Upgrade Your Shield
Choose the standard open-source protection or ascend to Pro-level countermeasures.
CORE
-
check_circle
Hardware-Bound Encryption
Keys locked to your specific USB device.
-
check_circle
AES-256 GCM & Argon2id
Full cryptographic stack included.
-
check_circle
Simple GUI Executable
Code optimized, bundled, and packed into a standalone executable for ease of use.
-
check_circle
Optional Password Layer
Add your own optional password for an extra layer of protection on top of hardware-bound security.
PRO
-
visibility_off
Hidden Volumes
Create "ghost" partitions requiring secondary passcodes.
-
sync_lock
Auto-Encryption & Decryption
Automatically encrypts/decrypts files upon USB insertion according to your configuration.
-
auto_delete
Decoy Triggered Wipe
Assign a decoy USB key. If it is used for decryption, USB-Vault immediately performs a secure wipe of protected data.
-
dynamic_form
Fake Decryption
Generates believable garbage data to waste intruder's time.
Note: Every option from PRO is completely optional and can be switched on/off and configured to users' wishes and desires. You have full control over your countermeasures.