Skip to main content

Latest JumpDrive Offers 256-Bit Encryption

Latest JumpDrive Offers 256-Bit Encryption

It’s really not the end of the world if someone steals a thumb drive with all of your last year’s term papers on it. While thieves might get a giggle out of Use of the Deus Ex Machina Principle in Voltron, you’re not in any real trouble. If it’s full of tax forms and medical records, though, you had better hope it has some protection.

Lexar’s new JumpDrive Solo Vault is one USB drive that’s up to the task of keeping snoopers out. With 256-bit AES encryption that passes the rigorous Federal Information Processing Standard 140-2 Level 1 (the same one Uncle Sam demands for government agencies), it should be one solid way to keep your most private information private.

With no administrative rights or application that has to be run, users simply plug the drive in, set up their own passwords, and begin storing files. Even if hackers manage to transfer all the raw data on the drive to another device, the encryption will prevent it from being read without a password. Built-in compression can also be activated to pack extra data – up to twice the capacity listed – onto thedrive.

The Lexar JumpDrive Solo Vault comes in 2GB and 4GB variants, which retail for $90 and $130, respectively.

Nick Mokey
As Digital Trends’ Managing Editor, Nick Mokey oversees an editorial team delivering definitive reviews, enlightening…
A dangerous new jailbreak for AI chatbots was just discovered
the side of a Microsoft building

Microsoft has released more details about a troubling new generative AI jailbreak technique it has discovered, called "Skeleton Key." Using this prompt injection method, malicious users can effectively bypass a chatbot's safety guardrails, the security features that keeps ChatGPT from going full Taye.

Skeleton Key is an example of a prompt injection or prompt engineering attack. It's a multi-turn strategy designed to essentially convince an AI model to ignore its ingrained safety guardrails, "[causing] the system to violate its operators’ policies, make decisions unduly influenced by a user, or execute malicious instructions," Mark Russinovich, CTO of Microsoft Azure, wrote in the announcement.

Read more