Tuesday, January 26th 2016

GuardKey USB Encryption Dongle Makes Military-Grade Encryption as Easy as PnP

Changingtec, the information security experts, are introducing a new kind of hassle-free encryption device for consumers. The GuardKey USB encryption dongle lets anyone easily secure their files with military-grade 256-bit encryption, and decrypt them by simply plugging the GuardKey into their computer. Rather than being limited to the amount of data on a USB stick, GuardKey secures any number of files and folders on the host computer, external drives connected to the computer, or even data stored on the Cloud.

GuardKey makes military-grade encryption easy. Make a SafeBox folder on the drives you like and everything stored inside is automatically secured with 256-bit AES encryption. To access files, simply plug in the GuardKey and the SafeBox is decrypted. When finished, unplug the GuardKey and the SafeBox not only locks up again but disappears from the file explorer.
Extra Security with 256-bit AES and Two-Factor Authentication
The hardware-based authentication of GuardKey eliminates the problem of weak user passwords vulnerable to brute force attacks and provides hassle-free encryption and decryption using military grade 256-bit AES. For extra security, GuardKey can be paired with a password for two-factor authentication so even if your GuardKey is stolen, your data remains secure.

Protect Multiple Drives, Computers, and Even the Cloud
With GuardKey's SafeBox technology, a single GuardKey can secure multiple hard drives, external drives, or even Cloud-based storage. Installed Cloud services such as Google Drive, DropBox, OneDrive, and more are automatically detected and configured without the need for user intervention and can be immediately used with GuardKey.

Mobile Access and Photo Lock
With the GuardKey Viewer mobile app, users can bind their GuardKey to a mobile phone, allowing them to securely access files stored on their encrypted Cloud-based storage. Photo Lock lets mobile users easily encrypt and decrypt photos, keeping their personal images secure from hackers.
Add your own comment

11 Comments on GuardKey USB Encryption Dongle Makes Military-Grade Encryption as Easy as PnP

#1
taz420nj
A closed-source encryption system from a Chinese company... I'll pass.
Posted on Reply
#2
Steven B
taz420njA closed-source encryption system from a Chinese company... I'll pass.
Not even that! lol my question is who is their target market? Anyone with any security sense would buy a random USB stick of the shelf rather than ordering one specifically targeted towards them, and I don't know how often these products make it into stores. Also half or more of these hacks happen from people plugging in USB sticks, so I am pretty sure anyone who needs this type of encryption for their work wouldn't be allowed to plug it into a secured terminal.

Nevertheless, it's nice to see this type of product. Anything that aims to increase security is good in my book, as long as they are doing so in the right way (no backdoors installed().
Posted on Reply
#3
R-T-B
taz420njA closed-source encryption system from a Chinese company... I'll pass.
Nearly all TPM and hardware encryption chips are made in China. Makes you feel great doesn't it?
Steven BNot even that! lol my question is who is their target market? Anyone with any security sense would buy a random USB stick of the shelf rather than ordering one specifically targeted towards them,
I'm assuming it does some kind of encryption in hardware.
Posted on Reply
#4
Prima.Vera
WTF is
"military-grade encryption"
?????
Posted on Reply
#5
taz420nj
R-T-BNearly all TPM and hardware encryption chips are made in China. Makes you feel great doesn't it?



I'm assuming it does some kind of encryption in hardware.
I don't use TPM either. Or Bitlocker. They can't be trusted not to have back doors. I use TrueCrypt - and as soon as VeraCrypt passes an audit I'll switch to that.
Posted on Reply
#6
R-T-B
taz420njI don't use TPM either. Or Bitlocker. They can't be trusted not to have back doors. I use TrueCrypt - and as soon as VeraCrypt passes an audit I'll switch to that.
That's great. But you obviously trust western encryption done in software not to have backdoors. AES likely does if we believe Snowden... why wouldn't the others? Why not the "black box" AES instruction done in hardware on most modern procs, utilized by truecrypt? (Note I don't buy into Snowdens reports 100%, just pointing out it's all largely subject to the same issues. Pick your trusted poison :) )
Posted on Reply
#7
taz420nj
R-T-BThat's great. But you obviously trust western encryption done in software not to have backdoors. AES likely does if we believe Snowden... why wouldn't the others? Why not the "black box" AES instruction done in hardware on most modern procs, utilized by truecrypt? (Note I don't buy into Snowdens reports 100%, just pointing out it's all largely subject to the same issues. Pick your trusted poison :) )
Could AES have a backdoor? Highly unlikely, but possible. That's why you use a cascaded cipher. As unlikely as it is for a single cipher to have a back door, it is orders of magnitude less likely for all three ciphers to have back doors. Not only that but to date, all vulnerabilities regarding AES - including those referenced by Snowden - have been due to exploiting a faulty implementation of the cipher, not a weakness or back door in the cipher itself. And then there's the fact that if AES WERE discovered to have a back door, it would turn the security world upside down overnight. I would put a lot more trust into an open-source implementation that has millions of eyes on it and has passed an independent audit, over a closed source item from a truly obscure company based in a country well-known for its cyber attacks against us.
Posted on Reply
#8
Dragonsmonk
taz420nj[...] I would put a lot more trust into an open-source implementation that has millions of eyes on it and has passed an independent audit, over a closed source item from a truly obscure company based in a country well-known for its cyber attacks against us.
And yet the most privacy issues in regards to anything "cyber" are with the US of A. At least China and N. Korea do it publicly.

There are reasons that American companies need to have special agreements and security in place if they want to move information (personal and bank details, etc.) from Europe to the US - as the US has been proven to have too little security and labled insecure by the European Council.
Posted on Reply
#9
taz420nj
DragonsmonkAnd yet the most privacy issues in regards to anything "cyber" are with the US of A. At least China and N. Korea do it publicly.

There are reasons that American companies need to have special agreements and security in place if they want to move information (personal and bank details, etc.) from Europe to the US - as the US has been proven to have too little security and labled insecure by the European Council.
... TrueCrypt has nothing to do with the US. The development team was Czech. It is open source, and aside from the actual security experts that use it themselves (and undoubtedly scrutinized every release before they used it), it has passed an independent audit.
Posted on Reply
#10
R-T-B
taz420nj... TrueCrypt has nothing to do with the US. The development team was Czech. It is open source, and aside from the actual security experts that use it themselves (and undoubtedly scrutinized every release before they used it), it has passed an independent audit.
The only part of it that has anything to do with the USA is the AES implementation which follows the NIST reference implementation to a tee.

The rest are european algorithms, which is why I was careful not to blame the USA and instead say you were trusting "Western" algorithms (and I don't mean algorithms developed by cowboys, people. Those ones are awful.)
Posted on Reply
#11
chlamchowder
DragonsmonkAnd yet the most privacy issues in regards to anything "cyber" are with the US of A. At least China and N. Korea do it publicly.

There are reasons that American companies need to have special agreements and security in place if they want to move information (personal and bank details, etc.) from Europe to the US - as the US has been proven to have too little security and labled insecure by the European Council.
At least we can talk about such privacy issues in the US.
Posted on Reply
Add your own comment
Apr 19th, 2024 20:02 EDT change timezone

New Forum Posts

Popular Reviews

Controversial News Posts