Of course, like anything, they could have other unknown vulnerabilities. But like they say in the video on that link, they're a security company that makes a storage product, opposed to a storage company making a security product.
they're a security company that makes a storage product, opposed to a storage company making a security product.
I laughed a bit thinking of extreme trade off in those two statements (so allow me to respectfully embellish [is that possible?]):
Security company makes a storage product: It's secure because they have no idea how to make a storage product and therefore your data is not actually stored anywhere that it can be retrieved in the event that you've provided the correct key.
Storage company makes a security product: The data is stored properly. It is then encrypted using whatever sample code was discovered in a search for the acronym "AES" with a bunch of redundancy in the event that something with the physical media fails. This redundancy is stored in the clear.
A vulnerability in storage results in inaccessible data. A vulnerability in security results in overly accessible data.
Perhaps, or perhaps they just XOR your data with your passwd like a certain tape maker did for their super hardware AES mil-spec encryption.