Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Data Storage Encryption Security

7 Secure USB Drives Reviewed 146

jcatcw writes "Computerworld has reviewed seven USB drives that use either encryption or a physical keypad to protect stored data, and found big differences in I/O speeds, ease of use and strength of security. In the case of the drive using a key pad, the editors were able to break open the device and access the data, bypassing the PIN security. They also state that there is little difference between 128-bit and 256-bit AES encryption because neither has been broken yet. The drives reviewed were the SanDisk Cruzer, the Lexar JumpDrive, the Kingston DataTraveler, the Imation Pivot Plus, the Corsair Survivor, the Corsair Padlock and the IronKey Secure USB Drive. The editors chose the IronKey as the most secure."
This discussion has been archived. No new comments can be posted.

7 Secure USB Drives Reviewed

Comments Filter:
  • For the... (Score:5, Informative)

    by Creepy Crawler ( 680178 ) on Monday March 03, 2008 @12:55PM (#22624708)
    For the love of /root, use the print link [computerworld.com].

    We dont want to see a little bit of content over 9 pages!
    • by Futurepower(R) ( 558542 ) on Monday March 03, 2008 @01:19PM (#22624996) Homepage
      For the love of convenience, sanity, and saving money, just use any flash memory drive and TrueCrypt [truecrypt.org].

      "Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux"
      • by Sancho ( 17056 )
        This requires trusting the OS with your password, having root at a minimum to install it and possibly to use it, and assumes that you don't want to use your thumbdrive on other operating systems. A truely hardware-based system where the drive doesn't even announce itself as a mass storage device until it is unlocked would be the best option.
        • "This requires trusting the OS with your password, ..."

          All drives except those with separate keypads trust the OS with the password. Hardware keyloggers will see the password if there is no separate keypad. But that's not the problem. The problem is losing the drive. Hopefully the drive would not be lost in the same place someone is using a key logging device.

          Root is required only to install TrueCrypt, not run it.
          • Root is required only to install TrueCrypt, not run it.

            What if you want to read the data on a computer that doesn't have TrueCrypt installed?

          • Interesting: Format a Flash drive as NTFS [ntfs.com].

            I wonder if that would make the flash drive more reliable, since NTFS is more reliable than FAT?

            Don't use Windows OS encryption. According to Microsoft technical support, it is not reliable.
            • Comment removed based on user account deletion
              • My understanding is that TrueCrypt keeps a lot in memory, and minimizes actual access to the drive.

                I don't know whether NTFS would have a higher access overhead. I hope someone who reads this can tell us.
              • Re: (Score:3, Insightful)

                Any good flash stick should be doing wear leveling in the controller chip so the filesystem you use shouldn't matter as much as it would with directly connected flash chips.
            • by jridley ( 9305 )
              I just went through this last night with my first > 4GB thumb drive. If anything, it'll make it LESS reliable.
              The FAT drivers are geared for quick flush to the drive, so you can yank the drive quickly. NTFS doesn't guarantee everything's flushed unless you use the eject dialog.

              So if you yank the drive, or lose power, or hibernate your machine, use the drive on another machine, then go back and plug it in and unhibernate the machine, if you're using NTFS, you're probably going to corrupt the filesystem.
          • An external keypad is irrelevant, unless the password is more confidential and important than the data you are unlocking with it.

            If you can't trust the computer you are exposing ALL your files to, you shouldn't make those files accessible to it.

            Any malicious program in the computer can read the rest of the files once you unlock the entire encrypted partition for the entire computer to read.

            Use a trusted computer to move the files to a different USB drive first.

            In the old floppy days, sticking a floppy into
        • Re: (Score:3, Interesting)

          by bytesex ( 112972 )
          A good solution would be where the drive holds a little (rechargable) battery, which can use a led to display whether we're in locked or unlocked mode, plus a little keypad (like the one on a briefcase, with wheels, but then electronic, and larger (more numbers) to unlock it. You have to unlock it just before you enter it into the USB slot, and it will lock automatically when you take it out. The drive is naturally locked (that is, the data is stored encrypted), and the voltage on the USB drive feeds a de
          • by Sancho ( 17056 )
            I haven't heard of such a device, but it sounds like a neat design.
          • The mechanism you've just described is used by the Bull Trusway PPS key [bull.com]. There is still a few differences. First, there is a single wheel so you have to enter the PIN code digit by digit. Second, it does not use a battery: you have to plug it in first. However the data is accessible only if the PIN is entered correctly.

            The only drawback is that it is not really something you can buy "off the shelf."
      • And since 5.0 introduced WDE for Windows machines, it is a viable alternative for PGP on the homefront.

        Unless people can tell me reasons otherwise.
      • by Chyeld ( 713439 ) <chyeld.gmail@com> on Monday March 03, 2008 @01:53PM (#22625462)
        My friend, I fear you do not see the point. Have we not said that hardware based encryption is far superior to software based encryption? Does this chart [presentationzen.com] tell you nothing?

        Indeed, our thumb drives utilize gold connectors to ensure the fidelity and privacy of your porn collection. Other thumb drives use cheap, base metals. These are highly susceptible to corruption and thus are insecure. Don't take the risk and go cheap; after all, do you really want the whole world to see your midget clown photo sets?
      • One aspect of the IronKey that makes it appealing is the protection from an off-line dictionary attack. Only once you have successfully authenticated with your key does it decrypt the flash drive and present it to the OS. It also will simply stop working with a certain number of authentication attempts failing and is fully potted to allow it to be able to resist physical tampering.

        It seems to use a randomly generated key (cryptographically the best thing that you can do) to encrypt the flash memory. This do
    • For the love of /root, use the print link.

      We dont want to see a little bit of content over 9 pages!
      Great. Let's Slashdot a few sites with their print link and cause them to make those annoying, too.

  • Crack open the PIN-based one, fill with epoxy, reseal.
    • by leuk_he ( 194174 )
      It is very doubtful it is any good...

      See this encrypted usb HARD drive:

      http://www.heise-online.co.uk/security/Enclosed-but-not-encrypted--/features/110136/0 [heise-online.co.uk]

      Some 128 bit encryption was involved, but not implemented a correct way, so it was easy to decrypt beacuse only a xor key was involved.
    • by Chyeld ( 713439 )
      If he was able to remove completely the number pad and simply trick the main board into thinking the correct combination had been entered, it's a fairly safe bet that snipping off the numberpad and using the leads that used to go to it would work just as well. Your epoxy solution would only cover part of it. Plus, IF the data is being storied unencrypted and the only issue is physical access, eventually epoxy can be removed. Once that happens, you are pwnt.
  • TrueCrypt (Score:5, Insightful)

    by ceswiedler ( 165311 ) * <chris@swiedler.org> on Monday March 03, 2008 @01:03PM (#22624808)
    How are any of these better than using TrueCrypt in traveller mode? The only thing I can think of is that TrueCrypt requires administrator rights to use. And I suppose they may be easier to use for people who don't know much about computers or encryption. But I trust TrueCrypt a hell of a lot more than anything which comes preinstalled on these things.
    • Re: (Score:3, Informative)

      by CodeBuster ( 516420 )
      It only requires administrative rights to use if you are trying to use it on another computer besides your own laptop while traveling, but anyone who does that without the dip switch set to write protect and the entire volume encrypted is just asking for trouble anyway. The ideal solution is to simply encrypt the entire volume on the USB thumb drive and then set the dip switch to write protect when it is not plugged into your laptop OR you are not using it for writes. That way if the thumb drive is lost it
      • In fact, if I were a thumb drive manufacturer then I would simply distribute TrueCrypt with my thumb drives and be done with it.

        Corsair already does on some of their drives (like the Flash Voyager 32Gb)
      • Re: (Score:2, Informative)

        by Amiralul ( 1164423 )
        Needing Administrator privileges to see the TrueCrypt encrypted drive, is a huge drawback. I mean, not every Joe have admin rights on his PC (or even knows his admin password) and if I want to use my USB on his computer... Well, I can't.
    • Short summary (Score:5, Informative)

      by Cheesey ( 70139 ) on Monday March 03, 2008 @01:32PM (#22625184)
      Corsair Flash Padlock - physical security only: crack it by breaking open the case.

      The Corsair Survivor - no security, so TrueCrypt is needed, but setup instructions for TrueCrypt are included.

      The Imation Pivot Plus Flash Drive - uses AES-256, but in the insecure ECB mode. Hey, I suppose it's better than ROT13 at least.

      The IronKey Secure Flash Drive - "To use the IronKey flash drive, you need to activate an online account." Well, that sounds like a great idea.

      The Kingston DataTraveler Secure -- Privacy Edition - "Kingston refused to say what encryption mode the device runs in, citing that it was proprietary information." So that would be ECB again, then. Or maybe something even more pathetic.

      The Lexar JumpDrive Secure II Plus - Special proprietary software is required to use this one.

      The SanDisk Cruzer Professional - ECB again.

      Really short summary: buy a conventional USB stick and do the encryption yourself using free software that you can trust. Because customers cannot tell the difference between a well secured device and some snake oil junk, there is no incentive to make these things work properly.
      • I want a kingston drive, or at least the software program. He who haveth one, have fun. http://www.amazon.com/gp/product/159749237X/ [amazon.com]
      • Re: (Score:3, Informative)

        by chappel ( 1069900 )
        Note that the online activation is completely optional for the IronKey. I've had one for a while, and am satisfied with it, other than the time it's taking them to release Linux support (beta should be coming out shortly).

        The anonymous browsing works well. I haven't had as much luck with the password-keeper feature. Note that so far only basic file access works on OSX, but it works easily.

        I opted for the online activation, and used the password recovery successfully - and am glad I got to test that inste
      • This is a random-access device. The codebook encryption method is pretty much your only option unless you intend to re-crypt the entire downstream content because a one-byte write altered the chaining dependencies. In telecom apps, most of the data is streaming, and chaining cyphers are very appropriate. For static storage with an arbitrary data-order access opportunity, chaining cyphers would cause dramatic reductions in throughput, to the point of making the device unusable.

        AES in ECB mode is less se
        • Re: (Score:3, Informative)

          by wfberg ( 24378 )
          The Disk encryption theory article on wikipedia [wikipedia.org] lists some modes of operation that are practical for disk encryption, most notably XTS, which is used by truecrypt. Wikipedia also lists [wikipedia.org] different disk encryption apps, and the modes of operation they use.
          • That's a nice link. Thanks. I was approaching from my telecom-centric point of view, where the item to be encrypted is the data, not the medium on which it is stored. There's a fundamental difference between the two, and I think there's a place for both. In a transport environment, it is assumed that the attacker has access to the data stream as well as the encryption algorithm. The strength of the encryption is based exclusively on the math.

            The block-based CBC structures will enhance encryption stre
        • by Agripa ( 139780 )
          Since CBC mode is sequential, why not use CTR mode to allow both random access and resistance to replay or even better, use ESSIV?

        • by Cheesey ( 70139 )
          I don't think that's true. Other filesystem encryption does use CBC: it is used at the (hard disk) block level. For example, aes-loop works in this fashion. I think what you are missing is that it isn't completely random access. Nothing smaller than a hard disk block is read or written in one go, so you can encrypt entire blocks using a chain. You have to break the chain at each hard disk block boundary (>= 512 bytes), but this is still better than breaking it at every encryption block boundary (= 32 byt
      • Thanks for the summary -- that was much quicker to read than the original article (which I gave up on after the second page of verbosity).

        I use LUKS on my USB drives on my Linux boxes, and I understand there's a way to use it from Windows as well although I haven't tried yet.
    • Well the Padlock one is better because it's platform agnostic.

      The Ironkey sounds really good, but since I need to swap between a Windows and a BSD pc, it's effectively useless.

      With TrueCrypt you could make it work cross-platform, but you'd need non-Windows host computers to have TrueCrypt already installed.
    • I run TC in traveler mode all the time without Admin rights and I've never figured out why it says you need them to run... maybe I am missing something?
      • by rduke15 ( 721841 )
        You can install TrueCrypt as an admin, and then you can use it without admin rights on that machine.

        or

        You can also not install anything, and just start it ("traveler mode"), but it must then be able to add it's driver when starting. And that needs admin rights.

        So unless the OS already knows about that driver, you do need admin rights.
    • Comment removed based on user account deletion
    • Am I the only one that gets corrupt TrueCrypt volumes on my USB drive because the drive will fail to dismount when I right click in TrueCrypt and select dismount? Usually this is caused by the AV engine stuck with a lock on a file. I quit using TrueCrypt for my entire 160GB USB drive due to this, and now just use it on static content.
  • by explosivejared ( 1186049 ) <hagan@jared.gmail@com> on Monday March 03, 2008 @01:05PM (#22624824)
    ... and not a single one of them is secure enough for me. I simply want a USB drive that whenever somebody, not authorized by me, touches it, heats their body to like a million kelvins and melt them. A few hundred thousand won't cut it. Until then, Lexar ain't impressing me with their little math based schemes. Unless it causes total vaporization, it's just not secure.
    • ...on the loss of your mother, when she happened to pull your USB drive out of one of your pockets before she threw your jeans in the wash.

    • The drive would be quite easy to make. Two sub-critical pieces of plutonium plus a small charge to bind them. The recognition mechanism sounds tricky but nothing a sub-skin RFID can't solve (you authorize people to use the drive by implanting them with authorized RFIDs). OTOH people from stuff like airport security may get nervous if you try to bring it with you on a plane.
      • The drive would be quite easy to make. Two sub-critical pieces of plutonium plus a small charge to bind them.

        Plus you could use it as an emergency radioactive boat anchor in a pinch.
      • by novakyu ( 636495 )

        The recognition mechanism sounds tricky but nothing a sub-skin RFID can't solve (you authorize people to use the drive by implanting them with authorized RFIDs).

        Except, of course, RFIDs are notoriously insecure—no physical contact needed to glean all the information one could want, unless it's protected again with a reasonable challenge/response system, but is there even one in existence? I suppose you could try biometric information such as full DNA scan, but then, do you really trust your evil twin?

        It really comes down to the fact that for a truly good security, a man really needs his own island. With electrified shores.

        • and remote 'dead hand trigger' nukes located under all the capitals of all the countries of any significance.
    • heats their body to like a million kelvins and melt them.

      That extra 273 degrees makes the critical difference between this approach and lesser celsius-based systems.
  • by th0mas.sixbit.org ( 780570 ) on Monday March 03, 2008 @01:12PM (#22624922)
    Another analysis of some of the ICs used in popular secure USB tokens (not usb storage devices) can be found here:

    http://www.flylogic.net/blog/ [flylogic.net]

    They often de-cap the ICs and reverse engineer from a microscope. Really interesting stuff!
  • So...it never states if you can format this drive with the filesystem of your choice and use it. It is critical that whatever drive I use be usable on pretty much any OS. I am constantly switching between FreeBSD, Linux, OSX, and occassionally Windows.
    • Re: (Score:3, Interesting)

      by AMuse ( 121806 )
      FYI I am using an IronKey (4GB Enterprise edition) right now on a Mac OSX box with the key formatted with FAT32.

      It works wonderfully on the Mac for basic encryptio/decryption/file access, and I am also mounting it to a WinXP virtual image within VMWare Fusion. The VM XP thing works flawlessly, including auto-mounting, and I initialized the key on the VM prior to using it on the Mac.

      The company promises Linux drivers soon.
  • by Phat_Tony ( 661117 ) on Monday March 03, 2008 @01:34PM (#22625196)

    They also state that there is little difference between 128-bit and 256-bit AES encryption because neither has been broken yet.


    Maybe not yet, but presumably, when they are broken, they're likely to be broken in such a manner that 128-bit falls way before 256-bit. So if you only care about someone not stealing your data right now, they might both be equivalent, but if you're worried about someone stealing your data at any time and then reading it further down the road, one is likely to be much better than the other.

    Also, I'm sure there will be some debate on this, but I'm not entirely convinced that if someone like the NSA has thrown a few billion dollars at the problem including having a custom-made super computer with their own unique, dedicated processors that are highly optimized for cracking encryption, that perhaps 128-bit AES is already compromised and we simply don't know. The relative advantages of 128 vs 256 bit might depend both on how long you want to keep your data secure, and on who you're trying to keep it secure from.
  • The big difference is WHEN they will be broken.

    With an algorithm like AES, if you need your data to stay secure longer, use a bigger key.
  • 128 vs 256 Bit AES (Score:4, Insightful)

    by Doc Ruby ( 173196 ) on Monday March 03, 2008 @01:40PM (#22625302) Homepage Journal

    there is little difference between 128-bit and 256-bit AES encryption because neither has been broken yet.


    It doesn't matter that much that there's little difference right now between 128-bit and 256-bit AES. It will matter later. There will almost certainly be time after 128-bit AES is broken but before 256-bit is broken. During that time, the extra 128 bits will mean the difference between secure and insecure. And remember, attackers who can read but not crack your messages can still keep them for later when they're crackable. If your messages still have value at that time, they will crack them then.

    Of course, even 256-bit AES will eventually be broken. Everything will eventually be broken. But you have to consider that what you're buying for your encryption dollar isn't secrecy, period, but rather secrecy for a period of time. 256-bit AES buys more time.
    • by PingXao ( 153057 )
      The notion that "everything will eventually be broken" is one I do not share. If by "broken" you mean the technical cryptological definition of "finding a weakness", then I would agree. But flat-out broken, as in, "I can read all your encrypted messages", then no, I do not agree. Most breaks, certainly the more celebrated ones, have more to do with flawed implementation of the security system as a whole, rather than the vulnerability of the underlying crypto algos.

      Before satellite TV hackers were shut do
      • Your argument about encryption algorithms vs products actually argues that encrypted messages will be readable at will earlier than when the algo is broken, not later. And your example of the TV systems is different from how easy it is to access the encrypted messages on the Internet.

        You really didn't offer an argument why a message encrypted with AES-128 could be trusted not to be read after AES-128 is eventually broken. Saying "Vista isn't broken yet" isn't a good argument. For one, only a small fraction
      • by sjames ( 1099 )

        The notion that "everything will eventually be broken" is one I do not share. If by "broken" you mean the technical cryptological definition of "finding a weakness", then I would agree. But flat-out broken, as in, "I can read all your encrypted messages", then no, I do not agree. Most breaks, certainly the more celebrated ones, have more to do with flawed implementation of the security system as a whole, rather than the vulnerability of the underlying crypto algos.

        Broken is a relative term. Even assumin

  • by v1 ( 525388 ) on Monday March 03, 2008 @01:40PM (#22625310) Homepage Journal
    One of our vendors sent us a demo drive, it was a small enclosure for a laptop size drive, and had a firewire interface. Instead of two firewire ports on the back, it had a firewire port and another identical looking firewire port, which was for the key. I assume the key was merely a very small firewire flash drive with the encryption key on the drive.

    The vendor assured us it was properly secured, and I got first crack at it. We were quite disappointed.

    I found that while each block on the hard drive WAS encrypted (by the firewire-to-ide bridge board), they were each encrypted using the same key, and no salt. This means that every block was encrypted in the same way.

    This by itself probably seems harmless, but it reveals information that should not be revealed. Let me propose a scenario:

    I engineer myself a position working at a rival company, and get physical access to their R&D lab, unsupervised. I have a 1/2 hr lunch break of time to find the drive containing the comany's secret recipes. I open the cabinet and find 30 of these secured drives. I was intending on taking the drive and copying it, but christ, there's 30 of them. I brought along a portable 1gb drive which would fit maybe 5 of them, but not 30.

    So which ones do I copy? The bad news... I can tell which ones to copy.

    I can look at the blocks on the disk and immediately spot any drives that have not been formatted, because their first 50 blocks are all going to contain the same random garbage in each block. OK that narrows it down to 8 drives. I can only image 5. So I look further.

    I can now tell which drives are formatted FAT32, APS (apple HFS), etc. I can do this because I know what blocks are zeros (because there are a lot of them and they are all the same) and so I can tell which bytes in the other blocks are NOT zeros, and this makes determingin format AND used space trivial. I know the drive I'm looking for is FAT32, and that breaks it down to 3 drives. I could just go with the one drive that clearly has 30 gb used on it, and skip the others that appear very lightly used, but this has given me plenty of time so I happily image the 3 drives to my portable and sneak out in under 20 minutes.

    Now of course we have to break the data, but the moral of the story here is, they allowed me way too much information from the supposedly secure drive, and it was enough to make what could have been a fruitless attempt into what may be a very successful attempt.

    I brought this issue to the manufacturers, and was brushed off. They did not consider this a problem. riiiiight.

    • Was that the Ciphershield? [ciphershield.com]
    • Re: (Score:2, Insightful)

      by rant64 ( 1148751 )
      Good write-up, but afaic it only shows that it's difficult to secure new, unformatted drives because you can tell them apart from the rest. If the drive had been wiped by even a single pass and quickformatted, that would probably make things more difficult.

      I agree that salts should apply and keys should be different for every sector, like Truecrypt does. But secure drives should be fully overwritten before use, even then. If the cracker has access to your encrypted data over a period of time, you should al
      • by v1 ( 525388 )
        Whether or not you zero the drive before use is meaningless. Most drives ship from the manufacturer zero'd. Finding zero blocks is trivial under this system.

        Even if we assume the drive was used for quite awhile before I got my hands on it, and thus had what will appear as random information in each block, I can do all sorts of analysis of it. I can still determine what filesystem is on it, and I can even scan the drive for more interesting things like count the number of (potential) files on the drive by
  • Hmmm... are any of these FIPS 140-2 [wikipedia.org] compliant? I think last I checked some were going through the cert process, but only one flash drive I know of has the certification. (Kanguru offers the only one I've found, making it the only one people will approve for use in the building.) Not sure if that cert is even worth the paper its written on, though.
  • Ironkey (Score:3, Insightful)

    by ramk13 ( 570633 ) on Monday March 03, 2008 @01:52PM (#22625448)
    Most of it sounds great, but "If someone does happen to gain access to your flash drive and they fail to type in the correct password more than 10 times, IronKey will self-destruct, permanently locking out users and wiping out all the data on the drive."

    Seems pretty easy for someone to destroy the drive/data if they wanted to. Even accidentally destroy the drive/data.
  • One of them won't even tell you the full details of the algorithm they use, saying it's 'proprietary' which is another word for "It's secret and it doesn't actually work." in the security industry.

    Not only that, but each and every single one of them uses software on my computer to do the encryption. I can get the same thing by using decent drive encryption software like dm-crypt and LUKS. And those are publicly viewable and peer reviewed so they're much more likely to be secure than some stupid random algorithm slapped together by a few techs they paid to do it out of the spare change jar. So that's just totally silly.

    I was hoping for something where the encryption was really done in the drive itself and it required me to enter something on a little keypad attached to it in some way in order to decrypt anything. I bet the one that sounds like it might do that just causes the USB device to refuse to talk to the world unless you enter the right thing on the keypad. You could pull that thing apart, attach a few leads and I bet you could read every bit off there (including the PIN) in the clear.

    Security isn't that hard to do right. But nobody seems to want to bother. They just want to slap the word on their product, make the user jump through a few hoops and call it good.

  • No BioStik review? (Score:4, Interesting)

    by fialar ( 1545 ) on Monday March 03, 2008 @02:24PM (#22625892)
    A few years ago I bought a 1 gigabyte BioStik [biostik.com] and it works really well. It can read 2 fingerprints. The only down side is, you need to actually issue the linux 'eject' command (or in windows remove safely option) or else the filesystem basically gets corrupted. Other than that, it's a great stick and quite secure. It has anti-tampering on it, so if someone tries to open it up, it immediately wipes the disk clean.
  • by imstanny ( 722685 ) on Monday March 03, 2008 @04:24PM (#22627406)
    A friend of mine ordered the Iron Key a few months ago. It didn't work at all, so he sent it back for a replacement. The replacement broke after 3 days. I would think reliability should be incorporated into the 'security' factor. If the data is lost, even if its into thin air, that's not very secure at all. SO the question is: was my friend's experience with the Iron Key an isolated incident/bad luck, or is there indeed a reliability problem (and thus a security problem) with the Iron Key??
  • These people did review the performance, of all things. The first thing that needs review in a supposedly secure storage device is ITS SECURITY! Not reviewing that only shows that the reviewers are utterly clueless and do not know that most of these things are easily broken. An easily broken "secure storage device" is not a secure storage device and no performance figure can fix that.

    Incompetents.
  • What a surprise... (Score:3, Interesting)

    by damn_registrars ( 1103043 ) <damn.registrars@gmail.com> on Monday March 03, 2008 @06:18PM (#22628720) Homepage Journal
    The winner was the same product that I see advertised here on slashdot while typing this response.

    I'm sure that's just pure coincidence, though.
  • now includes battery backed heater!
  • I figure XFS, Reiser4, Ext4, or the like should buy me some time. Figuring that Windows has 90%+ of the market share, I should be safe from most mischevious people that would break in to my home to steal my stuff.
  • The review isn't so good on examining performance.

    1) Inconsistent tests for the various file copies mentioned - so you can't really compare.
    2) No write speeds listed for all.

    Write speeds are significant if you are talking about copying GBs of data to the drive.

    And for the write tests you have to ensure that it's all copied and written to the usb drive and not just cached somewhere.

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...