Sadly, this store appears to be inactive! All products seem to be hanging out on the beach, enjoying the retired life.
Cryptotronix, LLC is a manufacturer of cryptographic open source hardware and software. We also provide contract engineering services including embedded secure system design and software development. Our mission is to provide quality and practical security engineering to individuals, organizations, and corporations.
Cryptotronix is committed to producing open source hardware and software products. We welcome community involvement in the design and review phases and believe that this transparency improves the quality of our products. We seek to provide makers, open hardware startups, and companies with the cryptographic tools they need to strengthen their own projects and products.
Security should not be an afterthought in system design. Cryptotronix can help design system architectures, perform code reviews, and recommend security solutions. We can also provide training on security technologies.
Individuals are left on their own to protect their privacy and security on the Internet. Fortunately, there is excellent open source software that can help protect anonymity online, encrypt email and other data, and secure chat messages. We are active in the local makerspace culture and volunteer our expertise to educate the community.
About the Founder, Josh Datko
Josh is an experienced engineer with a solid leadership background. While at the U.S. Naval Academy, Josh started his career in security and cryptography as a Trident Scholar, a select group of researchers. After graduation, he served ten years in the Navy, active and reserve, where he managed his submarine’s cryptographic program on an around-the-world deployment, qualified as a nuclear engineer, deployed to Afghanistan, and served as the Chief Staff Officer for the largest submarine squadron on the east coast.
Josh also has experience building embedded, secure systems deployed in the defense and commercial markets, especially in the areas of designing and maintaining public key infrastructures and incorporating transport layer security for embedded projects. For his graduate studies at Drexel University, he has focused on security, privacy, and artificial intelligence research.
Bill | Dec. 5, 2014
Tim | Jan. 24, 2014
We recognize our top users by making them a Tindarian. Tindarians have access to secret & unreleased features.
We look for the most active & best members of the Tindie community, and invite them to join. There isn't a selection process or form to fill out. The only way to become a Tindarian is by being a nice & active member of the Tindie community!