I think I'm not grasping the full story here (excuse me for being a bit thick) ... are we saying that the encryption takes place in the stick itself (that is, as and when the raw data is copied to it)?
And then once it's safely locked away inside the stick, you need some sort of access key number (or whatever) to be able to retrieve it. Is that it?
So (assuming that to be the case), each device (PC
etc.) wanting to use that data would need software installed to be able to access it, would they not? And then ... is the reverse process (the decryption) carried out in the stick (I guess so), or on the retrieving device?
My hacker instincts have been aroused! I wonder what (how good) this encryption actually is. Could it be just a simple flipping of the bits?
