PaulDotCom mailing list archives
Kingston DataTraveler Secure Privacy vulnerability
From: lonestarr13 at gmail.com (Michael Salmon)
Date: Thu, 7 Jan 2010 17:47:49 -0500
Thanks guys. Johan's explanation was much better than mine :). I feel kind of bad because I recommended the Kingston DTSP for use at my company and then first I found that the Hak5 switchblade software could overwrite the CDrom partition but the data was unrecoverable if that happened. Kingston gave us an update for the keys that addressed that but now this comes out. we were thinking of replacing them with Ironkey, we probably will now. Thanks, Michael Salmon On Jan 6, 2010 10:06 AM, "John Strand" <strandjs at gmail.com> wrote: Never attack crypto.. Even crappy crypto is hard to attack. Always attack the implementation. 2010/1/6 Johan Peder M?ller <johan at johans.dk>
Hi all > > As I read it the password is checked using a algorithm that
involves the 32 Byte blo... _______________________________________________ Pauldotcom mailing list Pauldotcom at mail.pauldotcom.com http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com -------------- next part -------------- An HTML attachment was scrubbed... URL: http://mail.pauldotcom.com/pipermail/pauldotcom/attachments/20100107/8d7f9989/attachment.htm
Current thread:
- Kingston DataTraveler Secure Privacy vulnerability Michael Salmon (Jan 05)
- <Possible follow-ups>
- Kingston DataTraveler Secure Privacy vulnerability David A. Gershman (Jan 05)
- Kingston DataTraveler Secure Privacy vulnerability Michael Salmon (Jan 05)
- Kingston DataTraveler Secure Privacy vulnerability Johan Peder Møller (Jan 06)
- Kingston DataTraveler Secure Privacy vulnerability John Strand (Jan 06)
- Message not available
- Kingston DataTraveler Secure Privacy vulnerability Michael Salmon (Jan 07)
- Kingston DataTraveler Secure Privacy vulnerability Michael Salmon (Jan 05)