About

Today's boot authentication is a relic of the past. Using secrets stored in an unauthenticated and easily accessible piece of memory, it is both cumbersome and insecure.

ORWL adds two-factor boot authentication to a compact, portable PC powered by the 6th Gen Intel Core M processor. That means you need both a physical key and a password just to power ORWL on.

ORWL is an open-hardware highly secure, tamper-resistant PC designed to protect your data

What people are saying:

"hardware that isn't the weak link in the security chain" Thomas Claburn Information Week

"we just don’t know how to get the data off one of these tiny computers" Brian Benchoff Hackaday

"Anyone looking to keep their data safe from prying eyes might be interested" Julian Horsey Geeky Gadgets

"The Bitcoin Ecosystem Can Benefit From ORWL" Jp Buntinx Bitcoinist.net

Honoree CES 2016 Innovation Award. "Computer Hardware and Components"

While software security has been steadily improving, most computer hardware used around the world today can still be easily compromised by physical access.

ORWL brings state-of-the-art hardware security technologies from the banking and defense industries to the personal computer, for the first time.

At it's core, ORWL is a last-generation Intel PC, and can be used by everyone. Running any Operating System including Windows and Linux, it can replace your desktop computer at work or at home, and requires both a key and a password to be used.

You'll need an HTML5 capable browser to see this content. Play Replay with sound Play with

sound 00:00 00:00

Today's boot authentication is a relic of the past. Using secrets stored in an unauthenticated and easily accessible piece of memory, it is both cumbersome and insecure. ORWL adds two-factor boot authentication to a compact, portable PC powered by the 6th Gen Intel Core M processor. That means you need both a physical key and a password just to power ORWL on. Control Critical information There seem to be no limit to how deep attackers can hide in a computer. Even when using a live operating system such as Tails, many components in your machine can still betray you. By verifying their integrity every time your computer starts, something your processor cannot do, we make sure no one can backdoor your computer without you knowing. A high-security ARM Cortex M3 microcontroller controls ORWL power. It handles authentication of both the keyfob and the firmwares on the platform, before it even sends power to the rest of the system. Taking advantage from advanced security features such as side channel protection, flip-flop based key storage, encrypted SNVRAM, glitching protection, crypto acceleration, die shield with dynamic fault detection, temperature monitoring, integrated real-time clock, true random number generation, and dedicated tamper-sensor mesh monitoring, it provides a secure environment to protect your most valuable secrets. The same technology has been used for years to protect the world's most valuable information, and we are confident it will help safeguard your data. Each electronic keyfob is unique. When your keys are paired, they are associated with unique cryptographic secrets inside ORWL that no one else will have -- not even us. Because the keyfobs are based on smartcards and rely on strong cryptography, they can't be cloned, even if you lend them to someone. Once you boot up, ORWL’s key acts as an electronic gatekeeper as you work. While you’re at your desk, ORWL will sense that your key is nearby and keep chugging along like any PC. But once the key gets more than 10 meters from ORWL, your workstation will go into lock mode. The processor is put to sleep, and the USB ports are cut off and HDMI port are turned off. Your cubicle neighbor – and even your boss – can’t access your data when you’re out grabbing your lunch. While ORWL’s key keeps the machine electronically secure, it’s when you look inside that ORWL really stands out. Inside ORWL’s outer glass case is a 3D honeycomb, tamper­‐proof, active mesh shell that protects the unique key of each computer – think of it as each ORWL’s individual DNA. If there is an attempt to break in or alter this mesh, the microcontroller will instantly erase the key to all the data inside ORWL. Honeycomb shell Active shield made by Laser Direct Structuring ORWL’s elegant industrial design is beautiful outside and protects a powerful computer inside. Thanks to a partnership with Intel, ORWL features the latest 6th generation “Skylake” Intel Core M processor. Superb graphics, enhanced security and power make this the most advanced Intel processor yet. It’s powerful enough to run any OS including Windows and Linux. ORWL PCB We made it open so you can make it more secure About 70 percent of our proceeds will be used to pay for manufacturing and components to build the device you ordered – the rest will be used to audit the machine above and beyond its current requirements. We would like to test and qualify ORWL with external independent third parties, to build a community of developers, and provide them with support. Ultimately, we’d like to see more devices designed with this technology. We think that by being able to communicate more securely, people will communicate more freely. When they have the confidence that what they’re saying will be kept private, they’ll be more authentic. Ultimately, they’ll feel more free to create what is really important to them. We are proud supporter of the Electronic Frontier Foundation, la Quadrature du Net, TOR Project, Wikipedia and more to come... From small households to big businesses, everyone deserves more protection. But it’s what you can do with ORWL’s physically secure, open-source architecture that really matters. The applications are limitless. Each ORWL will come with 4K HDMI Video and 2 USB type C ports. We also provide 2 encrypted keys, power supply and cables. We’ve made our machine as transparent as possible. We want ORWL technology to be accessible to everyone. This is why we are proposing a secure module in kit to assemble yourself. We removed the external casing and provide all the final assembly parts to build your own secure module. The PCB is done and tested before shipping. We provide a mechanical outline so you can integrate this module into your project. The kit requires some assembly and programming skills. You will also need a few tools. Please check the assembly video before ordering! ORWL Kit after assembly We want to enable hackers, developers and makers to continue develop the technology. We believe security only gets better when it’s powered by the creativity of the community. Imagine state-of-the-art encryption software running in a side-channel-free, tamper-proof environment like our ARM Cortex M3 108MHz Secure Microcontroller. Everyone in the security community understand the need for firmware transparency, yet verifying that your machine has not been tampered with is a long and tedious process. Using the Boot ROM of the Secure Microcontroller, we are able to provide a first-of-a-kind auditable method to extract firmwares binaries from the device, without disassembly and without running any of these firmwares themselves, so you can know what your machine is really running. We think ORWL is the first device in this category and we hope it will lead to more devices of its type. We made it open source because we believe by doing so, the community will make this technology more robust. That, in turn, should result in the creation of more, highly secure applications than we could ever create working alone. We are starting a wiki here and will continue to post more details as we progress. Have you ever lost or had your laptop stolen? Losing the machine is bad enough. But then there are the endless calls to credit card companies, your banks and brokerage accounts to change your credentials and make sure your data hasn’t been compromised. With ORWL, you don’t have to worry about any of that. Sure, your machine may still be gone. But the information that was inside it is still secure. ORWL is the end of worrying about what happened to your data. ORWL is a secure digital safe, mailbox, photo or video archive, a repository for your financial data, or a multimedia server, and more. Digitally speaking, ORWL may be the safest option available for all of your family’s data. You'll need an HTML5 capable browser to see this content. Play Replay with sound Play with

sound 00:00 00:00 If access control, a trusted endpoint to connect to your network or a secure EMV credit card reader is what you need, ORWL can do that. ORWL is also the end of the nightmare scenario where someone loses his laptop at the airport, along with all of your company’s sensitive data. ORWL will keep it safe. You'll need an HTML5 capable browser to see this content. Play Replay with sound Play with

sound 00:00 00:00 We’re engineers from day one and have spent our professional lives building consumer electronics for large companies. We have a track record of successful consumer electronics design and functionality with top Silicon Valley companies. In fact, we recently engineered ROBIN, which was successfully funded on Kickstarter. The engineers behind ORWL are deeply familiar with production of consumer electronics. It’s important to note that ORWL is not a concept. We have a prototype, supply chain partners who are ready to go, and a team that’s got a track record of success. With those pieces in place, we’re confident ORWL will be available to ship May 2016.



But don’t just take it from us, look at our partners. We built ORWL while partnering with companies like Intel, Quanta, Maxim, Alcineo and STMicroelectronics, some of the biggest manufacturer and semiconductor companies in the world. ORWL also achieved Honoree Status at the coveted CES Awards in 2016. And we’re just getting started.





We want to enable hackers, developers and makers to continue develop the technology. We believe security only gets better when it’s powered by the creativity of the community. Imagine state-of-the-art encryption software running in a side-channel-free, tamper-proof environment like our ARM Cortex M3 108MHz Secure Microcontroller.

Everyone in the security community understand the need for firmware transparency, yet verifying that your machine has not been tampered with is a long and tedious process.

Using the Boot ROM of the Secure Microcontroller, we are able to provide a first-of-a-kind auditable method to extract firmwares binaries from the device, without disassembly and without running any of these firmwares themselves, so you can know what your machine is really running.

We think ORWL is the first device in this category and we hope it will lead to more devices of its type. We made it open source because we believe by doing so, the community will make this technology more robust. That, in turn, should result in the creation of more, highly secure applications than we could ever create working alone.

We want to enable hackers, developers and makers to continue develop the technology. We believe security only gets better when it’s powered by the creativity of the community. Imagine state-of-the-art encryption software running in a side-channel-free, tamper-proof environment like our ARM Cortex M3 108MHz Secure Microcontroller.

Everyone in the security community understand the need for firmware transparency, yet verifying that your machine has not been tampered with is a long and tedious process.

Using the Boot ROM of the Secure Microcontroller, we are able to provide a first-of-a-kind auditable method to extract firmwares binaries from the device, without disassembly and without running any of these firmwares themselves, so you can know what your machine is really running.

We think ORWL is the first device in this category and we hope it will lead to more devices of its type. We made it open source because we believe by doing so, the community will make this technology more robust. That, in turn, should result in the creation of more, highly secure applications than we could ever create working alone.

We want to enable hackers, developers and makers to continue develop the technology. We believe security only gets better when it’s powered by the creativity of the community. Imagine state-of-the-art encryption software running in a side-channel-free, tamper-proof environment like our ARM Cortex M3 108MHz Secure Microcontroller.

Everyone in the security community understand the need for firmware transparency, yet verifying that your machine has not been tampered with is a long and tedious process.

Using the Boot ROM of the Secure Microcontroller, we are able to provide a first-of-a-kind auditable method to extract firmwares binaries from the device, without disassembly and without running any of these firmwares themselves, so you can know what your machine is really running.

We think ORWL is the first device in this category and we hope it will lead to more devices of its type. We made it open source because we believe by doing so, the community will make this technology more robust. That, in turn, should result in the creation of more, highly secure applications than we could ever create working alone.

We are starting a wiki to centralize all technical information and will continue to post more details as we progress.

We want to enable hackers, developers and makers to continue develop the technology. We believe security only gets better when it’s powered by the creativity of the community. Imagine state-of-the-art encryption software running in a side-channel-free, tamper-proof environment like our ARM Cortex M3 108MHz Secure Microcontroller.

Everyone in the security community understand the need for firmware transparency, yet verifying that your machine has not been tampered with is a long and tedious process.

Using the Boot ROM of the Secure Microcontroller, we are able to provide a first-of-a-kind auditable method to extract firmwares binaries from the device, without disassembly and without running any of these firmwares themselves, so you can know what your machine is really running.

We think ORWL is the first device in this category and we hope it will lead to more devices of its type. We made it open source because we believe by doing so, the community will make this technology more robust. That, in turn, should result in the creation of more, highly secure applications than we could ever create working alone.

We are starting a wiki to centralize all technical information and will continue to post more details as we progress.