ORWL - The First Open Source, Physically Secure Computer

$66,210 raised

of $25,000 goal

Funded! Order Now

Oct 06

funded on





Product Choices


Support Us!

You appreciate how open source hardware and software play a critical role in making computing secure. Thanks for your encouragement!


ORWL Secure Computer

The world's most physically secure computer. Comes with 8GB RAM, one secure key fob, and your choice of processor, storage capacity, operating system, and enclosure. Order during the campaign and receive a free aluminum carrying case.


Rackmount Server Chassis

This 1U steel rackmount server chassis is the perfect solution for housing up to three ORWL computers in a co-located server environment.


An open source, physically secure personal computer.

As Featured In



"This tiny disc of a computer is designed to defeat an Evil Maid through some very clever engineering on top of encryption tools we already use."

Decentralize Today

"ORWL is a computer which not only protects your data with the latest encryption but it also uses its physical features to bring security to a new level."


"Your ORWL unlocks by using a secure NFC and Bluetooth LE keyfob. Pressing it against the top of the ORWL and entering a password authenticates the user."



"Need a tamper-proof, encrypted PC? The portable, open-source ORWL could be what you're looking for"

Privacy Blog

"If you’re paranoid about someone gaining physical access to your computer, the palm-sized ORWL could put your mind at ease."

Tom's Hardware

"ORWL already supported Windows 10 and Ubuntu 16.04 LTS, but it will now gain support for Qubes OS, to take its software security to the next level."


"Als je echt niet wil dat je data in de verkeerde handen terecht komt."


"... ORWL PC is the most secure Home Computer ever!"


"[ORWL] aims to tackle this problem and give home users the world’s first physically-secure open source PC."


"... unlike some other vendors that just hope the community does the port, etc. ORWL has made public their statement of work with Eltan B.V. for ensuring Coreboot can power this system and it will work with both Linux and Windows operating systems."



"Imaginez un minuscule PC qui soit capable de détruire toutes les données qu’il contient en cas de tentative d’effraction."

3D News

3D News

"Для тех, кто озабочен сохранностью персональных данных, и предназначен проект ORWL PC, претендующий на создание самого защищённого персонального компьютера в мире."

Nerd Stalker

"ORWL... by Design SHIFT is a palm sized secure PC and has features something that the CIA or NSA would kill for..."

The Verge Logo

The Verge

"Passwords are all well and good... but if someone has physical access to your hard drive, even the best passwords may not be enough to keep your data safe. Orwl (pronounced Orwell) is an open-source, miniature PC that’s designed solve that problem..."

Ubuntu Insights

"If someone has physical access to your computer with secure documents present, it’s game over! ORWL is designed to solve this as the first open source physically secure computer."



fossBytes Logo


"In today’s age, our most precious information is saved on our computers... But, unlike your smartphone, you can’t carry your computer everywhere. To tackle this problem and harden the physical security, ORWL was created."



Wired DE

"Auch das stärkste Passwort nützt manchmal nichts, wenn der Computer selbst und die Festplatte mit allen privaten Daten in falsche Hände geraten."


."הוא מחשב זעיר וקטן, הטוען לכתר "המחשב הראשון בעולם עם אבטחה פיזית ORWL


"A co je asi nejzajímavější, pokud ORWL detekuje nějaké snahy o fyzickou manipulaci s vnitřnostmi , okamžitě vymaže veškerá data."


"Современные ПК и мобильные гаджеты способны предоставить своим пользователям достаточный уровень безопасности в Сети."

Linux Magazine

"Even where compromise is necessary, ORWL's designers have attempted as much openness as possible."

Slashdot Logo


"Last month DESIGN Shift successfully crowdfunded their physically-secure (and open source) ORWL computer."

We all have precious information, and we all need to store it somewhere. What happens when you’re not around your computer? For system administrators, physicians, lawyers, and journalists, protecting information is critically important. Sometimes it is even a life or death matter. And yet, when it comes to the computing hardware we all use everyday, most of us don’t even take the simple precautions that we use to protect our money. ORWL was created to bridge this gap and bring hardened physical security to personal computing.

Features & Specifications

  • Processor: Intel Skylake M3 (without vPro) or M7 (with vPro)
  • Graphics: Integrated Intel 515 chipset supports 4K output
  • Ports: 2X USB 3.0 Type C, 1X micro HDMI
  • Power: External power adapter connects to either USB 3.0 port
  • Memory: 8 GB
  • Storage: 120 or 480 GB SSD with automatic AES 256-bit encryption
  • Connectivity: Bluetooth 4.1, Wi-Fi a/b/g/n/ac
  • Operating Systems: Ubuntu and other GNU/Linux systems, Windows 10
  • Secure Microcontroller: MAX32550 DeepCover Secure Cortex-M3 with projected 6-month unplugged battery life
  • Authentication: NFC + BLE key fob and user password
  • Dimensions: 130 mm diameter, 30 mm height, 400 g weight
  • Datasheet: PDF (3.79 MB)

Physically Secure

Among information security professionals, it’s a truism that once somebody has physical access to your computer, it’s game over. Software exploits to steal data take a lot of time, money, and/or skill to pull off, and are only fleetingly effective before the vulnerability is patched. On the other hand, there are many fast, cheap, and easy ways to steal data once an adversary has physical access to your computer. The internals of a desktop or laptop computer are easily accessed and tapped for information, not to mention the myriad ways computer peripherals can hide malicious eavesdropping devices or otherwise be corrupted to work against you. This is where ORWL comes in.

ORWL was designed specifically to prevent undetected tampering with any of its electrical components, including the entire motherboard and storage drive. When tampering is detected, ORWL immediately and irrevocably erases all your data, even if it is unplugged at the time.

Secure Microcontroller

A battery-backed secure microcontroller (MAX32550 DeepCover Secure Cortex-M3) is integrated into the motherboard. It verifies the integrity of all firmware prior to boot, controls the power to rest of the Intel platform that runs the operating system, interfaces directly to an OLED display and NFC and BLE gateway for communicating with the secure key fob, and constantly monitors a dedicated inertial measurement unit, the active mesh (see below), the internal temperature, and input power voltage for any tampering. The battery itself is projected to last about six months without being connected to power.

This chip was chosen because it is powerful (108 MHz Cortex M3) and offers the highest level of security, with features that you simply cannot reproduce with general purpose microcontrollers. These features include: side channel scan protection, flip-flop based key storage, encrypted SNVRAM, glitching protection, crypto acceleration, die shield with dynamic fault detection, temperature monitoring, integrated real-time clock, true random number generation, and dedicated tamper-sensor mesh monitoring.

Encrypted Drive

ORWL’s solid state drive, an Intel SSD 540s Series, natively supports full drive encryption. The drive’s cryptographic key is generated and stored inside the secure microcontroller. The secure microcontroller provides this key to the SSD only after verifying the integrity of the system. Upon any tampering, the secure microcontroller instantly erases the encryption key, causing all data on the SSD to be irrevocably lost.

Enveloping Active Mesh

The entire ORWL system is encased in an active clamshell mesh formed by laser direct structuring (LDS), a technique for creating a resin material with finely printed circuitry designed to shatter when drilled. This mesh prevents access to any hardware component. LDS is a tamper-proofing technology used for many high security applications in banking, aerospace, defense – including hardware security modules (HSMs), security tokens, automated teller machines (ATMs), telecom crypto-key protection, defense electronics, and medical devices.

Opening the clamshell will relieve pressure switches, which will cause the secure microcontroller to delete the SSD’s encryption key. The secure microcontroller constantly monitors the mesh by sending random data through it and measuring the impedance of each trace. Drilling or cutting the LDS clamshell breaks the continuity of the printed circuit, again resulting in the deletion of the encryption key. Shorting, bypassing, or otherwise changing the geometry of any of the traces will result in an impedance change, which similarly results in the deletion of the encryption key. The traces of the printed circuit are microns thick, have a nominal width of 0.3 mm, and a nominal spacing of 0.5 mm.

You can always carefully open the clamshell yourself if you want to know what’s inside, but not without destroying the encryption key. After closing it, you will have to generate a new SSD encryption key and reinstall the entire system.

Secure Key Fob

Each ORWL comes with a key fob that uses the same authentication technology as smart-cards, with an added ability to detect proximity. After the initial pairing of the key fob with the ORWL to generate a shared secret, the key fob’s near field communication (NFC) is used to authenticate the user, at which point the key fob’s uses Bluetooth (BLE) to monitor whether or not the user is within range. Once a user goes out of range, ORWL will lock, requiring the key fob’s NFC authentication to unlock.

The key fob is built around the STMicroelectronics ST54D a secure chipset conforming to ISO/IEC 14443 Type A running in card emulation mode. This controller handles NFC communication and includes several security features, such as a protected memory space and an on-die mesh that will trigger data erasure if tampered with. Within ORWL itself, a NXP CLRC663 chipset is used for NFC communciation and is controlled directly by the Maxim secure microcontroller.

Communication between key fob and computer is encrypted and codes (including UUID) are synchronously updated on a regular basis. We will publish our source code for the NFC and BLE chipsets and provide support to develop custom solutions on them.

OLED Display

ORWL has an onboard OLED display for indicating its state: powered down, locked, and unlocked. The OLED display is entirely controlled by the secure microcontroller and is inaccessible from the operating system.

More Information

Much more detailed information about ORWL, its subsystems and components, and the design decisions that went into them can be found on our ever evolving wiki and in the ORWL product requirements document (PRD).

Security Certification

We are actively pursuing getting ORWL certified as a cryptographic module under a US National Institute of Standards and Technology (NIST) Federal Information Processing Standard known as FIPS 140-2. This is the standard under which the US government, financial institutions, health care providers, and other regulated industries store and process sensitive data.

FIPS 140-2 Security Level 4

The FIPS 140-2 specification, defines four levels of certification, with level four being the most stringent:

Security Level 4 provides the highest level of security defined in this standard. At this security level, the physical security mechanisms provide a complete envelope of protection around the cryptographic module with the intent of detecting and responding to all unauthorized attempts at physical access. Penetration of the cryptographic module enclosure from any direction has a very high probability of being detected, resulting in the immediate zeroization of all plaintext CSPs. Security Level 4 cryptographic modules are useful for operation in physically unprotected environments.

Security Level 4 also protects a cryptographic module against a security compromise due to environmental conditions or fluctuations outside of the module’s normal operating ranges for voltage and temperature. Intentional excursions beyond the normal operating ranges may be used by an attacker to thwart a cryptographic module’s defenses. A cryptographic module is required to either include special environmental protection features designed to detect fluctuations and zeroize CSPs, or to undergo rigorous environmental failure testing to provide a reasonable assurance that the module will not be affected by fluctuations outside of the normal operating range in a manner that can compromise the security of the module.

We are working toward and believe we have a very good chance of achieving FIPS 140-2 Security Level 4 certification, which would make ORWL the first personal computer to be so certified.

Third-party Penetration Testing

Complying with the certification requirements of FIPS 140-2 Security Level 4 is a complex, often lengthy process that takes highly specialized knowledge. To audit our work and guide us toward certification, we have engaged Penumbra Security, a NIST-accredited information security firm specializing in FIPS 140-2 compliance testing. Penumbra’s initial audit of ORWL has already resulted in several improvements to the design. We intend to continue working with Penumbra throughout the certification process.

Open Source

Security through obscurity is not security. We want the inner workings of ORWL to be transparent, so that it can receive the inspection necessary to build real trust. You shouldn’t need to take our word on how secure ORWL really is - you should be able to see for yourself.

ORWL is a complex product, with many pieces that could possibly be open sourced. As such, we are still working through exactly which licenses will be used and how best to make available all the information. We will make updates on this page in the coming days. Here’s what we know and are committed to at this point:

  • We will make available all source schematic and layout files, not just PDFs and Gerber files.
  • We will make available all software under our control, including BIOS firmware, secure controller firmware, and key fob firmware.
  • In order to maintain a competitive manufacturing advantage, some, but not all, of the source we make available will be released under a non-commercial license. For example, we will likely release the PCB layout source files under a non-commercial license, but the BIOS firmware will not have that restriction.
  • For those sources not under our control, in particular the datasheet for the secure controller, we will work closely with our partners to make as much information available as possible.
  • We are open to feedback! Please contact us with any comments, suggestions, or questions.

Sign up for reminder emails above and watch this space for updates. We anticipate having all licenses sorted out very soon.

Enclosures, Assembly, and Rack-mounting

ORWL is available with a glass enclosure (as shown in most of the images on this page), a plastic enclosure that is roughly the same dimensions as the glass enclosure, and bare without any enclosure.

ORWL with a plastic enclosure

The glass enclosure is heat formed, then machined and polished. The glass is 2.8 mm thick and chemically hardened, so that it will not accidentally break when dropped: the target drop resilience is 0.6 meter onto marble.

ORWL is designed to be easily (though carefully) disassembled and reassembled. Disassembling ORWL will erase the encryption key, rendering encrypted user data inaccessible. You will have to regenerate an SSD key and install a new operating system. That said, and because you should have backups of your data anyway, disassembly is possible provided you are careful. We cannot assume liability if you were to break the shield or any other part while disassembling. For ease of assembly, the screws are all identical: black, same length, with a Torx T8 head.

Up to three bare ORWLs without any enclosures can be mounted to a specially made 1U rackmount chassis. ORWL’s key fob behavior can be configured to accommodate server use.

ORWL rackmount chassis

Limited Edition Aluminum Carrying Case

As a small token of our appreciation for our early backers’ help getting ORWL off the ground, all ORWL units ordered during the campaign will include at no additional charge an aluminum carrying case with custom foam cutouts for securely and stylishly transporting ORWL and all its accessories.

  • Dimensions: 12.5” x 5” x 9”
  • Weight (fully loaded): 3.9 lbs

Why Intel? Isn’t x86 Considered Harmful?

This project is about having a standard, physically secure computer that anyone can use – as open as we can make it. All these concepts are important, and they mean that x86 and flawless out-of-the-box Windows support are not optional. There are reasons everyone is using x86, even in the security community and in governmental agencies around the world: compatibility, performance, and security. Make no mistake, some of us own Yeeloongs, and others are veterans of the silicon industry. We would love to ship a completely free and usable desktop processor, but we know very well that there is no alternative. Some people seem to think that switching to AMD can solve problems related Intel’s Management Engine (ME), microcode, or SMM. It doesn’t, as there are equivalents of these technologies in all recent x86 processors.

Qubes OS

Qubes OS is widely considered to be one of the most secure operating systems available. It relies on compartmentalizing the operating system into virtual machines so that, for example, an exploit in your browser doesn’t affect pieces outside your browser, such as your keyboard and mouse. ORWL meets all the minimum and recommended system requirements for running Qubes OS, including a processor that supports VT-x and VT-d. We offer Qubes OS as one of the pre-installed operating system options.

Alternative BIOS

We will not ship machines with Boot Guard “Verified Boot” activated. While we do implement a firmware verification mechanism on the microcontroller, you can choose to provision your own signing keys or not to use it at all.

Firmware Verification, Reflashing, and Hacking

ORWL is designed to be hackable. We will provide instructions on the ORWL wiki detailing how to perform various firmware verification, reflashing, and modification, as well as replacing parts such as the SSD. Of course, by design, opening ORWL results in all data being lost, thereby requiring a full system reinstallation.

Specific Attacks and Mitigations

The following are some of the specific attacks ORWL protects against.

Cold Boot

Attacks: Cold boot attacks consist of removing the DRAM or power-cycling the machine in order to read the memory content. The DRAM is often chilled to slow down the loss of information that occurs when the cells are no longer refreshed.

Mitigations: The DRAM is soldered, and protected by the active clamshell mesh. Cooling down the secure microcontroller will trigger a tamper event, erasure of the encryption key, and system power down. Encryption keys are only stored in the main memory by the UEFI for an extremely short time before they are passed to the SED, and are securely memset’ed long before the OS is booted. When the machine is put in sleep mode while the user is away, the key is not stored in the main memory nor in the SED controller memory. To prevent other kinds of attacks on the memory content, the entire RAM is wiped before the OS is booted.

UEFI etc.

Attacks: UEFI BIOS, SMM attacks, and all sorts of platform vulnerabilities allow an attacker to run very privileged code that is both invisible to the OS and capable of achieving persistence by modifying the SPI flash. The UEFI image can also be modified by physical access to the component.

Mitigations: We are in direct contact with the UEFI vendor and will work on patching public vulnerabilities. In the event that an attacker is able to exploit an SMM, UEFI, or platform vulnerability, there is no vector for persistence. The SPI flash Write Protection is controlled by the secure microcontroller, and the update process can be tied to a specific key fob or pin. The SPI flash content is also verified at every boot, before the Intel subsystem even receives power. Finally the external verification process allows you to easily read the flash and verify it.


Attacks: External DMA attacks over PCIe or Firewire can allow an attacker to read the memory content while the machine is running.

Mitigations: We do not expose DMA-capable ports externally. For internal ports, the SED we selected is not PCIe capable. The Intel processor also supports VT-d, allowing you to block this class of attacks from software.


Attacks: The device is intercepted during shipping, modified, then forwarded to its destination.

Mitigations: The system PIN will be shipped under separate cover, as is done with credit card or debit card PINs. If the device is opened for tampering prior to arrival, the root of trust (SSD encryption key) is deleted. Replacing this requires a paired key fob and the PIN. The result is that the owner will not be able to successfully boot the device if it’s been tampered with in this way. Because you have visibility into firmware, most software implants are very risky to use for your attackers. The hardware is protected by the shield, and the OLED screen that is the only exposed component is protected by a dedicated mesh. The screen’s flexible flat cable has a mesh on both sides, and is just as long as required. The space between the glass enclosure and the shield is also minimized.

USB Fuzzing

Attacks: A malicious USB device is inserted into an external USB port and used to find and exploit vulnerabilities in the USB host’s drivers.

Mitigations: When the key fob is out of range (e.g., the user leaves the room with the key fob), ORWL goes into a lock down mode in which the data lines for all external USB ports are disconnected, which renders connected USB devices ineffective.


Attacks: An adversary steals an ORWL and replaces it with a replica, which then relays communication between the key fob and the original ORWL in order to unlock the original.

Mitigations: ORWL employs time-of-flight analysis to detect relay attacks and rotating keys to foil them outright.

Manufacturing Plan

We’ve manufactured and tested several design and engineering iterations of ORWL prototypes. We are now ready for the first production run. If this campaign successfully reaches its funding goal, we will start production and wrap up what BIOS development remains to make ORWL feature complete.

We (Design Shift) have years of experience in product design, engineering, and manufacturing, with full-time staff in both our Menlo Park and Taipei offices. Our manufacturing partner for ORWL is Taiwan-based Quanta Computer, one of the world’s largest computer manufacturers. We are also working directly with many of our suppliers, such as Intel, STMicroelectronics, and Maxim.

Risks & Challenges

Our team and partners have copious experience mitigating the supply chain risks inherent in manufacturing any nontrivial product and have taken the same care with ORWL. On our website, you can see some of the products we’ve previously designed and brought to market, such as the X1 Digital Camera, Clover point-of-sale system, and the Robin by Nextbit smartphone.

The biggest risk in bringing ORWL to life is not whether it can be done, but how long it will take. We’ve laid out a conservative delivery schedule, but of course there may be surprises along the way that change that schedule. The biggest risk in this regard is the remaining BIOS development. While we have already made significant strides in the BIOS, there are some features that are not yet complete. In preparation for finishing the BIOS, we are currently in talks with a professional BIOS development team.

Regardless of how the production schedule evolves over time, we commit to publicly and transparently communicating ORWL’s production status together with updated estimates of the delivery schedule.

Ask a Question

Have a question not answered in the description above or in the Updates?

Ask Design SHIFT a Question or Browse the Crowd Supply Knowledge Base


Design SHIFT

Design SHIFT was started in 2009 with the simple idea that with passion and focus small teams can deliver breakthrough products.

Daniel Nelson

Olivier Boireau

Gupta Shreeranganath

George Crum

James Pan

Michele McIntosh

Nick Yen

Pearl Lai

Stefan Carpentier

Alfie Lin

Tim Chen

Sean Wen

Erik Chen

Subscribe to the Crowd Supply newsletter, highlighting the latest creators and projects: