I agree with Chris.  My Ironkey works fine on Linux.  True, it does not had all 
the add-on stuff that is available when launching from Windows.  If you have an 
older Ironkey, you will need to update it to get the Linux and Mac support.

Jody

-----Original Message-----
From: [email protected] 
[mailto:[email protected]] On Behalf Of Chris John Riley
Sent: Friday, May 28, 2010 11:48 AM
To: PaulDotCom Security Weekly Mailing List
Subject: Re: [Pauldotcom] Kanguru Bio AES Drive

Strange, I've used my Ironkey flawlessly on Win/Mac/Lin without any issues. 
Other encrypted USB keys, not so much. Many only support Windows.

With that said though. Truecrypt is a great product.

Chris

--
• Chris John Riley •
• http://blog.c22.cc •
--
----------------------------------------
All emails ROT-26 encrypted
----------------------------------------

On 28.05.2010, at 15:51, David Kovar <[email protected]> wrote:

> Ironkey's support for non-Windows platforms is sorely lacking.
>
> TrueCrypt is what I tend to use for securing a variety of portable 
> media.
>
> -David
>
>
> On Tue, May 11, 2010 at 1:48 PM, iamnowonmai <[email protected]>
> wrote:
>> Ironkey
>>
>>
>> Michael Miller <[email protected]> wrote:
>>
>>> I'm a bit skeptical about flash drives and hard drives that claim to 
>>> have device encryption or hardware encryption.  Most of these 
>>> devices only work on Windows machines.  I have a issue with the 
>>> assurance that the drivers / management software (for the device) is 
>>> written well.
>>> The cost is also higher for these devices.  Which one would expect 
>>> but are you really getting what you pay for?  I've not done a price 
>>> comparison lately, that might not be a issue now.  My personal view 
>>> is you can get high assurance levels encrypting content on a normal 
>>> flash drive / hard drive using openssl or gpg.  I know openssl and 
>>> gpg is not the most user friendly software for some individuals.
>>>
>>> I'm going to reference this article about about one vendor.
>>> www.h-online.com/security/features/Enclosed-but-not-encrypted-746199
>>> .html The way I see it using XOR and not AES is blatant false 
>>> advertising.
>>>
>>>
>>> -Miller
>>>
>>> On Fri, May 7, 2010 at 7:49 AM, Brad Nelson <[email protected]>
>>> wrote:
>>>> https://www.kanguru.com/index.php/flash-drives/secure-storage/kangu
>>>> ru-bio-aes#description
>>>>
>>>> I am working with a group that has business need to transport 
>>>> regulated data
>>>> (research/healthcare, not financial or defense) on a jumpdrive.   
>>>> I really
>>>> like the look of this drive in the link above, but before I move 
>>>> forward has anyone heard of any vulnerabilities in this device or 
>>>> am I missing something?
>>>>
>>>> Thanks,
>>>>
>>>> Brad
>>>>
>>>> _______________________________________________
>>>> Pauldotcom mailing list
>>>> [email protected]
>>>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>>>> Main Web Site: http://pauldotcom.com
>>>>
>>> _______________________________________________
>>> Pauldotcom mailing list
>>> [email protected]
>>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>>> Main Web Site: http://pauldotcom.com
>> _______________________________________________
>> Pauldotcom mailing list
>> [email protected]
>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>> Main Web Site: http://pauldotcom.com
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to