• Seefra 1@lemmy.zip
    link
    fedilink
    arrow-up
    5
    ·
    3 hours ago

    So, let’s see if I understand, the device only destroys the data after it’s connected to a computer.

    So an adversary can just not connect it to a computer and extract the data through alternative means (like unsoldering the chip and reading it directly.

    The device should be able to destroy itself either from an internal battery or some physical or chemical mechanism.

    • Sidhean@piefed.social
      link
      fedilink
      English
      arrow-up
      1
      ·
      41 minutes ago

      The image you posted seems to disagree with you. There is some sort of “Physical Data Destruction” in phase 2. The article says the switch breaks some chips, but I didn’t get much beyond that. In any case, lets hope the delete-when-plugged-in thing is redundant.

    • NekuSoul@lemmy.nekusoul.de
      link
      fedilink
      arrow-up
      4
      ·
      2 hours ago

      My assumption is that it probably uses the same mechanism that most other SSDs already have where it always saves the data with internal encryption and simply overwrites the encryption key when a wipe is requested.

      This same mechanism already allows SSDs to be formatted quickly while still being secure without having to zero out everything, which would cause a lot of additional wear.

      The additional complete wiping would just be the cherry on top.