PDA

View Full Version : Iron key



bdad
12-25-2012, 01:00 AM
Anyone using a iron key, just for another layer of protection?

beanlicker
12-25-2012, 01:50 AM
No I have not tried it yet, but I checked it out and it sounds like is has potential.......



IronKey is an Internet security and privacy company located in Sunnyvale, California (http://en.wikipedia.org/wiki/Sunnyvale,_California) that was formed in 2005 by David Jevans (http://en.wikipedia.org/wiki/David_Jevans), with the stated aim of providing security and privacy solutions to both consumers and enterprises. IronKey's founding was partially funded by the U.S. federal government (http://en.wikipedia.org/wiki/Federal_government_of_the_United_States), with a grant of US$ (http://en.wikipedia.org/wiki/United_States_dollar)1.4 million through the Homeland Security Research Projects Agency (http://en.wikipedia.org/w/index.php?title=Homeland_Security_Research_Project s_Agency&action=edit&redlink=1),[1] (http://en.wikipedia.org/wiki/IronKey#cite_note-1)[2] (http://en.wikipedia.org/wiki/IronKey#cite_note-2)[3] (http://en.wikipedia.org/wiki/IronKey#cite_note-3) and their products have been used extensively by the U.S. government in various areas.[4] (http://en.wikipedia.org/wiki/IronKey#cite_note-4)[5] (http://en.wikipedia.org/wiki/IronKey#cite_note-5)

Overview

IronKey manufactures a range of secure USB flash drives (http://en.wikipedia.org/wiki/USB_flash_drive_security), including the IronKey S200 and IronKey D200, which come in three varieties (Basic, Personal, and Enterprise) in sizes ranging from 1 GB (http://en.wikipedia.org/wiki/Gigabyte) to 16 GB (up to 32 GB for the D200). The three versions differ primarily in the software included with them; there are also some hardware differences that prevent the end-user from converting one version to another. All three contain the same level of hardware encryption (http://en.wikipedia.org/wiki/Encryption) and are structured with two partitions: an unlocker partition with software handling locking and unlocking, and a secure area. The Basic model has no extra software and is targeted at government and military users, while the Personal includes a portable version of Mozilla Firefox (http://en.wikipedia.org/wiki/Mozilla_Firefox), Identity Manager (http://en.wikipedia.org/w/index.php?title=Identity_Manager&action=edit&redlink=1) (an account/password management software), and Secure Sessions (http://en.wikipedia.org/w/index.php?title=Secure_Sessions&action=edit&redlink=1). The Enterprise model is intended for corporate and government environments, and is completely configurable by an administrator. As such, it can contain any or all of the software on the Personal edition, along with anti-malware (http://en.wikipedia.org/wiki/Anti-malware) software, RSA (http://en.wikipedia.org/wiki/RSA_%28algorithm%29), and OTP (http://en.wikipedia.org/wiki/One-time_password) software.

One of the key design features of the IronKey is a self-destruct mechanism which activates after the user enters his password incorrectly a certain number of consecutive times. On the Personal model ten times is the limit, and on the Enterprise model the count is configurable by the administrator, while the Basic model can be configured to disable this feature entirely. As a safety measure, the device is required to be unplugged and replugged after every three password attempts. After reaching the password limit, the device will delete its encryption keys and instigates a wear level pass on the drive, effectively making the device completely unusable.

A key differentiator of IronKey from software-based encryption solutions is that IronKey's controller does not allow access to the user's data before authentication, even in encrypted form. With a USB drive containing software-encrypted data, full access to the encrypted data is available immediately upon mounting. This allows offline brute-force attacks or cryptanalysis (http://en.wikipedia.org/wiki/Cryptanalysis). Instead, with IronKey, the only attack surface available is giving the authentication interface different potential passwords. Because of the (also hardware-based) low limit on password attempts, this makes brute-forcing infeasible. Without getting access to the tamper-resistant hardware, an attacker cannot try hundreds of passwords, let alone the billions required to guess a moderately secure password.

The IronKey S100 has passed FIPS 140-2 (http://en.wikipedia.org/wiki/FIPS_140-2) Level 2 validation,[6] (http://en.wikipedia.org/wiki/IronKey#cite_note-6) and the S200 and D200 have passed FIPS 140-2 (http://en.wikipedia.org/wiki/FIPS_140-2) Level 3 validation.[7] (http://en.wikipedia.org/wiki/IronKey#cite_note-7) As of July 2009, the latter two were the only[8] (http://en.wikipedia.org/wiki/IronKey#cite_note-8) USB drives to obtain an Overall Level 3 (although Kingston Technology (http://en.wikipedia.org/wiki/Kingston_Technology) has stated that Level 3 certification is pending[9] (http://en.wikipedia.org/wiki/IronKey#cite_note-9) for their DataTraveler 5000 device).

Bundled software

Secure Sessions is an IronKey-customized fork (http://en.wikipedia.org/wiki/Fork_%28software_development%29) of the open source Tor (http://en.wikipedia.org/wiki/Tor_%28anonymity_network%29) anonymizer (http://en.wikipedia.org/wiki/Anonymizer) network (http://en.wikipedia.org/wiki/Computer_network), offering similar features to end-users of secure and private web browsing by routing network traffic through a random selection of nodes (http://en.wikipedia.org/wiki/Node_%28networking%29). Unlike Tor, it only uses private servers (around 22 of them) owned by IronKey in several different countries, including the USA (http://en.wikipedia.org/wiki/USA), Canada (http://en.wikipedia.org/wiki/Canada), Denmark (http://en.wikipedia.org/wiki/Denmark), the Netherlands (http://en.wikipedia.org/wiki/Netherlands), and the UK (http://en.wikipedia.org/wiki/UK). Users are unable to configure themselves as nodes, which means that the entire system would stop working (http://en.wikipedia.org/wiki/Single_point_of_failure) if IronKey ever ceased operations. While use of all private nodes secures users from potential third-party rogue nodes, it requires the user to trust IronKey alone with their traffic. With a single company (IronKey) controlling all the nodes, a court order against IronKey could result in the entire Secure Sessions network being compromised (http://en.wikipedia.org/wiki/Man-in-the-middle_attack).

bdad
12-26-2012, 01:24 AM
Bump

PAiN
12-29-2012, 09:45 PM
No I don't, but will be picking one up soon.

PAiN
12-29-2012, 09:46 PM
I like the self destruct feature.