Contact Us

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Contact Us

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

View

Security through open hardware

Transparency. Auditability. Empowerment.

Contact Us

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
PRODUCTS
+

TROPIC01

A secure coprocessor – Root of Trust for your hardware.

View product

solutions
+

Use-Case

We partner with you to customize our solution to suit your application.

See solutions

Trust in what you can verify as a community.

How can you trust a design that you or independent security experts cannot audit themselves? Traditional hardware security solutions are behind NDAs and require your blind trust.

We offer secure chip designs that are open to audit and share the results of.

Redefining hardware
security mindset

A mindset based on Kerckhoffs' principle

" Design your system assuming that your opponents know it in detail."

We envision security through transparency. This allows for independent auditing to address any security risks. There is public accountability to make stronger designs and innovate towards the best possible solution.

Current hardware security relies on obscurity as one of the main methods of protection. When security details are a secret, where is the accountability in removing weak designs? How can better solutions be found without an honest try against real life attack scenarios?