EDEC Mobile Faraday Bag and NitroKey Bundle
DOUBLE UP the protection and secure your digital life!
With: 1 X EDEC UTILITY FARADAY MOBILE BAG
1 X NITROKEY START HARDWARE ENCRYPTION KEY
EDEC UTILITY FARADAY MOBILE BAG
Cell phones and other small wireless devices are safe from unwanted intrusion by cellular, WiFi, Bluetooth, and radio signals with the ISOTech shielding system of the Bag. Every bag effectively isolates a device from any outside network so it cannot be hacked, tracked, or detected.
Heavy-duty protection is provided by lightweight, Faraday technology that shields a wide range of wireless devices such as cell phones (GSM, CDMA, 3G, 4G, 5G), PDAs, and two-way radios from cyber attackers. A Faraday bag is an everyday essential for maintaining personal privacy while using common devices in public and private spaces.
- Quad-later Faraday construction provides advanced shielding
- Wear-resistant outer shell improves product durability
- Double layered construction provides maximum signal blockage
Mobile size: 8.2” x 7.8”. Operational area of 4.25” x 7.5”.
THE SECURE KEY FOR YOUR DIGITAL LIFE. ENCRYPTS YOUR EMAILS, FILES, AND SERVER ACCESS. PROTECTS AGAINST HACKERS AND ESPIONAGE – PRIVATE AND PROFESSIONAL.
The cryptographic key is securely stored in the Nitrokey and is thereby protected against loss, theft and malware. With strong hardware encryption, made reliable thanks to open source, quality made in Germany.
For Anybody – Protection Against Mass Surveillance and Hacker
Encrypt your emails with GnuPG, OpenPGP, S/MIME, Thunderbird or Outlook. Your private keys are securely stored in the Nitrokey and cannot be exported or stolen.
For Businesses, Chancelleries and the Self-Employed – Protect Sensitive Data
Protect Your Data Against Espionage
Encrypt field workers’ entire hard drives by means of TrueCrypt/VeraCrypt or individual files by means of GnuPG. The private keys are thereby securely stored in the Nitrokey.
Log in easily at your local computer desktop with the Nitrokey.
For IT Administrators and Security Experts – Protect Critical Infrastructure
Securely Administrating Servers With SSH
Securely store your SSH keys in the Nitrokey at all times. Your key is PIN-protected and cannot be exported or stolen from the Nitrokey. This means that you can bypass the insecure and tedious process of synchronizing key files between client systems.
Internet of Things (IoT) and Protecting Your own Products
Protect your own hardware products using Nitrokey integration. Ideal for remote maintenance and for ensuring product authenticity.