floor! 🔒🤝
What happens if the touch screen stops working?
@@jamesmendez1992 Technically, it's still secured, right; just can't access it. You do have a backup, right ? That's the issue with anything that is portable that can be stolen, lost, misplaced, fried electronically, etc.
@@MrPir84free That's correct but the question really is can the screen be replaced or will it brick because technically you tampered with it.
If you haven't seen it yet, I'd highly recommend checking out the IODD line of drives, specifically the IODDMini. M.2 drive with the same encryption standard, but it also allows booting from the device as a USB DVD drive, virtual hard drive, or virtual floppy. Even works to direct boot VHD or VMDK files. They have a new one out also called the ST400 that works as a BYOD enclosure with encryption. Good stuff!
Holy moly this looks pretty cool. Thanks for sharing!
Of course we want the technical details!
Hi Shannon,
Really nice video. I love this idea and think it will become more widespread as time goes on. Unfortunately someone like me could never use it because the blind and vision impaired are never considered when manufacturers come up with ideas like this. Unless you can unlock it when you connect it to your computer with the keyboard there is no way we would be able to use it. You are spending so much on the device already, perhaps had they included a 3.5 mil jack for headphones then one could be guided by spoken prompts.
it's not for everyone for sure but for me I like not having to install software on my PC to use it.
This would be awesome for chromebooks - or running portableapps on friends and family computers when travelling
Thanks for sharing; very informative. Blessings on your day 👍🏻
You can save money and have a faster transfer rate by purchasing something like the Samsung T7 2 TB, and with Win 11 Pro, you can create a Bitlocker encryption and if you use the WSL with Ubuntu, you can and LUKS. You would have two layers of encryption, with separate keys and still runs faster. I keep my VMs, etc. on such a device so, multiple layers of protection.
Shannon interesting piece of kit thanks for the info 👍👍
Why not just take any old SSD, put it in an enclosure and encrypt it with Versacrypt? As Versacrypt is supported by Windows, MAC-OS, ARM, Linux, and Raspberry Pi? It seems just as secure to me and at a fraction of the price.
I believe that one of the downsides is what if where you plug it in has a keylogger? And does versacrypt has a self destruct of data if you try to brute force it?
@@V1N_574 I don't believe a keylogger is an issue if it is your machine. If there is a keylogger on your machine, you would have a real issue with anything. As far as I know veracrypt does not have a self destruct or lock out function but it does have really good encryption. The only issue I thought of is I use Versacrypt on small chuncks of data usually a couple of gig. I am not sure how long it would take Versacrypt to unlock and lock a terabyte disk.
@@V1N_574 You remember the USB devices with Keylogger coming from the factory? Encryption on devices is no replacement for supply chain security.
Can it be cracked open and the SSD then be added to a different case and the security be bypassed? Or is the drive then unusable after being disconnected from the case?
It would be encrypted, but if you have physical access.... all bets are off ;-)
Nice to see its OS agnostic. Thanks Shannon!
How does it "destroy the data"? Does it use a DOD overwrite standard for example?
Mam I am from India,watching u on hack5 since 9th standard and hope I will get a job within 2years and buy something from ur store
Appreciate it mam......
Thank you. I’ve been using Lexar fingerprint USB flash drives. Although the two 128 GB ones I bought last year the fingerprint sensors are flaky.
Nice review. Wish it came in a few other colors and had a larger capacity
wow amazing, insta bought after watching this
Great vid ma'am. Wow, at the price though. The IODD ST-400 I use is $80 then you just add your drive. Same level of encryption, and it offers a massive number of options to be used as a boot device.
Thanks this is helpful
Have you ever had any issues with the touchscreen not working properly?
Amazon suggest to buy it together with a yubikey… Is it possible to use the yubikey (nfc) instead of a password or in combination?
I just wonder about taking that drive out.
Nice 👍
Something like this is mostly ineffective at keeping secrets when used in many machines in a corporate environment. Plug in a USB drive, and it often gets scanned by multiple levels of malware scanners, uploaded to different servers for analysis, etc. Yes, you have to enter a code to unlock the device, but once it's unlocked, well... I work IT, and it's getting beyond ridiculous in some environments..
Something might be good for home or personal use; but I just use one of the samsung drives with the fingerprint reader. Far smaller and easier to carry with me when I need to.
I find it super annoying that modern technology has to put an led screen on everything
Would you be opposed to my calling you S'more Zero? 😂 Kinda like Sub-Zero, but S'more-Zero!
Whats wrong in doing just a normal encryption when you format any drive when you bought it ?
for one this will auto-wipe if you try to bruteforce it
A true hardware solution is going to work across multiple operating systems, it's not going to transmit the key to the operating system at any point, and if properly implemented, it's storing the key and performing all cryptographic operations within a purpose-built hardware security module, that means the key never leaves the chip, and the HSM provides resistance to brute force and physical tampering attempts by instantly destroying the key if such an attempt is detected.
Disk encryption in software, or even a mix of hardware/software (such as Bitlocker), are all going to require OS support and will not be easily portable between different operating systems. This is also going to be weaker security for a few reasons - the disk can be imaged, allowing for unlimited decryption attempts, the operating system or bootloader can be compromised, leading to the attacker getting the key the next time the disk is unlocked, etc.
Besides helping against brute force attacks, I think the only advantage is you don't need to do anything on the device (mobile, linux, windows, etc) you're connecting to as it will appear like a standard drive once it's unlocked. I do wonder what's inside, mostly how hard would it be for an attacker to clone the storage to possibly ignore the self destruct.
@@alyti well, I don't want that either, well thanks for the video, all my external disks are format encrypted and I never had problems.
@@StephanieDaugherty Gosh, this looks like something from NASA, I use Mac OS encryption and never touch a bloatware operating system called windows, in fact if you plug this drive or any drive in to Windows system you are already playing with yours chances and the encryption on the drive is basically useless. Now, for people that don't know how to work with computers, yeah, I guess that has some value and convenience, I will give you that, for me, I prefer to continue to format encrypt my external devices myself.
how far does the encryption is it just the case or does it go to the file level. I someone where able to pop it open and connect is it game over.
It should be at the disk level, where even the filesystem is encrypted.
Hmmmmmmm Interesting
Windows Built-In Bitlocker works on every USB Stick/Drive , SD Card... and does not show so obviously you have sth. to hide :)
there is no such thing .. anything computers can be hacked its just a fact of life
No. Can be done with software.
In the (Amazon) product description: "XTS-AES _256GB_ Encrypted"
Wow! That's _2,199,023,255,552-bit_ encryption! That _sounds_ very secure! 😏
btw- 1GB = 1024^3 bytes; 256*8*1024^3 = 2,199,023,255,552
@@doodlebug1820 - Correctamundo! And you can have all of that _in your pocket_ for only $264!
And I bet the guy who cracks hardware, crypto-wallets can still beat its security _in a matter of days._
Exploiting powering-on race-conditions with custom rewiring. As Pat Morita says, "If done right, no can defense. Bonzai!!!" 🥋😝