It's a pretty nice, but it's good thing that stuff on it is backed up, cause like johnny said it would suck if you had someone that dislikes you and wipes it. I had a phone like that, if you put on a code and you got it wrong 10 times it wipes all the contacts, notes, music, pictures, everything. It was annoying because one of my friends wiped everything in the phone one time, it took me a week trying to get all the contacts back
It's a pretty nice, but it's good thing that stuff on it is backed up, cause like johnny said it would suck if you had someone that dislikes you and wipes it. I had a phone like that, if you put on a code and you got it wrong 10 times it wipes all the contacts, notes, music, pictures, everything. It was annoying because one of my friends wiped everything in the phone one time, it took me a week trying to get all the contacts back
Yeah, you will often find policies on phones like that if you are using Exchange ActiveSync, you can set the phone to completely wipe out after so many failed attempts.
Luckily people irl don't hate me as much as on Skial. :P
Would've been MUCH cheaper if you had bought a regular HDD and then encrypted it using TrueCrypt which is extremely powerful open-source encryption software.
But nice device though.
I carry a lot of sensitive client information when I'm out in the field, and my old vanilla Aegis external drive finally quit after 6 years of admirable service (even had this thing in the military, it lasted me through two deployments).
So, since I carry all this data around that would get me fired if I ever lost it, and I needed a new drive anyway, enter the Aegis Padlock:
If it gets wiped I wouldn't mind because, as I said, we have this data backed up. I've just always worried about losing my stuff (like, physically losing the drive and someone just being able to pick it up and get in it) or having it stolen. I would go full retard if that happened.
I'm confused..if you have it backed up why would you be worried if you we're to get fired..just get a regular one and not worry or spend the extra money for one that would be tempting to try to crack by some retard who goes "duh..i can crack this thing"
Clearly the problem is from someone trying to take the propriety info from the drive and not from losing the drive itself.
That is where the "loss" comes in.
Fail troll is fail.
Would've been MUCH cheaper if you had bought a regular HDD and then encrypted it using TrueCrypt which is extremely powerful open-source encryption software.
But nice device though.
Of course I do have sources. I'm a licensed PI and prior to using TrueCrypt on my personal HDD I made sure that it's compliant with government standards.
I think that the fact that AES (the US government’s Advanced Encryption Standard) is one of the standards that is being used in TrueCrypt should be enough and I won't have to talk about all other standards TrueCrypt is compliant with and certified for such as FIPS 197, FIPS 198, FIPS 180-2. If you want to know more about FIPS standard, please visit NIST knowledgebase.
The Advanced Encryption Standard (AES) specifies a FIPS-approved cryptographic algorithm (Rijndael, designed by Joan Daemen and Vincent Rijmen, published in 1998) that may be used by US federal departments and agencies to cryptographically protect sensitive information. TrueCrypt uses AES with 14 rounds and a 256-bit key (i.e., AES-256, published in 2001) operating in XTS mode.
In June 2003, after the NSA (US National Security Agency) conducted a review and analysis of AES, the U.S. CNSS (Committee on National Security Systems) announced in that the design and strength of AES-256 (and AES-192) are sufficient to protect classified information up to the Top Secret level. This is applicable to all U.S. Government Departments or Agencies that are considering the acquisition or use of products incorporating the Advanced Encryption Standard (AES) to satisfy Information Assurance requirements associated with the protection of national security systems and/or national security information.
Rationale: I do understand and I did mentioned that your device is cool, but there is absolutely no reason to bullshit on encryption software. Especially if you've never tried to use it or to break it.
Of course I do have sources. I'm a licensed PI and prior to using TrueCrypt on my personal HDD I made sure that it's compliant with government standards.
I think that the fact that AES (the US government’s Advanced Encryption Standard) is one of the standards that is being used in TrueCrypt should be enough and I won't have to talk about all other standards TrueCrypt is compliant with and certified for such as FIPS 197, FIPS 198, FIPS 180-2. If you want to know more about FIPS standard, please visit NIST knowledgebase.
The Advanced Encryption Standard (AES) specifies a FIPS-approved cryptographic algorithm (Rijndael, designed by Joan Daemen and Vincent Rijmen, published in 1998) that may be used by US federal departments and agencies to cryptographically protect sensitive information. TrueCrypt uses AES with 14 rounds and a 256-bit key (i.e., AES-256, published in 2001) operating in XTS mode.
In June 2003, after the NSA (US National Security Agency) conducted a review and analysis of AES, the U.S. CNSS (Committee on National Security Systems) announced in that the design and strength of AES-256 (and AES-192) are sufficient to protect classified information up to the Top Secret level. This is applicable to all U.S. Government Departments or Agencies that are considering the acquisition or use of products incorporating the Advanced Encryption Standard (AES) to satisfy Information Assurance requirements associated with the protection of national security systems and/or national security information.
Rationale: I do understand and I did mentioned that your device is cool, but there is absolutely no reason to bullshit on encryption software. Especially if you've never tried to use it or to break it.
The level of encryption is compliant with government standards, yes. But that's like saying "the government needs an operating system on this computer, and it needs to do networking. Windows is a compliant operating system". Just because something is compliant with government standards DOES NOT mean that the government is currently fielding that particular solution. I promise you, the government would not use open-source software based encryption. You may be a licensed PI, but I was a systems and support engineer in the Marine Corps for five years with a focus on IA. This is what I do for a living.
That aside, I do need to apologize to you for my last post, I was being a dick there and I should have been a little more civil. Sorry about that.
My concern with software based encryption is that there are already solutions in the wild to crack the keys. Hell, Defcon even had a contest for this. The other thing that makes me paranoid is that, if someone really wanted to, all they'd have to do is throw a keylogger on your machine and grab your key. I like hardware encryption for the fact that you must physically manipulate something in order to gain access.
This conversation has got me wondering if I could find a way to crack the key on my hard-drive though. Very interesting. I should definitely do my own pen-test.
Again, I'm really sorry for my douchey comment earlier, my post was not doing anything further an intellectual conversation. I'll try to check myself on that from here on out because I like where this is going.
You may be a licensed PI, but I was a systems and support engineer in the Marine Corps for five years with a focus on IA. This is what I do for a living.
My concern with software based encryption is that there are already solutions in the wild to crack the keys. Hell, Defcon even had a contest for this. The other thing that makes me paranoid is that, if someone really wanted to, all they'd have to do is throw a keylogger on your machine and grab your key.
There have been a lot of rumors circling around about AES being cracked - however, there have been no solid proof that actually happened. It is near to impossible to crack AES with the kind of machinery we currently have. Brute-forcing AES key using 128,000,000,000,000 calculations per second (capacity of regular i7) will approximately take 20,455 years.
Yeah brute force on any encryption, regardless of whether it is software based or hardware based, is impossible right now with the technology that we have at our disposal. But the problem with software encryption is that there are ways to extract the key without the need to brute force. Hardware encryption, you would have to beat my ass to within an inch of my life to get the key. :p
Yeah brute force on any encryption, regardless of whether it is software based or hardware based, is impossible right now with the technology that we have at our disposal. But the problem with software encryption is that there are ways to extract the key without the need to brute force. Hardware encryption, you would have to beat my ass to within an inch of my life to get the key. :p
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.