plans to have hidden electrodes surreptitiously measure the resistance of a user’s finger when it’s being plugged in. The second part is the access control the “wet fingers” part. Toggling the chip enable (CE) pin will hide the drive’s contents. In such environments, it is better for the drive to appear completely normal. But in some environments, the mere presence of encryption technology can be considered incriminating. First, encryption is of course the technologically sound and correct solution to data security. It sounds weird, but let’s walk through the thinking behind the concept. What separates authorized access from unauthorized? Wet fingers. The only difference is this: if an unauthorized person plugs it in, there’s no data. Instead of relying on encryption or other “visible” security features, this device looks and works like an utterly normal USB drive. Has a very interesting new project: a completely different take on a self-destructing USB drive.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |