AliceKeys
Slide 1
123

We’re Not Sure About Bob, But Eve Will Never Get Alice’s Keys.

No more lost SSH keys, clunky hardware, or security headaches. AliceKeys turns your phone into a secure, hardware-backed key for SSH, VPN, Git signing—and much more. Fast, effortless, and built for engineers. Your keys stay locked in your device’s secure enclave—only you can use them, no one else.

The Secure, Effortless Way to Authenticate

Unlock the power of hardware-backed security without extra devices. With cutting-edge encryption and FIDO standards, AliceKeys offers strong, hardware-based authentication—just like a YubiKey, but more convenient, faster, and built right into your phone. Built on the principles of Trusted Computing, your keys remain secure inside your device’s trusted enclave, ensuring they never leave your control.

Hardware-Secured Keys

Keys are stored securely in your phone’s trusted enclave, with attestation to confirm storage.

SSH & VPN Authentication

Use your phone as a secure key for seamless remote access.

Git Commit Signing

Ensure authorship and integrity with cryptographic signing.

Silent & Passwordless Authentication

No codes, no interruptions, just secure access.

FIDO Standards & End-to-End Encryption

Proven security, no compromises.

Open Source & Transparent

Review the code, trust the security.

Enterprise-Ready

Centralized management, audit logs, and team policies.

Cross-Platform Support

Works with Windows, macOS, Linux, and major SSH clients.

Future-Ready & Extensible

Modular design to support OAuth, 2FA, FIDO, and more.

Works with your technologies

Windows OS Logo Mac OS Logo Linux OS Logo