Frequently Asked Questions
SilentKeys can be used as a standard keyboard on all devices that currently accept USB keyboards : PCs, Macs, Android phones and all tablets with USB OTG function or USB adapter.
Additionally, Satya Desktop is compatible with all PCs and Macs (x86) manufactured after 2007.Last updated:
For various reasons including :
Snooping, closed-source and untrustworthy Operating Systems,
Mobile networks specifications
Obscure basebands and closed modem firmwares
We believe current mobile phones and tablets cannot be trusted with handling sensitive activities.
Security through obscurity we don't believe in ; it's dangerous to trust something that hides the way it works.
We settled on the PC/Mac hardware platforms for our Secure features ; we believe it is more durable, time-proven and trustworthy. And it can boot a fully operational secure OS from the ground up.
This architecture allows SilentKeys to protect users against many more real privacy threats than a mobile-based solution would.Last updated:
Satya bypasses the installed OS when booting and therefore immunizes computing session from any virus, keyloggers or malware already present on the hard drives. It loads straight into your computer's RAM memory and gets wiped every time the computer is shut down.
By design, RAM memory cannot hold data without power, unlike hard disks and USB Pendrives. The memory from which Satya loads is virus-proof thanks to the clever hardware read-only design of our flash storage module. This prevents any remote application or OS infection from getting to the source files from which the OS loads.
A simple reboot and you'll recover a safe and sanitized work environment.Last updated:
Well you may browse the Web using the Tor browser but all other network traffic (e-mail, chat, files, app and OS) will not use the Tor network. The OS will still be leaking a lot of clear-text traffic and metadata and nosy apps will keep reporting usage and sometimes keystrokes to their publishers. This is why Satya Desktop is the recommended solution : ALL traffic is encrypted before leaving the computer using strong SSL encryption via the Tor Network or a VPN and the Apps that have been included do not report data.
The Tor browser, Tor Routers or VPN Wifi Hotspots do not protect you against Operating System data leaks, viruses and keyloggers. They can give a false sense of security as they do not improve your overall computer security.
With SilentKeys and Satya Desktop you get much more than a single browser - a private, cocooned environment that encrypts all your files and protects them from viruses and keyloggers. Fully packed with privacy-friendly apps and veiled by full network cloaking. All plug'n'play. Nothing to set-up.
SilentKeys and Satya Desktop also includes OpenVPN for office and VPN users. Easily switch between Tor and your VPN accounts. Or even combine them for added cloaking.Last updated:
To get the most out of SilentKeys and Satya Desktop we recommend :
- CPU : 1.5 Ghz & higher (Intel or AMD - 32 or 64bits)
- RAM : 2 GB Ram & higher
- USB : 1 free on-board port (SilentKeys shouldn't be daisy-chained to an external hub for power and security reasons).
Satya Desktop can be used on all USB-bootable PCs and Macs, independently of their existing Operating System (be it MacOS, Windows XP/Vista/7/8/10 or Linux flavors).
SilentKeys will work on below-requirements systems but we can't vouch for an optimal experience on underpowered systems.Last updated:
SilentKeys has a lenght similar to an A4/Letter page (29cm/11.4") and the width of a DVD case (13.5cm/4.3"). Height goes from (1cm/0.4") at the front up to (2cm/0.8") at the back. As such, it will fit in all standard laptop bags and backpacks. It is sturdy but light too : only 14Oz / 395g!Last updated:
We use the Qwerty layout on our illustrations and prototypes as it is the most common worldwide. US, UK, FR, DE and ES layouts are planned to start with. We're also looking at CN and BR as well as more exotic ones like DVORAK and BÉPO later on.
Key pitch (the distance between centers of two side-by-side keys) is 18mm, like most laptop keyboards. To ensure a streamlined and portable device we settled on a low-profile scissor mechanism identical to the design used in laptops. The comfortable tactile keys are locked to the switch suspension mechanism and the board on which they rest is epoxied to the shell's inner structure, protecting the electronic PCB below from intrusion and tampering.
As a side note, a mechanical switch version is certainly something we'd love to consider if enough people are interested!Last updated:
PC/Mac hardware limitations do not allow booting Operating Systems over wireless links, the devices need a hardware connection to communicate. And that's a good thing : a cable will always be harder to hack than a wireless and omnidirectional radio signal.Last updated:
'Satya Desktop' is the security-focused operating system embedded in SilentKeys. It is based on Tails (an operating system recommended by Edward Snowden). We will release Satya beta and its source code, in a few months, after a security audit.Last updated:
Satya Desktop owes a lot to Tails and Debian and we believe that's a good thing. Satya includes more curated apps, custom wizards, control panel and contextual helpers. It lets you do a little bit more while sporting a more modern interface. Our focus is really simplifying Open Source information security and the vast majority of people's Threat Models are less stringent than Tail’s “life or death” one.
For this reason, Satya is a bit more flexible than Tails : For instance, you can very well decide to start it without connecting to Tor but using a VPN instead. Or even connect directly to the Internet : if you’re going to be connecting to your bank or logging in to your office’s Intranet, you might not always want to appear to be coming from another location.
Satya Desktop also handles software integration with the hardware write-protection, it includes an agent that monitors the memory state : it will guide the user through the OS updating process and will warn and prevent use if the safety switch has been deactivated.
The persistent partition is automatically set on the memory card rather than on the main memory, we've added a memory watcher agent that monitors Satya's protected memory and the Desktop manager includes wizards and helpers for easy access to non-technical people.
We will have an independent security audit on Satya Desktop as soon as we deem it ready to go in Beta testing.
We publicly announced SilentKeys on the Tails Mailing list and expect a fruitful collaboration to ensue. We share similar goals and ourselves have been Tails users since version 0.16.
We use Open Source software for all company and project development including (but not limited to) Foswiki, Owncloud, Debian, Emacs, Discourse, Hugo, Apache, Rocketchat, Pidgin, LibreOffice, Tox, Thunderbird, Firefox, Onionshare, Tor, OpenVPN, the Gimp, Chromium, Cyanogen, Telegram...Last updated:
The write-protection physically shields the source OS files from un-patched vulnerabilities that may allow malware to gain administrative rights. Our free OS updates will patch vulnerabilities as soon as they are found and fixed.
How can software ever be tamper-proof on a write-enabled medium? We attempt to solve the problem by offering a solution based on a hardware write-protected memory chip coupled with ephemeral Live OS sessions.
We feel these are two very solid security features currently lacking on consumer computing products.Last updated:
On top of the natural benefits of running wallet software on a more secure system, you can use SilentKeys as a full offline wallet. We wrote a blogpost about it!
Satya Anonymous Browser uses Tor while Satya Desktop offers two protected network options : Tor or VPN. They may also be combined if necessary and both use banking and military-grade SSL encryption algorithms.
The Tor multi-hop network cloaks your original location by encrypting and bouncing your browsing data three times through a free, worldwide, volunteer network before it reaches the public Internet to conceal location and usage.
VPN encrypts all your traffic to secure wireless transactions, circumvent geographical blocks and censorship and to protect personal identity and location. It's what companies use to link remote sites and employees. Faster and more flexible, it usually requires a subscription.Last updated:
Don't see the answer to your question? Ask the project creator directly.Ask a question