Ironkey is my hardware ideal. I'm looking at a way to replicate that functionality so it can work with COTS usb drives. <br><br><div class="gmail_quote">On Wed, Nov 25, 2009 at 7:26 AM, George Allen <span dir="ltr"><<a href="mailto:glallen01@gmail.com">glallen01@gmail.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;"><div class="im">>> Jim Kinney wrote:<br>
>> The bit I don't have is how to set up the USB so a brute force attempt<br>
>> will cause a secure wipe.<br>
<br>
</div>I missed the previous parts of this thread, but this is exactly what<br>
IRONKEY usb drives are setup to do in hardware:<br>
<a href="http://www.ironkey.com/" target="_blank">http://www.ironkey.com/</a><br>
<br>
After a certain number of failed PIN attempts, the drive erases the<br>
private keys, erases the data, and then tells the FGPGA containing the<br>
keys and encryption side to wipe itself basically. So it's a hardware<br>
self-destruct. They embed the whole think in metal and epoxy, and<br>
supposedly the self-destruct can be triggered by either failed PIN<br>
attempts - or physical tampering attempts - so that you can't even get<br>
the data with a j-tag.<br>
<div><div></div><div class="h5">_______________________________________________<br>
Ale mailing list<br>
<a href="mailto:Ale@ale.org">Ale@ale.org</a><br>
<a href="http://mail.ale.org/mailman/listinfo/ale" target="_blank">http://mail.ale.org/mailman/listinfo/ale</a><br>
See JOBS, ANNOUNCE and SCHOOLS lists at<br>
<a href="http://mail.ale.org/mailman/listinfo" target="_blank">http://mail.ale.org/mailman/listinfo</a><br>
</div></div></blockquote></div><br><br clear="all"><br>-- <br>-- <br>James P. Kinney III<br>Actively in pursuit of Life, Liberty and Happiness <br><br>