Über dieses Projekt
SilentKeys: A Keyboard that Protects your Privacy & Security
110.913 €
Pour la version française, cliquez ici
SilentKeys is a Plug'n'Play USB keyboard that protects you both off-line and on-line. Keep control over your privacy and safeguard your computer from viruses, snooping and hackers. Protect your keystrokes from key-loggers. Go anonymous at the push of a button. Encrypt your data and safeguard access to Paypal, Facebook, bank as well as all your on-line accounts and credentials.
The SilentKeys Bundle includes:
- SilentKeys Secure Keyboard
Choose your color : cosy White or Travel Black
Choose your layout : US, UK, FR, DE and ES - 16GB microSD card
- USB cord
- User Guide
- Dice
It also shouldn’t mean leaving your front door wide open. Would you share your bank passwords, your private mail or even your medical records with your neighbor, the postman or the government?
Right now, strangers are exploiting your political and religious beliefs, your desires, sympathies and convictions and even things about yourself that you aren’t yet aware of. Given enough data and time, your behavior might even be predicted.
Protecting your privacy is not about having something shady or nefarious to hide, it is simply about your private things not being anyone else’s business. We all need a place where we can go and be free of the judgmental eyes of other people.
Some imply that citizens and businesses who take measures to avoid tracking or surveillance are weird, guilty or paranoid. This logical fallacy impedes debate and implies that it is normal for government workers and corporation marketers to know everything about us, whether we like it or not. This line of thinking shows no regards for our individual freedom, national Constitutions and the UN's Human Rights Declaration, all cornerstones of free societies.
Did you know 700 million people across the world changed their on-line habits following the NSA revelations?
No one in their right minds would allow strangers to install cameras in their bedroom ; stop them from doing it in your computer.
Need to access a sensitive website without sharing your real location? Want to research or share personal and professional matters (medical, political, financial etc) without letting everyone know everything about them?
SAB is a safe anonymous browser based on the renowned Tor Network Browser. We strengthen it by enclosing it inside a locked software container called a Virtual Machine. Inspired by Satya's compartmented design, it shields your OS from numerous Web threats, encrypts its own traffic and protects your anonymity.
Satya Desktop allows for an all-inclusive, secure and private session. Fully autonomous, loaded from scratch and ignoring your current OS and hard disks, it is protected from insecure computers, infected downloads and removable media.
By encrypting all its traffic and data, it protects your security and anonymity and lets you work, browse and relax in full privacy.
Keyloggers record everything you type. They can be either malware that infects your system or small hardware chips plugged or inserted inside your computer.
SilentKeys physically bypasses external and laptop keyboards and includes a buffer Hub chip to hinder hardware key-loggers. Additionally, by loading Satya, all software keyloggers hidden inside the default Operating System are unable to even load.
We love Open ; we are keen on transparency and we strive to make our products as universally-compatible as can be. Security through obscurity (patents, undisclosed code) we do not support nor believe in for security products.
Satya Desktop is derived from the Tails Operating system. Tails is considered by many IT professionals, from Ed Snowden to the Electronic Frontier Foundation, to be the one of the safest solution available for privacy protection. Satya is a Tails fork : this means it is based on the Tails Project source code with added ergonomics, guidance and custom features we've developed.
Satya Anonymous Browser is based on the Tor Browser and Linux powered by Virtualbox.
SK and Satya are the result of a full spectrum security approach to secure each link in the privacy chain : the hardware, the software and the network.
Securing all of them at once in one place means truly securing your communications, your local files, your private documents and pictures, your browsing habits, your e-shopping and banking as well as professional research, remote connections and sensitive informations.
« This is a very interesting project, especially the Secure Updates switch. »
Security Analyst, Gandi.net Web Hosting
« It's a fantastic concept, and one of the nicest looking keyboards I've seen in a long while. »
H.Havoc | Previous Magazine
« We do a lot of R&D and setting up secure file and communication exchange channels with remote manufacturers and contractors would be much simpler if they all just had a SilentKeys. »
P.A. Coquelin | CEO, Mac Lloyd Sport Tracking
« I like the idea of a separate secure bubble for when I need anonymity, security, or both. »
P.Ourdanov | Early-backer
« I experienced first-hand the damage keyloggers can do when
my ex used one on my computer and I wouldn't wish it on anyone. »
A.Montarguet | Early-backer
« I may be 62 and not very good with computers but I still value my privacy. I like SilentKeys because of easy foolproof-ness and that it's all in one. » D.Nelson | Retired Teacher and Fan
SilentKeys was born out of the pain of suffering credit card fraud during Iann’s travel in India in 2012. A keylogger on on a cyber-café computer cloned his credit card info which was then used by someone to make fraudulent purchases on the Web.
The financial loss, the administrative and banking hassle and the delays in getting a replacement card delivered almost ruined his travel.
After returning home, the idea of combining a keyboard and OS to protect against hardware and software keylogging was tested out, initially with travellers and backpackers in mind. This is why the first two prototypes were made using off-the-shelf flexible silicon keyboards, so that they could be rolled up and tucked in a bag.
However it quickly became apparent that flexible keyboards while seemingly cool just aren’t great for typing. We tested overcoming some of the issues by trying to encase it in a hard shell but ergonomics and typing comfort were still unsatisfactory. After that we left the flexible path and focused on designing a real and proper keyboard that could be both portable and used all day. The initial result was promising. After two more iterations we settled on the final design, the one you’ll be getting by backing us.
We're Preevio. We design privacy projects that are open, legal and easy as the simple act of closing curtains or shutting doors. We focus our efforts on helping people safeguard their computers and defend themselves against today's security and privacy issues : mass surveillance, data and identity theft, commercial profiling, insecure OS-es and malicious software.
From our technical point of view we believe the answer lies first in education, then in cryptography, decentralized networks and open hardware.
Wary of the ongoing centralization and privacy-deprivation trend led by Big Data companies, we strive to both raise public awareness and design people-friendly safe havens .
We now live in a post-Snowden world, we've been warned : no one will protect our data for us. It’s not about having anything to hide, it’s about our privacy not being anyone else’s business.
Short Co-founders bio
Iann De Maria - CEO. Following network and system management studies he started his career as systems administrator and level 2 user support on NT4 & Win2000 in a training center back in 2001. His career gave him much insight into the endpoint and the sometime surreal relationships users have with it! Iann has worked for various groups including Philips-NXP, GDF-Suez, LVMH, Jones Lang Lasalle and a government agency.
Romain Pironneau - CTO. Programming is the family-business and he was the local computer wizard: his first real job was installing a full cyber-cafe at the age of 14. The biggest projects Romain has participated in have been working on a large videosecurity product and totally redesigning and rebuilding all the software solutions for an outdoor smart multimedia kiosk system, ViaDirect, as development team leader.
Risiken und Herausforderungen
We're a team of developers who love building hardware to run our software. We've built two fully functional prototypes as well as various pre-production development boards to validate our electronics design.
Our software development is finalized and will soon go in Beta. To fulfil our engagement with our backers and make the best board we can, we are in talk with Inodesign, an expert French electronics design company that will optimize the speed and electronic data integrity design of SilentKeys. Our Bill of Materials is ready and we intend to work with Hardware Club and Usine.io in order to benefit from their expertise and counselling on hardware design.
Keyboard mechanism and structural design is an important aspect of our project and we will be partnering with an experienced keyboard maker in Shenzhen, China. Each SilentKeys Secure Keyboard will be assembled, sealed and programmed by ourselves in France to guarantee software integrity.
Device certification in various countries will be pretty straightforward ; SilentKeys does not include wireless or radio transmitters and electronic design is based on the well-known USB standard.
SilentKeys presents no major hardware or software development risks other than minor unexpected production process hiccups or shipping delays. We are fully confident in our capacity to deliver a high-end product and by partnering with experienced professionals we will ensure timely delivery and good quality control.
Näheres zur Rechenschaftspflicht auf KickstarterFAQs
-
SilentKeys can be used as a standard keyboard on all devices that currently accept USB keyboards : PCs, Macs, Android phones and all tablets with USB OTG function or USB adapter.
Additionally, Satya Desktop is compatible with all PCs and Macs (x86) manufactured after 2007.
-
For various reasons including :
Snooping, closed-source and untrustworthy Operating Systems,
Proprietary hardware,
Mobile networks specifications
Obscure basebands and closed modem firmwaresWe believe current mobile phones and tablets cannot be trusted with handling sensitive activities.
Security through obscurity we don't believe in ; it's dangerous to trust something that hides the way it works.
We settled on the PC/Mac hardware platforms for our Secure features ; we believe it is more durable, time-proven and trustworthy. And it can boot a fully operational secure OS from the ground up.
This architecture allows SilentKeys to protect users against many more real privacy threats than a mobile-based solution would.
-
Satya bypasses the installed OS when booting and therefore immunizes computing session from any virus, keyloggers or malware already present on the hard drives. It loads straight into your computer's RAM memory and gets wiped every time the computer is shut down.
By design, RAM memory cannot hold data without power, unlike hard disks and USB Pendrives. The memory from which Satya loads is virus-proof thanks to the clever hardware read-only design of our flash storage module. This prevents any remote application or OS infection from getting to the source files from which the OS loads.
A simple reboot and you'll recover a safe and sanitized work environment.
-
Well you may browse the Web using the Tor browser but all other network traffic (e-mail, chat, files, app and OS) will not use the Tor network. The OS will still be leaking a lot of clear-text traffic and metadata and nosy apps will keep reporting usage and sometimes keystrokes to their publishers. This is why Satya Desktop is the recommended solution : ALL traffic is encrypted before leaving the computer using strong SSL encryption via the Tor Network or a VPN and the Apps that have been included do not report data.
The Tor browser, Tor Routers or VPN Wifi Hotspots do not protect you against Operating System data leaks, viruses and keyloggers. They can give a false sense of security as they do not improve your overall computer security.
With SilentKeys and Satya Desktop you get much more than a single browser - a private, cocooned environment that encrypts all your files and protects them from viruses and keyloggers. Fully packed with privacy-friendly apps and veiled by full network cloaking. All plug'n'play. Nothing to set-up.
SilentKeys and Satya Desktop also includes OpenVPN for office and VPN users. Easily switch between Tor and your VPN accounts. Or even combine them for added cloaking.
-
To get the most out of SilentKeys and Satya Desktop we recommend :
- CPU : 1.5 Ghz & higher (Intel or AMD - 32 or 64bits)
- RAM : 2 GB Ram & higher
- USB : 1 free on-board port (SilentKeys shouldn't be daisy-chained to an external hub for power and security reasons).Satya Desktop can be used on all USB-bootable PCs and Macs, independently of their existing Operating System (be it MacOS, Windows XP/Vista/7/8/10 or Linux flavors).
SilentKeys will work on below-requirements systems but we can't vouch for an optimal experience on underpowered systems.
-
SilentKeys has a lenght similar to an A4/Letter page (29cm/11.4") and the width of a DVD case (13.5cm/4.3"). Height goes from (1cm/0.4") at the front up to (2cm/0.8") at the back. As such, it will fit in all standard laptop bags and backpacks. It is sturdy but light too : only 14Oz / 395g!
-
We use the Qwerty layout on our illustrations and prototypes as it is the most common worldwide. US, UK, FR, DE and ES layouts are planned to start with. We're also looking at CN and BR as well as more exotic ones like DVORAK and BÉPO later on.
Key pitch (the distance between centers of two side-by-side keys) is 18mm, like most laptop keyboards. To ensure a streamlined and portable device we settled on a low-profile scissor mechanism identical to the design used in laptops. The comfortable tactile keys are locked to the switch suspension mechanism and the board on which they rest is epoxied to the shell's inner structure, protecting the electronic PCB below from intrusion and tampering.
As a side note, a mechanical switch version is certainly something we'd love to consider if enough people are interested!
-
PC/Mac hardware limitations do not allow booting Operating Systems over wireless links, the devices need a hardware connection to communicate. And that's a good thing : a cable will always be harder to hack than a wireless and omnidirectional radio signal.
-
'Satya Desktop' is the security-focused operating system embedded in SilentKeys. It is based on Tails (an operating system recommended by Edward Snowden). We will release Satya beta and its source code, in a few months, after a security audit.
-
Satya Desktop owes a lot to Tails and Debian and we believe that's a good thing. Satya includes more curated apps, custom wizards, control panel and contextual helpers. It lets you do a little bit more while sporting a more modern interface. Our focus is really simplifying Open Source information security and the vast majority of people's Threat Models are less stringent than Tail’s “life or death” one.
For this reason, Satya is a bit more flexible than Tails : For instance, you can very well decide to start it without connecting to Tor but using a VPN instead. Or even connect directly to the Internet : if you’re going to be connecting to your bank or logging in to your office’s Intranet, you might not always want to appear to be coming from another location.
Satya Desktop also handles software integration with the hardware write-protection, it includes an agent that monitors the memory state : it will guide the user through the OS updating process and will warn and prevent use if the safety switch has been deactivated.
The persistent partition is automatically set on the memory card rather than on the main memory, we've added a memory watcher agent that monitors Satya's protected memory and the Desktop manager includes wizards and helpers for easy access to non-technical people.
We will have an independent security audit on Satya Desktop as soon as we deem it ready to go in Beta testing.
We publicly announced SilentKeys on the Tails Mailing list and expect a fruitful collaboration to ensue. We share similar goals and ourselves have been Tails users since version 0.16.
We use Open Source software for all company and project development including (but not limited to) Foswiki, Owncloud, Debian, Emacs, Discourse, Hugo, Apache, Rocketchat, Pidgin, LibreOffice, Tox, Thunderbird, Firefox, Onionshare, Tor, OpenVPN, the Gimp, Chromium, Cyanogen, Telegram...
-
The write-protection physically shields the source OS files from un-patched vulnerabilities that may allow malware to gain administrative rights. Our free OS updates will patch vulnerabilities as soon as they are found and fixed.
How can software ever be tamper-proof on a write-enabled medium? We attempt to solve the problem by offering a solution based on a hardware write-protected memory chip coupled with ephemeral Live OS sessions.
We feel these are two very solid security features currently lacking on consumer computing products.
-
On top of the natural benefits of running wallet software on a more secure system, you can use SilentKeys as a full offline wallet. We wrote a blogpost about it!
-
Satya Anonymous Browser uses Tor while Satya Desktop offers two protected network options : Tor or VPN. They may also be combined if necessary and both use banking and military-grade SSL encryption algorithms.
The Tor multi-hop network cloaks your original location by encrypting and bouncing your browsing data three times through a free, worldwide, volunteer network before it reaches the public Internet to conceal location and usage.
VPN encrypts all your traffic to secure wireless transactions, circumvent geographical blocks and censorship and to protect personal identity and location. It's what companies use to link remote sites and employees. Faster and more flexible, it usually requires a subscription.
Dieses Projekt unterstützen
Finanzierungszeitraum
- (35 Tage)