<article>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#article09_07_13_1836204</id>
	<title>IronKey Unveils Self-Destructing USB Flash Drive</title>
	<author>ScuttleMonkey</author>
	<datestamp>1247476260000</datestamp>
	<htmltext>fysdt writes to share that IronKey has released a <a href="http://blogs.zdnet.com/gadgetreviews/?p=5806">USB flash drive with self-destruct capability</a>.  Specializing in "secure flash drives," IronKey has launched the S200 aimed at government and enterprise customers, "featuring hardened physical security, the latest Cryptochip technology, active anti-malware and enhanced management capabilities.  It's the 'first and only USB storage device to achieve FIPS 140-2, Level 3 validation' and delivers advanced Cryptochip featuring AES-256, tamper-resistance and self-destruction circuitry."</htmltext>
<tokenext>fysdt writes to share that IronKey has released a USB flash drive with self-destruct capability .
Specializing in " secure flash drives , " IronKey has launched the S200 aimed at government and enterprise customers , " featuring hardened physical security , the latest Cryptochip technology , active anti-malware and enhanced management capabilities .
It 's the 'first and only USB storage device to achieve FIPS 140-2 , Level 3 validation ' and delivers advanced Cryptochip featuring AES-256 , tamper-resistance and self-destruction circuitry .
"</tokentext>
<sentencetext>fysdt writes to share that IronKey has released a USB flash drive with self-destruct capability.
Specializing in "secure flash drives," IronKey has launched the S200 aimed at government and enterprise customers, "featuring hardened physical security, the latest Cryptochip technology, active anti-malware and enhanced management capabilities.
It's the 'first and only USB storage device to achieve FIPS 140-2, Level 3 validation' and delivers advanced Cryptochip featuring AES-256, tamper-resistance and self-destruction circuitry.
"</sentencetext>
</article>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682833</id>
	<title>Re:Encryption is just as good as self destruction</title>
	<author>Anonymous</author>
	<datestamp>1247480520000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext><p><div class="quote"><p>Hit yourself on the head with a crowbar, making you forget the password. Problem solved.</p></div><p>Maybe the information-hiding-people don't want to potentially allow themselves to be subjected to information-gathering techniques (*ahem* torture) by knowing the password.  It's easier to just have the data destroyed after a certain period of time.  Once it's gone, you don't have to forget a password and you don't have any password to be persuaded to remember?</p></div>
	</htmltext>
<tokenext>Hit yourself on the head with a crowbar , making you forget the password .
Problem solved.Maybe the information-hiding-people do n't want to potentially allow themselves to be subjected to information-gathering techniques ( * ahem * torture ) by knowing the password .
It 's easier to just have the data destroyed after a certain period of time .
Once it 's gone , you do n't have to forget a password and you do n't have any password to be persuaded to remember ?</tokentext>
<sentencetext>Hit yourself on the head with a crowbar, making you forget the password.
Problem solved.Maybe the information-hiding-people don't want to potentially allow themselves to be subjected to information-gathering techniques (*ahem* torture) by knowing the password.
It's easier to just have the data destroyed after a certain period of time.
Once it's gone, you don't have to forget a password and you don't have any password to be persuaded to remember?
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682769</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28695313</id>
	<title>Re:Encryption is just as good as self destruction</title>
	<author>hesaigo999ca</author>
	<datestamp>1247605140000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Maybe anyone not wanting that the data be legally maneuvered in terms of company usage, like a court order forcing you to reveal the password might be useless in this case, as for TrueCrypt, there is a known backdoor in that industry, and such is used for counter measures to pedophiles right now in court cases, which is a sort of bug if you will with the way the drive is encrypted and the hashed password is saved somewhere on that same drive, or so I have heard.</p></htmltext>
<tokenext>Maybe anyone not wanting that the data be legally maneuvered in terms of company usage , like a court order forcing you to reveal the password might be useless in this case , as for TrueCrypt , there is a known backdoor in that industry , and such is used for counter measures to pedophiles right now in court cases , which is a sort of bug if you will with the way the drive is encrypted and the hashed password is saved somewhere on that same drive , or so I have heard .</tokentext>
<sentencetext>Maybe anyone not wanting that the data be legally maneuvered in terms of company usage, like a court order forcing you to reveal the password might be useless in this case, as for TrueCrypt, there is a known backdoor in that industry, and such is used for counter measures to pedophiles right now in court cases, which is a sort of bug if you will with the way the drive is encrypted and the hashed password is saved somewhere on that same drive, or so I have heard.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682769</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683405</id>
	<title>Wow</title>
	<author>webheaded</author>
	<datestamp>1247482860000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>This is such old news that it's ridiculous.  Furthermore, this is a ridiculously overpriced toy that breaks itself.  No thanks...if I have data that someone wants to hack by opening up my thumb drive, then I shouldn't be carrying it on a thumb drive in the first place.  Everything else this is just ridiculous and expensive overkill.</htmltext>
<tokenext>This is such old news that it 's ridiculous .
Furthermore , this is a ridiculously overpriced toy that breaks itself .
No thanks...if I have data that someone wants to hack by opening up my thumb drive , then I should n't be carrying it on a thumb drive in the first place .
Everything else this is just ridiculous and expensive overkill .</tokentext>
<sentencetext>This is such old news that it's ridiculous.
Furthermore, this is a ridiculously overpriced toy that breaks itself.
No thanks...if I have data that someone wants to hack by opening up my thumb drive, then I shouldn't be carrying it on a thumb drive in the first place.
Everything else this is just ridiculous and expensive overkill.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28689887</id>
	<title>Re:Nerdgasm</title>
	<author>Malevolyn</author>
	<datestamp>1247581140000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext>Er, why is this news? <a href="http://www.thinkgeek.com/gadgets/security/99f1/" title="thinkgeek.com">This exact item</a> [thinkgeek.com] has been on sale at ThinkGeek for a couple years, now. Self-destruct capabilities and everything.</htmltext>
<tokenext>Er , why is this news ?
This exact item [ thinkgeek.com ] has been on sale at ThinkGeek for a couple years , now .
Self-destruct capabilities and everything .</tokentext>
<sentencetext>Er, why is this news?
This exact item [thinkgeek.com] has been on sale at ThinkGeek for a couple years, now.
Self-destruct capabilities and everything.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682701</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28686641</id>
	<title>Re:Rip-off</title>
	<author>WoRLoKKeD</author>
	<datestamp>1247506920000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>If D&amp;D has taught me anything, it's that thieves are not without ethics. They just have a great flexibility about them.</htmltext>
<tokenext>If D&amp;D has taught me anything , it 's that thieves are not without ethics .
They just have a great flexibility about them .</tokentext>
<sentencetext>If D&amp;D has taught me anything, it's that thieves are not without ethics.
They just have a great flexibility about them.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682945</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28684289</id>
	<title>Re:Smoke</title>
	<author>Hurricane78</author>
	<datestamp>1247488260000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Bonus points when you can either<br>A) kill an attacker because it also is a nerve gas<br>B) use it as an antidote against a truth serum<br>C) kill yourself when in risk of being captured<br>D) all of the above.</p><p>.<br>.<br>.</p><p>Sadly, in reality, a good attack would mean, that you did not even notice that your system is compromised, and never would.</p></htmltext>
<tokenext>Bonus points when you can eitherA ) kill an attacker because it also is a nerve gasB ) use it as an antidote against a truth serumC ) kill yourself when in risk of being capturedD ) all of the above....Sadly , in reality , a good attack would mean , that you did not even notice that your system is compromised , and never would .</tokentext>
<sentencetext>Bonus points when you can eitherA) kill an attacker because it also is a nerve gasB) use it as an antidote against a truth serumC) kill yourself when in risk of being capturedD) all of the above....Sadly, in reality, a good attack would mean, that you did not even notice that your system is compromised, and never would.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682955</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28686855</id>
	<title>Re:Encryption is just as good as self destruction</title>
	<author>mgblst</author>
	<datestamp>1247508660000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Oh yes, the huge multi-billion dollar industry of reselling average student work, and the resale of cheap and small USB drives. No doubt this is an organization run by terrorists.</p></htmltext>
<tokenext>Oh yes , the huge multi-billion dollar industry of reselling average student work , and the resale of cheap and small USB drives .
No doubt this is an organization run by terrorists .</tokentext>
<sentencetext>Oh yes, the huge multi-billion dollar industry of reselling average student work, and the resale of cheap and small USB drives.
No doubt this is an organization run by terrorists.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28684597</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28689677</id>
	<title>Re:Nerdgasm</title>
	<author>Phoghat</author>
	<datestamp>1247580300000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>

<p>
<a href="http://en.wikipedia.org/wiki/Neuromancer" title="wikipedia.org" rel="nofollow">
Neuromancer</a> [wikipedia.org]
</p></htmltext>
<tokenext>Neuromancer [ wikipedia.org ]</tokentext>
<sentencetext>



Neuromancer [wikipedia.org]
</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682701</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683981</id>
	<title>This is nothing new.</title>
	<author>joshtheitguy</author>
	<datestamp>1247486340000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I've been administering and deploying these "self-destructing" IronKeys for over a year now. Yeesh... talk about a really fucking slow news day.</htmltext>
<tokenext>I 've been administering and deploying these " self-destructing " IronKeys for over a year now .
Yeesh... talk about a really fucking slow news day .</tokentext>
<sentencetext>I've been administering and deploying these "self-destructing" IronKeys for over a year now.
Yeesh... talk about a really fucking slow news day.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28685907</id>
	<title>Re:Where's the market?</title>
	<author>TarrVetus</author>
	<datestamp>1247501100000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>Funny, instead of paying extra, I'd just use a hammer, or a desk drawer, or if in a real pinch my two hands to break the thing apart.  Unless you're James Bond, I don't see how most folks would need any more than this, and if they do need more, they already have it.</p></div><p>I think using brute force to get into the IronKey drive would be a very bad idea.  <a href="http://www.thinkgeek.com/gadgets/security/99f1/" title="thinkgeek.com">ThinkGeek sells an older version</a> [thinkgeek.com] of the product the article covers, and even it had some pretty effective measures against breaking it apart.<br> <br> <i>Passwords can be hacked, but not the IronKey. It's built to withstand attacks both virtual and physical. 10 incorrect password attempts, and the encryption chip self-destructs, making the contents of the flash drive totally unreadable. The contents of the drive are filled with epoxy, so if a hacker tries to physically access the chips, he'd more likely damage them instead. Even if he did get access to the memory chips, they'd be worthless without the encryption chip. Electron-shielded, even a scanning electron microscope can't get inside.</i> <br> <br>So, use a hammer, desk drawer, or your hands, and it's still encrypted at best, and most likely just ruined and unreadable.</p></div>
	</htmltext>
<tokenext>Funny , instead of paying extra , I 'd just use a hammer , or a desk drawer , or if in a real pinch my two hands to break the thing apart .
Unless you 're James Bond , I do n't see how most folks would need any more than this , and if they do need more , they already have it.I think using brute force to get into the IronKey drive would be a very bad idea .
ThinkGeek sells an older version [ thinkgeek.com ] of the product the article covers , and even it had some pretty effective measures against breaking it apart .
Passwords can be hacked , but not the IronKey .
It 's built to withstand attacks both virtual and physical .
10 incorrect password attempts , and the encryption chip self-destructs , making the contents of the flash drive totally unreadable .
The contents of the drive are filled with epoxy , so if a hacker tries to physically access the chips , he 'd more likely damage them instead .
Even if he did get access to the memory chips , they 'd be worthless without the encryption chip .
Electron-shielded , even a scanning electron microscope ca n't get inside .
So , use a hammer , desk drawer , or your hands , and it 's still encrypted at best , and most likely just ruined and unreadable .</tokentext>
<sentencetext>Funny, instead of paying extra, I'd just use a hammer, or a desk drawer, or if in a real pinch my two hands to break the thing apart.
Unless you're James Bond, I don't see how most folks would need any more than this, and if they do need more, they already have it.I think using brute force to get into the IronKey drive would be a very bad idea.
ThinkGeek sells an older version [thinkgeek.com] of the product the article covers, and even it had some pretty effective measures against breaking it apart.
Passwords can be hacked, but not the IronKey.
It's built to withstand attacks both virtual and physical.
10 incorrect password attempts, and the encryption chip self-destructs, making the contents of the flash drive totally unreadable.
The contents of the drive are filled with epoxy, so if a hacker tries to physically access the chips, he'd more likely damage them instead.
Even if he did get access to the memory chips, they'd be worthless without the encryption chip.
Electron-shielded, even a scanning electron microscope can't get inside.
So, use a hammer, desk drawer, or your hands, and it's still encrypted at best, and most likely just ruined and unreadable.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682777</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28684199</id>
	<title>Refer to my signature</title>
	<author>carp3\_noct3m</author>
	<datestamp>1247487660000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Old news is old. My company uses these and I have found them very useful, less because of how secure they are (even though they really are pretty good) but more for the "wow the customer" factor when some big wig sees me pull it out and I get to throw some ridiculous acronyms and make myself sound like james bond to him. Yeah, it's worth it. Now they need to catch up in the space department (space as in size, not space as in pew pew, chewbacca went that way)</p></htmltext>
<tokenext>Old news is old .
My company uses these and I have found them very useful , less because of how secure they are ( even though they really are pretty good ) but more for the " wow the customer " factor when some big wig sees me pull it out and I get to throw some ridiculous acronyms and make myself sound like james bond to him .
Yeah , it 's worth it .
Now they need to catch up in the space department ( space as in size , not space as in pew pew , chewbacca went that way )</tokentext>
<sentencetext>Old news is old.
My company uses these and I have found them very useful, less because of how secure they are (even though they really are pretty good) but more for the "wow the customer" factor when some big wig sees me pull it out and I get to throw some ridiculous acronyms and make myself sound like james bond to him.
Yeah, it's worth it.
Now they need to catch up in the space department (space as in size, not space as in pew pew, chewbacca went that way)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683371</id>
	<title>unvi</title>
	<author>kaoshin</author>
	<datestamp>1247482740000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext>I understand thinkgeek and slashdot are sister companies, so this post is more of an ad, but is the only thing different here the revision or level of certification, or is there something else newsworthy on this from a tech standpoint?  Ironkey has been on thinkgeek for like a year, and the self destruct and other features have all been in this product for a long time.</htmltext>
<tokenext>I understand thinkgeek and slashdot are sister companies , so this post is more of an ad , but is the only thing different here the revision or level of certification , or is there something else newsworthy on this from a tech standpoint ?
Ironkey has been on thinkgeek for like a year , and the self destruct and other features have all been in this product for a long time .</tokentext>
<sentencetext>I understand thinkgeek and slashdot are sister companies, so this post is more of an ad, but is the only thing different here the revision or level of certification, or is there something else newsworthy on this from a tech standpoint?
Ironkey has been on thinkgeek for like a year, and the self destruct and other features have all been in this product for a long time.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683995</id>
	<title>A hacker challenge</title>
	<author>RobertLTux</author>
	<datestamp>1247486460000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>4</modscore>
	<htmltext><p>what iron key should do is go to DEFCON with a bunch of these drives and then run a contest</p><p>If you can crack the drive you get some obscenely large amount of money<br>how to run the contest fairly</p><p>have the contents of the drive detail how to get to an offshore account with the prize money</p><p>So Ironkey how much you want to bet this key is "secure"</p></htmltext>
<tokenext>what iron key should do is go to DEFCON with a bunch of these drives and then run a contestIf you can crack the drive you get some obscenely large amount of moneyhow to run the contest fairlyhave the contents of the drive detail how to get to an offshore account with the prize moneySo Ironkey how much you want to bet this key is " secure "</tokentext>
<sentencetext>what iron key should do is go to DEFCON with a bunch of these drives and then run a contestIf you can crack the drive you get some obscenely large amount of moneyhow to run the contest fairlyhave the contents of the drive detail how to get to an offshore account with the prize moneySo Ironkey how much you want to bet this key is "secure"</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28684909</id>
	<title>Re:Nerdgasm</title>
	<author>Anonymous</author>
	<datestamp>1247492520000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Sorry, epoxy isn't security, it's annoyance. Epoxy might stop a certain percentage of console modders from modding their consoles and the like (discouraging wholesale unpotting by the public), but it is useless against a dedicated attacker with time. Potted circuits are damn annoying to unpot, but it's by no means impossible if you spend a couple afternoons on it. If you're careful you won't damage anything.</p><p>I'd have given them some credit if there were a wire mesh embedded in the potting and a coin cell battery inside which powers a SRAM chip which stores the keys, with the circuit rigged to destroy the data if any part of the wire mesh is broken (NOT just kill power - you want to deliberately overwrite it with zeroes), but that's not the case here.</p></htmltext>
<tokenext>Sorry , epoxy is n't security , it 's annoyance .
Epoxy might stop a certain percentage of console modders from modding their consoles and the like ( discouraging wholesale unpotting by the public ) , but it is useless against a dedicated attacker with time .
Potted circuits are damn annoying to unpot , but it 's by no means impossible if you spend a couple afternoons on it .
If you 're careful you wo n't damage anything.I 'd have given them some credit if there were a wire mesh embedded in the potting and a coin cell battery inside which powers a SRAM chip which stores the keys , with the circuit rigged to destroy the data if any part of the wire mesh is broken ( NOT just kill power - you want to deliberately overwrite it with zeroes ) , but that 's not the case here .</tokentext>
<sentencetext>Sorry, epoxy isn't security, it's annoyance.
Epoxy might stop a certain percentage of console modders from modding their consoles and the like (discouraging wholesale unpotting by the public), but it is useless against a dedicated attacker with time.
Potted circuits are damn annoying to unpot, but it's by no means impossible if you spend a couple afternoons on it.
If you're careful you won't damage anything.I'd have given them some credit if there were a wire mesh embedded in the potting and a coin cell battery inside which powers a SRAM chip which stores the keys, with the circuit rigged to destroy the data if any part of the wire mesh is broken (NOT just kill power - you want to deliberately overwrite it with zeroes), but that's not the case here.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682701</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28685239</id>
	<title>Re:unvi</title>
	<author>Anonymous</author>
	<datestamp>1247495580000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>New things are AES 256 CBC encryption, new CryptoChip, FIPS 140-2 LEVEL 3 security validation (the only flash drive in the world to achieve level 3), also speed improvements for small file writes, barcode on the devices linked to asset tracking and control on the service or server.</p></htmltext>
<tokenext>New things are AES 256 CBC encryption , new CryptoChip , FIPS 140-2 LEVEL 3 security validation ( the only flash drive in the world to achieve level 3 ) , also speed improvements for small file writes , barcode on the devices linked to asset tracking and control on the service or server .</tokentext>
<sentencetext>New things are AES 256 CBC encryption, new CryptoChip, FIPS 140-2 LEVEL 3 security validation (the only flash drive in the world to achieve level 3), also speed improvements for small file writes, barcode on the devices linked to asset tracking and control on the service or server.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683371</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683715</id>
	<title>Re: Nobody gives a shit!</title>
	<author>Anonymous</author>
	<datestamp>1247484840000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>all is said</htmltext>
<tokenext>all is said</tokentext>
<sentencetext>all is said</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683277</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682863</id>
	<title>Re:Where's the market?</title>
	<author>CannonballHead</author>
	<datestamp>1247480580000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Maybe if they lost it and thus can't reach it with a hammer?<nobr> <wbr></nobr>:)</htmltext>
<tokenext>Maybe if they lost it and thus ca n't reach it with a hammer ?
: )</tokentext>
<sentencetext>Maybe if they lost it and thus can't reach it with a hammer?
:)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682777</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28684089</id>
	<title>Re:Encryption is just as good as self destruction</title>
	<author>Anonymous</author>
	<datestamp>1247486880000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><div class="quote"><p>What's the point of having it self destruct? Encrypt any old flash drive with True Crypt and you have accomplished the same thing at a much lower price. Want to destroy the data? Hit yourself on the head with a crowbar, making you forget the password. Problem solved.</p></div><p>I've had flash drives (encrypted with TrueCrypt no less) stolen from me.  While I took comfort in the fact that the data was secure, I was upset for having it lost, and the thief gaining an expensive flash drive.  At least with this, if someone stole it I could take pleasure knowing that they managed to steal a brick.</p></div>
	</htmltext>
<tokenext>What 's the point of having it self destruct ?
Encrypt any old flash drive with True Crypt and you have accomplished the same thing at a much lower price .
Want to destroy the data ?
Hit yourself on the head with a crowbar , making you forget the password .
Problem solved.I 've had flash drives ( encrypted with TrueCrypt no less ) stolen from me .
While I took comfort in the fact that the data was secure , I was upset for having it lost , and the thief gaining an expensive flash drive .
At least with this , if someone stole it I could take pleasure knowing that they managed to steal a brick .</tokentext>
<sentencetext>What's the point of having it self destruct?
Encrypt any old flash drive with True Crypt and you have accomplished the same thing at a much lower price.
Want to destroy the data?
Hit yourself on the head with a crowbar, making you forget the password.
Problem solved.I've had flash drives (encrypted with TrueCrypt no less) stolen from me.
While I took comfort in the fact that the data was secure, I was upset for having it lost, and the thief gaining an expensive flash drive.
At least with this, if someone stole it I could take pleasure knowing that they managed to steal a brick.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682769</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683091</id>
	<title>Re:Where's the market?</title>
	<author>DragonWriter</author>
	<datestamp>1247481480000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><blockquote><div><p>Unless you're James Bond, I don't see how most folks would need any more than this</p></div></blockquote><p>There are all kinds of legal environments, outside of national security, where you need better certainty of destruction of data than "it looked broken to me" (e.g., HIPAA).</p><blockquote><div><p>and if they do need more, they already have it.</p></div></blockquote><p>Maybe, maybe not. Places that are subject to rules that would require additional security sometimes simply don't do particular things that might be useful from an operational convenience perspective since the tools don't exist that let them work under the rules, and others bend (or break) the rules because they aren't willing to sacrifice the operational convenience. Anything that lets them meet requirements in the applicable mandates while promoting operational convenience is a big plus for them.</p><p>Additionally, the balance between operational convenience and available protective technology is usually a consideration in adopting new (e.g.) privacy regulations.</p></div>
	</htmltext>
<tokenext>Unless you 're James Bond , I do n't see how most folks would need any more than thisThere are all kinds of legal environments , outside of national security , where you need better certainty of destruction of data than " it looked broken to me " ( e.g. , HIPAA ) .and if they do need more , they already have it.Maybe , maybe not .
Places that are subject to rules that would require additional security sometimes simply do n't do particular things that might be useful from an operational convenience perspective since the tools do n't exist that let them work under the rules , and others bend ( or break ) the rules because they are n't willing to sacrifice the operational convenience .
Anything that lets them meet requirements in the applicable mandates while promoting operational convenience is a big plus for them.Additionally , the balance between operational convenience and available protective technology is usually a consideration in adopting new ( e.g .
) privacy regulations .</tokentext>
<sentencetext>Unless you're James Bond, I don't see how most folks would need any more than thisThere are all kinds of legal environments, outside of national security, where you need better certainty of destruction of data than "it looked broken to me" (e.g., HIPAA).and if they do need more, they already have it.Maybe, maybe not.
Places that are subject to rules that would require additional security sometimes simply don't do particular things that might be useful from an operational convenience perspective since the tools don't exist that let them work under the rules, and others bend (or break) the rules because they aren't willing to sacrifice the operational convenience.
Anything that lets them meet requirements in the applicable mandates while promoting operational convenience is a big plus for them.Additionally, the balance between operational convenience and available protective technology is usually a consideration in adopting new (e.g.
) privacy regulations.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682777</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683125</id>
	<title>Better spy flash drive</title>
	<author>FunPika</author>
	<datestamp>1247481600000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Would be one that said "this flash drive well self-destruct in 5 seconds" the 2nd time you removed it from a computer (1st time to write the sensitive info to it, 2nd time for recipient to read it).<nobr> <wbr></nobr>:D</htmltext>
<tokenext>Would be one that said " this flash drive well self-destruct in 5 seconds " the 2nd time you removed it from a computer ( 1st time to write the sensitive info to it , 2nd time for recipient to read it ) .
: D</tokentext>
<sentencetext>Would be one that said "this flash drive well self-destruct in 5 seconds" the 2nd time you removed it from a computer (1st time to write the sensitive info to it, 2nd time for recipient to read it).
:D</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683531</id>
	<title>Sell-out</title>
	<author>Anonymous</author>
	<datestamp>1247483580000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>So is Slashdot accepting paid posts now? At the bottom of this story my RSS reader displayed an ad for... wait for it... IronKey!</p></htmltext>
<tokenext>So is Slashdot accepting paid posts now ?
At the bottom of this story my RSS reader displayed an ad for... wait for it... IronKey !</tokentext>
<sentencetext>So is Slashdot accepting paid posts now?
At the bottom of this story my RSS reader displayed an ad for... wait for it... IronKey!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683871</id>
	<title>Thermite</title>
	<author>Dr\_Barnowl</author>
	<datestamp>1247485740000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>2</modscore>
	<htmltext><p>I keep wanting to build a flash drive with a thermite filler and some kind of rip-strip fuse that you could just yank on hard to set it off.</p><p>No offence to IronKey, but how do you know that it's really, really, destroyed your data beyond recovery? Maybe it just locks out the disk controller. A small heap of smouldering slag is much more definitive.</p><p>Now, if you could combine the thermite with their remote wipe protocols......</p></htmltext>
<tokenext>I keep wanting to build a flash drive with a thermite filler and some kind of rip-strip fuse that you could just yank on hard to set it off.No offence to IronKey , but how do you know that it 's really , really , destroyed your data beyond recovery ?
Maybe it just locks out the disk controller .
A small heap of smouldering slag is much more definitive.Now , if you could combine the thermite with their remote wipe protocols..... .</tokentext>
<sentencetext>I keep wanting to build a flash drive with a thermite filler and some kind of rip-strip fuse that you could just yank on hard to set it off.No offence to IronKey, but how do you know that it's really, really, destroyed your data beyond recovery?
Maybe it just locks out the disk controller.
A small heap of smouldering slag is much more definitive.Now, if you could combine the thermite with their remote wipe protocols......</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682771</id>
	<title>Rip-off</title>
	<author>Anonymous</author>
	<datestamp>1247480220000</datestamp>
	<modclass>Funny</modclass>
	<modscore>3</modscore>
	<htmltext><p>why would i pay $199 for that when i could buy a cheap USB drive and a hammer to break it with for less than $10?</p></htmltext>
<tokenext>why would i pay $ 199 for that when i could buy a cheap USB drive and a hammer to break it with for less than $ 10 ?</tokentext>
<sentencetext>why would i pay $199 for that when i could buy a cheap USB drive and a hammer to break it with for less than $10?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28684965</id>
	<title>Re:Circuitry?</title>
	<author>kylemonger</author>
	<datestamp>1247492820000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>From the IronKey website:</p><p>IronKey's patent-pending "flash-trash" methodology incorporates an exhaustive hardware erase of all flash and Cryptochip memory. This is not a simple clearing of file allocation tables, but a secure overwriting of data. This is done in hardware rather than via a software application for the ultimate protection. You, personally, should not be physically harmed when this happens.</p></htmltext>
<tokenext>From the IronKey website : IronKey 's patent-pending " flash-trash " methodology incorporates an exhaustive hardware erase of all flash and Cryptochip memory .
This is not a simple clearing of file allocation tables , but a secure overwriting of data .
This is done in hardware rather than via a software application for the ultimate protection .
You , personally , should not be physically harmed when this happens .</tokentext>
<sentencetext>From the IronKey website:IronKey's patent-pending "flash-trash" methodology incorporates an exhaustive hardware erase of all flash and Cryptochip memory.
This is not a simple clearing of file allocation tables, but a secure overwriting of data.
This is done in hardware rather than via a software application for the ultimate protection.
You, personally, should not be physically harmed when this happens.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683793</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683907</id>
	<title>Re:What a bad idea</title>
	<author>ChaoticCoyote</author>
	<datestamp>1247485980000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext><blockquote><div><p> <i>
Flash drives are a big no-no in the federal government and military. If something is so sensitive that it needs this kind of encryption wrapped in dynamite, then it should not be walking around on a USB drive. Dumb dumb dumb.
</i></p></div> </blockquote><p>
True... but not everyone who requires security is a government spook. For most of us non-spooks, this thing has merit.
</p></div>
	</htmltext>
<tokenext>Flash drives are a big no-no in the federal government and military .
If something is so sensitive that it needs this kind of encryption wrapped in dynamite , then it should not be walking around on a USB drive .
Dumb dumb dumb .
True... but not everyone who requires security is a government spook .
For most of us non-spooks , this thing has merit .</tokentext>
<sentencetext> 
Flash drives are a big no-no in the federal government and military.
If something is so sensitive that it needs this kind of encryption wrapped in dynamite, then it should not be walking around on a USB drive.
Dumb dumb dumb.
True... but not everyone who requires security is a government spook.
For most of us non-spooks, this thing has merit.

	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682835</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28684009</id>
	<title>Strictly speaking, it doesn't self-destruct</title>
	<author>e9th</author>
	<datestamp>1247486460000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>3</modscore>
	<htmltext>From IronKey's blurb:<blockquote><div><p>- Secure key management -encryption keys are born on the device in the Cryptochip and bound to the device<br>- Hard-wired encryption key self-destruct defenses and electromagnetic shielding of the Cryptochip</p></div></blockquote><p>which I interpret as saying that only the key is wiped, while the actual data remains on the drive.  If you've somehow managed to snarf the key before it was wiped, or if you're really cool and can break AES-256, you're good to go.</p></div>
	</htmltext>
<tokenext>From IronKey 's blurb : - Secure key management -encryption keys are born on the device in the Cryptochip and bound to the device- Hard-wired encryption key self-destruct defenses and electromagnetic shielding of the Cryptochipwhich I interpret as saying that only the key is wiped , while the actual data remains on the drive .
If you 've somehow managed to snarf the key before it was wiped , or if you 're really cool and can break AES-256 , you 're good to go .</tokentext>
<sentencetext>From IronKey's blurb:- Secure key management -encryption keys are born on the device in the Cryptochip and bound to the device- Hard-wired encryption key self-destruct defenses and electromagnetic shielding of the Cryptochipwhich I interpret as saying that only the key is wiped, while the actual data remains on the drive.
If you've somehow managed to snarf the key before it was wiped, or if you're really cool and can break AES-256, you're good to go.
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683615</id>
	<title>Mission Impossible</title>
	<author>Neanderthal Ninny</author>
	<datestamp>1247484180000</datestamp>
	<modclass>Funny</modclass>
	<modscore>2</modscore>
	<htmltext><p>The new version of the Mission Impossible self-destructing tape player.<br>However, how many spoofs has been made to this "self-destruction" capability so I wonder what if your USB key self-destructs accidentally in your pants pocket will it fry your gonads.</p></htmltext>
<tokenext>The new version of the Mission Impossible self-destructing tape player.However , how many spoofs has been made to this " self-destruction " capability so I wonder what if your USB key self-destructs accidentally in your pants pocket will it fry your gonads .</tokentext>
<sentencetext>The new version of the Mission Impossible self-destructing tape player.However, how many spoofs has been made to this "self-destruction" capability so I wonder what if your USB key self-destructs accidentally in your pants pocket will it fry your gonads.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683957</id>
	<title>Ha! Apple beat them to it...</title>
	<author>sponglish</author>
	<datestamp>1247486220000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><a href="http://www.pcmag.com/article2/0,2817,2350033,00.asp" title="pcmag.com" rel="nofollow">Apple Reportedly Recalls iPod Nanos in Korea</a> [pcmag.com]</htmltext>
<tokenext>Apple Reportedly Recalls iPod Nanos in Korea [ pcmag.com ]</tokentext>
<sentencetext>Apple Reportedly Recalls iPod Nanos in Korea [pcmag.com]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28685217</id>
	<title>Re:Encryption is just as good as self destruction</title>
	<author>SixGunMojo</author>
	<datestamp>1247495280000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>Not even close my friend. I've been using one for &gt;18 months and I'll just hit the high points. First there are 2 chips in the Ironkey. The first is a hardware based encryption chip and the second is the actual flash drive. The data on the drive is always encrypted. Also the first won't even mount the second without the proper password (mine is 17 nums, chars, and letters long). You have 10 tries to guess that or the drive destroys all the data. In addition the epoxy they seal them with insures that any attempt to get to the actual flash chips a) damages them heavily and b) also triggers the self-destruct. The second biggie is the on-board browser and identity manager. This gives you the ability to securely surf the web from any computer (I even use mine on my computer whenever I am doing anything financial) and if you are feeling really paranoid you can toggle tor with one click and/or configure Privoxy. The identity manger also allows you to log into sensitive sites without worrying about keystroke loggers. If you really want to see how hardcore this drive is I would suggest you visit their website. To paraphrase an OpenBSD motto: Ironkey the flash drive for the practical paranoid!</p></htmltext>
<tokenext>Not even close my friend .
I 've been using one for &gt; 18 months and I 'll just hit the high points .
First there are 2 chips in the Ironkey .
The first is a hardware based encryption chip and the second is the actual flash drive .
The data on the drive is always encrypted .
Also the first wo n't even mount the second without the proper password ( mine is 17 nums , chars , and letters long ) .
You have 10 tries to guess that or the drive destroys all the data .
In addition the epoxy they seal them with insures that any attempt to get to the actual flash chips a ) damages them heavily and b ) also triggers the self-destruct .
The second biggie is the on-board browser and identity manager .
This gives you the ability to securely surf the web from any computer ( I even use mine on my computer whenever I am doing anything financial ) and if you are feeling really paranoid you can toggle tor with one click and/or configure Privoxy .
The identity manger also allows you to log into sensitive sites without worrying about keystroke loggers .
If you really want to see how hardcore this drive is I would suggest you visit their website .
To paraphrase an OpenBSD motto : Ironkey the flash drive for the practical paranoid !</tokentext>
<sentencetext>Not even close my friend.
I've been using one for &gt;18 months and I'll just hit the high points.
First there are 2 chips in the Ironkey.
The first is a hardware based encryption chip and the second is the actual flash drive.
The data on the drive is always encrypted.
Also the first won't even mount the second without the proper password (mine is 17 nums, chars, and letters long).
You have 10 tries to guess that or the drive destroys all the data.
In addition the epoxy they seal them with insures that any attempt to get to the actual flash chips a) damages them heavily and b) also triggers the self-destruct.
The second biggie is the on-board browser and identity manager.
This gives you the ability to securely surf the web from any computer (I even use mine on my computer whenever I am doing anything financial) and if you are feeling really paranoid you can toggle tor with one click and/or configure Privoxy.
The identity manger also allows you to log into sensitive sites without worrying about keystroke loggers.
If you really want to see how hardcore this drive is I would suggest you visit their website.
To paraphrase an OpenBSD motto: Ironkey the flash drive for the practical paranoid!</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682769</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28692659</id>
	<title>...for now</title>
	<author>Kabuthunk</author>
	<datestamp>1247593320000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>True Crypt will work -for now-.  Can you tell me that it won't be broken 5 years from now?  20?  50?  What guarantee do you have that the encryption used today won't be utterly worthless decades from now?  Because after all, we've all seen that encryption methods in the past haven't been defeated by new technology and such.</p><p>So the thumb drive containing whatever extraordinarily sensitive information sits in someone's "to be unencrypted" pile for a dozen years or so.  If I had ridiculously sensitive information for some reason, I'd rather the lost/stolen thumb drive destroy itself, rather than just sit and collect dust, waiting for unencrypting technology to catch up to it.</p></htmltext>
<tokenext>True Crypt will work -for now- .
Can you tell me that it wo n't be broken 5 years from now ?
20 ? 50 ?
What guarantee do you have that the encryption used today wo n't be utterly worthless decades from now ?
Because after all , we 've all seen that encryption methods in the past have n't been defeated by new technology and such.So the thumb drive containing whatever extraordinarily sensitive information sits in someone 's " to be unencrypted " pile for a dozen years or so .
If I had ridiculously sensitive information for some reason , I 'd rather the lost/stolen thumb drive destroy itself , rather than just sit and collect dust , waiting for unencrypting technology to catch up to it .</tokentext>
<sentencetext>True Crypt will work -for now-.
Can you tell me that it won't be broken 5 years from now?
20?  50?
What guarantee do you have that the encryption used today won't be utterly worthless decades from now?
Because after all, we've all seen that encryption methods in the past haven't been defeated by new technology and such.So the thumb drive containing whatever extraordinarily sensitive information sits in someone's "to be unencrypted" pile for a dozen years or so.
If I had ridiculously sensitive information for some reason, I'd rather the lost/stolen thumb drive destroy itself, rather than just sit and collect dust, waiting for unencrypting technology to catch up to it.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682769</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682955</id>
	<title>Smoke</title>
	<author>wjousts</author>
	<datestamp>1247480940000</datestamp>
	<modclass>Funny</modclass>
	<modscore>5</modscore>
	<htmltext>This better emit a puff of smoke when it self-destructs or I'm not buying it. It doesn't matter if the smoke is only for show.</htmltext>
<tokenext>This better emit a puff of smoke when it self-destructs or I 'm not buying it .
It does n't matter if the smoke is only for show .</tokentext>
<sentencetext>This better emit a puff of smoke when it self-destructs or I'm not buying it.
It doesn't matter if the smoke is only for show.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28685745</id>
	<title>Re:Ironkey also supports Linux!</title>
	<author>CuriHP</author>
	<datestamp>1247500020000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I bought one a couple months ago and was able to initialize it just fine on a Mac.</p></htmltext>
<tokenext>I bought one a couple months ago and was able to initialize it just fine on a Mac .</tokentext>
<sentencetext>I bought one a couple months ago and was able to initialize it just fine on a Mac.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683277</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682819</id>
	<title>24's Cloe O'Brian</title>
	<author>SolarStorm</author>
	<datestamp>1247480460000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>1</modscore>
	<htmltext>would have this cracked in no time (at least withing the timeframe of one episode)

From what I have see her do, no encryption is safe for more than 41 minutes</htmltext>
<tokenext>would have this cracked in no time ( at least withing the timeframe of one episode ) From what I have see her do , no encryption is safe for more than 41 minutes</tokentext>
<sentencetext>would have this cracked in no time (at least withing the timeframe of one episode)

From what I have see her do, no encryption is safe for more than 41 minutes</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28687155</id>
	<title>Re:Ironkey also supports Linux!</title>
	<author>BitZtream</author>
	<datestamp>1247513040000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Still want to know why they require drivers.  That scares me.  Standard USB HID interface allows any USB device to receive arbitrary commands from an application.</p><p>I've made an Atmel AT90USBKey demo board do on chip AES using a key generated by a password supplied via a USB HID command.  Works in Windows with the pretty gui app written for the task as well as Linux if you want to use some command line tools to manually send the data to the device to supply the key and get the device to make the encrypted area available.  Neither Windows nor Linux are anything other than a default install.  My prototype is utterly useless from a practical standpoint as the microcontroller involved is just FAR too slow to be useful as a disk device when you throw encryption at it, well hell, it was too slow for me before the encryption was in place, but the point is, there is no reason a driver should be required for any OS, just the app that can talk to it.</p><p>If they are requiring drivers then I'm sensing snake oil or lies.  If the drivers are doing ANY part of the encryption chain other than sending off a password to the device then its practically pointless if you actually want security.  My guess would be they aren't generating the key on chip, the host is doing it and passing it off to the chip, but again, no need for a driver to do that.  Requiring drivers is very odd indeed.</p></htmltext>
<tokenext>Still want to know why they require drivers .
That scares me .
Standard USB HID interface allows any USB device to receive arbitrary commands from an application.I 've made an Atmel AT90USBKey demo board do on chip AES using a key generated by a password supplied via a USB HID command .
Works in Windows with the pretty gui app written for the task as well as Linux if you want to use some command line tools to manually send the data to the device to supply the key and get the device to make the encrypted area available .
Neither Windows nor Linux are anything other than a default install .
My prototype is utterly useless from a practical standpoint as the microcontroller involved is just FAR too slow to be useful as a disk device when you throw encryption at it , well hell , it was too slow for me before the encryption was in place , but the point is , there is no reason a driver should be required for any OS , just the app that can talk to it.If they are requiring drivers then I 'm sensing snake oil or lies .
If the drivers are doing ANY part of the encryption chain other than sending off a password to the device then its practically pointless if you actually want security .
My guess would be they are n't generating the key on chip , the host is doing it and passing it off to the chip , but again , no need for a driver to do that .
Requiring drivers is very odd indeed .</tokentext>
<sentencetext>Still want to know why they require drivers.
That scares me.
Standard USB HID interface allows any USB device to receive arbitrary commands from an application.I've made an Atmel AT90USBKey demo board do on chip AES using a key generated by a password supplied via a USB HID command.
Works in Windows with the pretty gui app written for the task as well as Linux if you want to use some command line tools to manually send the data to the device to supply the key and get the device to make the encrypted area available.
Neither Windows nor Linux are anything other than a default install.
My prototype is utterly useless from a practical standpoint as the microcontroller involved is just FAR too slow to be useful as a disk device when you throw encryption at it, well hell, it was too slow for me before the encryption was in place, but the point is, there is no reason a driver should be required for any OS, just the app that can talk to it.If they are requiring drivers then I'm sensing snake oil or lies.
If the drivers are doing ANY part of the encryption chain other than sending off a password to the device then its practically pointless if you actually want security.
My guess would be they aren't generating the key on chip, the host is doing it and passing it off to the chip, but again, no need for a driver to do that.
Requiring drivers is very odd indeed.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683277</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683721</id>
	<title>Enterprise Mac Alternatives?</title>
	<author>GreenPickles</author>
	<datestamp>1247484900000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I really like the IronKey Enterprise features -- remote destruction, management console, etc.  It sounds like mac support is in it's infancy.  Are there any enterprise level mac alternatives to IronKey?</p></htmltext>
<tokenext>I really like the IronKey Enterprise features -- remote destruction , management console , etc .
It sounds like mac support is in it 's infancy .
Are there any enterprise level mac alternatives to IronKey ?</tokentext>
<sentencetext>I really like the IronKey Enterprise features -- remote destruction, management console, etc.
It sounds like mac support is in it's infancy.
Are there any enterprise level mac alternatives to IronKey?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682749</id>
	<title>Shilltatstic1</title>
	<author>Anonymous</author>
	<datestamp>1247480100000</datestamp>
	<modclass>Offtopic</modclass>
	<modscore>-1</modscore>
	<htmltext><p>Shill much?</p></htmltext>
<tokenext>Shill much ?</tokentext>
<sentencetext>Shill much?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682711</id>
	<title>Spais</title>
	<author>Anonymous</author>
	<datestamp>1247479980000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Here is your mission if you choose to accept it. This USB will self-destruct in twenty seconds.</p></htmltext>
<tokenext>Here is your mission if you choose to accept it .
This USB will self-destruct in twenty seconds .</tokentext>
<sentencetext>Here is your mission if you choose to accept it.
This USB will self-destruct in twenty seconds.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682847</id>
	<title>What!?!</title>
	<author>Starteck81</author>
	<datestamp>1247480520000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>No retina scan authentication? LAME</htmltext>
<tokenext>No retina scan authentication ?
LAME</tokentext>
<sentencetext>No retina scan authentication?
LAME</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28688203</id>
	<title>Re:Thermite</title>
	<author>Anonymous</author>
	<datestamp>1247568060000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>No offence to you, but how fucking stupid do you think they are?</p><p>Additionally, with your idea, what happens if your key drive is stolen?  Do you expect the thief to destroy it for you before trying to access it?</p><p>What the hell is it about slashdot where everyone thinks that some idea they come up with in 30 seconds is better than those of the people who actually develop these things professionally?</p></htmltext>
<tokenext>No offence to you , but how fucking stupid do you think they are ? Additionally , with your idea , what happens if your key drive is stolen ?
Do you expect the thief to destroy it for you before trying to access it ? What the hell is it about slashdot where everyone thinks that some idea they come up with in 30 seconds is better than those of the people who actually develop these things professionally ?</tokentext>
<sentencetext>No offence to you, but how fucking stupid do you think they are?Additionally, with your idea, what happens if your key drive is stolen?
Do you expect the thief to destroy it for you before trying to access it?What the hell is it about slashdot where everyone thinks that some idea they come up with in 30 seconds is better than those of the people who actually develop these things professionally?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683871</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683929</id>
	<title>Re:Encryption is just as good as self destruction</title>
	<author>Anonymous</author>
	<datestamp>1247486040000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>&gt;Once it's gone, you don't have to forget a password and you don't have any password to be persuaded to remember?</p><p>And you don't have any value to your captors, so they can just kill you for sport (or to set an example for the next person in line for interrogation.)</p></htmltext>
<tokenext>&gt; Once it 's gone , you do n't have to forget a password and you do n't have any password to be persuaded to remember ? And you do n't have any value to your captors , so they can just kill you for sport ( or to set an example for the next person in line for interrogation .
)</tokentext>
<sentencetext>&gt;Once it's gone, you don't have to forget a password and you don't have any password to be persuaded to remember?And you don't have any value to your captors, so they can just kill you for sport (or to set an example for the next person in line for interrogation.
)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682833</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28684927</id>
	<title>Re:The Market</title>
	<author>Anonymous</author>
	<datestamp>1247492640000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>You will notice that personal hygiene product vendors do NOT advertise on Slashdot. However purveyors of kiddie-porn-concealment devices do.</htmltext>
<tokenext>You will notice that personal hygiene product vendors do NOT advertise on Slashdot .
However purveyors of kiddie-porn-concealment devices do .</tokentext>
<sentencetext>You will notice that personal hygiene product vendors do NOT advertise on Slashdot.
However purveyors of kiddie-porn-concealment devices do.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683073</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682701</id>
	<title>Nerdgasm</title>
	<author>amateur6</author>
	<datestamp>1247479980000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>FTA: " Physical Security &#226;" the IronKey cryptographic module includes the following physical security mechanisms that meet or exceed the Level 3 requirements:...Hard epoxy potting material (opaque to the visible spectrum) that encapsulates the multi-chip circuitry, thereby preventing removal/penetration attempts without causing serious damage to the chips "</p><p>I'm sorry, that's so straight-outta-Neuromancer-Gibsonesque I need to change my pants.</p></htmltext>
<tokenext>FTA : " Physical Security   " the IronKey cryptographic module includes the following physical security mechanisms that meet or exceed the Level 3 requirements : ...Hard epoxy potting material ( opaque to the visible spectrum ) that encapsulates the multi-chip circuitry , thereby preventing removal/penetration attempts without causing serious damage to the chips " I 'm sorry , that 's so straight-outta-Neuromancer-Gibsonesque I need to change my pants .</tokentext>
<sentencetext>FTA: " Physical Security â" the IronKey cryptographic module includes the following physical security mechanisms that meet or exceed the Level 3 requirements:...Hard epoxy potting material (opaque to the visible spectrum) that encapsulates the multi-chip circuitry, thereby preventing removal/penetration attempts without causing serious damage to the chips "I'm sorry, that's so straight-outta-Neuromancer-Gibsonesque I need to change my pants.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683165</id>
	<title>Oops...</title>
	<author>Anonymous</author>
	<datestamp>1247481780000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I misstyped my password and my USB key melted. Now I lost the company thousands of dollars worth of spreadsheets, Ruined a perfectly good USB port on my computer, and now it smells kinda funny...</p></htmltext>
<tokenext>I misstyped my password and my USB key melted .
Now I lost the company thousands of dollars worth of spreadsheets , Ruined a perfectly good USB port on my computer , and now it smells kinda funny.. .</tokentext>
<sentencetext>I misstyped my password and my USB key melted.
Now I lost the company thousands of dollars worth of spreadsheets, Ruined a perfectly good USB port on my computer, and now it smells kinda funny...</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683277</id>
	<title>Ironkey also supports Linux!</title>
	<author>AMuse</author>
	<datestamp>1247482380000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>4</modscore>
	<htmltext><p>I'm using an Ironkey at work (have been for about 2 years now) and the thing has been rock solid. However, the main reason I selected it is that it's the only key that I've had the opportunity to trial which is both FIPS 140-2l2 compliant *AND* supports Linux.</p><p>I use it with WinXP and MacOSX daily and yes, they do ship with "alpha" Linux drivers.  Not full support like Win* but enough to read and write the encrypted data, which is all I really use.</p><p>Although the company claims that you can now "initialize" a key on MacOS, all the versions I've used required an initial bootstrapping under Windows before being cross-platform usable.</p></htmltext>
<tokenext>I 'm using an Ironkey at work ( have been for about 2 years now ) and the thing has been rock solid .
However , the main reason I selected it is that it 's the only key that I 've had the opportunity to trial which is both FIPS 140-2l2 compliant * AND * supports Linux.I use it with WinXP and MacOSX daily and yes , they do ship with " alpha " Linux drivers .
Not full support like Win * but enough to read and write the encrypted data , which is all I really use.Although the company claims that you can now " initialize " a key on MacOS , all the versions I 've used required an initial bootstrapping under Windows before being cross-platform usable .</tokentext>
<sentencetext>I'm using an Ironkey at work (have been for about 2 years now) and the thing has been rock solid.
However, the main reason I selected it is that it's the only key that I've had the opportunity to trial which is both FIPS 140-2l2 compliant *AND* supports Linux.I use it with WinXP and MacOSX daily and yes, they do ship with "alpha" Linux drivers.
Not full support like Win* but enough to read and write the encrypted data, which is all I really use.Although the company claims that you can now "initialize" a key on MacOS, all the versions I've used required an initial bootstrapping under Windows before being cross-platform usable.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682783</id>
	<title>Sony</title>
	<author>StellarFury</author>
	<datestamp>1247480280000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I think Sony figured out the technology here 3 years ago.</p><p><a href="http://www.engadget.com/2006/08/24/sony-ordered-by-japan-to-investigate-battery-problems/" title="engadget.com" rel="nofollow">http://www.engadget.com/2006/08/24/sony-ordered-by-japan-to-investigate-battery-problems/</a> [engadget.com]</p></htmltext>
<tokenext>I think Sony figured out the technology here 3 years ago.http : //www.engadget.com/2006/08/24/sony-ordered-by-japan-to-investigate-battery-problems/ [ engadget.com ]</tokentext>
<sentencetext>I think Sony figured out the technology here 3 years ago.http://www.engadget.com/2006/08/24/sony-ordered-by-japan-to-investigate-battery-problems/ [engadget.com]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28688357</id>
	<title>Re:Thermite</title>
	<author>freedom\_india</author>
	<datestamp>1247569800000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>Maybe it just locks out the disk controller.</p></div><p>This is a FLASH drive. There are NO movable parts in a Flash Drive.<br>All IronKey needs to do is to draw a sudden more power from USB port to fry the circuits. Of course a surge would cause a system reboot or probably crash a non-CoolerMaster PC.</p></div>
	</htmltext>
<tokenext>Maybe it just locks out the disk controller.This is a FLASH drive .
There are NO movable parts in a Flash Drive.All IronKey needs to do is to draw a sudden more power from USB port to fry the circuits .
Of course a surge would cause a system reboot or probably crash a non-CoolerMaster PC .</tokentext>
<sentencetext>Maybe it just locks out the disk controller.This is a FLASH drive.
There are NO movable parts in a Flash Drive.All IronKey needs to do is to draw a sudden more power from USB port to fry the circuits.
Of course a surge would cause a system reboot or probably crash a non-CoolerMaster PC.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683871</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683155</id>
	<title>Re:What!?!</title>
	<author>canonymous</author>
	<datestamp>1247481720000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>That just puts you at risk of losing an eye as well as a USB drive.</htmltext>
<tokenext>That just puts you at risk of losing an eye as well as a USB drive .</tokentext>
<sentencetext>That just puts you at risk of losing an eye as well as a USB drive.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682847</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28684157</id>
	<title>TSA Approval?</title>
	<author>Perf</author>
	<datestamp>1247487300000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Ummm, what will the TSA say about self destructing thumbdrives?</htmltext>
<tokenext>Ummm , what will the TSA say about self destructing thumbdrives ?</tokentext>
<sentencetext>Ummm, what will the TSA say about self destructing thumbdrives?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683257</id>
	<title>Re:What a bad idea</title>
	<author>Anonymous</author>
	<datestamp>1247482320000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I partially agree with you, although some people on the go may demand a compromise between usb storage convenience and security. More to your point though- this tool, solution, toy, -pick your reason- is not perfect. I am not an expert at anything, but I've learned over time that as long as there is a unique challenge and the barriers aren't too high, enthusiastic hackers around the world will take it on. The more services, conveniences what-have-yous built into this stick <a href="https://www.ironkey.com/compare" title="ironkey.com" rel="nofollow">https://www.ironkey.com/compare</a> [ironkey.com]  , <a href="https://www.ironkey.com/ikdocs/datasheets/s200/IronKey\_S200\_Enterprise\_Server.pdf" title="ironkey.com" rel="nofollow">https://www.ironkey.com/ikdocs/datasheets/s200/IronKey\_S200\_Enterprise\_Server.pdf</a> [ironkey.com]; the more touted it is for being secure by the company "the world's most secure flash drive; the only level 3 FIPS 140-2 flash drive"; the more security professionals say they use it and how cool it is <a href="https://www.ironkey.com/sdkform" title="ironkey.com" rel="nofollow">https://www.ironkey.com/sdkform</a> [ironkey.com]; the more likely someone will find a vulnerability with it, one of its dependencies, or one of its features and break it. period.</htmltext>
<tokenext>I partially agree with you , although some people on the go may demand a compromise between usb storage convenience and security .
More to your point though- this tool , solution , toy , -pick your reason- is not perfect .
I am not an expert at anything , but I 've learned over time that as long as there is a unique challenge and the barriers are n't too high , enthusiastic hackers around the world will take it on .
The more services , conveniences what-have-yous built into this stick https : //www.ironkey.com/compare [ ironkey.com ] , https : //www.ironkey.com/ikdocs/datasheets/s200/IronKey \ _S200 \ _Enterprise \ _Server.pdf [ ironkey.com ] ; the more touted it is for being secure by the company " the world 's most secure flash drive ; the only level 3 FIPS 140-2 flash drive " ; the more security professionals say they use it and how cool it is https : //www.ironkey.com/sdkform [ ironkey.com ] ; the more likely someone will find a vulnerability with it , one of its dependencies , or one of its features and break it .
period .</tokentext>
<sentencetext>I partially agree with you, although some people on the go may demand a compromise between usb storage convenience and security.
More to your point though- this tool, solution, toy, -pick your reason- is not perfect.
I am not an expert at anything, but I've learned over time that as long as there is a unique challenge and the barriers aren't too high, enthusiastic hackers around the world will take it on.
The more services, conveniences what-have-yous built into this stick https://www.ironkey.com/compare [ironkey.com]  , https://www.ironkey.com/ikdocs/datasheets/s200/IronKey\_S200\_Enterprise\_Server.pdf [ironkey.com]; the more touted it is for being secure by the company "the world's most secure flash drive; the only level 3 FIPS 140-2 flash drive"; the more security professionals say they use it and how cool it is https://www.ironkey.com/sdkform [ironkey.com]; the more likely someone will find a vulnerability with it, one of its dependencies, or one of its features and break it.
period.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682835</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28690469</id>
	<title>Re:The Market</title>
	<author>WuphonsReach</author>
	<datestamp>1247583720000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><i>Like most things, if you have to ask "who needs this?", the answer is not you. </i> <br>
<br>
The question is more "is this snakeoil" and "what attacks does it work against".  In this particular case, the product does nothing to prevent key-logging attacks, and once the attacker has the password, your data is at their fingertips.<br>
<br>
I would be much more interested to see an external product requiring the entry of a PIN before you could access the data.  It would be a lot harder to hack the unit to intercept the PIN without the user noticing. (Keyboard sniffers are small and easily blend in with the PS/2 cable.)<br>
<br>
Something in a 2.5" form factor, allowing you to insert any old 2.5" drive might be very useful.</htmltext>
<tokenext>Like most things , if you have to ask " who needs this ?
" , the answer is not you .
The question is more " is this snakeoil " and " what attacks does it work against " .
In this particular case , the product does nothing to prevent key-logging attacks , and once the attacker has the password , your data is at their fingertips .
I would be much more interested to see an external product requiring the entry of a PIN before you could access the data .
It would be a lot harder to hack the unit to intercept the PIN without the user noticing .
( Keyboard sniffers are small and easily blend in with the PS/2 cable .
) Something in a 2.5 " form factor , allowing you to insert any old 2.5 " drive might be very useful .</tokentext>
<sentencetext>Like most things, if you have to ask "who needs this?
", the answer is not you.
The question is more "is this snakeoil" and "what attacks does it work against".
In this particular case, the product does nothing to prevent key-logging attacks, and once the attacker has the password, your data is at their fingertips.
I would be much more interested to see an external product requiring the entry of a PIN before you could access the data.
It would be a lot harder to hack the unit to intercept the PIN without the user noticing.
(Keyboard sniffers are small and easily blend in with the PS/2 cable.
)

Something in a 2.5" form factor, allowing you to insert any old 2.5" drive might be very useful.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683073</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28691401</id>
	<title>Re:Encryption is just as good as self destruction</title>
	<author>BuckoA51</author>
	<datestamp>1247587980000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I am astounded that somebody actually had to explain this on Slashdot and that the above comment by  basementman was actually rated "Informative".</htmltext>
<tokenext>I am astounded that somebody actually had to explain this on Slashdot and that the above comment by basementman was actually rated " Informative " .</tokentext>
<sentencetext>I am astounded that somebody actually had to explain this on Slashdot and that the above comment by  basementman was actually rated "Informative".</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28684597</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683067</id>
	<title>Re:Where's the market?</title>
	<author>LWATCDR</author>
	<datestamp>1247481420000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Actually a hammer may not be good enough. There are some very strict rules for medical records and financial data that this could be useful for.</p></htmltext>
<tokenext>Actually a hammer may not be good enough .
There are some very strict rules for medical records and financial data that this could be useful for .</tokentext>
<sentencetext>Actually a hammer may not be good enough.
There are some very strict rules for medical records and financial data that this could be useful for.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682777</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682779</id>
	<title>Old feature</title>
	<author>Anonymous</author>
	<datestamp>1247480220000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I thought all of their thumb drives would 'self destruct'?</p></htmltext>
<tokenext>I thought all of their thumb drives would 'self destruct ' ?</tokentext>
<sentencetext>I thought all of their thumb drives would 'self destruct'?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28685809</id>
	<title>Re:Encryption is just as good as self destruction</title>
	<author>MillionthMonkey</author>
	<datestamp>1247500380000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>But not any old TrueCrypted flash drive has a brushed aluminum case. This is the kind of drive Jack Bauer would swing through the air to bludgeon a terrorist.</htmltext>
<tokenext>But not any old TrueCrypted flash drive has a brushed aluminum case .
This is the kind of drive Jack Bauer would swing through the air to bludgeon a terrorist .</tokentext>
<sentencetext>But not any old TrueCrypted flash drive has a brushed aluminum case.
This is the kind of drive Jack Bauer would swing through the air to bludgeon a terrorist.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682769</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683073</id>
	<title>The Market</title>
	<author>Anonymous</author>
	<datestamp>1247481420000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>4</modscore>
	<htmltext>Like most things, if you have to ask "who needs this?", the answer is not you.
<br>
<br>
Personally, there are a great number of wildly popular products for which I am not in the market.</htmltext>
<tokenext>Like most things , if you have to ask " who needs this ?
" , the answer is not you .
Personally , there are a great number of wildly popular products for which I am not in the market .</tokentext>
<sentencetext>Like most things, if you have to ask "who needs this?
", the answer is not you.
Personally, there are a great number of wildly popular products for which I am not in the market.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682777</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28684071</id>
	<title>WOOPS!</title>
	<author>binaryseraph</author>
	<datestamp>1247486820000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>"no- wait ctrl-Z, ctrl-Z!!!- damnit!"</htmltext>
<tokenext>" no- wait ctrl-Z , ctrl-Z ! !
! - damnit !
"</tokentext>
<sentencetext>"no- wait ctrl-Z, ctrl-Z!!
!- damnit!
"</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28685025</id>
	<title>Re:Encryption is just as good as self destruction</title>
	<author>w0mprat</author>
	<datestamp>1247493420000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>You miss the obvious point. Keys can be stolen and copied, thus it's useful to destroy data, especially when it is no longer required buy still sensitive.<br> <br> Keys have to be typed in by protein popsicles and they have to be stored in notoriously vulnerable meat-space neural processors which so far, nobody is interested in patching.</htmltext>
<tokenext>You miss the obvious point .
Keys can be stolen and copied , thus it 's useful to destroy data , especially when it is no longer required buy still sensitive .
Keys have to be typed in by protein popsicles and they have to be stored in notoriously vulnerable meat-space neural processors which so far , nobody is interested in patching .</tokentext>
<sentencetext>You miss the obvious point.
Keys can be stolen and copied, thus it's useful to destroy data, especially when it is no longer required buy still sensitive.
Keys have to be typed in by protein popsicles and they have to be stored in notoriously vulnerable meat-space neural processors which so far, nobody is interested in patching.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682769</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682835</id>
	<title>What a bad idea</title>
	<author>Reason58</author>
	<datestamp>1247480520000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Flash drives are a big no-no in the federal government and military. If something is so sensitive that it needs this kind of encryption wrapped in dynamite, then it should <b>not</b> be walking around on a USB drive. Dumb dumb dumb.</htmltext>
<tokenext>Flash drives are a big no-no in the federal government and military .
If something is so sensitive that it needs this kind of encryption wrapped in dynamite , then it should not be walking around on a USB drive .
Dumb dumb dumb .</tokentext>
<sentencetext>Flash drives are a big no-no in the federal government and military.
If something is so sensitive that it needs this kind of encryption wrapped in dynamite, then it should not be walking around on a USB drive.
Dumb dumb dumb.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682871</id>
	<title>Re:Encryption is just as good as self destruction</title>
	<author>Anonymous</author>
	<datestamp>1247480580000</datestamp>
	<modclass>Funny</modclass>
	<modscore>4</modscore>
	<htmltext><p>Encryption can easily be beaten by thermorectal cryptoanalysis (http://en.wikipedia.org/wiki/Rubber-hose\_cryptanalysis).</p></htmltext>
<tokenext>Encryption can easily be beaten by thermorectal cryptoanalysis ( http : //en.wikipedia.org/wiki/Rubber-hose \ _cryptanalysis ) .</tokentext>
<sentencetext>Encryption can easily be beaten by thermorectal cryptoanalysis (http://en.wikipedia.org/wiki/Rubber-hose\_cryptanalysis).</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682769</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683153</id>
	<title>AES-256</title>
	<author>Anonymous</author>
	<datestamp>1247481720000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>It uses AES-256, which has already been broken. Not that it's actually possible to use the attack to recover data, but in the future, AES-256 will only get more broken.</p></htmltext>
<tokenext>It uses AES-256 , which has already been broken .
Not that it 's actually possible to use the attack to recover data , but in the future , AES-256 will only get more broken .</tokentext>
<sentencetext>It uses AES-256, which has already been broken.
Not that it's actually possible to use the attack to recover data, but in the future, AES-256 will only get more broken.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682965</id>
	<title>Re:Encryption is just as good as self destruction</title>
	<author>Anonymous</author>
	<datestamp>1247480940000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>4</modscore>
	<htmltext><p>didn't <a href="http://xkcd.com/538/" title="xkcd.com">xkcd</a> [xkcd.com] teach you anything about encryption?</p></htmltext>
<tokenext>did n't xkcd [ xkcd.com ] teach you anything about encryption ?</tokentext>
<sentencetext>didn't xkcd [xkcd.com] teach you anything about encryption?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682769</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683601</id>
	<title>let me guess the code</title>
	<author>Anonymous</author>
	<datestamp>1247484120000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>Self destruct code:  Code zero zero zero destruct zero</htmltext>
<tokenext>Self destruct code : Code zero zero zero destruct zero</tokentext>
<sentencetext>Self destruct code:  Code zero zero zero destruct zero</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683793</id>
	<title>Circuitry?</title>
	<author>dandart</author>
	<datestamp>1247485380000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>So it blows out the circuitry, but what about the flash? Someone could just recover that.</htmltext>
<tokenext>So it blows out the circuitry , but what about the flash ?
Someone could just recover that .</tokentext>
<sentencetext>So it blows out the circuitry, but what about the flash?
Someone could just recover that.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682769</id>
	<title>Encryption is just as good as self destruction</title>
	<author>basementman</author>
	<datestamp>1247480160000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>3</modscore>
	<htmltext>What's the point of having it self destruct? Encrypt any old flash drive with True Crypt and you have accomplished the same thing at a much lower price. Want to destroy the data? Hit yourself on the head with a crowbar, making you forget the password. Problem solved.</htmltext>
<tokenext>What 's the point of having it self destruct ?
Encrypt any old flash drive with True Crypt and you have accomplished the same thing at a much lower price .
Want to destroy the data ?
Hit yourself on the head with a crowbar , making you forget the password .
Problem solved .</tokentext>
<sentencetext>What's the point of having it self destruct?
Encrypt any old flash drive with True Crypt and you have accomplished the same thing at a much lower price.
Want to destroy the data?
Hit yourself on the head with a crowbar, making you forget the password.
Problem solved.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682777</id>
	<title>Where's the market?</title>
	<author>religious freak</author>
	<datestamp>1247480220000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext>Funny, instead of paying extra, I'd just use a hammer, or a desk drawer, or if in a real pinch my two hands to break the thing apart.  Unless you're James Bond, I don't see how most folks would need any more than this, and if they do need more, they already have it.</htmltext>
<tokenext>Funny , instead of paying extra , I 'd just use a hammer , or a desk drawer , or if in a real pinch my two hands to break the thing apart .
Unless you 're James Bond , I do n't see how most folks would need any more than this , and if they do need more , they already have it .</tokentext>
<sentencetext>Funny, instead of paying extra, I'd just use a hammer, or a desk drawer, or if in a real pinch my two hands to break the thing apart.
Unless you're James Bond, I don't see how most folks would need any more than this, and if they do need more, they already have it.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682709</id>
	<title>Testicles.</title>
	<author>Anonymous</author>
	<datestamp>1247479980000</datestamp>
	<modclass>Offtopic</modclass>
	<modscore>-1</modscore>
	<htmltext><p>That is all.</p></htmltext>
<tokenext>That is all .</tokentext>
<sentencetext>That is all.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682945</id>
	<title>Re:Rip-off</title>
	<author>Starteck81</author>
	<datestamp>1247480880000</datestamp>
	<modclass>Funny</modclass>
	<modscore>5</modscore>
	<htmltext>I believe the self-destruct is triggered by unauthorized attempts to access. While your way is cheaper I suspect that rubber banding your usb drive to a hammer with a note that says "In case of theft please smash drive" is somewhat less effective due the lack of ethics most thieves posses.</htmltext>
<tokenext>I believe the self-destruct is triggered by unauthorized attempts to access .
While your way is cheaper I suspect that rubber banding your usb drive to a hammer with a note that says " In case of theft please smash drive " is somewhat less effective due the lack of ethics most thieves posses .</tokentext>
<sentencetext>I believe the self-destruct is triggered by unauthorized attempts to access.
While your way is cheaper I suspect that rubber banding your usb drive to a hammer with a note that says "In case of theft please smash drive" is somewhat less effective due the lack of ethics most thieves posses.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682771</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28684247</id>
	<title>Re:Encryption is just as good as self destruction</title>
	<author>Hurricane78</author>
	<datestamp>1247487900000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>5</modscore>
	<htmltext><p>So you think that will make the evil ones stop torturing the password out of you? They'll use that same crowbar to make you remember it! ^^</p><p>(Interlude: WTF. I have my adblocker disabled for the first time in months, and the first thing I see, is an Ironkey banner. Truly a slashvertisement.)</p><p>The point is, that the keyfile on your USB key is encrypted with your password. So if you destroy the keyfile, which would open your encrypted safe, your password gets useless. You could scream it to the whole world. It wouldn't matter. Nobody could open that thing now. Not even you.</p><p>And that is why you never let someone know that you want access to his system. ^^<br>Just use a keylogger, or a trojan horse, and be good. Become a cleaning person in that place. Or gain some trust otherwise.<br>If you need it: There are some internal CIA agent training manuals on the net, that can teach you this. Or if you can speak Russias, I recommend some Russian forums. ^^</p></htmltext>
<tokenext>So you think that will make the evil ones stop torturing the password out of you ?
They 'll use that same crowbar to make you remember it !
^ ^ ( Interlude : WTF .
I have my adblocker disabled for the first time in months , and the first thing I see , is an Ironkey banner .
Truly a slashvertisement .
) The point is , that the keyfile on your USB key is encrypted with your password .
So if you destroy the keyfile , which would open your encrypted safe , your password gets useless .
You could scream it to the whole world .
It would n't matter .
Nobody could open that thing now .
Not even you.And that is why you never let someone know that you want access to his system .
^ ^ Just use a keylogger , or a trojan horse , and be good .
Become a cleaning person in that place .
Or gain some trust otherwise.If you need it : There are some internal CIA agent training manuals on the net , that can teach you this .
Or if you can speak Russias , I recommend some Russian forums .
^ ^</tokentext>
<sentencetext>So you think that will make the evil ones stop torturing the password out of you?
They'll use that same crowbar to make you remember it!
^^(Interlude: WTF.
I have my adblocker disabled for the first time in months, and the first thing I see, is an Ironkey banner.
Truly a slashvertisement.
)The point is, that the keyfile on your USB key is encrypted with your password.
So if you destroy the keyfile, which would open your encrypted safe, your password gets useless.
You could scream it to the whole world.
It wouldn't matter.
Nobody could open that thing now.
Not even you.And that is why you never let someone know that you want access to his system.
^^Just use a keylogger, or a trojan horse, and be good.
Become a cleaning person in that place.
Or gain some trust otherwise.If you need it: There are some internal CIA agent training manuals on the net, that can teach you this.
Or if you can speak Russias, I recommend some Russian forums.
^^</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682769</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28684597</id>
	<title>Re:Encryption is just as good as self destruction</title>
	<author>mlts</author>
	<datestamp>1247489940000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>4</modscore>
	<htmltext><p>The advantage of having it drop access to the data after a certain amount of tries is the same reason people use cryptographic tokens -- brute forcing a passphrase becomes a non issue.</p><p>There is another feature of the IronKey that isn't mentioned -- encryption on a machine, say at a student computer lab, but without requiring administrative rights to access the data.  A lot of schools disallow admin access, and this is required to mount virtual volumes (TrueCrypt, BestCrypt, PGP, etc.)  Having software to allow access to the drive that never needs to leave user space is a good thing in these cases.</p><p>IronKey does have a market.  Especially for students at larger universities where there are people who lurk in the 24 hour computer labs just looking for a USB flash drive to steal.  With a stolen USB flash drive, they can either sell the done homework, or if someone has a paper for a popular class that isn't turned in, actually take the word processing document and call it theirs.  The downside is that the distinctive metal case does lure thieves, but the user has to figure out a balance.  To the user, is the data on the drive worth the price premium, especially if the data can be used by a thief or extortionist?  This applies to faculty too.  I'm sure there are those who would be more than happy to sell any test or quiz data that was gleaned from a USB flash drive swiped from a faculty lab.</p><p>Another use for these USB flash drives is delivering to a customer something extremely confidental (such as TrueCrypt keyfiles or one time pads) that will be used for future communication of large volumes of data.  For example, the customer gets the passphase from a rep, while a secure courier drops off the IronKey.  This way, the data never crosses the Internet.</p></htmltext>
<tokenext>The advantage of having it drop access to the data after a certain amount of tries is the same reason people use cryptographic tokens -- brute forcing a passphrase becomes a non issue.There is another feature of the IronKey that is n't mentioned -- encryption on a machine , say at a student computer lab , but without requiring administrative rights to access the data .
A lot of schools disallow admin access , and this is required to mount virtual volumes ( TrueCrypt , BestCrypt , PGP , etc .
) Having software to allow access to the drive that never needs to leave user space is a good thing in these cases.IronKey does have a market .
Especially for students at larger universities where there are people who lurk in the 24 hour computer labs just looking for a USB flash drive to steal .
With a stolen USB flash drive , they can either sell the done homework , or if someone has a paper for a popular class that is n't turned in , actually take the word processing document and call it theirs .
The downside is that the distinctive metal case does lure thieves , but the user has to figure out a balance .
To the user , is the data on the drive worth the price premium , especially if the data can be used by a thief or extortionist ?
This applies to faculty too .
I 'm sure there are those who would be more than happy to sell any test or quiz data that was gleaned from a USB flash drive swiped from a faculty lab.Another use for these USB flash drives is delivering to a customer something extremely confidental ( such as TrueCrypt keyfiles or one time pads ) that will be used for future communication of large volumes of data .
For example , the customer gets the passphase from a rep , while a secure courier drops off the IronKey .
This way , the data never crosses the Internet .</tokentext>
<sentencetext>The advantage of having it drop access to the data after a certain amount of tries is the same reason people use cryptographic tokens -- brute forcing a passphrase becomes a non issue.There is another feature of the IronKey that isn't mentioned -- encryption on a machine, say at a student computer lab, but without requiring administrative rights to access the data.
A lot of schools disallow admin access, and this is required to mount virtual volumes (TrueCrypt, BestCrypt, PGP, etc.
)  Having software to allow access to the drive that never needs to leave user space is a good thing in these cases.IronKey does have a market.
Especially for students at larger universities where there are people who lurk in the 24 hour computer labs just looking for a USB flash drive to steal.
With a stolen USB flash drive, they can either sell the done homework, or if someone has a paper for a popular class that isn't turned in, actually take the word processing document and call it theirs.
The downside is that the distinctive metal case does lure thieves, but the user has to figure out a balance.
To the user, is the data on the drive worth the price premium, especially if the data can be used by a thief or extortionist?
This applies to faculty too.
I'm sure there are those who would be more than happy to sell any test or quiz data that was gleaned from a USB flash drive swiped from a faculty lab.Another use for these USB flash drives is delivering to a customer something extremely confidental (such as TrueCrypt keyfiles or one time pads) that will be used for future communication of large volumes of data.
For example, the customer gets the passphase from a rep, while a secure courier drops off the IronKey.
This way, the data never crosses the Internet.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682769</parent>
</comment>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_07_13_1836204_13</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28687155
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683277
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_07_13_1836204_4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683257
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682835
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_07_13_1836204_10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28689677
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682701
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_07_13_1836204_15</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28684089
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682769
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_07_13_1836204_7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28685217
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682769
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_07_13_1836204_29</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28684965
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683793
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_07_13_1836204_1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28684909
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682701
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_07_13_1836204_11</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28688357
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683871
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_07_13_1836204_2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682871
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682769
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_07_13_1836204_26</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28686855
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28684597
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682769
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_07_13_1836204_28</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28689887
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682701
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_07_13_1836204_31</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683067
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682777
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_07_13_1836204_27</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683715
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683277
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_07_13_1836204_18</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682863
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682777
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_07_13_1836204_21</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28685239
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683371
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_07_13_1836204_14</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28684247
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682769
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_07_13_1836204_5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28684289
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682955
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_07_13_1836204_20</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28686641
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682945
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682771
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_07_13_1836204_16</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28688203
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683871
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_07_13_1836204_12</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683907
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682835
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_07_13_1836204_8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683155
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682847
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_07_13_1836204_3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28692659
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682769
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_07_13_1836204_25</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28691401
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28684597
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682769
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_07_13_1836204_32</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683091
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682777
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_07_13_1836204_6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28685025
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682769
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_07_13_1836204_0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28685907
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682777
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_07_13_1836204_24</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683929
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682833
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682769
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_07_13_1836204_23</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28685809
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682769
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_07_13_1836204_30</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28695313
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682769
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_07_13_1836204_17</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28690469
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683073
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682777
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_07_13_1836204_19</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28684927
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683073
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682777
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_07_13_1836204_9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682965
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682769
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_07_13_1836204_22</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28685745
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683277
</commentlist>
</thread>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_07_13_1836204.1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683153
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_07_13_1836204.12</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682955
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28684289
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_07_13_1836204.10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683995
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_07_13_1836204.15</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683793
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28684965
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_07_13_1836204.13</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683165
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_07_13_1836204.16</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682701
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28689887
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28684909
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28689677
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_07_13_1836204.14</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683277
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28685745
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28687155
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683715
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_07_13_1836204.6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682819
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_07_13_1836204.4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682769
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682871
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682965
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682833
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683929
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28684597
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28686855
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28691401
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28695313
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28685809
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28685217
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28692659
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28685025
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28684089
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28684247
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_07_13_1836204.8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683981
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_07_13_1836204.5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682847
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683155
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_07_13_1836204.2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682771
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682945
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28686641
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_07_13_1836204.3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683871
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28688203
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28688357
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_07_13_1836204.0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683721
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_07_13_1836204.9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682777
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682863
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683091
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683073
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28684927
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28690469
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683067
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28685907
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_07_13_1836204.7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683371
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28685239
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_07_13_1836204.11</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28682835
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683907
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_07_13_1836204.28683257
</commentlist>
</conversation>
