🔒 Unextractable Private Keys
Your private keys stay locked inside the USB device - they can never be extracted or stolen
E-Signature Based Security Library And Services
One Security Device to Rule Them All
Revolutionary Security
Your private keys stay locked inside the USB device - they can never be extracted or stolen
Built on Turkish e-signature standards for maximum cryptographic protection
Trusted by countless users, your popular e-signature device works instantly with our browser extension — just install once and use it everywhere.
Core Features
Signing all kinds of files and verification of signature with cryptographic proof
Encrypting and decrypting all kinds of files with high-level security
PDF signing that fits ETSI-PADES standards. Can be verified with Adobe Acrobat!
Microsoft Office documents signing that fits ECMA-376 standards. Can be verified with MS Office
Effortlessly create, manage, and protect your PGP key pair with hardware security
All mail flow is encrypted and signed with e-signature device or PGP key pair
Passwordless authentication API for 3rd party websites with zero-trust security
HTTP/S header based authorization mechanism for restricted URLs
A secure vault for your credentials, protected by your e-signature device
Sign any type of file with your e-signature device to ensure authenticity and integrity. Recipients can verify that the file came from you and hasn't been tampered with.
Our file signing feature supports all file formats and provides cryptographic proof of origin. It generates a signature file that will be used for verification.
Encrypt your sensitive files using your e-signature device's cryptographic capabilities. Only authorized recipients with the proper keys can decrypt and access your files.
Features end-to-end encryption with perfect forward secrecy. Our file encryption feature is able to encrypt/decrypt all kinds of files.
Digitally sign PDF documents with ETSI-PADES compliance. Your signed PDFs can be verified directly in Adobe Acrobat.
PDF signing feature complies with European digital signature standards for PDF documents, which are developed by the European Telecommunications Standards Institute (ETSI).
Sign Microsoft Office documents (Office Open XML file formats such as Word, Excel, PowerPoint) with ECMA-376 standards. Signatures are recognized and verifiable directly within Microsoft Office applications.
The Office Document Signing feature generates an Office Open XML digital signature and embeds it into the document. Signature details—such as the certificate chain, signing reason, and issuer—can be viewed in Microsoft Office.
Create, manage, and protect your PGP key pair using your e-signature device. Seamlessly integrate with existing PGP workflows while keeping your private keys secure in hardware.
Compatible with standard PGP implementations. You are able to publish your key pair to our server with encrypting your PGP private key with your e-signature device.
You don't need to manually move your key pair between devices. Since your keys are securely encrypted by your e-signature device and stored on our server, you can access them anytime from any device.
All your Gmail communications are encrypted and signed using your e-signature device or PGP key pair. Transparent security without changing your email workflow.
The browser extension seamlessly integrates with the Gmail interface and supports both email and attachment signing, as well as signing and encryption.
Passwordless authentication API that allows 3rd party websites to authenticate users through their e-signature devices. No more passwords, just cryptographic proof of identity.
Can be integrated into any website within minutes, providing a high level of security through e-signature devices, timestamps, and request hashes.
Header-based authorization mechanism for restricted URLs. Access protected resources using cryptographic signatures in HTTP headers instead of traditional session cookies.
You are seeing one browser without E-SBSL on the left, and another one with E-SBSL on the right.
Implements a custom HTTP/S authorization scheme, ideal for API access, administrative interfaces, and any web resource requiring strong authorization and isolation.
Secure vault for storing and managing your credentials, protected by your e-signature device. Access your credentials for any website from any computer using your e-signature device.
Encrypted credential storage with automatic form filling. Saves your credentials encrypted on our server, allowing you to access them anytime through our extension and e-signature device.
We offer an advanced logging system that provides detailed visibility into user activity. You can easily track which employee performed which action and when, ensuring complete accountability.
Our log management system is divided into two components: local logs and remote logs. Together, they offer a comprehensive view of all operations within your organization, enabling you to monitor activity with precision.
Our Team
Get In Touch
Middle East Technical University