Portable, powerful, and private — protect your apps and data anytime, anywhere.
Couldn't load pickup availability
Free Shipping
12-Month Warranty
Hardware-Isolated Secure OS: Built-in PlugOS protects your data at the hardware level Cross-Platform Compatibility: Works with Android, iOS, Mac, Windows via USB-C(Supports iPhone 15+, iPad, Mac PC(Apple Silicon M1+)and other Apple devices with standard Type-C interface) Plug-and-Play: No adapter, no extra display, no extra wires High Performance: Octa-core CPU, fast memory, seamless Android app support
PlugMate: Your Thumb-Sized Secure Computer
Overview
Specifications
PlugMate: Secure Android into any phone, tablet or computer
Redefining Portable Privacy Computing
Not a USB drive. A complete Android computer
8-Core CPU 4GB RAM 128GB Storage
Hardware-Level Mutual Isolation
Dual Authentication System
Cross-Platform
Plug-and-play across phone, tablet and computer
Android and iOS on iPhone
Full-Spectrum Privacy Control
Thumb-Sized, Fully Functional Computer
Private Computing. Anytime. Anywhere.
PlugMate is a fully functional Android computer, not a stripped-down device. It runs standard Android apps, supports video, audio, camera, maps, messaging, browsing, wallets, and productivity tools - just like a phone or tablet.
How is it possible: PlugMate contains its own processor, memory,and fully encrypted storage, while securely reusing peripherals from the connected phone or computer without exposing your data. This design keeps PlugMate incredibly small, while computation and data remain fully isolated.
Plug-and-Play
Supports the Google app ecosystem
(manual installation required)
Cross-Platform Compatibility
One device. Every platform.
PlugMate works across Android, iOS, Windows, and macOS ¹, Connects via Type-C to devices including phones, tablets, or computers with OTG support. Your private system, apps and data stay isolated and identical everywhere you go.
With one PlugMate, any Type-C device becomes your secure workstation.
¹ Supports iPhone 15+, iPad, Mac PC with Apple Silicon M1+, Android phone & tablet, and Windows PC.
Built for Security
Secure by Architecture, not by Promises
Hardware-Level Isolation
Your data lives only inside PlugMate.Encrypted.
With its own processor, memory and storage, PlugMate remains isolated from the host device. The only connection is a single Type-C interface, drastically reducing attack surfaces.
All data is encrypted by hardware at rest and is never exposed.
Chip-Level Dual Authentication
No Trust. No Boot
Before PlugMate starts, two secure-chip verifications must succeed:
Device authentication: PlugMate only boots when connected to an authorized device.
User authentication: only an authorized user can unlock and boot PlugMate.If either check fails, PlugMate simply does not boot and never decrypts your data.
This innovative pre-authentication boot process blocks:
Backdoors
Firmware tampering
Supply-chain attacks
Extreme Data Protection
Silent. Instant. Irreversible
PlugOS includes a duress password and brute-force self-destruction mechanisms. Under coercion or physical attack, your data protects itself instantly and permanently.
Designed not just for privacy, but for personal safety.
Password ErrorSelf-Destruct
Duress PasswordSelf-Destruct
Privacy by Design
Your Data, Yours Only
PlugMate is built with privacy by design. Access, usage, and control of your data remain exclusively in your hands.
Privacy is not achieved by removing capabilities. It's achieved by giving you control over them.
Zero Data Collection
PlugOS is designed to collect no user data.
No Telemetry
No Remote Access
No Profiling
Sensor Virtualization
Integrated peripheral virtualization and anti-tracking technologies simulate or block sensors like GPS and SIM cards. This helps to prevent hardware fingerprint tracking and effectively thwarts eavesdropping attempts.
Transparent Network Control
The built-in system firewall allows you to monitor network access logs and block high-risk app connections. All network activity is made fully "visible" and "controllable" to you.
Local processing
The built-in apps, from the keyboard and browser to the app store, are re-engineered for complete data localization or privacy enhanced.
Used in Different Occasions
PlugMate isn't just for "privacy geeks", it's for anyone who needs a separate, trusted digital space that moves with them
Risk Isolation
Keep uncertain apps and activities away from your main device
Some apps are necessary but don't belong on your everyday phone — apps you don't fully trust or simply don't want mixed with your personal device. Installing them directly mixes unknown risk with your photos, contacts, and accounts.
PlugMate creates a hardware-level sandbox. By moving these apps to PlugMate, your main phone remains clean. Unplug the PlugMate, and the risk vanishes.
Keep Risk in PlugMate. Instant Reset. Zero Residue.
Your Apps Run Free. Your Main Device Stays Safe.
Data & Asset Protection
A hardened vault for high-stakes assets
Some moments carry higher stakes than everyday use. Credentials, sensitive data, and digital assets demand stronger guarantees than software protection alone.
PlugMate creates a physical security boundary. Your data and assets stay protected inside its own trusted system, independent of your phone or computer.
View Sensitive Files. Not on Your Device.
High-Stakes Apps. Physically Secured.
Private Moments. Belong on a Private Device.
Cross-Platform Freedom
One Android system across all your devices
You may love iPhone or Mac hardware, but closed ecosystems limit flexibility. Carrying a second phone is an awkward compromise.
PlugMate bridges the gap. Plug it into any Type-C phone or computer and instantly access a full Android system. Get the freedom of a second phone without the bulk.
Android on Your iPhone. No Second Phone Needed.
Make any PC into your private workplace.
Workspace moves with me. Any device, anytime.
Personal Control & Privacy
A system that you fully own and control
Privacy is about control — when a system runs, where data lives, and who can access it. Always-on devices and managed environments take that control away.
PlugMate is your "ghost" system. The system, the apps, and their behavior exist only on your terms and under your control. Plug it in when you choose. Unplug it, and everything stops.
Unplug, and everything disappears instantly.
Communicate securely, control your privacy.
Browse Privately. Surf Anonymously.
PlugMate vs Traditional Solutions
Comparison
Traditional Solutions
PlugMate
USB Live OS
OS that only boots on PCs.
Thumb-sized device running a full Android system on phones or PCs.
Secure Mobile Phone
Requires carrying a second phone.
One portable device creates a separate system anywhere.
Secure Laptop
Requires carrying a full laptop.
Portable secure workspace on any compatible device.
Encrypted USB
Only encrypts and stores files
Runs a full OS and apps in an isolated environment.
Designed Around Real Use
Plug and Play
Continuous use
Careful Protection
Simultaneous Use
Specifications
Model
PS01
Processor
MediaTek Helio G80
RAM
4GB
Storage
128GB
OS
PlugOS (based on Android 14)
Interface
Type-C male 480Mbps
Power supply
USB DC5V 1A (Max)
Material
Aluminum + PC
Product size
50mm * 19mm * 8mm
Product weight
14.3g
Certificate
FCC、 CE、 RoHs、MFI
Supported Devices
USB-C devices1
1 iPhone 15+, iPad, Mac PC with Apple Silicon Ml+, Android phone & tablet, and Windows PC
PlugMate is built by a team with a proven record in audited, certified secure systems. Independently verified across security, privacy, quality, and compliance standards.
PlugMate runs PlugOS inside its own hardware and no PlugMate data is stored on the host device. The client app simply provides a window to display the PlugMate workspace and reuse the host's screen, keyboard, and network.
No.
TrustKernel is committed to not collecting any user data. PlugMate is designed with user privacy as its core principle. The system does not collect, transmit, or analyze any user data. All data remains fully under the user’s control, ensuring complete privacy and information security.
PlugMate is designed to provide an independent and secure execution environment for sensitive operations, even when the host device is untrusted or operating in a high-risk environment.
Even if the host device (phone or computer) is infected with malware, PlugOS prevents direct access to the data stored or processed inside PlugMate, including both data at rest and data in use. The client application also includes runtime environment security checks that help reduce the risk of common application-level attacks, such as screen capture, screen recording, or code injection.
Our threat model assumes that the host device is controlled by the user but may be operating in an exposed environment (for example, with potential malware risk), rather than being fully compromised at the kernel level before connection. If a user believes that a host device has been completely taken over (for example, due to a persistent kernel-level compromise), no security mechanism that depends on that device can provide reliable protection. In such cases, replacing the host device is recommended.
PlugMate is designed to be used across multiple phones and computers. Your secure environment moves with PlugMate itself, rather than depending on any single host machine.
Smooth and cool for daily use.
PlugMate has its own processor and memory, optimized for privacy-focused workflows and everyday tasks. Thanks to efficient hardware and power design, it generates only mild warmth during extended use and remains safe to handle.
Only a small amount.
PlugMate draws power from the host device but is designed for low-power operation. In typical use, the additional battery consumption is modest and depends on usage patterns, apps, and the host device.