How ORWL worksORWL uses a self-encrypted SSD ). A security microcontroller is integrated into its motherboard to generate and store encryption keys. Once the system integrity and verified users are verified, it uses the key to decrypt the SSD ). Whether you tamper with ORWL of any type, the key immediately deletes useless data on the solid state drive (SSD ).
To complete identity authentication, ORWL has a key card that uses a technology similar to smart card. It uses NFC technology to authenticate users and uses Bluetooth to detect whether users are in use. If the user is not nearby (out of scope), ORWL will be automatically locked.
The entire ORWL system is wrapped in an active flip grid with pressure switches everywhere. Security microcontroller continuously monitors specialized inertial measurement components, movable flip mesh, internal temperature and power input voltage for tampering detection. This will prevent access to internal components. For example, attempts to crack the flip will trigger the Security microcontroller to delete the encryption key. In addition, for security considerations, dynamic random memory (DRAM) is also welded to a shell.
This is not all of the security measures. ORWL also has more detailed measures to ensure the absolute physical security of the device, including cold start protection and Direct Memory Access (DMA) attack defense.
For more information, see the ORWL boot page. Here is a quick video on how it works.
Is ORWL the final answer to information security?Sadly, ORWL is not the final answer to information security. ORWL can only provide physical security for computers. Although it is powerful and looks cool, there are still many attacks from other aspects that will damage your system. However, ORWL does improve computer security as a whole.
What do you think about ORWL? Let us know your thoughts through comments.
From: http://www.lupaworld.com/article-260966-1.html
Address: http://www.linuxprobe.com/computer-capable.html