14
3
I'm looking for a solution to write-protect the contents of a USB key. The idea is to prevent its contents from being inadvertently removed by the user or changed by malicious programs -- not to restrict the re-cycling of the key for something else.
Here is a summary of my findings so far:
Some keys have a switch which makes them read-only. Unfortunately this is not always the case.
With a FAT32 filesystem the only solution seems to be setting the files "read-only". But this protection is too weak. There is a slightly stronger write-protection available for NTFS, which can be achieved by removing write privileges from "All Users" it will make the files read-only to every account, except "Administrator". Formatting the disk as UDF makes it read-only under Windows XP SP3, but read-write in Windows Vista, Windows 7, Linux and Mac OS X. Formatting as ISO9660/CDFS makes it read-only under Linux and Mac OS X, but unfortunately the contents are not readable anymore from Windows.
With microcontroller-specific software is possible (if supported by the chip) to re-partition the key so it displays for example a write-protected and a read-write partition. The problem is that it is very confusing for the users: the write-protected partition can appear as a CD-ROM drive (which it is not), after insertion some drivers are apparently installed on the computer (in fact they are not really drivers), and it can lead to prompting for reboot. Besides, this solution cannot be applied universally because it requires knowing which chip is used in the drive, and the existence of publicly available tools to re-program the device.
John Reasor mentions utilities able to fill all free space on the device, making it impossible to create new files (see below).
Does there exist a general solution to store non-modifiable contents on a USB key?
It protects the contents from modifications typically done from the shell (e.g. delete, rename, move) or from the files and folders being modified by a standard applications (e.g. save-as)
It should work with most of the devices
The user can still re-format the device into a regular key to re-cycle it for another usage (for example, with fdisk)
1You would need to buy a flash drive designed for this purpose, no way to retrofit an existing flash drive. It could be done by modifying Windows permissions of the files on the drive, but Unix, Linux would ignore these settings. I'm a bit confused, you want to protect data from users deleting it, but then you want users to format and recycle the drive?, you cannot have it both ways. – Moab – 2011-04-11T21:23:29.667
Yes, I don't consider using fdisk, format or the partition manager as something a user would inadvertently do. It's just this kind of action I want to prevent. – caas – 2011-04-12T21:48:13.520