Originally Posted By: Dali
This stuff is really interesting!

Correct me if I'm wrong but isn't it the usual assumption that encrypted communications / files are fully exposed to a third party - so the emphasis is always on "unbreakable" - or at least sufficiently difficult to break - encryption. The self-destruct/tamperproof design is clearly an attempt to prevent data exposure in the first place.


After reading the whitepaper on this product, I would be worried about the 10 password limit. This limit cannot be changed nor can the counter be reset.

I can just see someone mistakenly leaving the USB drive in a pc. A curious co-worker, your kids or an inqusitive wife sees the drive and data, tries entering in a few passwords and after a grand total of 10 passwords, bye, bye goes your data.

Hopefully you have safe backups somewhere else. However from years of professional experience, I can tell you that 98% of people do not have any kind of backups on any media type...

Just to add to this, I would not loose any sleep if my own PGP and Truecrypt files were to be obtained by someone else. I have enough confidance in these products, and my passphrases that no person can brute force the password. For those who are truly paranoid and worry about the "government" getting their personal data...they already have it.


Edited by Sherpadog (09/13/07 01:57 AM)
Edit Reason: additional comments