Proposal: Framework Vault Module
A user-owned, built-in hardware vault for keys, passwords, and digital identity
Summary
This proposal explores a Framework-compatible, internal hardware vault module designed to securely store cryptographic keys, passwords, and passkeys inside the laptop, without relying on USB dongles, vendor-locked TPM implementations, or cloud services.
The idea is not to replace TPM, but to complement or bypass it when needed, restoring user ownership over digital trust, in the same way Framework already restored ownership over hardware.
The current situation (and the gap)
Today, users typically choose between:
1. TPM-based security
-
Often closed firmware
-
Vendor- and motherboard-bound
-
Not portable across machines
-
Limited transparency and user control
2. USB security keys (dongles)
-
Easy to lose or forget
-
Occupy valuable USB ports
-
External, fragile, and not integrated
-
Often closed hardware or opaque firmware
3. Software password managers
-
Convenient, but ultimately host-compromisable
-
Rely on OS integrity
-
Increasingly cloud-dependent
For a community that values repairability, openness, and user agency, this is an unsatisfying trade-off.
The core idea
Framework Vault Module
A built-in, user-controlled hardware trust module, installed internally (e.g. via M.2), that:
-
Stores secrets in hardware, not in the OS
-
Never exposes raw keys to the host
-
Works with or without TPM
-
Is unlocked via phone-based push approval (no USB, no typing)
-
Uses open firmware and documented protocols
-
Is portable across laptops
TPM belongs to the system.
The Vault belongs to the user.
What the Vault does (V0 scope)
-
Hardware-backed storage for:-
Password vault entries
-
SSH / GPG keys
-
Passkeys (WebAuthn)
-
-
Cryptographic operations happen inside the module -
Unlock via phone push approval-
No USB dongles
-
No code typing
-
Presence-based security
-
-
Safe firmware updates via A/B firmware slots -
Recoverable by split key shards (no single point of failure)
What it is not
-
Not a TPM clone -
Not a DRM or attestation enforcement tool -
Not cloud-locked -
Not mandatory for the system to boot
This is opt-in, user-owned security.
Why this fits Framework specifically
Alignment with Framework values
-
Modularity â a replaceable, optional component -
Openness â FOSS firmware, auditable behavior -
Sustainability â no disposable dongles -
User ownership â keys move with the user, not the motherboard
This extends Frameworkâs philosophy from hardware freedom into digital trust freedom.
Benefits for the community
For users
-
No more dongle chains
-
No vendor lock-in
-
Stronger security than software-only solutions
-
Security that survives laptop upgrades
For developers and power users
-
Hardware-backed SSH/GPG without TPM pain
-
Scriptable, auditable trust model
-
Linux-first, but browser-compatible via passkeys
For privacy-focused users
-
No cloud dependency
-
No biometric requirement
-
Phone used only as presence confirmation
Benefits for Framework
-
A unique differentiator among laptop manufacturers
-
Minimal platform risk (external, optional module)
-
Strong community engagement and discussion
-
Reinforces Frameworkâs reputation as the user-first laptop company
Even as a community-driven accessory, this would be a visible statement.
Limitations and honest trade-offs
Limitations
-
Not a drop-in enterprise TPM replacement
-
Does not satisfy Microsoft-style attestation requirements
-
Initial scope likely Linux-first
Why thatâs acceptable
-
Framework users already value control over compliance
-
WebAuthn/passkeys enable cross-platform usefulness
-
Enterprise features can be layered later if desired
Why this matters beyond Framework
Many laptops:
-
Have no TPM
-
Have TPM 1.2 only
-
Have locked-down firmware
-
Are still perfectly usable hardware-wise
A built-in, user-owned vault could extend the usable lifetime of millions of devices, aligning with sustainability goals far beyond a single product line.
Open questions for the community
Questions for users
-
Would you prefer an internal security module over USB dongles?
-
How important is portability of your keys between laptops?
-
Would phone-based approval feel acceptable or preferable to USB keys?
-
What would make you trust such a module?
Questions for engineers / hackers
-
Would open firmware and reproducible builds be a requirement for you?
-
How do you feel about TPM coexistence vs. replacement?
-
Would an M.2-based module be acceptable, or would you prefer an Expansion Card?
-
What security assumptions would you not be willing to make?
Closing thought
Framework proved that laptops donât have to be disposable or locked down.
This proposal asks a simple follow-up question:
If users can own and repair their hardware,
shouldnât they also own and control their digital keys?