IT PRO Today, June2019, cloudAshur article featuring Prof John Walker
“The testing conducted against this device has gone well beyond attempting to guess the key sequence,” he said. “The core technology of all iStorage devices has also been subjected to penetration testing and attack at the lower levels of the operating stack, including physical tampering, all of which proved that robust security is provisioned.”