Forum search & shortcuts

USB dongle memory s...
 

[Closed] USB dongle memory stick - data security if it falls into enemy hands...?

Posts: 0
Free Member
Topic starter
 
[#1447575]

I'm not talking about data that affect national security here, just the regular stuff one carries around from day-to-day.

The question is, is there a way of ensuring that the enemy can't access my stored files should I misplace the USB stick?

Is there a way of, for example, making it so that the contents of the memory stick can only be accessed upon input of a password?

Does such a program exist? Anyone used such a thing? Effective & user-friendly?

Any thoughts & ideas are gratefully received. Cheers!


 
Posted : 25/03/2010 11:00 pm
Posts: 7130
Full Member
 

We use encrypted sticks at work...

[url= http://www.ciao.co.uk/Kingston_DataTraveler_BlackBox_USB_flash_drive_2_GB__6917337 ]Kingston Black Box[/url]

They don't come cheap though


 
Posted : 25/03/2010 11:04 pm
Posts: 5185
Full Member
 

Truecrypt (.org). It's free. Either do the whole thing, or create an encrypted file on there which the software can mount as a virtual filesystem. If you do that method, you can keep a copy of the software on the unencrypted bit too to use on other computers.


 
Posted : 25/03/2010 11:07 pm
Posts: 460
Free Member
 

^ what he said, in fact what both said.
TrueCrypt volume for ease of use on cheap memory sticks
Encrypted sticks (lots of them around now) if you don;t fancy that.

We've found a few along the way and its quite impressive what you can recover off them (even when deleted) 👿


 
Posted : 25/03/2010 11:37 pm
Posts: 0
Free Member
 

There are all sorts of encrypted discs, I've got Softek & Integral AES 256BIT ones myself. Didn't cost that much really, if keeping stuff safe matters to you.


 
Posted : 25/03/2010 11:47 pm
Posts: 52609
Free Member
 

truecrypt, cost nothing, can only be broken if they are cutting your fingers off


 
Posted : 25/03/2010 11:49 pm
Posts: 2
Free Member
 

[i]We use encrypted sticks at work...

Kingston Black Box[/i]

you might want to let your company know that they're exploitable.
[url] http://www.darkreading.com/security/storage/showArticle.jhtml?articleID=222300819 [/url]


 
Posted : 26/03/2010 12:19 am
Posts: 89
Free Member
 

(Mac user) I keep an encrypted .dmg disk image on mine to store 'sensitive' files (octop0rn)

Not useful if you need access from windows, but thought someone might be interested.


 
Posted : 26/03/2010 12:30 am
Posts: 0
Free Member
Posts: 215
Full Member
 

+1 for Truecrypt.

"truecrypt, cost nothing, can only be broken if they are cutting your fingers off "

Even then, truecrypt allows you to password protect the data you really want to keep hidden, and a create a second password which, when entered, reveals a second data area for you to keep stuff you don't mind sharing, so should duress be used you can appear to unlock the drive, but your stuff stays secret. And because of the way it works, it's imposible to tell whether there's more suff on the drive, or not. Brill.


 
Posted : 26/03/2010 1:37 am
Posts: 5807
Free Member
 

You really need to have put [u]only[/u] encrypted data on the stick from the word go for it to be passably secure. Encypting a stick which has already had data on can leave any remnants of that data vulnerable.


 
Posted : 26/03/2010 8:37 am
Posts: 3409
Full Member
 

[url= http://www.ironkey.com ]Ironkey[/url] secure USB is great, Works on Mac and PC. Hardware-based. Self destruct. Physically secured. etc etc.

Or, you could just not use a USB drive.


 
Posted : 26/03/2010 8:48 am
Posts: 621
Free Member
 

TrueCrypt is really really good. As Johnny Panic describes it can protect you even in situations where you are forced to give up the password.


 
Posted : 26/03/2010 9:08 am
Posts: 0
Free Member
 

And because of the way it works, it's imposible to tell whether there's more suff on the drive, or not. Brill.

Although not if the person looking at your drive is an expert - I understand* that there is some analysis they can do to detect the hidden partition. But unless you're involved in a criminal case of some kind, probably no one involved is going to be capable of doing it.

Joe
*I don't know how common knowledge this is, but I know for certain of at least one person who has done this, and I did get the rough details, but it was all a bit too clever for me.


 
Posted : 26/03/2010 9:52 am
Posts: 621
Free Member
 

There is a bit about it on wiko, under 'identifying truecrypt volumes'


 
Posted : 26/03/2010 10:13 am
Posts: 14293
Free Member
 

I use Axcrypt for our archives which seems to do the job but I'm going to wander over and have a look at Truecrypt.


 
Posted : 26/03/2010 10:32 am
Posts: 7130
Full Member
 

Cheers Samuri, I have just mailed your link into work.


 
Posted : 26/03/2010 11:08 am
Posts: 2
Free Member
 

We purchased a ton of them. They all had to be recalled. Cost us a lot of money. I've watched the exploit in action, it's insanely easy to reproduce and Kingston are far from the only affected company.


 
Posted : 26/03/2010 11:13 am
Posts: 7130
Full Member
 

mmmm. Our ICT made a big show of ensuring we all had them, and at £62.40 for a 2gb they aren't cheap. It will be interesting to see how they respond - but typically they are IT experts and don't like to be told that they may have made the wrong decision.

(We have only just moved from GroupWise to Outlook, we used Word Perfect suite until pretty recently!)


 
Posted : 26/03/2010 11:15 am
Posts: 8404
Full Member
 

Pictures of you and the Pope is it?


 
Posted : 26/03/2010 11:39 am
Posts: 0
Free Member
 

Ironkey impressed me the most at the security conference I went to last year.
Once devices start appearing on the CAPS listing then we'll consider them. I think Integral disks might have made it onto there by now and they were pretty cheap.


 
Posted : 26/03/2010 2:16 pm
Posts: 12088
Full Member
 

How about leaving the data on your servers, and VPN in to get to it? (OK: not much use if you want offline access, but given you can be compelled to reveal USB keys by law enforcement (e.g. US Customs) it might be a better solution.)


 
Posted : 26/03/2010 2:22 pm
Posts: 2675
Full Member
 

I really like [url= http://keepass.info/ ]keepass[/url].

As well as holding all my website passwords, I also store
any other files or info I want.

Using it I have different and totally random passwords for all websites.
Another great advantage is that there is no software to install on the pc. It all runs from the memory stick.


 
Posted : 26/03/2010 2:36 pm