The USB armory is the world smallest secure computer.
It can safeguard data and run trusted applications, preventing unauthorized access or execution. Minimal attack surface, vast performance and capabilities. Fits right in your pocket, your laptop, your servers.
Compact. Customizable. Secure.
The capability of implementing arbitrary USB devices in combination with the USB armory speed, the security features and the flexible and customizable operating environments, makes the USB armory the ideal platform for all kinds of personal security applications.
What are the applications?
The USB is a prime platform for the following applications:
The USB armory incorporates a vast number of features that can support a wide variety of security architectures. Its capabilities allow the safe storage of data as well as the trusted execution of operating environments and their applications, natively on the device itself.
Beyond simple smartcards or security tokens, the USB armory is a personal, self-contained, secure server.
In addition to native support for standard operating environments, such as Linux distributions, the USB armory is directly supported by TamaGo, an WithSecure Foundry developed framework that provides execution of unencumbered Go applications on bare metal ARM® System-on-Chip (SoC) processors.
Example use cases
The USB armory provides secure execution of cryptographic operations and data storage.
The user can unlock the USB armory over Bluetooth, authorizing only need-to-know contents, to ensure safe operation even on untrusted laptops.
The GoKey application implements a USB smartcard with innovative properties. Featuring an SSH based management interface, the card provides a dramatically improved security model over traditional smartcards. By leveraging on the TamaGo framework, GoKey is written and executed with only high-level code, minimal dependencies and a memory-safe environment.
Remote Hardware Security Module
When hosting facilities cannot be trusted, the USB armory, plugged on a server, complements its potentially unsafe environment with self-contained, tamper proof, HSM services.
Remote peers can authenticate the USB armory and use it, while the server remains an unprivileged party.
The server itself can also use the USB armory HSM services for CA/PKI or any other cryptographic purpose, without having access to protected keys.
How to order
The USB armory is assembled entirely in Italy and is available for ordering from selected stores as listed below. Additionally custom/bulk order inquiries can be placed directly by contacting email@example.com
|UA-MKII-ULZ-512M||USB armory Mk II • i.MX6ULZ 900 MHz • 512 MB RAM • enclosure|
|UA-MKII-DA||Debug accessory for the USB armory Mk II|
Custom / bulk orders
|UA-MKII-UL-512M||USB armory Mk II • i.MX6UL 528 MHz • 512 MB RAM|
|UA-MKII-UL-1G||USB armory Mk II • i.MX6UL 528 MHz • 1 GB RAM|
|UA-MKII-ULZ-1G||USB armory Mk II • i.MX6ULZ 900 MHz • 1 GB RAM|
|UA-MKII-ENC||Enclosure for the USB armory Mk II|
Want to customize / bulk order or talk in more detail?
Complete the form, and we'll be in touch as soon as possible.