Subject: General Tech | February 14, 2019 - 05:30 PM | Jim Tanous
Tagged: sound card, radeon viii, podcast, Nu Audio, hyperx, evga, encrypted storage, DLSS, battlefield V, audiophile
PC Perspective Podcast #532 - 2/13/2019
This week we take a look at a high-end audio card from EVGA, a USB flash drive with built-in hardware encryption, and new gaming mouse from HyperX, the latest NVIDIA and AMD driver updates, and GTX 1660 Ti rumors.
Subscribe to the PC Perspective Podcast
Check out previous podcast episodes: http://pcper.com/podcast
00:07:14 - Review: EVGA NU Audio Card
00:26:26 - Review: iStorage datAshur Pro Encrypted USB Drive
00:32:41 - Review: HyperX Pulsefire Core Gaming Mouse
00:36:40 - News: AMD Radeon Adrenalin 19.2.2 Driver Update
00:42:04 - News: AMD Pro Driver Support for Radeon VII
00:47:18 - News: NVIDIA DLSS Driver & Battlefield V
00:59:07 - News: Microsoft Wants You to Dump Internet Explorer
01:03:12 - News: GTX 1660 Ti Spec Rumors
01:15:53 - Picks of the Week
datAshur Pro Encrypted USB Flash Drive
Editor's Note: This review was originally published at TekRevue and is republished here with permission.
When it comes to protecting your data, there are options such as local encryption or using an online storage service that offers encryption in the cloud. But one major weakness that affects both businesses and consumers is the "sneakernet:" moving data physically between computers or users via mediums such as flash drives or external hard drives. For example, delivering the latest W-2 forms to the HR department or taking your yearly tax information to your accountant's office.
While it's possible to move data in this manner securely by using software-based encryption, the simple reality is that many users and employees don't take data security into consideration, or they just forget. The thought is "the data is in my hands, it's safe." But, of course, when that flash drive or hard drive gets left behind at the coffee shop, or the bag containing them gets swiped at the airport, this false notion crumbles immediately.
UK-based iStorage is one company that recognizes this issue, and the company has built its entire product line around hardware-based encryption for external storage devices. These are devices that automatically encrypt the data stored on them, completely preventing access to the data unless the correct PIN is physically entered on the device. As long as employees or family members use a device like this for their external data storage, they never need to "think" about encryption since the data is automatically secured as soon as it's unplugged from the computer.
While iStorage offers a range of devices including external hard drives, we spent some time with one of the company's flash drives. The datAshur Pro is a USB 3.0 drive that is available in capacities ranging from 4 to 64GB. We're reviewing the 32GB model, which has a current street price in the US of about $125.
It's Easier to Be Convincing than Correct
This is a difficult topic to discuss. Some perspectives assume that law enforcement have terrible, Orwellian intentions. Meanwhile, law enforcement officials, with genuinely good intentions, don't understand that the road to Hell is paved with those. Bad things are much more likely to happen when human flaws are justified away, which is easy to do when your job is preventing mass death and destruction. Human beings like to use large pools of evidence to validate assumptions, without realizing it, rather than discovering truth.
Ever notice how essays can always find sources, regardless of thesis? With increasing amounts of data, you are progressively more likely to make a convincing argument, but not necessarily a more true one. Mix in good intentions, which promotes complacency, and mistakes can happen.
But this is about Apple. Recently, the FBI demanded that Apple creates a version of iOS that can be broken into by law enforcement. They frequently use the term “back door,” while the government prefers other terminology. Really, words are words and the only thing that matters is what it describes -- and it describes a mechanism to compromise the device's security in some way.
This introduces several problems.
The common line that I hear is, “I don't care, because I have nothing to hide.” Well... that's wrong in a few ways. First, having nothing to hide is irrelevant if the person who wants access to your data assumes that you have something you want to hide, and is looking for evidence that convinces themselves that they're right. Second, you need to consider all the people who want access to this data. The FBI will not be the only one demanding a back door, or even the United States as a whole. There are a whole lot of nations that trusts individuals, including their own respective citizens, less than the United States. You can expect that each of them would request a backdoor.
You can also expect each of them, and organized criminals, wanting to break into each others'.
Lastly, we've been here before, and what it comes down to is criminalizing math. Encryption is just a mathematical process that is easy to perform, but hard to invert. It all started because it is easy to multiply two numbers together, but hard to factor them. The only method we know is dividing by every possible number that's smaller than the square root of said number. If the two numbers are prime, then you are stuck finding one number out of all those possibilities (the other prime number will be greater than the square root). In the 90s, numbers over a certain size were legally classified as weapons. That may sound ridiculous, and there would be good reason for that feeling. Either way, it changed; as a result, online banks and retailers thrived.
While we believe the FBI’s intentions are good, it would be wrong for the government to force us to build a backdoor into our products. And ultimately, we fear that this demand would undermine the very freedoms and liberty our government is meant to protect.
Good intentions lead to complacency, which is where the road to (metaphorical) Hell starts.