The first open-source FIDO2 security key: Protect your online accounts against unauthorized access by using the most secure login method.
Protect Yourself with Solo Security Keys
Using Solo you can securely log into websites like Google, Facebook, Microsoft, Salesforce, and others.
Strongest Security
By supporting the new FIDO2 standard, you get the strongest secure login, with protection against phishing, account takeover, and other online attacks.
Open Source
Our keys share open source hardware and firmware, because we believe that security should be more open. Our keys are verified, trustworthy and hide no secrets.
Easy & Quick
It’s incredibly easy to use and consistent across all sites: just log in with your username and password, then plug Solo into your computer and press its button.
When you connect to the internet with Mullvad, we ensure that the traffic to and from your device is encrypted to the highest standards even if you are using a public WiFi network at a cafe or hotel.
Keep your privacy
We keep no activity logs, do not ask for personal information, and even encourage anonymous payments via cash or one of the cryptocurrencies we accept. Your IP address is replaced by one of ours, ensuring that your device’s activity and location are not linked to you.
Easy to use
Using Mullvad is straightforward and simple – just download and install the app. You won’t need to waste time with setup configurations or a multi-step registration process. We built Mullvad with ease of use in mind.
Qubes OS is a security-focused desktop operating system that aims to provide security through isolation. Virtualization is performed by Xen, and user environments can be based on Fedora, Debian, Whonix, and Microsoft Windows, among other operating systems.
We consider the effects of our choices with regarding to running our service. We follow a privacy-first mindset that goes beyond the basics.
Every decision matters: how and what we communicate to new customers, what information we collect and what tools we use to improve our service. We believe in leading by example, and commit to the following:
No personal information
We aim for zero user information collected as defined in our concise privacy policy. We don’t ask for your email address or any other personal information.
No trackers
Trackers by ad companies and social networks monitor your actions and aid in profiling you. You won’t find them on ivpn.net – we are a tracking free provider.
No third-party tools
Tools like Google Analytics collect personally identifiable information. We use software hosted only on IVPN controlled servers to ensure your privacy.
No secrets
IVPN’s ownership, company structure and team is public, so you know who is responsible for protecting your privacy.
No false promises
Some services try to convince everyone to get a VPN and become anonymous online. We don’t advertise benefits that are not attainable by using a VPN.
Openness and accountability
Our applications are open source and available for review on our GitHub page. We commission regular audits to back up our claims.
Nitrokey is the world-leading company in open source security hardware. Nitrokey develops IT security hardware for data encryption, key management and user authentication. The company has been founded in Berlin, Germany in 2015 and can already count ten thousands of users including numerous well-known international enterprises from various industries.
Our Mission
Our mission is to develop the best physical “latch keys” to comprehensively secure your digital life. Whether you need a solution for two-factor authentication, encrypted data storage, email encryption, key management or server administration – we offer you a portfolio with plenty of options to protect your personal digital life as well as your enterprise. We aim to provide the best open source security key on the market.
Our Portfolio, Made in Germany
All Nitrokeys are produced in Germany and thus enable a high level of trust. In addition, all Nitrokeys are operating system independent, have a robust and twist-proof USB connector and (optional) a Secure Element for highest security requirements.
Besides our Nitrokey hardware products we offer services and consulting. This includes customer-specific system customization of Nitrokey products and their integration in your own system environments. Furthermore, we help you with concept, development and certification of your specific security solutions.
In addition to that, our portfolio consists of Subscription and Fulfillment Business Services, the secure laptop NitroPad for high security requirements, the messenger NitroChat, the video conference service Nitrokey Meet, and the data destruction service NitroShred.
Security Requires Open Source
In the last decades, countless incidents became public and showed that proprietary IT systems had severe vulnerabilities or even backdoors. The Snowden revelations gave us clarity about how backdoors are even being implemented intentionally in critical IT systems. As long as IT systems are proprietary, backdoors can remain undetected for a long time. That is why we at Nitrokey focus on Open Source and make our software and hardware developments available to the public. This enables our users as well as independent third parties to check and audit the security of Nitrokey products.
Proton Drive provides end-to-end encrypted cloud storage, suitable for securing sensitive documents with the same kind of encryption we use to secure emails in ProtonMail and events in ProtonCalendar. We continue to build more features for Proton Drive, but the early access version is ideal for some use cases:
Securely backing up sensitive files, such as medical records, financial documents, copies of identity documents
Storing files with end-to-end encryption in the cloud, so you can access them from any device
End-to-end encrypted file storage
Proton Drive allows you to store your files on the Proton server network. You encrypt your files on your device, and only you (or those you authorize) can decrypt them. Files and folders are encrypted using the same PGP encryption method we use to secure ProtonMail emails.
How it works: PGP first generates a large symmetric session key, which is used to encrypt your files. This session key is then itself encrypted using an asymmetric key and a passphrase that you provide. Both the symmetric key and the password (which only you should know) are required to decrypt your data.
Encryption and decryption occur on your device only, never on our servers. This means that no one can access files you have stored on Proton Drive (except you). However, an upcoming feature will allow you to securely share files without compromising end-to-end encryption.
Never forget a password again. Securely store passwords using industry standard encryption, quickly auto-type them into desktop applications, and use our browser extension to log into websites.
Encrypted
Complete database encryption using industry standard 256-bit AES. Fully compatible with KeePass Password Safe formats. Your password database works offline and requires no internet connection.
Cross-Platform
Every feature looks, feels, works, and is tested on Windows, macOS, and Linux. You can expect a seamless experience no matter which operating system you are using.
Open Source
The full source code is published under the terms of the GNU General Public License and made available on GitHub. Use, inspect, change, and share at will; contributions by everyone are welcome.
YubiKey is the only technology proven to stop account takeovers at scale.
Used by 9 of the top 10 technology companies. Loved by more than 5,000 businesses and 15+ million users in over 160 countries.
Built for security
Mobile authentication software or SMS could not stop phishing and man-in-the middle attacks at Google.
Employees & customers
The search giant made YubiKey mandatory for all employees, and optional for all end-users.
Results
Zero account takeovers. 4x faster to login. 92% fewer support calls. 100% acceptance rate.
Authentication without compromise
Historically, there has been a tradeoff between great security and usability.
Passwords are fundamentally broken. Basic two-factor authentication, like SMS and mobile apps, is increasingly vulnerable to attackers. And the more secure hardware technologies, such as traditional smart cards, are difficult to deploy and use at scale.
ProtonVPN was built with extra security features to make it better at protecting your privacy than an ordinary VPN.
When you use ProtonVPN to browse the web, your Internet connection is encrypted. By routing your connection through encrypted tunnels, ProtonVPN’s advanced security features ensure that an attacker cannot eavesdrop on your connection. It also allows you to access websites that might be blocked in your country.
Subgraph OS is a desktop computing and communications platform that is designed to be resistant to network-borne exploit and malware attacks. It is also meant to be familiar and easy to use. Even in alpha, Subgraph OS looks and feels like a modern desktop operating system.
Subgraph OS includes strong system-wide attack mitigations that protect all applications as well as the core operating system, and key applications are run in sandbox environments to reduce the impact of any attacks against applications that are successful.
Subgraph OS was designed to reduce the risks in endpoint systems so that individuals and organizations around the world can communicate, share, and collaborate without fear of surveillance or interference by sophisticated adversaries through network borne attacks. Subgraph OS is designed to be difficult to attack. This is accomplished through system hardening and proactive, ongoing research on defensible system design.