Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security Hardware IT

Self-Destructing USB Stick 223

Hugh Pickens writes "PC World reports that Victorinox, maker of the legendary Swiss Army Knife, has launched a new super-secure memory stick that sounds like something out of Mission: Impossible. The Secure Pro USB comes in 8GB, 16GB, and 32GB sizes, and provides a variety of security measures including fingerprint identification, a thermal sensor, and even a self-destruct mechanism. Victorinox says the Secure is 'the most secure [device] of its kind available to the public.' The Secure features a fingerprint scanner and a thermal sensor 'so that the finger alone, detached from the body, will still not give access to the memory stick's contents.' While offering no explanation how the self-destruct mechanism works, Victorinox says that if someone tries to forcibly open the memory stick it triggers a self-destruct mechanism that 'irrevocably burns [the Secure's] CPU and memory chip.' At a contest held in London, Victorinox put its money where its mouth was and put the Secure Pro to the test offering a £100,000 cash prize ($149,000) to a team of professional hackers if they could break into the USB drive within two hours. They failed."
This discussion has been archived. No new comments can be posted.

Self-Destructing USB Stick

Comments Filter:
  • by solevita ( 967690 ) on Tuesday March 30, 2010 @08:02AM (#31668694)
    From TFA:

    Anyone stateside wanting one of these bad boys will have to wait patiently or hop on a transatlantic flight.

    Just remember to take it out of your pocket before getting back on that plane.

    I'd be interested in one without the knife as something to play with, but I'm not sure I want to carry all the rest of it around with me (I'm not some knife freak, but I want a USB stick to be just a USB stick).

  • Re:Two hours? (Score:3, Interesting)

    by warGod3 ( 198094 ) on Tuesday March 30, 2010 @08:05AM (#31668720)

    The article didn't mention two things:

    * Was the "team of professional hackers" paid for NOT cracking this?
    * Was the "team of professional hackers" able to beat the security at all?

  • Re:Two hours? (Score:5, Interesting)

    by compro01 ( 777531 ) on Tuesday March 30, 2010 @08:19AM (#31668816)
  • by datapharmer ( 1099455 ) on Tuesday March 30, 2010 @08:23AM (#31668846) Homepage
    You must have one crazy washing machine. I find them in the bottom of the wash all the time and as long as I let them dry out first I haven't had one fail yet. Not that I would recommend running them through the wash intentionally, but....

    Not sure about being run over by cars through; a titanium cased one perhaps?
  • Extreme cooling (Score:4, Interesting)

    by Henk Poley ( 308046 ) on Tuesday March 30, 2010 @08:30AM (#31668898) Homepage

    It burns the inside when opened? Let's see what happens when you pry it open while pouring liquid helium over it.

    This reminds me of the IBM Secure Cryptoprocessors, which are *pretty much* physically secure. But still people get in now and then usually through software or neat stasis tricks so the device can't respond to your intrusion.

  • by fuzzyfuzzyfungus ( 1223518 ) on Tuesday March 30, 2010 @08:41AM (#31668988) Journal
    Just for curiosity's sake, I'm trying to think of how difficult that would actually be....

    Exposing blood to air gives your pretty decent oxygen saturation. Doing that for any great length of time is likely to cause clotting or other nastiness, so it isn't exactly an alternative to the "lung" side of "heart lung machine"; but this isn't medicine we are talking about, just fooling a sensor. In the same vein, the sensor isn't going to care about blood type, immune matching, or anything like that. Also, a finger doesn't have that much volume to in. A few CCs of fresh blood(from say, yourself, or the same guy you took the finger from), exposed to air for a few seconds, would be fine.

    Pulse could presumably be simulated with a low power pump(perhaps a small peristaltic unit), with its power supply being turned on and off at roughly the right frequency. I can't imagine that huge exactness is required, since the pulse rates of humans vary fairly widely with conditions, and people would be pissed if their fingerprint scanner doesn't work if they've just run up a flight of stairs, or are freaking out about the big presentation in 20 minutes.

    The real difficulty, or lack thereof, would really come down to the artery/vein structure of the finger. If you can get away with just connecting to a couple of big blood vessels and ignoring some minor leakage(since this is all temporary and nonmedical), an amateur willing to just shove a few little tubes in there should do fine. If the sensor can detect(and is tuned to care about) the details of the vascalature, you'd pretty much need a cooperative microsurgeon, a fancy microscope, and real surgical kit. That would probably be problematic for most applications.

    Obviously, the above would be a huge pain in the ass, even under good conditions, and is highly unlikely to be worth it(probably easier just to show the owner of the finger your pair of bolt cutters, and let him operate the scanner for you, unless you are in an environment where the cameras would pick up on that, in which case the above described apparatus could, quite plausibly, be fit down the sleeve of a not-too-suspicious garment).

    Perhaps more practical, I wonder how difficult it would be to produce a variant of the classic "gelatin finger with correct fingerprint" that reads as having oxygen sat and a pulse? Would one made of blood agar [wikipedia.org] return plausible results under optical oxygen saturation tests? If so, that's raise the bar from "supermarket" to "laboratory supply house"; but that wouldn't be too bad. For pulse, the question is "how complex does your simulated vasculature have to be?" Any decently competent modeler can probably mould a simple circulatory loop into a gel finger; but achieving an actual capillary structure is sci-fi self-assembling nanomaterials stuff...
  • by AllynM ( 600515 ) * on Tuesday March 30, 2010 @08:51AM (#31669094) Journal

    I saw a self-destructed sample of this unit at CES in January. It did not self destruct from an opening attempt, as opening those is quite easy. The drive is enclosed by a simple clear plastic shell (not epoxy filled). The 'destruction' was caused by presumably supplying voltage in excess of the USB spec. You could literally pry the plastic off of the USB drive with the included knife, and it would work just fine (sans enclosure).

    Also, it would be nice if PCWorld at would at least get the name of these things correct:
    http://www.swissarmy.com/multitools/Pages/Category.aspx?category=presentation+pro& [swissarmy.com]

    Perhaps the USB-only part is dubbed 'Secure', but you won't ask for that name when you want to buy one.

    Allyn Malventano
    Storage Editor, PC Perspective

  • Re:Two hours? (Score:5, Interesting)

    by TheRaven64 ( 641858 ) on Tuesday March 30, 2010 @08:56AM (#31669134) Journal

    Mod parent up. Apple's File Vault, for example, stores the key in a silly way, which reduces the effective key length of their 128-bit AES implementation to something closer to 112 bits. Given that the recent attacks on AES reduce the complexity further, so File Vault with AES-128 is creeping closer to being feasible to crack. Hardware AES is potentially vulnerable to side-channel attacks.

    If the drive is secure, you don't give attackers 2 hours to break it, you publish the implementation details and give a prize to the first person to demonstrate a feasible attack with this knowledge.

  • WTF!? (Score:3, Interesting)

    by kpainter ( 901021 ) on Tuesday March 30, 2010 @08:58AM (#31669166)
    The self destruct mechanism link in TFA is a link to a review of Ironkey's self destruct. I was going to say, this isn't anything new. I had a Sandisk brick itself when it could not be ejected. We switched to Ironkey. We havn't had any problems with these and the encryption is hardware based so it is pretty fast. There is an option to have the drive be capable of being reformatted if you can't enter the password within 10 attempts.

    I have not had a lot of love for fingerprint scanners readers. I think I will stay with Ironkey.
  • by bluefoxlucid ( 723572 ) on Tuesday March 30, 2010 @09:11AM (#31669292) Homepage Journal

    Seeing as I used to pen test; and we regularly raped the shit out of banks and utilities and gave them volumes to explain their complete and utter security failure AND methods to correct their gross incompetence; AND they had competent security teams that thanked us both for pounding issues they had found into their managers head AS WELL AS finding issues they had no prior knowledge of; AND we regularly got called back after a year for another pen test and found less, some of the same (not fixed), and some new issues; I have got to say that penetration testing is the only real way to test a system's real-world security.

    Seriously, you have the people sitting around coming up with all kinds of policies trying to secure a system. These are just theory. IIS is configured correctly, MySQL is configured correctly, we did a lot of ridiculous useless shit to lock down Windows and Linux (like deleting the swap file at shutdown, woo!). Everything's compliant, so it must be secure.

    Then you have people like me, sitting down, squinting, poking, prod--*FOOM!* .... oh shit o_o it asplode....

  • Re:Two hours? (Score:3, Interesting)

    by Andy Dodd ( 701 ) <atd7NO@SPAMcornell.edu> on Tuesday March 30, 2010 @09:17AM (#31669370) Homepage

    See, for example, the Kingston DataTraveler BlackBox scenario. It and two drives (one from Verbatim, one from... I forget who...) that used the same crypto chip had FIPS 140-2 validated AES implementations, but they completely screwed up key management. All of the drives apparently used the same AES key...

  • by Andy Dodd ( 701 ) <atd7NO@SPAMcornell.edu> on Tuesday March 30, 2010 @09:23AM (#31669424) Homepage

    If I recall correctly, there were a few classic arcade games that were copy protected by a battery-backed encryption key. Mess with the device the wrong way and the key would be lost.

  • Re:Two hours? (Score:5, Interesting)

    by Rich0 ( 548339 ) on Tuesday March 30, 2010 @09:40AM (#31669626) Homepage

    Yup.

    Plus, if somebody did need to crack one of these within two hours of getting their hands on it with minimal equipment this isn't how they'd go about it.

    Step one for an attacker would be to go to a store and just buy a dozen of these USB drives. Then they attack the drives from home with a full machine shop, a clean room, electron microscopes, logic analyzers, FPGAs, and the works.

    Then they figure out how to defeat the devices defenses, and then package that up into a minimal set of tools and steps needed to accomplish the feat in a few minutes.

    Then when they steal the device they already know exactly what they're doing and it takes them no time at all.

    It would be like a bank robber deciding on a whim to break into a bank, without checking plans, casing the place, identifying the vault make/model, etc. Like anything, a quickly executed mission depends on good planning.

  • Just do it like they did on mythbusters. Pull a print, make a thin copy, put it on your own thumb, swipe. Your body heat would work just as well.

    Hell, on CSI they managed to get prints from a bloated water logged corpse by cutting the fingers off, removing the bones, and using the finger meat as a glove.

    If you want to get in you'll get in.

Real Programmers don't eat quiche. They eat Twinkies and Szechwan food.

Working...