Data Protection

The KoalaKey employs several techniques to prevent unauthorized access:

  1. The circuit board + case is designed to break upon being forced open. 
  2. The drives can be encrypted. 
  3. In the event that someone triggers the brute force detection on the Koalakey, access to all of the existing raw data is blocked, and the previous encryption key is lost.

With these steps in place, you can rest easy knowing that your data is safe.

Administrators can also retrieve an activity log of the KoalaKey via GumTree.