With all of the data leaks being announced on a daily basis, many people have decided that they would rather host their own data in order to maintain control. While there are many options, such as NAS devices, sometimes you may want access to your files anywhere you are, regardless of an Internet connection, so a portable storage device is something to consider. But once the device leaves the house, what happens if you accidentally lose it or your laptop bag is stolen?
Back in 2018, I took a look at the iStorage diskAshur PRO2, a secure portable hard drive that encrypted all data on the device. Today, I'll take a look at the iStorage datAshur PRO2, a device that provides similar functionality to the diskAshur PRO2, only in a small USB thumbdrive form factor that you can easily put in your pocket and carry with you.
The datAshur PRO2 comes in different capacities, from 4GB (priced at 49/$59) all the way up to 512GB (priced at 369/$468). Our review unit, provided by iStorage, was the 256GB model, priced at 279/$358.
3.7V Li-Polymer Rechargeable Battery
USB 3.2 Gen 2 SuperSpeed USB
The device's housing is made of a rugged anodized aluminum, and the case that goes over it has a rubber gasket to make the datAshur PRO2 waterproof, giving it an IP58 certification.
The USB drive contains a rechargeable battery. This lets you type in the PIN and unlock the device before connecting the datAshur PRO2 to a USB port on your computer. Since all of the encryption and decryption is done on the thumb drive itself, the datAshur PRO2 can be used on Windows, Mac, and Linux without the need to install any drivers. If the battery dies from lack of use, you can still plug it into a computer and unlock the drive while it's charging.
If you're paying for an encrypted drive, part of the cost is related to obtaining security certifications, and the datAshur PRO2 has a lot of them. Or rather, is in the process of obtaining a lot of them. Unfortunately it's hard to tell which ones have been completed and which ones are currently in process. Let's explore those certifications in the next section.
The buttons on the device are the main interface, and they have a polymer coating to prevent the keys from smudging, which would tip off an attacker as to what keys are frequently pressed to unlock it.
If you're looking for cheap and portable storage, but don't care about security, then there are far better solutions in the market for you that come in at much cheaper price points. If you require your data to be secure, then the datAshur PRO2 shines.
The website lists the following certiifcations/validations for the datAshur PRO2: FIPS 140-2 Level 3, NCSC CPA, NLNCSA BSPA & NATO Restricted Level. However it's hard to tell which of these the product has completed, and which are still pending review by the official agencies. For example, the device does not yet have FIPS 140-2 Level 3 validation, although the design itself is compliant. If this distinction is important to you for purchasing, you'll want to wait a little longer for NIST to complete its review. The company has other products that have been approved, so I suspect it's only a matter of time before the datAshur PRO2 is validated as well.
One of the main physical features that will allow iStorage to obtain FIPS 140-2 Level 3 validation on the datAshur PRO2 is the fact that the components within the device are covered in an epoxy resin. This makes physical attacks against the hardware nearly impossible without damaging the components, and is also used as evidence that the device has been tampered with.
The datAshur PRO2 is a great solution for enterprise environments due to the ability to whitelist the device. This allows a company to lockdown what external storage devices are allowed to connect to the corporate network and prevent someone from, for example, connecting a rogue USB thumbdrive that may have malware on it, while allowing approved devices. Unfortunately, my test lab does not have the ability to test this functionality.
The device has a concept of both an admin and a regular user account. The admin account allows you to setup features on the datAshur PRO2, such as password complexity, create a one-time recovery PIN, set the device as bootable, or make the device read-only to users. The user account only allows someone to read/write data stored on the device, and of course, only the admin can create users.
Another interesting feature of the datAshur PRO2 is the concept of a "self-destruct" PIN. If configured, you can simply type in the code to automatically delete the encryption keys and the data from the device. While this feels very spy-like, it's better to have the feature and not need it than need it and not have it.
While the datAshur PRO2 has a lot of features available, you will probably want to keep the manual nearby because memorizing all of the keypresses required to set things up or check the status is pretty much impossible. However, the PDF, which is included on the drive itself when you first get buy it, is very informative and has clear instructions on what to do and how the device will respond, as shown in the example above. In addition, unlocking the device is what you'll be doing the most, and that's a simple process to perform.
Since the datAshur PRO2 supports a USB 3.2 Gen 2 SuperSpeed connection, I expected the performance to be great and I was not disappointed.
While I normally test NAS systems using a RAM-disk in order to reduce latency, I went with a more "real-world" test here of simply copying files my Samsung 970 EVO Plus NVMe drive to the datAshur PRO2. Since the drive can read and write at over 3,300 MB/sec, we'll definitely only be limited by the USB bus and the USB drive itself.
According to the specs on the iStorage website, you can expect a maximum of 168 MB/sec when reading files from the device, and 116 MB/sec when writing files to to the device.
After doing my normal battery of tests - namely, copying a multi-gigabyte file to/from the device and copying hundreds of multi-megabyte files to/from the device, I was roughly hitting those numbers. When connected to a USB 3.0 or better port, a simple drag-and-drop copy would always consistently show 116 MB/sec when writing files to the datAshur PRO2 and 130 MB/sec when reading from the datAshur PRO2. When connected to an older USB 2.0 port, performance was consistently throttled at 40 MB/sec for all of the tests.
Running a benchmark in CrystalDiskMark provided even higher throughput values, with a consistent 140 MB/s sequential read and 128 MB/s sequential write speeds. As expected, random read/write speed was considerably slower, clocking in at only 17 MB/s read and a maximum of 12 MB/s write.
While it would've been nice to see the device take full advantage of the USB 3.2 performance, these speeds are still reasonable and iStorage delivers what it promises.
Unlike a regular flash drive, if you plug the datAshur PRO2 into a USB drive, nothing happens. In order to access the drive, you have to first unlock it. This process consists of holding the shift key down on the drive to wake it up, then pressing the unlock key, followed by your PIN code. The red light under the locked padlock lights up when the datAshur PRO2 is awake, and the unlocked padlock and letter A (administrator) start flashing after you press the unlock key. Once unlocked, you have 30 seconds to plug the device into a computer before it automatically locks itself again. Alternatively, you can plug the device in first and then unlock it.
The keys themselves are only slightly raised, but have a nice tactile response when pressed, making it easy to know you've successfully engaged it. In all of my testing, I never once accidentally pressed the wrong button.
When in the unlocked mode and connected to a computer, the datAshur PRO2 stays unlocked until it's removed from the USB port or the computer is rebooted. During this time, it acts just like a regular flash drive you'd connect to your PC.
The one minor quibble is that when you pull the flash drive from its protective sleeve, you have to make sure you don't misplace it. The datAshur PRO2 is only waterproof when in the sleeve, due to the rubber gasket, and the sleeve also protects against accidental button presses.
There's an old adage in technology: Good, Fast, Cheap, pick two. It's clear that iStorage went in with the strategy of creating a good and fast product, but as I noted earlier, that means the device is not cheap, especially at the larger capacities.
If you're just looking for a USB flash drive to store some generic data, then you probably won't be interested in the datAshur PRO2. It's a little bigger than a normal drive and a lot more expensive, especially as you look at the larger capacity drives. However if you're looking for a well designed, well performing, and very secure thumb drive to store sensitive data, you can't go wrong with the datAshur PRO2. In addition, if you're only looking to keep some sensitive documents that don't take up a lot of space, the four gigabyte version is only $59, which is a great price considering the level of security the device maintains.
Continue reading here:
Review of the iStorage datAshur Pro2, an encrypted thumbdrive for home and work - Neowin
- WhatsApp overhauling status tab with encrypted Snapchat Stories-like feature - 9 to 5 Mac [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- GOP demands inquiry into EPA use of encrypted messaging apps - CNET [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Encryption Apps Help White House Staffers Leakand Maybe Break the Law - WIRED [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- World Wide Web Creator Calls for Internet Decentralization & Encryption - The Data Center Journal [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- What It Means to Have an 'Adult' Conversation on Encryption - Pacific Standard [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Confide in me! Encryption app leaks sensitive info from Washington DC - SC Magazine UK [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Gmail v7.2 Prepares to Add Support for S/MIME Enhanced Encryption - XDA Developers (blog) [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Top 6 Data Encryption Solutions - The Merkle [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Your Guide to the Encryption Debate - Consumer Reports - ConsumerReports.org [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Google helps put aging SHA-1 encryption out to pasture - Engadget [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Decipher your Encryption Challenges - Infosecurity Magazine [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How the Politics of Encryption Affects Government Adoption - Freedom to Tinker [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How Encryption Makes Your Sensitive Cloud-Based Data an Asset, Not a Liability - Security Intelligence (blog) [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Set up VMware VM Encryption for hypervisor-level security - TechTarget [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How The Media Are Using Encryption Tools To Collect Anonymous Tips - NPR [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Encryption patent that roiled Newegg is dead on appeal | Ars Technica - Ars Technica [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Research proposes 'full-journey' email encryption - The Stack [Last Updated On: March 1st, 2017] [Originally Added On: March 1st, 2017]
- Database-as-a-service platform introduces encryption-at-rest - BetaNews [Last Updated On: March 1st, 2017] [Originally Added On: March 1st, 2017]
- Encrypted Messaging Service 'Signal' Adds Video Call Option - Top Tech News [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Germany, France lobby hard for terror-busting encryption backdoors ... - The Register [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- How to Send Encrypted Nudes, a Guide for the Discerning Lover - Inverse [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Ironclad Encryption Corporation Announces New Ticker Symbol OTCQB: IRNC - Yahoo Finance [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- The Best Email Encryption Software of 2017 | Top Ten Reviews [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- No, you shouldn't delete Signal or other encrypted apps - TechCrunch [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Best encryption software: Top 5 - Computer Business Review [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Encryption Backdoors, Vault 7, and the Jurassic Park Rule of Internet Security - Just Security [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- That Encrypted Chat App the White House Liked? Full of Holes - WIRED [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- What the CIA WikiLeaks Dump Tells Us: Encryption Works - New York Times [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Snake-Oil Alert Encryption Does Not Prevent Mass-Snooping - Center for Research on Globalization [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Customer Letter - Apple [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Don't Let WikiLeaks Scare You Off of Signal and Other Encrypted Chat Apps - WIRED [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- BT to offer customers encryption service for data - Capacity Media (registration) [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Encryption - technet.microsoft.com [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Use FileVault to encrypt the startup disk on ... - Apple Support [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Viber launches secret chats to go beyond encryption - SlashGear [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- Zix wins 5-vendor email encryption shootout - Network World [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- A lesson from the CIA WikiLeaks dump: Encryption works - The Seattle Times [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- What the CIA WikiLeaks Dump Tells Us: Encryption Works - NewsFactor Network [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Panicked Secret Service Says It Lost Encrypted Laptop But It's Fine, Everything's Fine - Gizmodo [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Google Cloud adds new customer-supplied encryption key partners ... - ZDNet [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Preseeding Full Disk Encryption - Linux Journal [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Bypassing encryption: 'Lawful hacking' is the next frontier of law enforcement technology - Boston Business Journal [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- SecurityBrief NZ - Gemalto introduces on-prem encryption key solution for 'highly regulated' organisations - SecurityBrief NZ [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- 'Always Be Concerned': US Court Slaps Down Fifth Amendment Defense of Encryption - Sputnik International [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Quantum Key System Uses Unbreakable Light-Based Encryption to Secure Data - Photonics.com [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Wikileaks Only Told You Half The Story -- Why Encryption Matters More Than Ever - Forbes [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- EPA Sued For Withholding Info On Encrypted Text Messages | The ... - Daily Caller [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- Opinion Data encryption efforts ramp up in face of growing security threats - Information Management [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- Bypassing encryption: Lawful hacking is the next frontier of law enforcement technology - Salon [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- NeuVector Announces Container Visualization, Encryption, and Security Solution for NGINX Plus - DABCC.com [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Is encryption one of the required HIPAA implementation specifications? - TechTarget [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Paper Spells Out Tech, Legal Options for Encryption Workarounds - Threatpost [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Encryption debate needs to be nuanced, says FBI's Comey - TechTarget [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- Comey Renews Debate Over Encryption - 550 KTSA [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- UK minister says encryption on messaging services is unacceptable - Reuters [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- The why and how of encrypting files on your Android smartphone - Phoenix Sun [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- UK targets WhatsApp encryption after London attack - Yahoo News [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Critical flaw alert! Stop using JSON encryption | InfoWorld - InfoWorld [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- SecureMyEmail is email encryption for everyone - TechRepublic - TechRepublic [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Apple iOS 10.3 will introduce encryption which makes it MORE difficult for cops and spooks to crack into ISIS nuts ... - The Sun [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- How to Analyze An Encryption Access Proposal - Freedom to Tinker [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Questions for the FBI on Encryption Mandates - Freedom to Tinker [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Justice Department anti-terror chief keeps pressing on encryption - Politico (blog) [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- UK government can force encryption removal, but fears losing, experts say - The Guardian [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Encryption FAQs [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Why isn't US military email protected by standard encryption tech? - Naked Security [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- How have ARM TrustZone flaws affected Android encryption? - TechTarget [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- Keeping the enterprise secure in the age of mass encryption - Information Age [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- Lack of encryption led to Dallas siren hack - WFAA [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Internet Society tells G20 nations: The web must be fully encrypted - The Register [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Make Encryption Ubiquitous, Says Internet Society - Infosecurity ... - Infosecurity Magazine [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Can we encrypt the web while giving governments a backdoor to snoop? - SC Magazine UK [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Why we need to encrypt everything - InfoWorld [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Hacked Dallas sirens get extra encryption to fend off future attacks - Computerworld [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- SHA-1 Encryption Has Been Broken: Now What? - Forbes [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Hewlett Packard Enterprise touts encryption tool for federal clients - The Hill [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Encryption on the Rise in Age of Cloud - Infosecurity Magazine - Infosecurity Magazine [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Lawmaker Pushes Bill That Requires Encryption by Pennsylvania State Employees - Government Technology [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Disk encryption - Wikipedia [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- The apps to use if you want to keep your messages private - Recode [Last Updated On: April 15th, 2017] [Originally Added On: April 15th, 2017]