As the encryption algorithm uses AES with 128 encryption mode CBC and ESSIV:SHA256. The master key is encrypted with another 128 bit AES key derived from the user password using PBKDF2 2000 cycles with 128 bits of random salt using the openssl library call. Salt is used to add more randomness when creating hash standard PBKDF2 and prevents "rainbow table" attacks on the password.
Find more questions by tags SoftwareUSB flash drivesdata recoveryIron
The specifications on the Protocol found. Even with shaggy, when in the course were 16-128 megabytes of SD, the problem with passwords on them already stood, and then did the device on mega 48, which removes the password, formatting, of course.
And technological Pina what you can find on habré, there was an article about data recovery from microSD. Those little noses on the map. - julie_DAmore commented on July 9th 19 at 10:41