"Generates and stores cryptographic keys using an on-board hardware random number generator, and it uses those keys to perform cryptographic operations, mainly generating secure digital signatures (not to be confused with an electronic signature. These are not the same.) The keys are stored in such a way that they cannot be extracted from the device even by someone who has physical possession of the device. This is the central feature of any HSM."
"U2F Zero is an open source U2F token for 2 factor authentication. It is implemented securely. It works with Google accounts, Github, Duo, OpenSSH, and anything else supporting U2F."
"The open-source hardware cryptographic engine must be of general use to the broad Internet community, covering needs such as securing email, web, DNSsec, PKIs, etc."
OpenSesame is a device that can wirelessly open virtually any fixed-code garage door in seconds, exploiting a new attack I've discovered on wireless fixed-pin devices. Using a child's toy from Mattel.
"Embedded hardware security research including side-channel power analysis and glitching."
What am I missing?
The USB Armory is full-blown computer (800MHz ARM® processor, 512MB RAM) in a tiny form factor using USB. The unit supports a few advanced security features such as secure boot and ARM TrustZone.
Yubico have launched their $18 Universal Second Factor (U2F) dongle at http://www.yubico.com/security-key. Powered by the FIDO alliance second factor standard.
also see: https://eprint.iacr.org/2014/204.pdf
Aiming for 100 euro, the USB armory hardware is supported by standard software environments and requires very little customization effort. In fact vanilla Linux kernels and standard distributions run seamlessly on the tiny USB armory board with remote X11.
The following example security application ideas illustrate the flexibility of the USB armory concept: mass storage device with advanced features such as automatic encryption, virus scanning, host authentication and data self-destruct,. OpenSSH client and agent for untrusted hosts (kiosk), router for end-to-end VPN tunnelling, Tor, password manager with integrated web server, electronic wallet (e.g. pocket Bitcoin wallet), authentication token, portable penetration testing platform, low level USB security testing over emulated connections such as HS USB 2.0 On-The-Go (OTG), full TCP/IP connection to/from USB armory via CDC Ethernet emulation, flash drive functionality via mass storage device emulation, serial communication over USB or physical UART.
Optimised for energy efficiency, connectivity, security and reusable software components, it will become the foundation that enables widespread innovation in the IoT space.
"The revolutions in web 2.0 and smartphones were enabled by the creation of platforms, and the widespread innovation they made possible. The disruptive jump in complexity brought on by IoT devices, combined with the requirement for their development at scale means embedded development must enter the platform era too."