eyeDisk. Hacking the unhackable. Again
https://www.pentestpartners.com/security-blog/eyedisk-hacking-the-unhackable-again/ [www.pentestpartners.com]
2019-05-12 15:19
So, a lot of complex SCSI commands were used to understand the controller side of the device, but obtaining the password/iris can be achieved by simply sniffing the USB traffic to get the password/hash in clear text. The software collects the password first, then validates the user-entered password BEFORE sending the unlock password. This is a very poor approach given the unhackable claims and fundamentally undermines the security of the device.
source: HN