Feeds

Smoke-belching flash drive self-destructs on command

Do not press the red button!

Choosing a cloud hosting partner with confidence

Vid Chinese flash biz Runcore has built a self-destructing solid-state drive.

The ironically named InVincible SATA SSD is aimed at military applications and customised SSD markets where a very high degree of data protection is required. It comes in 1.8-inch and 2.5-inch rugged form factors with SATA, PATA and CF Card interfaces, and holds up to 512GB of data.

As you can witness in the video below, the InVincible protects stored content from falling into the wrong hands at the press of a couple of buttons. Hit the green one to overwrite every NAND cell with random junk data, leaving the SSD to be initialised and reused from scratch. It's Green - see?

Now, maybe writing random data over your files isn't enough. You need to burn your documents. This is where the red button comes into play. Press that and the NAND cells are physically destroyed, complete with inexplicable magic blue smoke.

Presumably you don't actually need to hit the push switches - the connectors can be wired up to some output line for remote, or even local, electronic control. And red is a bad choice; who could resist hitting a shiny big red button?

El Reg's storage desk can imagine a scenario in which the device is embedded in some military equipment that is about to fall into enemy hands. Then you could send it a signal to self-destruct. But fiddling about with button-ended wires? That's a Runcore gimmick, surely, designed to catch the attention of shallow-minded hacks, er, us. ®

Remote control for virtualized desktops

More from The Register

next story
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
DEATH by COMMENTS: WordPress XSS vuln is BIGGEST for YEARS
Trio of XSS turns attackers into admins
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.