CloudFoxy is built on an acclaimed platform, which has been presented at best security conferences and events in the world - from DEFCON, to BlackHat and ACM Conference on Communication Security (one of the top events in the world of encryption research). The platform was used to demonstrate an encryption system resistant to attacks including supply-chain subversion.
CloudFoxy builds on the excellence of the hardware platform and couples it with simple integration and practical use-cases you can use out of the box.
An independent blinded review - expert on encryption technologies
JavaCards are an affordable and convenient way of separating security critical code and secrets
You can use JavaCard code in local hardware, cloud JavaCards, or in
simulators (local or listening on an TCP/IP port)
JCMath Lib fills the gap in modern crypto algorithms - Elliptic Curve Encryption (ECC)
Get started right-away
Examples & Documentation
Profiler & Complete Toolchain
New crypto hardware architecture
For the first time, tolerates faulty & malicious hw
Scales nicely; just keep adding ICs
Suitable for commercial-off-the-shelf components