It seems like the benefits are having the device lock/wipe itself after a set amount of attempts in case of a brute force attack and not having to run software to decrypt the drive on the device you plug it into.

I included a picture of the IronKey Keypad 200 but that’s just because it’s the first result that came up when I was looking for an example. There seem to be a few other manufacturers and models out there and they probably have different features.

I am curious what do you think of them? Do you think they are useful? Do you find it more a novelty?


It was an ExplainingComputers video titled Very Useful Small Computing Things that made me think of them.

    • fidodo@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      9 months ago

      Just press the rest of the keys after you unlock it. Or use all the keys in the password. Or purposefully scuff them up.

      • NuXCOM_90Percent@lemmy.zip
        link
        fedilink
        arrow-up
        0
        ·
        edit-2
        9 months ago

        It still drastically narrows down the search space and makes social engineering a LOT easier.

        Because you tend to have one of two sources for any password that people need to remember.

        1. Randomly generated with no rhyme or reason. And written down on a sticky note as a result
        2. Something with meaning to the user

        And it is the latter where this becomes an issue. Because let’s say they are a 50 year old and 1, 4, 6, 7, and 9 are heavily worn. Well, they were born in the 70s so let’s verify exactly when. Hmm, May. No 5 means it probably isn’t their birthday. Wait… their partner was born on April 7th, 1976. No luck. Oh, but what if they were clever adn it is actually 197647 instead of 471976? Boom, in.

        • Corroded@leminal.spaceOP
          link
          fedilink
          English
          arrow-up
          0
          ·
          edit-2
          9 months ago

          Related XKCD

          It’s a shame more people don’t think of obscure numbers they’ve been forced to remember in the past or see constantly and use those.

          • A number from a song

          • Your middle school locker combination

          • The number of a local pizza place

          • Your library card number

          • The barcode number on something you carry around all the time

          If you combined any two of those I imagine it would make for a pretty secure password.

          • NuXCOM_90Percent@lemmy.zip
            link
            fedilink
            arrow-up
            0
            ·
            9 months ago

            No. That xkcd (not loading but I assume it is the password one?) is not relevant. Because you can’t make a meaningful and easy to remember mnemonic out of a numeric password. That is WHY a purely numeric password is bad for anything that needs security. They are great for 2fa but the unique key should still be the other device.

            And all of your good codes are similarly easy to social engineer out, are screwed the moment it is compromised once, or are literally reading off a sticky note.

            Which gets back to these kinds of devices largely being security theatre. Because there is no good use case for them that wouldn’t also involve encrypting the data/volume after you pin in. At which point… why waste money on something conspicuous with an easy to crack code?

            • Corroded@leminal.spaceOP
              link
              fedilink
              English
              arrow-up
              0
              ·
              edit-2
              9 months ago

              I included it because passwords don’t need to be hard to remember. If they make sense to you and have a bit of thought behind them they can be just as secure.

              I am not saying these codes are perfect but if they are the weakest link in your network of security it’s a decent start. Someone could be trying to get your passcode for days but unless they see you checking something like the bar code of a notebook before you have it memorized they could spend months guessing before realizing a segment of your passcode is the number of a pizza place in your hometown. It’s not exactly something that’s going to come up naturally.

              I mentioned it in another comment but they also lock you out after a set number of attempts preventing brute force attacks.

              I am not saying they aren’t overpriced for what you are getting ($100 for 8GB) and considering the other options that are available but I doubt they are significantly easier to crack than a smartphone

              • NuXCOM_90Percent@lemmy.zip
                link
                fedilink
                arrow-up
                0
                arrow-down
                1
                ·
                9 months ago

                Look up how hard it is for humans to remember long strings of numbers. That is WHY ICQ (and eventually phone numbers) were dropped almost immediately in favor of social media and the ability to exchange numbers just by tapping phones.

                And in the time it would take to memorize a bar code (12-ish digits, depending on standard) you likely should be rotating that password anyway. And in the time it would take to memorize it you are also very blatantly reading off a sticky note as you “discretely” look at your notebook every time you want to access your password database in public. And if you aren’t in public? Why go through these extra steps when there are much better ways to secure this that are a lot more obvious if they are tampered with.

                I get that a youtuber you like talked about this. Youtubers talk about a lot of stupid products in the interest of making Content. But maybe listen to the people who have experience with this kind of hardware and the kind of security theatre policies that make them “a good idea”.

                • Corroded@leminal.spaceOP
                  link
                  fedilink
                  English
                  arrow-up
                  0
                  ·
                  9 months ago

                  I think you might be confused.

                  I’m not saying these devices are good. I started the entire post by asking if people thought they were a novelty. I just don’t think it’s black and white and we got off on a tangent about passwords.

                  I think often enough people have a few numbers memorized that they can use and a lot of the time they’re going to be too obscure to social engineer. I don’t think you could do some CSI style deduction to narrow down a passcode that’s over ten digits in length. You could probably brute force it and it’s going to take less time than an alpha numeric code though.

            • Corroded@leminal.spaceOP
              link
              fedilink
              English
              arrow-up
              0
              ·
              9 months ago

              That’s why I said to combine it with something else. Jenny’s number might be in a dictionary that is used in a brute force attack but hopefully something like your middle school locker combination isn’t. It’s still 7 extra bits of entropy.

              • Preflight_Tomato@lemm.ee
                link
                fedilink
                arrow-up
                0
                ·
                9 months ago

                Password Entropy = length * log2(possible_chars). So this would actually add 7*log2(10) => 23 bits of entropy, assuming the attacker knew that this section was numeric, or ~45 bits if they didn’t.

                For anyone curious: Current best practice is a minimum of 100 bits, or 16 characters assuming only letters, numbers, and special characters. The recommended minimum bits increases every year with computing power.

    • Corroded@leminal.spaceOP
      link
      fedilink
      English
      arrow-up
      0
      ·
      9 months ago

      It seems like these drives can use up to 15 digit pins and lock out after a set number of attempts. I don’t if that would be a huge issue

  • csm10495@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    1
    ·
    9 months ago

    I had one of the SanDisk flash drives that had some launcher thing on it and I had a password for some reason on it.

    In high school, a classmate tried to guess it, 3 times and I lost everything on it forever, since it stupidly locked forever after 3 tries.

    I had software projects from back then that I can never get back… including a web browser. I could have had the next Firefox…

    If you’re out there, Liz: I’ll never forgive that.

    • kevincox@lemmy.ml
      link
      fedilink
      arrow-up
      0
      ·
      9 months ago

      The downside with doing encryption in software is that you can’t limit attempts. If you are using a high-entropy key this is fine. But getting users to use high-entropy keys has problems. If there is an HSM integrated into the device you can limit the potential guesses before the key is wiped which is critical without high-entropy keys.

      A blog I follow recently had a good post about this: https://words.filippo.io/dispatches/secure-elements/

      Of course you are still better off with a high-entropy key and software. But if you trade off too much usability in the name of security you will likely find that your users/employees just work around the security.

        • kevincox@lemmy.ml
          link
          fedilink
          arrow-up
          0
          ·
          9 months ago

          That mitigates the problem but doesn’t solve it. If you want unlocking to be <1s and your adversary has 10k times the RAM and can take a month they can make 26 billion guesses. So unless your password is fairly high entropy it is at risk. Especially if they have more resources or more time. PINs are definitely out of the question, and simple passwords too.

  • NuXCOM_90Percent@lemmy.zip
    link
    fedilink
    arrow-up
    0
    ·
    edit-2
    9 months ago

    What is your use case for this?

    • Confidential files in a public setting? Don’t fucking bring confidential files to a public setting. But if you must, a big bulky laptop with (good) FDE is a lot more sequre than a flash drive someone can pickpocket.
    • Border crossing? Guess what? You paint a MASSIVE red flag on your back and get to learn that you don’t actually have all that many rights in the time between stepping on foreign soil and being admitted by customs. Congrats, you gave them the wrong code three times and it got wiped. They are going to break your face and put you in a black site.
    • Hiding sensitive/highly illegal content in the event of a police investigation: Yeah… if you are at the point where there is a warrant (or black van) out for your arrest than it really doesn’t matter if they can see whatever you were looking at last night.

    At my old job we required these for “thumb drives” and all they ever did was make reformatting machines pure hell.

    • Corroded@leminal.spaceOP
      link
      fedilink
      English
      arrow-up
      0
      ·
      edit-2
      9 months ago

      What is your use case for this?

      In the ExplainingComputer’s video he was using it to store his passwords. I’m not sure if he was doing it in conjunction with something like an encrypted password database or a plain text file.

  • jet@hackertalks.com
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    9 months ago

    They are interesting. But they are a huge red flag and scream examine me if it’s in your luggage and your crossing a boarder.

    I’m somewhat dubious about a hardware system not having long term undiscovered flaws. Be sure to use software based data protection on top of the hardware solution.

    • Possibly linux@lemmy.zip
      link
      fedilink
      English
      arrow-up
      0
      ·
      9 months ago

      Depending one where you are this may may be seen as normal in many airports as this isn’t uncommon in a business setting

    • Corroded@leminal.spaceOP
      link
      fedilink
      English
      arrow-up
      0
      ·
      9 months ago

      But they are a huge red flag and scream examine me if it’s in your luggage and your crossing a boarder.

      Good point. I guess you’d need to look into key disclosure laws at that point

  • ctr1@fl0w.cc
    link
    fedilink
    English
    arrow-up
    0
    ·
    9 months ago

    I have this device and use it to store my keepassxc and onlykey backups, and it’s useful to me because I’ve stopped using passwords (I only need to remember the pins for these devices which can unlock my keepass dbs that have everything else).

    It seems secure enough for my use case, especially since the files I store in it are themselves encrypted (the onlykey backup still requires a pin), but I still want them to be difficult to access.

    I’ve had to rely on it before but only because I didn’t prepare a backup onlykey ahead of time- ideally it should be one of many recovery methods. But so far it’s worked great for me.

  • Dyskolos@lemmy.zip
    link
    fedilink
    arrow-up
    0
    ·
    9 months ago

    Useful for what? Hiding stuff from family-member or coworkers? Yeah sure. Why not.

    Hiding stuff from professionals that really want your data? Probably not very helpful.

    Also what about backup? One controller-malfunction and your stuff goes poof. I just assume the data is somehow important or else you wouldn’t care about such a device 😊

    • Corroded@leminal.spaceOP
      link
      fedilink
      English
      arrow-up
      0
      ·
      9 months ago

      Those are some good points. The IronKey Keypad 200 says it has a self recharging battery but I wonder how long it would last sitting out of use as a backup or if plugging it in would always be enough.

        • THE MASTERMIND@feddit.ch
          link
          fedilink
          arrow-up
          0
          ·
          9 months ago

          Yeah i am stumped what do they mean by that . Also that statement alone indicates their product is not good as they say.

          • Corroded@leminal.spaceOP
            link
            fedilink
            English
            arrow-up
            0
            ·
            9 months ago

            I think they mean it doesn’t rely on a battery that would need to eventually be replaced. It wouldn’t have a disposable button cell battery for example

  • PowerCrazy@lemmy.ml
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    9 months ago

    I have a USB drive with a keypad on it, it stores my FIPS Compliant SSH-key for IL-5 government systems. I unlock it to add my key into my ssh-agent, and don’t use it for anything else. Though it is an 8gig USB stick, so I could in theory run some kind of security/pen testing flavor of linux plus a VPN Client to connect to said systems.

    • constantokra@lemmy.one
      link
      fedilink
      arrow-up
      0
      ·
      9 months ago

      Is there a specific benefit to that over something like a security key with a keypad, or even just a passphrase?

  • tiredofsametab@kbin.run
    link
    fedilink
    arrow-up
    0
    ·
    9 months ago

    First time I’ve seen something like that, but my initial thought was: wow, that’s a lot of parts that can break and things that can go wrong (compared to only encrypting the data itself before storage).

  • SheeEttin@programming.dev
    link
    fedilink
    English
    arrow-up
    0
    ·
    9 months ago

    Overkill and overpriced. If you’re on Windows, bitlocker is enough. If you’re on Linux, LUKS is enough.

    I’ve used Apricorn drives at previous jobs. They’re cool and very much fit for purpose, but I’d have a hard time justifying the significant price premium when software is nearly as good, free, and works with any drive.

  • solrize@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    9 months ago

    Ironkey has been more careful than some other vendors but the concept still seems dubious to me, if you are tryna to stop serious attackers. You want the decryption key to be completely separated from the storage.

    • Lojcs@lemm.ee
      link
      fedilink
      arrow-up
      0
      ·
      9 months ago

      Does this matter if it needs a password? Luks stores the key in storage too

      • solrize@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        9 months ago

        If I understand Luks, the raw key is encrypted using the passphrase, so that is an ok scheme if the passphrase itself is too random to attack by brute force (unlike the 8 digit code that the Ironkey device uses). Look up “diceware” for a reasonable way to generate random phrases. Luks with this approach can be pretty good, though still potentially vulnerable to key loggers and other such attacks. Basically, put careful attention into what you are trying to protect against. High security commercial crypto (e.g. for banking) uses hardware modules in secure data centers, surrounded by 24/7 video surveillance. Check out the book “Security Engineering” by Ross Anderson if this sort of thing interests you. 1st and 2nd editions are on his website, use web search. Parts of the current 3rd edition are there too).

    • Corroded@leminal.spaceOP
      link
      fedilink
      English
      arrow-up
      0
      ·
      9 months ago

      Ironkey has been more careful than some other vendors

      In what aspects? This is a topic I don’t know much about

      • solrize@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        9 months ago

        Cryptography and tamper resistance implementation. E.g. search “ironkey fips certification”. Ironkey is a Kingston brand now though, and Kingston has traditionally been crap, so be careful. Anyway if it’s for run of the mill personal files where you just want some extra protection, the device is probably ok if you don’t mind the semi-ridiculous cost. This is interesting though: https://www.wired.com/story/unciphered-ironkey-password-cracking-bitcoin/

        There are more serious technical approaches to data protection, but fairly quickly the weak spot becomes the humans in the loop, which are harder to handle with pure technology.

        • 9point6@lemmy.world
          link
          fedilink
          arrow-up
          0
          ·
          9 months ago

          I was going to suggest an attack similar to what I’d assume the guys in your link achieved—the actual data on the flash chip can be dumped easily, so if you can figure out the encryption algorithm used, you don’t need a whole lot of computational power to brute force a 15 digit numeric key (a couple of high end GPUs would probably get you there in an hour or so) and decrypt the dumped data.

          • solrize@lemmy.world
            link
            fedilink
            arrow-up
            0
            ·
            9 months ago

            the actual data on the flash chip can be dumped easily

            I’d stop short of saying “easily” since you have to get the epoxy potting off of the chip. But you are right that there doesn’t seem to be any active tamper reactance. The numeric key is apparently 8 digits. Since it’s a 10 digit keypad, at least 2 of the digits are unused, and you might be able to recognize those from the comparative lack of fingerprints and wear on those specific keys. So that narrows down the search range some more.

  • Chefdano3@lemm.ee
    link
    fedilink
    English
    arrow-up
    0
    ·
    9 months ago

    One thing I can tell you, it’s that you can’t use them as bootable drives to install an OS from. And if you try to pass the USB connection from an ESXi host to a VM on it, it won’t work.

    Aside from that, they’re really annoying to work with.

    • NuXCOM_90Percent@lemmy.zip
      link
      fedilink
      arrow-up
      0
      ·
      9 months ago

      Didn’t use ironkey specifically but you can totally boot from an apricorn. Basically involved plugging it in, rebooting the machine, and VERY rapidly entering the unlock code before the bios finishes starting up and gets to the “so which drives are bootable?” phase.

      It was hellish but it was also corporate policy to not use any USB storage devices that did not have a keypad for encryption. And DVDs were strongly controlled by the IT department (who were about as stupid as you would expect to have signed off on a policy like that).