Full disk encryption and blazing read speeds make this protect usb pocket hard drive a handy tool for road warriors.
Firstly, we created two MS Word documents – one that we opened from its location within the device under test (if possible), the second document was copied to the device without being opened. Both files were then deleted and the device’s password was changed. This mimic’s the possible behaviour of someone who has given their USB stick to another party. We then plugged the device in to a separate computer and scanned secure usb it without logging in to the device’s security/password system. No trace of the deleted files should be detected. We wanted to see if files stored in or even deleted from the secure area of the device could be seen by anyone if they were to just pick up the device if for instance it had been dropped in the street. The obvious hopeful outcome of this test was that no files would be found ensuring privacy.
They don’t claim that they used an USB device to launch the attack. Their DAGGER firmware requires what they call first party DMA, ie. PCIe card. They talk about USB only in the context of finding the URB (USB Request Block) to locate keystrokes. If you’re encrypting the data, later hashing and visually checking is redundant. But don’t forget to check the CD itself (md5sum or gpg signature). Rohos works by storing lock usb your logon information and automatically inputting your credentials when the USB is plugged in. Alternate logon methods exist for Android and iOS, allowing you to unlock access to your Windows or Mac computer through your smartphone. Data is protected using the AES algorithm and is encrypted at rest and in transit. Content is only ever decrypted in memory so that there are no unprotected cached files.