We design hardware with built-in security, from industrial data loggers to personal cryptocurrency wallets.
We engineer hardened bootloaders, secure monitors, and runtime environments with minimal attack surface.
We develop embedded applications for numerous industries and functions, combining our engineering and hacking skills.
We are the leading world experts in Secure Boot implementations. We broke several, trust us in securing them.
We secure critical equipment on aircraft, automotive vehicles, marine vessels, and satellites – where security is critical to human safety.
We ensure close ties with the industry and a test-heavy approach by leading open hardware and open source projects.
We are breakers and makers, testing and building software and hardware products from the ground up since 2005. This has given us a pragmatic engineering mindset that makes those products not only effective and secure, but practical to implement in your organization. Our hardware security services have been awared with IEC 62443 certification. Find out more in our detailed service overview.
Understand and select the right features offered by application processors to achieve secure product design.
Take secure products from the drawing board to deployment.
Secure products are manageable, maintainable, and verifiable. Our delivery process ensures control stays in your hands, with full code transparency, simple-to-interpret documentation, and tested deployments.
We’re here for the long-haul, giving you products that are manageable and maintainable in the short, medium and long term, by you.
We’ve engineered innovative escrow solutions for cryptocurrency exchanges and individual wallets, based on our USB armory platform or custom developed hardware. Our solutions offer the highest number of modern transactional features, with a significantly-reduced attack surface.
We’ve developed custom IEC-62443 certified data logging solutions for remote deployment. Designed for use in the maritime, aviation, and automotive industries, our secure data loggers collect information from vessels, aircraft, and vehicles, with local and remote secure storage. Advanced data diode concepts isolates attacks aimed at accessing industrial buses: even in worst-case scenarios, the solution prevents attackers from using it to gain control over safety-critical systems.
We’ve engineered custom IP protection schemes for firmware and software, integrating hardware-backed trust chains with effective runtime protection. The outcome is integrated products, locked-down, making sure the cost of compromise of any residual risk far outweighs the value of the internal IP and data.
We’re the engineers of USB armory: the tiny but powerful secure computer for personal and enterprise applications. We integrate and develop hardware security modules, licensing tokens, secure provisioning platforms, and many applications that work with USB armory. Available with custom variants for every need.
We’re experienced in evaluating, designing, and training for effective and secure TrustZone implementations – tasks that require a deep understanding of inner hardware layout. When expertly handled, TrustZone technology can result in considerable production savings by reducing part number count. When TrustZone consulting is carried out early on in any process, costly mistakes are avoided.
Proper segregation of safety-sensitive domains relies on robust layers of separation. Where interconnection is inevitable, data diodes can be used to create unidirectional flow, forbidding communication from less secure domains towards more privileged ones. Our experience implementing data diodes extends to household-name enterprises in the travel sector, where we’ve delivered state-of-the-art solutions focused on human safety.