Framework
LaptopsRepairable, upgradeable laptop with Linux support
Privacy-focused hardware including laptops, phones, security keys, and routers.
18 tools in 4 subcategories
Hardware authentication tokens for strong two-factor authentication.
View all Security Keys →Privacy-focused smartphones with hardened operating systems.
View all Mobile Phones →Open source tools let you verify the code does what it claims. Look for tools with published source code and active community review.
E2E encryption means only you and your intended recipients can read your data. The service provider cannot access your content.
Where a company is based affects what laws they must follow. Swiss and EU-based services often have stronger privacy protections.
Third-party security audits provide independent verification. Look for services that publish their audit results.
Repairable, upgradeable laptop with Linux support
Tamper-evident laptop with open firmware
Open firmware laptops built for Linux
Compact open-source security key
Open-source security key with NFC for mobile
USB-C security key with NFC - the flagship
Hardware Security Module for enterprise key management
Simple, affordable passwordless authentication
Professional security key for PGP email encryption
Security key with built-in password manager
Budget open-source security key
Industry-standard security key with widest compatibility
USB-C security key with industry-leading compatibility
Budget YubiKey for basic FIDO2 authentication
Take control of your network security
Security-hardened Android OS - install it yourself
Privacy-focused Android with better app compatibility
Pre-configured secure smartphone with GrapheneOS
Our security assessments identify gaps and guide you to the right solutions. Get a personalized roadmap for your organization.