For FIPS Sake – Smashing The iStorage DiskAshur PRO

For FIPS Sake – Smashing The iStorage DiskAshur PRO

Over the last two/three years, when chatting with clients, or delivering training, there has been occasions when the following question has come up:


‘How do I know FIPS/140-2 encrypted drives are as secure as claimed by the commercial sales bumph of the provider?’


AKA- how confident can the user be in the modern era of data breaches – can they be assured that, if the worse-case scenario does occur, their sensitive data objects are not placed in readable reach of the finder, or for that matter criminal?


So, having decided that there is a real need to prove (or disprove) the claims, I set off to take some action to test the theory in hands-on, practical terms, and commenced on my 10 Step technical venture with a 500GB iStorage diskAshur PRO encrypted drive in-hand, loaded with data.


Step 1: Connect drive to PC to assure that it was in full working order on two Operating Systems – Linux and Windows 10 – both loaded and mounted the encrypted drive after the correct PIN code had been input and accepted – at this point we have a green light displayed on the drive and full access to the secured contents was achieved.


Step 2: With hammer in hand, a pair of pliers and a screwdriver I started to break open the drive outer cover. 


Steps  3 – 5: The following steps were a matter of gradually pealing back the drive internals and along that path upon every part being deconstructed from the  build of the part disassembled drive, it was again mounted, the PIN entered, and authenticated, and access was gained to the drive contents– see images 1 – 3. Now, things are getting serious, but yes, the part disassembled drive is still working.


Image 1 – Drive Outer Case Removed     Image 2 – P ..

Support the originator by clicking the read the rest link below.