Can hackers break encrypted USB drives? I tried to find out
Briefly

Can hackers break encrypted USB drives? I tried to find out
"Carrying data around on unencrypted drives is just asking for trouble. Lose the drive, and not only are you down the device, but also all its data is open to anyone who finds it. If you run a business, this loss can be a fast track to fines and regulatory headaches. I recommend that anyone who needs a flash storage device should use hardware-encrypted flash drives."
"OK, so the IronKey Locker+50 G2 is a hardware-encrypted USB flash drive. This device is different from drives that use software encryption because, rather than using software to protect the data, which comes with the risk that data is left unencrypted on the drive or that remnants of cached files could be accessed, hardware encryption uses a special chip inside the drive that makes sure that the entire user-writable part of the device is always protected."
"Without the password, no one can access anything. And as soon as the drive is unmounted, everything is securely encrypted. Hardware encryption is completely independent of the host system, making the drive less vulnerable to malware or hacking attempts. That's why I generally vouch for hardware-level security in addition to software encryption."
"The encryption used here is 256-bit AES-XTS, a military-grade level of protection that encrypts data and adds tamper resistance. You plug the drive in (Windows and Mac supported), run the IronKey application, enter the passcode, and then the main storage partition is decrypted. Unmount or unplug the drive, and the data is instantly secured."
Unencrypted storage devices expose data when lost, potentially leading to regulatory issues for businesses. Hardware-encrypted flash drives protect the entire user-writable area using a dedicated chip rather than relying on software encryption. Without the correct password, no data can be accessed, and removing or unmounting the drive immediately secures the contents. Hardware encryption operates independently of the host system, reducing exposure to malware or host-based attacks. The Kingston IronKey Locker+50 G2 uses 256-bit AES-XTS encryption with tamper resistance. After connecting to Windows or Mac, entering a passcode through the IronKey application decrypts the main partition, and unplugging re-encrypts it instantly.
Read at ZDNET
Unable to calculate read time
[
|
]