Q: What encryption type and method is used?

A: We use hardware encryption instead of software encryption. It utilizes AES 256-bit Encryption in CBC mode - it is Unbreakable. This is the same type of encryption the NSA and other government agencies use. The CBC method is stronger that the accepted Electronic Code Book method and only available with hardware encryption.

Q: What is CBC mode and why is it better?

A: Cipher Block Chaining, is a higher confidentiality mode whose encryption process features the combining ("chaining") of the encrypted blocks with the previous cipher text blocks; in addition to using a given Key Code. The security level of a CBC implementation is quadruple trillions times more than that of ECB (Electronic Code Book) mode found in software encryption.

Q: Is Hardware Encryption better?

A: Yes, software encryption only encrypts part of your system drive. This gives unwanted investigation a "foot in the door" to gain any kind of information about the computer's use and the files. Hardware encryption is NOT susceptible to unwanted intrusion, hacking, or forensics. With Hardware Encryption:

  • It is not vulnerable to viruses, malware or spyware corruption which can disable or modify software encryption.
  • Hardware encryption is safer and simpler to use. There are no passwords, codes and procedures to remember. No training is needed or reoccurring updates as with software encryption.
  • It is compatible with all operating systems.
  • It does not rob power from the CPU as software encryption does. Hardware Encryption operates independently on its own power.
  • NO DATA is ever visible on the encrypted drive without your key. It will only appear on a standard SATA port as an uninitialized “new” hard drive. This gives plausible deniability that any data has been on the drive.

Q: Is there any maintenance required for hardware encryption?

A: No - Hardware encryption has the lowest TCO (Total Cost of Ownership). There is no IT maintenance required, no software versions to maintain nor any updates to keep track of. This makes everything simple for private use and cost effective for deployment in government, healthcare, industry and business.


100% Totally Secure Data