bg-team-02
An OnlyKey User’s Guide to Traveling Internationally with Your Digital Privacy Intact For background information on plausible deniability with OnlyKey read the previous post here first. Step 1. Purchase an OnlyKey Step 2. Follow instructions...
An OnlyKey User’s Guide to Traveling Internationally with Your Digital Privacy Intact
Read more
bg-services-02
As we announced in February we are releasing a new hardware design of OnlyKey, the OnlyKey Color™. OnlyKey Color will start shipping tomorrow to pre-order customers. With this release we are also releasing new features, see the new features in acti...
OnlyKey Color™ Release - New Hardware Multi-Color LED, Increased Capacity, OpenPGP support
Read more
bg-team-01
We are much overdue for an OnlyKey update. For the past few months the OnlyKey team has been hard at work on the latest and greatest OnlyKey hardware design, features, and accessories. NEW HARDWARE DESIGN… Introducing OnlyKey Color™ Sometimes a...
Introducing OnlyKey Color w/New Features and New Accessories
Read more
bg-office-01
It's no secret, most of us are really bad at passwords. If you can remember your passwords then you are probably doing it wrong. If you can't remember your passwords then you are probably trusting a software password manager to do it for you....
Is the entire password strategy flawed? The short answer - YES!
Read more
bg-office-02
Before getting into the details of our new firmware and Chrome app releases we want to take a minute to provide some useful information on how to backup your OnlyKey securely. Here are two instructional videos on backing up your OnlyKey. Standa...
Lots of Updates - New OnlyKey Features, Chrome App Preferences Page, Experimental SSH Support, and more!
Read more

Already an OnlyKey owner?

Get started here…

Quick Start Guide






See The Kickstarter Project That Started It All!

Kickstarter Project



 

Our security services.

Security Architecture Review

CryptoTrust has the right tools and expertise to provide an independent evaluation that will help you identify any security gaps you may have before an attacker does.


Vulnerability Assessment

It is constant challenge for organizations to assess and prioritize information security vulnerabilities. We provide a prioritized checklist of findings to simplify remediation.


Penetration Testing

A penetration test does not stop at simply uncovering vulnerabilities. Our penetration testing methodology simulates a real world attack and is based on industry standard NIST SP 800-115.


Consulting

CryptoTrust’s professionals understand that there is no magic bullet when it comes to security. Only through a well designed and well tested security architecture using a defense in depth methodology can a robust security posture be attained.