![](https://cdn.prod.website-files.com/625faf6f5e93e941317bb67f/6799dadb88b09ce1a6c908c5_tropic01_ts02_board_open_socket_low.png)
TROPIC01 is designed for applications demanding advanced cryptographic security and transparency.
We've designed this open and auditable secure element based on Kerckhoffs's principle to enable independent verification.
We encourage your evaluation on TROPIC01 security and are committed to addressing any issues that are discovered.
Why Join?
- Collaboration: Work closely with our engineering team
- Contribute: Provide feedback to help advance the security and usability of the chip
- Early Access: Get the chip samples to start evaluation and application development (SDK available on Github)
Who Should Apply?
- Companies building next generation secure devices
- Design houses
- Security engineers & researchers
- Penetration testers and white hat hackers
- Open-source advocates
Secure Your Samples Today
Apply now to start building your verifiably secure hardware.
We work Across
multiple industries
Logistics
TASSIC transformation of a low-entropy secret (PIN) to a high-entropy secret can be used in various cryptographic applications.
Logistics
TASSIC transformation of a low-entropy secret (PIN) to a high-entropy secret can be used in various cryptographic applications.
Logistics
TASSIC transformation of a low-entropy secret (PIN) to a high-entropy secret can be used in various cryptographic applications.
Logistics
TASSIC transformation of a low-entropy secret (PIN) to a high-entropy secret can be used in various cryptographic applications.