I agree with Chris. My Ironkey works fine on Linux. True, it does not had all the add-on stuff that is available when launching from Windows. If you have an older Ironkey, you will need to update it to get the Linux and Mac support.
Jody -----Original Message----- From: [email protected] [mailto:[email protected]] On Behalf Of Chris John Riley Sent: Friday, May 28, 2010 11:48 AM To: PaulDotCom Security Weekly Mailing List Subject: Re: [Pauldotcom] Kanguru Bio AES Drive Strange, I've used my Ironkey flawlessly on Win/Mac/Lin without any issues. Other encrypted USB keys, not so much. Many only support Windows. With that said though. Truecrypt is a great product. Chris -- • Chris John Riley • • http://blog.c22.cc • -- ---------------------------------------- All emails ROT-26 encrypted ---------------------------------------- On 28.05.2010, at 15:51, David Kovar <[email protected]> wrote: > Ironkey's support for non-Windows platforms is sorely lacking. > > TrueCrypt is what I tend to use for securing a variety of portable > media. > > -David > > > On Tue, May 11, 2010 at 1:48 PM, iamnowonmai <[email protected]> > wrote: >> Ironkey >> >> >> Michael Miller <[email protected]> wrote: >> >>> I'm a bit skeptical about flash drives and hard drives that claim to >>> have device encryption or hardware encryption. Most of these >>> devices only work on Windows machines. I have a issue with the >>> assurance that the drivers / management software (for the device) is >>> written well. >>> The cost is also higher for these devices. Which one would expect >>> but are you really getting what you pay for? I've not done a price >>> comparison lately, that might not be a issue now. My personal view >>> is you can get high assurance levels encrypting content on a normal >>> flash drive / hard drive using openssl or gpg. I know openssl and >>> gpg is not the most user friendly software for some individuals. >>> >>> I'm going to reference this article about about one vendor. >>> www.h-online.com/security/features/Enclosed-but-not-encrypted-746199 >>> .html The way I see it using XOR and not AES is blatant false >>> advertising. >>> >>> >>> -Miller >>> >>> On Fri, May 7, 2010 at 7:49 AM, Brad Nelson <[email protected]> >>> wrote: >>>> https://www.kanguru.com/index.php/flash-drives/secure-storage/kangu >>>> ru-bio-aes#description >>>> >>>> I am working with a group that has business need to transport >>>> regulated data >>>> (research/healthcare, not financial or defense) on a jumpdrive. >>>> I really >>>> like the look of this drive in the link above, but before I move >>>> forward has anyone heard of any vulnerabilities in this device or >>>> am I missing something? >>>> >>>> Thanks, >>>> >>>> Brad >>>> >>>> _______________________________________________ >>>> Pauldotcom mailing list >>>> [email protected] >>>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom >>>> Main Web Site: http://pauldotcom.com >>>> >>> _______________________________________________ >>> Pauldotcom mailing list >>> [email protected] >>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom >>> Main Web Site: http://pauldotcom.com >> _______________________________________________ >> Pauldotcom mailing list >> [email protected] >> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom >> Main Web Site: http://pauldotcom.com > _______________________________________________ > Pauldotcom mailing list > [email protected] > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com _______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com _______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
