The power-analysis and fault-injection tool you can hold in your paw
An open source, privacy friendly, compact GNSS receiver with ESP32 and NFC for all your location based projects, including tracking surveillance cameras
A USB kill cord for your laptop
A compact, easy-to-use, low-power, bidirectional, thermal-detection sensor that respects privacy
A multi-tool for building, analyzing, and hacking USB devices
Security-oriented mini-ITX motherboard with MCST Elbrus8CB VLIW as CPU
A mind-bending hardware puzzle in three acts
Mobile, Open Hardware, RISC-V System-on-Chip (SoC) Development Kit
Security keys you create by rolling dice
A one-chip hardware security module (HSM) and MAX10 FPGA dev board
A tiny, open source USB computer for security applications
A hardware-based USB 2.0 monitor & trigger platform, controlled from Python
A tiny FIDO2 security key for two-factor authentication and passwordless login
A handheld RFID & NFC test instrument optimized for untethered use in the field
An all-in-one encrypted USB flash drive, two-factor authentication token, and password manager
BadUSB embedded into a USB cable
A tool to explore optical data transmissions and covert channels
Open hardware USB true random number generator
Physical security for your personal data
Open-source hardware password manager
An open, programmable dongle for protecting USB devices from USB hosts and chargers.
An independent international development effort founded to create a trusted, open source, inexpensive, hardware cryptographic engine.
Your Personal, Portable Password Manager
An open source, physically secure personal computer.
Protect your USB Armory Mk I in style with this milled PaperStone and anodized aluminum enclosure.
The first high-end laptop that respects your privacy, security, and freedom
An Earth-friendly way to easily upgrade and fix your own computer
The first high-end laptop that respects your freedom and privacy
An open source USB stick computer for security applications.
A protective barrier between your device and "juice-jacking" hackers.