The short answer is no. The battery hold enough energy to use the Seclave in offline mode (never connected via USB) for months using normal usage pattern. If you put the device in the USB-port it will charge it's battery and most if not all users never actively charge their device, it gets topped up once in a while.
The product offers a secure and easy to handle solution to managing complex passwords. It differs from most similar products on the market in that the information is only stored on the device.
Glad you asked. The Seclave is designed as a single-purpose computer. The only time the Seclave allows access to one of your passwords is when you tell it to. This is in stark contrast to for example smartphone apps where malware on your smartphone might get access to all of your passwords.
No, the Seclave acts as a standard USB keyboard when connected to a computer.
Not only is it possible, that's one of the use-cases we use the Seclave for ourselves.
You don't have to install anything to be able to use your Seclave. However, if you want to import passwords from the computer, you can use either the SecImport program or KeePass using our plugin. These programs can be downloaded from the web page.
The Seclave works with any operating system which supports USB HID. SecImport and the KeePass plugin works with Windows, MacOS and Linux.
If a backup has been made, you can simply restore all your passwords into a new unit using the encryption key.
Your Seclave will be programmed and packaged in Sweden in a controlled environment. The package is sealed with security tape.
Not really. The protected memory is constructed in a way that makes it very expensive, if possible, to extract it's content without the correct password. The flash memory is encrypted with AES-128 using strong keys, so breaking that is very unlikely... All of this would also take a great deal of time if ever succeeded. This would give you time to get a new Seclave, recover your lost passwords from your backup and simply change them all before anyone has had the chance to figure out your most valuable password. The risk of anyone guessing your passphrase is less than 1/65,000 for each attempt and the Seclave will erase all passwords after four erroneous attempts.
By using the same password on multiple sites it is enough for an attacker to hack one of those sites to steal it. The attacker can then try to use that password on other sites. Thus by hacking an unimportant website the attacker can get the password for your email, online banking and so forth. This kind of attack is quite common.
A software password manager, even though it might encrypt your passwords, won't help you if your computer/phone gets infected by malware. Malware can steal sensitive files from your device as well as log your keystrokes. A dedicated security device like the Seclave isn't vulnerable to those kinds of attacks.
Yes. If you want give your Seclave to somebody else, you can factory reset the Seclave. This will erase all stored data, by wiping crypto-keys and erasing all encrypted content.
Seclave is using an 8 bit AVR microcontroller running at 8 MHz with low power consumption. The codebase is small which makes it easier to verify that it does what it is intended to do and nothing else.
We are leaving our fingerprints everywhere, including on our Seclave. An attacker interested in your passwords could lift your fingerprint from the device and using it to unlock your Seclave.
If a backup has been made, you can simply restore all your passwords into a new unit using the backup key.
To make sure that you don't lose all of your passwords if the device gets lost or breaks.
An encryption key that is used if you need to recover your passwords from a backup. The key is a long string of numbers and letters and is meant to be stored, preferably on paper, in a safe place.