All information on developing your own apps for TKey can be found in the Developers Handbook.
The way TKey is designed makes it possible for anybody (well, anybody with programming knowledge) to adapt their TKey for their specific use case or own purposes. The way to do that is by developing an own app. From scratch or start with an already existing app and make own adjustments. Read all about developing apps in the Developer Handbook.
TKey Unlocked is a non-programmed TKey.
TKey Unlocked can be used for a customer to program a TKey by themselves and by that have full control of what the TKey contains. This will essentially make such a TKey a user owned USB security key.
Another use case for TKey Unlocked is for developers to experiment with the hardware and/or firmware. The heart of the TKey is a Lattice iCE40UP5K FPGA. TKey Unlocked can be used for experimenting with the FPGA.
All information on how to program TKey Unlocked can be found in the Developers Handbook.
NB 1: A TKey Programmer is needed for programming the TKey Unlocked.
NB 2: App development does not require TKey Unlocked, the TKey is sufficient.
Unless otherwise noted, the project sources are licensed under the terms and conditions of the “GNU General Public License v2.0 only” and hardware boards under “CERN Open Hardware Licence Version 2 – Strongly Reciprocal”.
We can offer dual licensing, contact Tillitis at email@example.com for more information if you need another type of license for your project.
The TKey is a small computer in a USB-C form factor that can run small device applications which are loaded onto it. The purpose of TKey is to be a secure environment for applications that provide some kind of security function. Some examples of such security functions are:
There is no way of storing a device application (or any other data) on the TKey. A device app has to be loaded onto the TKey every time you plug it in.
The DCO is published on GitHub.
The project is on GitHub. Please engage with us there.
Great to hear, drop an email to firstname.lastname@example.org and we’ll get back to you immediately.
Send an email to email@example.com
If you for some reason want to change your order, please send an email to firstname.lastname@example.org asap (don’t forget to reference your order number). If we haven’t already shipped, we will update the order.
Currently we ship to EU/EEA countries, Norway, Switzerland, UK, USA and Canada.
We continuously work with expanding our geographical coverage, either with shipping directly from Tillitis or via resellers. Exact solution depends on how we can solve compliance with legal requirements in respective country.
We accept returns of products, if the original package has not been opened. Due to security reasons we will not accept returns where the product has been removed from its original package. Send a mail to email@example.com to start the return process.
If you bought you product from a reseller, you should turn to the reseller and claim warranty.
You should claim warranty for products bought on Tillitis web shop by sending a mail to firstname.lastname@example.org.
Tillitis products are covered by a one year warranty (from the date of delivery) against production and/or material defects.
The easiest way to contact us is to send an email to email@example.com
We usually respond to emails during office hours 9-17, CET.
You can also follow us on LinkedIn, Twitter and GitHub as well as sign up for our mailing lists.
Tillitis has it’s head office at Ekelundsgatan in central Gothenburg, Sweden.
Tillitis AB is a Swedish company developing hardware based authentication and security solutions. Tillitis is wholly owned by Amagicom AB and is a spin-off from the sister company Mullvad VPN.