kinda like the recompute base encryption hash button in sales guy vs web dude

So, let’s see if I understand, the device only destroys the data after it’s connected to a computer.
So an adversary can just not connect it to a computer and extract the data through alternative means (like unsoldering the chip and reading it directly.
The device should be able to destroy itself either from an internal battery or some physical or chemical mechanism.
The image you posted seems to disagree with you. There is some sort of “Physical Data Destruction” in phase 2. The article says the switch breaks some chips, but I didn’t get much beyond that. In any case, lets hope the delete-when-plugged-in thing is redundant.
My assumption is that it probably uses the same mechanism that most other SSDs already have where it always saves the data with internal encryption and simply overwrites the encryption key when a wipe is requested.
This same mechanism already allows SSDs to be formatted quickly while still being secure without having to zero out everything, which would cause a lot of additional wear.
The additional complete wiping would just be the cherry on top.
Help, my cat stepped on the button, how do I recover my data?
To prevent accidental and catastrophic presses, the drive’s self-destruct button is designed with a two-stage sliding switch.
Looks like they prevent that.
CATastropic preesses are prevented? Sounds PURRfect.
I’m not sure I trust myself with that functionality.
So it’s a fidget with a slider AND a button?
Two stage slider
Or you could just use an encrypted file system…
If they are willing to torture you for the decryption key, then they are also willing to kill you if you destroy the drive.
Def not true about the justice system, killing you does not do them any good, they just want good prosecution statistics









