At Tillitis, we don’t just develop a security key; we are creating an open source security key with the collaboration and feedback of the open source community, for the open source community. Thus, it’s great to announce that we sponsor and attend this year’s Open Source Firmware Conference, OSFC , in Sunnyvale, California.
Continue reading
Today we’re announcing two new products - TKey Unlocked - TKey Programmer
What are they? Tkey Unlocked is a non-provisioned TKey for advanced users that want to provision their TKeys themselves, experiment with new hardware designs, or change the bootloader firmware.
Continue reading
The Homebrew package for tkey-ssh-agent has been updated to include:
man page, i.e., man tkey-ssh-agent
default to promt for the USS (User Supplied Secret) input
Continue reading
Introduction Randomness plays a crucial role in various fields, including cryptography, simulations, and data analysis. To ensure the security and integrity of systems, high-quality random data is essential. That’s where the TKey Random Generator comes into play.
Continue reading
US Online Reseller We’re proud to announce our first US online reseller, Blinkinlabs .
With a reseller in US we simplify order handling and deliveries for customers all over North America.
Continue reading
Reseller News We can now present two resellers of the TKey.
Proxystore are based in Leipzig, Germany. They have both a local store and online shop.
Continue reading
Clarification on what we sell It has come to our attention that some customers are surprised that the TKey we are currently selling in our web shop, is a TKey for end users and consequently has the program memory locked-down.
Continue reading
Tillitis Shop Open The wait is finally over. Today we open Tillitis Shop and deliveries will start immediately. We ship from our office all working days (adhering Swedish bank holidays).
Continue reading
On Flexibility and Future Proof What makes TKey flexible?
The function of a TKey is defined by software, the TKey Device App, that is uploaded to the TKey from the client, the computer or mobile phone the TKey is attached to, and usually a piece of software running on the client that is loading and then communicating with the TKey device app.
Continue reading
Digital keys is how information and communication on the Internet is protected. We all use them every day. Hence, generating those keys is crucial aspect of security. This is how it’s done on TKey.
Continue reading