Top of the line secure laptop

Support Center

Popular Categories

How to operate the secure OS

Resources and documentation to use the secure OS, which is hidden by default and runs on Qubes OS. This is where all of your sesnitive data will be stored.

How to Operate the Decoy OS

Documentation on the decoy OS, which is powered by Linux Mint. This is designed to be easy to access and house your decoy files and tripwires.

Setup secure networking

Documentation on setting up secure network layers, including TOR (onion routing), VPN, and stacked networks. 

 

Setting up Obfuscation

Dark Web Resources

Offensive Security Tools

Crypto Currency Tools

Simplified USB hardware

Find documentation and resources for the Skeleton Key, which is the USB version of the software, which combines Obfuscation, Offensive Security, and Network privacy in an easy to use package.

Everything Else

Don’t find what you need here? Reach out to support and let us know. Submit a help request here.

Frequently Asked Questions

Do you offer other configurations?

We do not offer other product configurations at this time. To ensure maximum security, we stick with a consistent set of hardware and configure it for optimal security. We use high-quality components with robust resources to power the laptop.

Is it available with a GPU?

Not at this time. There is additional research needed to determine security configurations needed to support GPU enabled hardware. 

Do you offer other OSs?

No, the security features are based on this specific Operating System, which uses Qubes for the secure part of the laptop. Linux Mint powers the decoy OS.

Why don't you offer customizable hardware options?

Customizable hardware options can introduce variability that may compromise security. By using a consistent set of high-quality components, we ensure that our security configurations are reliable and robust.

What type of components do you use in your laptops?

We use high-quality components with robust resources to power our laptops. This ensures that our devices are not only secure but also perform efficiently and effectively.

How does using consistent hardware improve security?

Consistent hardware allows us to thoroughly test and optimize our security configurations. This reduces the risk of vulnerabilities and ensures that our security measures are dependable across all devices.

Can I upgrade my laptop's hardware later?

While hardware upgrades are technically possible, we recommend using the laptop with its original configuration to maintain the highest level of security and performance.

Where is this avaiable?

Currently, the laptop is only available for sale within the US. This is due to concerns about encryption and security hardware with local laws around the world.

Can this be shipped outside the US?

We do not recommend importing the laptop to countries outside the US due to potential legal issues with encryption and security hardware. It is best to wait until the product is officially available in your region.

Why can't I buy the laptop in my country?

Encryption and security hardware are subject to different regulations globally. To comply with these laws and ensure the highest security standards, we are currently limiting sales to the US.

Are there plans to expand sales to other countries?

We are continuously evaluating our options and hope to expand the product reach in the near future. Our goal is to make the laptop available internationally while adhering to all local regulations.

What are the specific legal concerns preventing international sales?

Different countries have varying laws regarding encryption and security hardware. To ensure compliance and maintain the integrity of our security features, we are currently restricting sales to the US while we navigate these complex legal landscapes.