For a long time, users' mobile storage media have continued from floppy disk → CD → USB disk → mobile hard disk. Although these storage devices bring great convenience to users, there are hidden dangers of storage privacy and security. With the rapid development of digital information construction, third-party encryption products for user security emerge in endlessly, including encryption USB flash drives controlled by computer APP; There is also a USB flash disk that can enter the password in the U itself; There are also black tokens for mobile phone security. These products are all designed to ensure user data security, but there is still a risk of cracking due to staying at the digital protection level. This time, the author was lucky to get the opportunity to experience this magic cloud shield. This product builds a security bridge through built-in wifi, and uses fingerprint identification to protect user information security.
▲ There is not much bright spot on the outer package of the product, and only the abbreviation MLkey and other words are printed on the front shell. The product name, safety protection information and function introduction are printed in detail below the back. In addition, the product mac address and the built-in wifi account password are printed in large letters on stickers (I think it is improper to publicize and protect information as a security software. If the built-in wifi is used, it can be easily known that it is not easy for outsiders to access the intranet)
▲ The product accessories are also very simple. The inner layer of the package is divided into two layers, the upper layer is the Magic Yundun host, and the lower layer is the instructions and data lines
▲ The data cable is designed as one to two. In addition to the default Micro usb interface, it can also be converted to the Apple 6 interface through the headset
▲ On the cardboard wrapping the data line, the operation steps of the product, the QR code downloaded from the APP, the product operation instructions and other information are briefly printed
▲ The front part of the product is equipped with a fingerprint identification scanning device, and the user can complete scanning verification by moving his finger from up to down.
▲ The official website of the product is printed on the top right corner of the smooth back of the product, and the left and right sides of the product are also sealed with two smooth silver gray plastic covers.
▲ The Mirco usb interface at the bottom is used for daily device charging
▲ The two data keys on the top manage the daily equipment startup, and the charging indicator is equivalent
Since the product itself does not have the function of external connection, all data transmission needs to be completed using the intelligent terminal to receive instructions. Secure data access is achieved through security verification between APP and Yundun.
▲ When executing the APP for the first time, you can see the wizard interface displayed by sliding, and clearly understand the four functions of the device by means of graphics and text.
▲ The user needs to complete four login instructions to formally enter the interface; First, complete the internal wifi connection according to the shell prompt information, and then the APP will remind the user to scan and input the fingerprint information (in order to verify the accuracy, the user needs to repeat the swiping operation five times to complete the identification). Finally, set a digital password to avoid fingerprint identification failure.
▲ When everything is ready, users can enter the program. Although the device is 16GB, the actual available space is about 13.9GB. Users can back up data to Yundun by uploading and downloading data; In the backup/restore mode, data file encryption/decryption can be realized; If you have a large number of accounts and passwords of different natures, you can safely enter them into the password library. Compared with the file management password library, you need to be authenticated to view them.
▲ After Yundun scans the fingerprint, you can access to account management, which provides different types of account password management, such as website, online game, bank, etc; It is helpful for the daily security management of user information resources.
▲ In order to quickly classify and manage the files put on, Yundun classifies the uploaded files, and selects the corresponding types of uploaded files to automatically place them in the corresponding Yundun management directory; Avoid the inconvenience of traditional unified upload and secondary sorting.
▲ Since the files uploaded to Yundun will not be encrypted automatically, after successfully entering Yundun, the user needs to enter the backup/restore column to perform a separate operation on the files to be encrypted. After the file is encrypted, if you need to view the file content, the software will prompt fingerprint scanning verification when you open it.
▲ Because Yundun uses built-in wifi connection, users cannot access the Internet when connecting to built-in wifi; At this point, the user can enter My>One button Internet Access mode, add external wifi to the Yundun database, and then achieve wifi relay access (PS: hidden SSID network is not supported).
▲ In My → Security Settings, the user can increase the number of fingerprint identification according to the use needs, and the maximum number of fingerprints can be 3; You can also set whether to support dual protection of fingerprint and password, as well as abnormal login logs.
For the Magic Yundun product, it breaks people's traditional product security awareness. For the first time, biometrics, data encryption, wireless transmission and other technologies are applied to civilian level equipment to achieve dual security assurance of local and cloud. It is not only compact in appearance and convenient for carrying, but also can quickly establish a communication network anywhere. It can quickly and safely achieve identity verification by gently sliding your fingers on the Magic Cloud Shield to avoid the risk of password leakage. The secure and convenient privacy protection lock allows user data to enjoy military level protection.
Suggestions for product improvement:
1. As a security product, it seems inadvertent to protect the built-in wifi password of the device on the shell. It is recommended that these information be placed on the internal instructions of the package to eliminate hidden dangers.
2. Since the built-in wifi information cannot be modified, if the built-in wifi is mastered by hackers, you can enter the intranet environment to achieve cracking. It is recommended to support built-in wifi customization functions or hide SSID functions.
3. Although the one button Internet access function can achieve external network access by relaying the third-party wifi, it is found in the actual test that the wireless network cannot support the "hidden SSID".
4. Add ordinary upload and encrypted upload options in the upload mode, so as to save the user from choosing to encrypt the uploaded file twice after uploading.
5. Since the equipment is small, it is recommended to add anti loss reminder to avoid loss. Avoid the loss of encryption equipment and the loss of own data.
6. The device charges slowly, and its continuous use duration is only about 4 and a half hours.
7. Users can view files only after decryption is allowed, but after decryption, users need to manually delete the files after viewing them; It is recommended to set the temporary view decryption mode. Users will automatically delete the decrypted files after viewing the encrypted files. Protect users from information leakage due to personal forgetfulness.
The article on the trial of iGo is completed by netizens, which does not represent the views of this website.