• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

GuardKey USB Encryption Dongle Makes Military-Grade Encryption as Easy as PnP

btarunr

Editor & Senior Moderator
Staff member
Joined
Oct 9, 2007
Messages
46,777 (7.64/day)
Location
Hyderabad, India
System Name RBMK-1000
Processor AMD Ryzen 7 5700G
Motherboard ASUS ROG Strix B450-E Gaming
Cooling DeepCool Gammax L240 V2
Memory 2x 8GB G.Skill Sniper X
Video Card(s) Palit GeForce RTX 2080 SUPER GameRock
Storage Western Digital Black NVMe 512GB
Display(s) BenQ 1440p 60 Hz 27-inch
Case Corsair Carbide 100R
Audio Device(s) ASUS SupremeFX S1220A
Power Supply Cooler Master MWE Gold 650W
Mouse ASUS ROG Strix Impact
Keyboard Gamdias Hermes E2
Software Windows 11 Pro
Changingtec, the information security experts, are introducing a new kind of hassle-free encryption device for consumers. The GuardKey USB encryption dongle lets anyone easily secure their files with military-grade 256-bit encryption, and decrypt them by simply plugging the GuardKey into their computer. Rather than being limited to the amount of data on a USB stick, GuardKey secures any number of files and folders on the host computer, external drives connected to the computer, or even data stored on the Cloud.

GuardKey makes military-grade encryption easy. Make a SafeBox folder on the drives you like and everything stored inside is automatically secured with 256-bit AES encryption. To access files, simply plug in the GuardKey and the SafeBox is decrypted. When finished, unplug the GuardKey and the SafeBox not only locks up again but disappears from the file explorer.



Extra Security with 256-bit AES and Two-Factor Authentication
The hardware-based authentication of GuardKey eliminates the problem of weak user passwords vulnerable to brute force attacks and provides hassle-free encryption and decryption using military grade 256-bit AES. For extra security, GuardKey can be paired with a password for two-factor authentication so even if your GuardKey is stolen, your data remains secure.

Protect Multiple Drives, Computers, and Even the Cloud
With GuardKey's SafeBox technology, a single GuardKey can secure multiple hard drives, external drives, or even Cloud-based storage. Installed Cloud services such as Google Drive, DropBox, OneDrive, and more are automatically detected and configured without the need for user intervention and can be immediately used with GuardKey.

Mobile Access and Photo Lock
With the GuardKey Viewer mobile app, users can bind their GuardKey to a mobile phone, allowing them to securely access files stored on their encrypted Cloud-based storage. Photo Lock lets mobile users easily encrypt and decrypt photos, keeping their personal images secure from hackers.

View at TechPowerUp Main Site
 
Joined
Jul 21, 2015
Messages
501 (0.15/day)
A closed-source encryption system from a Chinese company... I'll pass.
 
Joined
Sep 4, 2005
Messages
658 (0.10/day)
A closed-source encryption system from a Chinese company... I'll pass.
Not even that! lol my question is who is their target market? Anyone with any security sense would buy a random USB stick of the shelf rather than ordering one specifically targeted towards them, and I don't know how often these products make it into stores. Also half or more of these hacks happen from people plugging in USB sticks, so I am pretty sure anyone who needs this type of encryption for their work wouldn't be allowed to plug it into a secured terminal.

Nevertheless, it's nice to see this type of product. Anything that aims to increase security is good in my book, as long as they are doing so in the right way (no backdoors installed().
 
Joined
Aug 20, 2007
Messages
20,988 (3.40/day)
System Name Pioneer
Processor Ryzen R9 7950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage Intel 905p Optane 960GB boot, +2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64 / Windows 11 Enterprise IoT 2024
A closed-source encryption system from a Chinese company... I'll pass.

Nearly all TPM and hardware encryption chips are made in China. Makes you feel great doesn't it?

Not even that! lol my question is who is their target market? Anyone with any security sense would buy a random USB stick of the shelf rather than ordering one specifically targeted towards them,

I'm assuming it does some kind of encryption in hardware.
 
Joined
Sep 15, 2011
Messages
6,563 (1.40/day)
Processor Intel® Core™ i7-13700K
Motherboard Gigabyte Z790 Aorus Elite AX
Cooling Noctua NH-D15
Memory 32GB(2x16) DDR5@6600MHz G-Skill Trident Z5
Video Card(s) ZOTAC GAMING GeForce RTX 3080 AMP Holo
Storage 2TB SK Platinum P41 SSD + 4TB SanDisk Ultra SSD + 500GB Samsung 840 EVO SSD
Display(s) Acer Predator X34 3440x1440@100Hz G-Sync
Case NZXT PHANTOM410-BK
Audio Device(s) Creative X-Fi Titanium PCIe
Power Supply Corsair 850W
Mouse Logitech Hero G502 SE
Software Windows 11 Pro - 64bit
Benchmark Scores 30FPS in NFS:Rivals
WTF is
"military-grade encryption"
?????
 
Joined
Jul 21, 2015
Messages
501 (0.15/day)
Nearly all TPM and hardware encryption chips are made in China. Makes you feel great doesn't it?



I'm assuming it does some kind of encryption in hardware.


I don't use TPM either. Or Bitlocker. They can't be trusted not to have back doors. I use TrueCrypt - and as soon as VeraCrypt passes an audit I'll switch to that.
 
Joined
Aug 20, 2007
Messages
20,988 (3.40/day)
System Name Pioneer
Processor Ryzen R9 7950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage Intel 905p Optane 960GB boot, +2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64 / Windows 11 Enterprise IoT 2024
I don't use TPM either. Or Bitlocker. They can't be trusted not to have back doors. I use TrueCrypt - and as soon as VeraCrypt passes an audit I'll switch to that.
That's great. But you obviously trust western encryption done in software not to have backdoors. AES likely does if we believe Snowden... why wouldn't the others? Why not the "black box" AES instruction done in hardware on most modern procs, utilized by truecrypt? (Note I don't buy into Snowdens reports 100%, just pointing out it's all largely subject to the same issues. Pick your trusted poison :) )
 
Joined
Jul 21, 2015
Messages
501 (0.15/day)
That's great. But you obviously trust western encryption done in software not to have backdoors. AES likely does if we believe Snowden... why wouldn't the others? Why not the "black box" AES instruction done in hardware on most modern procs, utilized by truecrypt? (Note I don't buy into Snowdens reports 100%, just pointing out it's all largely subject to the same issues. Pick your trusted poison :) )

Could AES have a backdoor? Highly unlikely, but possible. That's why you use a cascaded cipher. As unlikely as it is for a single cipher to have a back door, it is orders of magnitude less likely for all three ciphers to have back doors. Not only that but to date, all vulnerabilities regarding AES - including those referenced by Snowden - have been due to exploiting a faulty implementation of the cipher, not a weakness or back door in the cipher itself. And then there's the fact that if AES WERE discovered to have a back door, it would turn the security world upside down overnight. I would put a lot more trust into an open-source implementation that has millions of eyes on it and has passed an independent audit, over a closed source item from a truly obscure company based in a country well-known for its cyber attacks against us.
 
Last edited:
Joined
Sep 26, 2012
Messages
118 (0.03/day)
Processor AMD Threadripper 3690x
Motherboard MSI TRX40 Pro 10G
Cooling Custom Water
Memory 32GB (2x 16GB) G.Skill Flare X
Video Card(s) Gigabyte GeForce GTX 1080 Turbo OC
Storage 2x 1TB Intel 970 Pro NVM
Display(s) Dell U2415m x2
Case Fractal Define XL R2
Audio Device(s) Sound Blaster Hyper X G6
Power Supply 800 Watt Fractal Design Newton R3
Mouse Logitech G502
Keyboard Cherry MX-3.0 - Black Keys
Software Win 10 Edu
[...] I would put a lot more trust into an open-source implementation that has millions of eyes on it and has passed an independent audit, over a closed source item from a truly obscure company based in a country well-known for its cyber attacks against us.

And yet the most privacy issues in regards to anything "cyber" are with the US of A. At least China and N. Korea do it publicly.

There are reasons that American companies need to have special agreements and security in place if they want to move information (personal and bank details, etc.) from Europe to the US - as the US has been proven to have too little security and labled insecure by the European Council.
 
Joined
Jul 21, 2015
Messages
501 (0.15/day)
And yet the most privacy issues in regards to anything "cyber" are with the US of A. At least China and N. Korea do it publicly.

There are reasons that American companies need to have special agreements and security in place if they want to move information (personal and bank details, etc.) from Europe to the US - as the US has been proven to have too little security and labled insecure by the European Council.

... TrueCrypt has nothing to do with the US. The development team was Czech. It is open source, and aside from the actual security experts that use it themselves (and undoubtedly scrutinized every release before they used it), it has passed an independent audit.
 
Joined
Aug 20, 2007
Messages
20,988 (3.40/day)
System Name Pioneer
Processor Ryzen R9 7950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage Intel 905p Optane 960GB boot, +2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64 / Windows 11 Enterprise IoT 2024
... TrueCrypt has nothing to do with the US. The development team was Czech. It is open source, and aside from the actual security experts that use it themselves (and undoubtedly scrutinized every release before they used it), it has passed an independent audit.

The only part of it that has anything to do with the USA is the AES implementation which follows the NIST reference implementation to a tee.

The rest are european algorithms, which is why I was careful not to blame the USA and instead say you were trusting "Western" algorithms (and I don't mean algorithms developed by cowboys, people. Those ones are awful.)
 
Last edited:
Joined
Oct 23, 2015
Messages
56 (0.02/day)
Processor i5-6600K
Motherboard Gigabyte Z710-HD3
Cooling H60
Memory 32 GB DDR4-2133
Video Card(s) EVGA 980 Ti
Storage BX100 1 TB
Display(s) Acer S277HK
Case Fractal Design R5
Power Supply EVGA 750W B2
Mouse Logitech G400s
Keyboard MS Sidewinder X4
And yet the most privacy issues in regards to anything "cyber" are with the US of A. At least China and N. Korea do it publicly.

There are reasons that American companies need to have special agreements and security in place if they want to move information (personal and bank details, etc.) from Europe to the US - as the US has been proven to have too little security and labled insecure by the European Council.
At least we can talk about such privacy issues in the US.
 
Top