Just under three years ago, @Stake found that the password protection on one vendor's secure products was solely at the software level .
Capacities have drastically increased, and improved process technologies should have allowed for improved security functionality since then.
On this page, I'll present examples and demonstration programs that once again illustrate that security cannot be added in as a marketing afterthought.
AcomData claims "strong SHA-256 password encryption" for their line of external enclosures. Despite impossible security claims, their current consumer product line lacks hardware encryption. A tamper-evident sticker is the sole protection against removing the drive from the enclosure.
Two other factors further demolish this device's security:
Dmiunlck demonstrates this weakness -- it opens up the protected portions of the drive without needing the password.
Vista Compatibility: This program must run as administrator. Further, Vista will not recognize the new drive without a rescan. After running the program, follow the sequence: win-R -> diskmgmt.msc Actions->Rescan Disks
This program is also believed to work on Toshiba external hard drives, such as the Toshiba PX1269E, primarily sold in Europe.
While PNY claims that "encrypted data will not be recoverable" due to 256-bit AES encryption, this does not appear to be the case with the current software revision.
SmartLoginVE.exe version 220.127.116.11, included on the flash drive, writes the actual password into the same area used for the password hint. This sector does not appear to be used by the flash controller and the reason for this behavior is unknown.
pnypwd demonstrates this problem -- it displays the password hint area, which usually includes the plaintext password for the "secure" portion.
Vista Compatibility: This program shouldn't need any special privileges to run under Windows Vista.
Verbatim has provided a fix - download the vsafe update from http://www.verbatim.com/downloads.cfm
Contact information: usbtinker(at)gmail.com