🚧 The Passport Prime SDK is in public beta. Got an idea, or want a dev unit to play with? We'd love to hear from you — hello@foundation.xyz .
Passport Prime is an open developer platform for building secure, offline-first apps in Rust. Powered by KeyOS - our Rust-based microkernel OS - Prime gives you a sandboxed runtime, a curated UI library, post-quantum Bluetooth, NFC, camera, secure storage, and a hardware secure element, all on auditable open hardware.
If you've ever wanted to give your users a physical, offline place to hold secrets - keys, seeds, identities, contracts - without building a hardware company, Prime is that place.
What you can build
The modular nature of KeyOS means you're limited only by imagination. Apps are full Rust binary crates with their own UI, their own storage, and their own declared permissions - they are not "skins" of an existing app.
A few of the things Prime is well-suited for:
- Bitcoin & crypto - multisig coordinators, offline Lightning signers, DLC signers, smart contract auditors, privacy wallet companions
- Identity & access - SSH key managers, credential managers, FIDO2 security keys, dedicated password managers
- Messaging & comms - Nostr signers, encrypted offline messengers
- Storage & secrets - air-gapped seed signers for any chain, offline secret storage for any online crypto app
The pattern: keep secrets offline, sign quickly via QuantumLink for interactive protocols like Lightning, Nostr, Ark, swaps, and Coinjoins.
Hardware at a glance
Prime is built around a Microchip SAMA5D27 (ARM Cortex-A5) application-class processor with a Microchip ATECC608C secure element, 60 GB of storage (50 GB user-accessible), a 3.5" color touchscreen, USB-C, NFC, camera, and post-quantum QuantumLink Bluetooth. Designed and assembled in New Hampshire, USA.
For full hardware specifications, see the consumer site .
Apps already shipping on Prime
These are the apps we've built on top of KeyOS. Each one is a concrete example of what's possible on the platform — from offline Bitcoin signing to FIDO2 authentication to encrypted storage.
| App | What it does |
|---|---|
| Bitcoin Wallet | Airgapped Bitcoin signing with full BDK integration — multisig, passphrases, temporary seeds |
| Vault | Encrypted seed phrase storage with Magic Backup support |
| Keys | FIDO2 / WebAuthn / U2F security key — replaces a YubiKey |
| 2FA | TOTP code generator backed by the secure element |
| Files | On-device filesystem browser across Airlock, User, and USB scopes |
| Image Viewer | JPEG/PNG viewer for files from USB or NFC |
| QR Scanner | Shared camera-based QR / UR / animated-QR decoder service |
All are open source in the KeyOS repo — fork them, read them, use them as reference for your own apps.
🚧 Public examples repo coming soon. We're preparing a standalone foundation-devices/prime-examples repo with small, focused starter apps (multisig coordinator, Nostr signer, FIDO2 key, password manager stub) that you can scaffold directly with
foundation new --template <name>. Not live yet — email us if you want an early look.
Where to next
- Get Started
— install the
foundationCLI and build your first app - KeyOS — architecture, security model, permissions
- Building Apps
— project layout,
app-config.toml, Slint UI, build and sign - CLI Reference
— every
foundationcommand and flag - Capabilities — what your app can access
- FAQ
Building a wallet or anything that touches keys? Email hello@foundation.xyz for our security review checklist before you ship.