What is defferent hardware encrypted from software encrypted?
In the case of flash drives (as well as HDD and SSD), a special chip located on the printed circuit board of the device is used to implement hardware data encryption. It has a built-in random number generator that generates encryption keys. Data is automatically encrypted and instantly decrypted when a user password is entered. In this scenario, accessing data without a password is nearly impossible.
How do iStorage drives AES 256-bit Hardware Encrypted?
iStorage uses AES-XTS 256-bit hardware encryption for all of its secure drives datashur and diskashur. As we noted above, flash drives contain in their component base a separate chip for encrypting and decrypting data, which acts as a constantly active random number generator. The first time you connect a device to the USB port, the Initialization Setup Wizard prompts you to set a master password to access the device. After activating the drive, the encryption algorithms will automatically start working according to user preferences.
Who guarantees the absence of "backdoors" from the manufacturer when using flash drives with hardware encryption?
Almost all buyers are concerned about this question, because they want to make sure that our USB drives are free of common errors, such as weak encryption or the ability to bypass the password entry. Therefore, all products are tested by a third party with an independent review. Specifically, all hardware-encrypted iStorage USB drives are certified to the Federal Information Processing Standard (FIPS).