Write before evaluation
Many people have used password management software, such as 1password, lastpass, etc., but have you seen hardware products that specifically manage passwords?
Today, we want to evaluate a hardware version of the password manager, Extreme Secret Shield K2.
Jimi Shield K2 just came into the market this year. Its birth stems from a common pain point of many users: losing passwords.
We use many applications every day, QQ、 WeChat, Weibo, Taobao, Jingdong, online banking, Alipay, email...... Each has a password.
Just imagine how much trouble will be caused if these passwords are lost overnight.
Worryingly, this probability has been increasing: many large websites do not pay enough attention to user privacy security, leading to the disclosure of all user information; Numerous hackers use the stolen password database to carry out database collision attacks, steal users' assets and privacy, sell user data everywhere, and even have formed a huge black industry chain
The founder of Jimi Technology, a Virgo tech man, saw the seriousness of the problem early. He was worried about this and decided to do something for netizens. After three years of closed door research and development, he and his team launched this extremely dense shield K2 this year.
Don't gossip. Open the box.
Appearance evaluation of JMD K2
This is a black plastic packaging carton. It looks high-end and low-key. There is only a logo and four words "everything is close" on the front of the carton lid, which makes people wonder what is inside.
Tear off the plastic seal and open the cover. The black printed Jimi Shield K2 appeared in front of us.
Jimi Shield K2 has a strong and angular shape. The whole body is made of zinc alloy, which is strong and durable. Zinc alloy has good mechanical properties and wear resistance at room temperature, which can largely keep the body of the ultra dense shield K2 beautiful, and it is not easy to scratch and deform over time.
The front of the phone is a monochrome display screen. Compared with the mobile phone, the screen proportion is not too high. The screen size and screen proportion are similar to the previous MP3. This is acceptable considering the size of the equipment. The use of tempered glass as a protective layer outside the screen can prevent the screen from being scratched or damaged by hard objects. At the same time, the reflective property of the glass can prevent others from peeping to a certain extent.
On the top of the fuselage are the OK key and the Exit key, which are also black zinc alloy, and are consistent with the fuselage. The key feedback force is appropriate, without collapse and stiffness.
On the right side of the fuselage is a key hole with a long round corner, which can be matched with a key chain or a mobile phone lanyard. This design is very good. Everyone should have had the experience of looking for USB flash drives everywhere. Such small things are easy to lose. The key hole solves the storage problem well.
There is a mini USB interface at the rear of the fuselage. The manual says that this interface can be used for charging, or it can be connected to a PC and managed through a PC client.
The back of the fuselage is very simple. From here, we can know that Jimi Shield K2 has obtained the batch number SJK1591 issued by the State Password Security Administration. This shows that the security of JMD K2 has been recognized by the authority, which we have never seen on other products.
In addition, JMD K2 has also obtained the domestic EAL4+security certification, which is the highest security certification that domestic products can obtain at present.
In the box, except for the extremely tight shield K2, the accessories only have one data cable. The outer layer of the data cable is made of nylon braid, which is resistant to pulling and can protect the internal copper core cable from being damaged by external forces.
Take a group photo of Jimi Shield K2, data cable, certificate of quality, warranty card and manual.
That's all for the appearance. Next, let's look at the function evaluation.
Evaluation on the use of extremely dense shield k2
After getting the extremely dense shield K2, we have always had a question without an answer: how much capacity does it have if there is no capacity written on the fuselage?
The instruction manual says that the capacity of the Extreme Secret Shield K2 is 100 passwords+100 secret bars. This is a puzzling answer. Why is it not a unit like 128M or 16G, but a "piece"?
After some understanding, we found that although the appearance of the Extreme Shield K2 is very similar to that of the USB flash drive and early MP3 players, the way they store data is quite different. Jimi Shield K2 uses professional encryption chips to store data, while USB flash memory chips and MP3 flash memory chips are used to store data. The data is stored in clear text without encryption.
Jimi Shield K2 is not only a simple password memory, but also an independent password manager with complex encryption technology. The data is encrypted and stored in professional encryption chips. The "National Secret Algorithm" developed by the National Cryptographic Security Administration is used internally, and the JMOS 3.0 system independently developed by Jimi Science and Technology is operated. Security is fully considered from hardware to software.
After long pressing the power key to start the machine, "Please connect the Jimi treasure to activate" is displayed on the Jimi Shield K2 screen.
Jimibao is an app used in conjunction with Jimidun K2. It supports IOS, Android and PC systems. It can be downloaded from Apple app stores and Android app stores. The PC version can be downloaded from the official website of Jimidun Technology.
Bluetooth test
We installed Jimibao on an iPhone 7. The Jimibao installation package is small and will be installed soon. After entering Jimi Treasure, you will be prompted to turn on Bluetooth. Because Jimibao is connected to Jimidun through mobile phone Bluetooth. If PC client is used, it is connected through USB cable.
After Bluetooth is turned on, the extremely dense shield K2 is scanned successfully, and the activation is also lightning activation. I tried several mobile phones at the same time, and they were able to quickly connect to the extremely tight shield K2.
Reconnecting after exiting is also very fast.
The theoretical transmission distance of Bluetooth is 10 meters, but the Bluetooth connection distance of JMD K2 is only about 2 meters. Later, we found that this was deliberately done by the manufacturer. Two meters is a very safe distance. Within this radius, if there is any abnormal behavior, users can quickly detect it, which can prevent others from connecting to the extremely dense shield K2.
This shows that the Bluetooth chip of JMD K2 is very good, and the connection is fast and stable. For a device that is highly dependent on mobile phones, the Bluetooth performance of the JMD K2 is very good.
Enter password
We use the iPhone 7 to connect to the Extreme Secret Shield K2, and try to enter a QQ number and password.
Go to the data page, click the password, add the password, enter "QQ" for the title, 12345678 for the account, and 1234 @ # ¥% for the password).
Click Save, and you will be prompted to click OK at the Extreme Secret Shield.
At this time, the account password has been sent to Extreme Secret Shield and displayed on the screen. Click OK on Extreme Secret Shield K2 to save it successfully.
If you need to save some important text, it is basically the same as the password entry operation. Take saving an ID card number as an example.
Click "Secret Note" to add a secret note with the title of "Liming ID Card No." and the content of "432030 19991122 2833".
Click Save to save it to Extreme Secret Shield.
The whole process is simple and clear, and the operation is very simple, no matter whether the password or text is entered.
Password View
After the password is saved to the Extreme Secret Shield K2, it can be taken out at any time to check if you need to use the password in the future. We also experienced this.
We found that when checking the password, the password is only displayed on the K2 screen, not on the mobile phone.
Intuitively, the operation is somewhat cumbersome; When you think about it carefully, these are all carefully designed for security reasons. The password is not transmitted to the mobile phone, which can effectively prevent people with ulterior motives from intercepting the account password through the mobile phone.
Change Password
If a password is changed, we can change the password in the Extreme Secret Shield K2 through the APP via Bluetooth connection.
When changing the password, because the original password is not displayed on the phone, we do not change the original password directly, but enter a new password to overwrite the old password.
If we just want to change the original password slightly, this modification method will be somewhat inconvenient. Of course, most of the time, we change the password to a password that has nothing to do with the previous password, so this has little impact.
Data backup
When we got the Extreme Secret Shield K2, we all had a doubt: we stored all the passwords here. What if the data was deleted by mistake? What should I do if the extremely secret shield K2 is lost?
The manufacturer obviously took this into consideration, so it was very considerate to introduce the "data backup&recovery" function.
Click "Add Backup" to back up all data of the Extreme Shield K2 to your phone or computer. If you think your phone or computer may also be damaged, you can enable the cloud backup function to back up all data to the cloud space.
In this way, the data is backed up.
data recovery
If you need to restore the backup data to the extremely tight shield K2, click Restore directly and select the backup document to be restored to restore the previously backed up data to the extremely tight shield.
If the extremely tight shield K2 is lost, you can restore the data in the original extremely tight shield K2 to the new extremely tight shield as long as you have a new extremely tight shield K2, connect the mobile phone, and follow the operation.
Rest assured, the backup file is also encrypted by the encryption chip, which is very safe.
The above functions are quite simple to operate. The following video shows the simple and easy use of the Extreme Shield K2 more intuitively.
How safe is Extreme Shield K2
After a period of comprehensive use of Extreme Shield K2, we have a great interest in its security: it seems that Extreme Shield K2 is very secure, but how secure is it?
According to the collected data, we sorted out the following:
L Anti spying display:
The screen size and font size of JMD K2 have been carefully designed so that users can see the text clearly without being easily seen by others;
The external glass screen is used outside the screen, and it is difficult for the bystander to see the screen clearly when he is in a large viewing angle position;
The refresh rate of the screen is different from that of mainstream cameras. It is not easy to capture the complete content when the mobile phone shoots the screen.
L Automatic locking:
When entering the power on password, if you enter an error for six consecutive times, the extremely secret shield K2 will enter the locked state to avoid being tested violently by bad guys to try out the password;
At the same time, the USB interface of the Extreme Secret Shield K2 will also be closed to prevent hackers from connecting to the Extreme Secret Shield K2 through computers to try to crack it.
After the ultra dense shield K2 is automatically locked, it can be reused through the reset function. At the same time, all data previously stored in the ultra dense shield K2 will be cleared. Avoid misoperation, which will make it impossible to use after locking, and also ensure data security.
L Deposit separation:
The data management and storage of the Extreme Secret Shield K2 are separated to prevent hackers from accessing user data through management. The extremely dense shield K2 is like a black box. It cannot reach the inside from the outside. It can only send instructions to add, delete, change and check to the inside of the box.
L Offline design:
In order to ensure security to the maximum extent, JMD K2 has kept maximum restraint on network use. Except for the account login related functions and cloud backup functions that must rely on the Internet, other operations are not conducted online. After completing the previous operation, the user can even manage the Extreme Secret Shield K2 through the client after the network is shut down.
L Operating system: JMOS system adopted by JMD is a system specially designed for password security, which can completely isolate trojans on Windows, Android, IOS and other platforms;
L Data transmission: when connecting to Extreme Secret Shield K2, the client establishes a secure encryption channel (USB/Bluetooth) with Extreme Secret Shield K2. All interactive data are transmitted through the encrypted channel, and cannot be monitored. At the same time, the Bluetooth signal is artificially controlled within 2 meters to prevent others from scanning attacks;
L Data entry: When the client inputs sensitive data, it does not use the system's own input method or other third-party input methods. Instead, it uses a bank level security keyboard to prevent trojans from stealing and recording screens. If necessary, it can also enable a higher-level mapping keyboard;
L Data storage: the data is encrypted by the security chip when it is stored, and the 32-bit backup password generated in the extremely secret shield is used for encryption when the backup is exported;
L Cloud storage: users can synchronize the encrypted backup data to Jimi Cloud hosting, so that even if Jimi Shield and mobile phones are lost together, the data will not be lost. Considering that some users have concerns about uploading data to the server, this function needs to be enabled by users.
Postscript
This is the end of the evaluation of Jimi Shield K2. After this evaluation, we were deeply impressed by the pursuit of extreme safety of JMD K2. The hardware, software, operating system, functions and interaction design of JMD K2 everywhere embodies the concept of "safety first".
The network jungle is full of dangers. The malicious hackers and fraudsters are ready to seize the property and privacy of ordinary consumers at any time. The extremely secret shield K2 is just the password security weapon born in this environment.
At present, Jimi Shield K2 has achieved good sales in JD and Taobao since it was launched. We believe that in the near future, JMD K2 will have a broader market space.