Here’s the Disk Ashur channeling its Edge technology as it shows off its toned and conditioned hard case dressed in beautiful pastel shades. This photographer just happened to catch Ashur in rare unposed footage of the hard disk as it made a rare appearance on the desktop.
It is nick named the Edge, which stands for Enhanced Dual Generating Encryption.
It was papped on the way from its multi-million pound data centre to the home from which its owner ‘works’ on Friday afternoons. According to local estate agents, the worker’s house is worth £500,000 (but they will probably listen to offers).
Ashur’s military grade hardware encryption drew some admiring glances. Its ability to instantly render information indecipherable to outsiders had hackers shaking their heads in despair.
The sleek lines of the toned kit drew some admiring glances from fans
What do they mean by ‘military grade’? I don’t know. They don’t say
The Dish Ashur impressed a crowd of admirers by using its own microprocessor to generate random numbers. The processor then stunned onlookers by performing feats of cryptography.
“This is clearly more than just a pretty face,” said one data centre insider. But Disk Ashur better be careful inside the cages, we heard. The other hard disks don’t take kindly to a drive that gets ideas above its work station. Some may try to infect it. Other criminals may attack it with a screw driver.
The Ashur reclines, while its onboard processor thinks of ways to make data indecipherable.
To prepare for such physical attacks Ashur has been toughening up in a studio, working to harden up its outer case.
It’s got a tamper free mechanism too. The only way to get physical access to Ashur’s is to get through its enclosure. And that only happens with consent. Which it isn’t giving any time soon. This is a hard disk with a brain remember and nothing gets past its omnipotent processor.
The Ashur is physically protected from external tampering.
All the critical components on Ashur’s circuit board are covered by a layer of epoxy resin, which is harder than that stuff they use to make the Black Box of a plane.
Epoxy Resin is even tougher, claim some insiders, than those bits of Weetabix that welded to your breakfast bowl after they’ve been through the dishwasher.
When weetabix is melted by superheated, then dried by the temperatures hotter the earth’s core, a residue forms on a plate and creates the hardest known substance in the natural world
But what happens next may surprise you.
If some super human actually managed to remove the epoxy resin they’d almost certainly damage the components. Even if, by some miracle, they didn’t, they’d still face the type of labours that would make Hercules thrown in the towel.
Not least of the defence mechanisms is the Common Criteria EAL4+ microprocessor. Then there’s the PIN number.
The encryption is full strength too. It uses AES 256 bit XTS full disk encryption.
The pins and keys are always encrypted while at rest.
The drive is designed to comply with the latest government certifications.
The drive needs no software or drivers to be installed on your machine.
Because it’s intelligent it works on any computer with all operating systems – as long as they have a USB port any comp.
Amazingly, despite all the work it does to instantly encrypt data, you won’t notice any performance deficit. You won’t be kept waiting for your data.
Your data needs to be protected by a pin number.
And then it’s encrypted. By an intelligent hard drive. This is a hard disk with its own processor. Like an officious security guard.
Its brains are in its disk.
If you’re feeling really zealous you can programme in a self destruct feature. If someone tries to hack into your device by trying a random set of pin numbers, you can get your system to self wipe if,say, the croook types in the pin number 1234.
Whatever number you use for your unique self destruct pin code, the end result is the same. once it has been triggered it deletes the encryption key, all pins and data. It then creates a new encryption key.
If there are 15 attempts at a log in, then the system becomes closed down and the data wiped.
If you haven’t used the disk for a while, the system automatically locks so that people can’t, say, access your computer while you are at lunch.
Under article 34 of the terms of GDPR, you can be fine massively if you lose an unencrypted device with with customer data. If you lose in iStorage device, you will be fine however. You won’t even need to report the loss.
If there is an automated attack the disk gets clever and offers an instant state of paralysis called a Deadlock frozen state.
Summary BOX: What is Cryptography?
It’s a sort of Rhyming Slang for computers.
Crypting Slang possibly.
Except that’s a massive over simplification.
What does it do?
Makes data unintelligible to outsiders.
First it makes it impossible to find.
Then it makes it impossible to convert.
To be safe, it makes it impossible to read.
Isn’t that what marketing managers do with technology press releases?
It’s a bit like that. But this goes even deeper.
And there is one crucial difference.
It won’t complain about not being on the front page of the FT.
How Do they do it?
Cryptography can only be created by assembling a critical mass of experts with knowledge of the following:
Communication science and physics