Header Ads

THE HARD DRIVE YOU CAN MAKE SELF-DESTRUCT WITH A TEXT

Reminiscent of something from Mission: Impossible, the Autothysis128t is a hard drive you can make self-destruct with a text message should you lose it or if it happens to fall into the wrong hands.

You can encrypt it with a password, but for added protection it includes a built in cellular radio that can receive texts. You determine the kill command and, when necessary, text it to the drive to make it commit suicide.

The Autothysis128t is a 128GB drive, and can also be taught to self-destruct in the event that it is disconnected from your computer or if too many wrong passwords are attempted.
The device doesn’t exactly explode or anything like that, but it does scramble its insides to block all known methods of data recovery.
All of this extra security will set you back about $1600.

The Autothysis128t is the ultimate in data storage protection. The Drive offers a broad configuration set of options to safeguard your data from unauthorised access.

The Autothysis128t is a 128GB SSD Self-Encrypting Drive (SED) with 256-bit AES CBC hardware level encryption and computer independent 2 factor authentication via a separate Token. The encryption engine is FIPS 140-2 level 3 certified.

The 2.5” Drive can be used inside a computer via the SATAII interface or externally via the micro USB3.0 port with a micro USB3.0 or micro USB2.0 cable.

The Drive has built in GSM with the capability of physical data destruction on demand. It is the first SSD Drive in the world to offer remote fragmentation of the NAND Flash storage within the Drive.

This patented technology is designed to fragment the NAND Flash along with the security controller to impede any data recovery technique that might be applied in an attempt to gain access to the encrypted data. No amount of computer processing power will help if a NAND Flash can't be mounted onto a PCB. The whole design approach of this Drive was based on reverse engineering data recovery techniques.

Physical data destruction – on demand. The data destruction process can be triggered by any of the following:
  • Via SMS 'kill message' (user defined)
  • Starvation of the GSM signal
  • Anti-tamper Case
  • Tap-to-destroy function in the Token
  • Low battery level
  • Removing the Drive from a PC
  • PIN code retries being exceeded

Token - The Token is the command centre for the Drive and allows easy access to all configuration options. It enables the user to quickly change the level of security depending on the users own security risk landscape. Up to three Tokens can be assigned to one Drive and up to three Drives can be assigned to one Token.












No comments

blogmytuts. Powered by Blogger.