The UK's National Cyber Security Centre (NCSC), a part of GCHQ, has developed and launched a hardware security device named SilentGlass. This plug-and-play tool is designed to mitigate the often-overlooked threat of cyber espionage and data exfiltration through video display connections like HDMI and DisplayPort. The device functions as a data diode for video signals, ensuring that only the intended display data can pass from the computer to the monitor, while actively blocking any other form of data transmission in either direction. The NCSC has already deployed this technology in high-threat UK government environments and is now commercializing it through a partnership with Goldilock Labs and the Sony UK Technology Centre to make it available to the broader public and private sectors.
Modern monitors are no longer simple display devices; they are complex systems with their own processors, memory, and firmware (System-on-a-Chip or SoC). This complexity creates a new attack surface. A compromised monitor could potentially:
Video interfaces like HDMI and DisplayPort include auxiliary data channels (e.g., DDC/CI, CEC, Ethernet over HDMI) that are designed for legitimate purposes like controlling monitor settings or network connectivity, but can be abused by attackers. SilentGlass is designed to completely sever these auxiliary channels, creating a one-way, video-only physical link.
SilentGlass is effectively a hardware-enforced data diode specifically for video signals. It sits physically between the host computer's video output and the monitor's video input.
Its operation is based on a simple but powerful principle: it only allows the unidirectional flow of pixels. The device physically lacks the circuitry to transmit data on the auxiliary channels of the HDMI or DisplayPort standards. This isn't a software block that could be bypassed; it's a physical hardware limitation.
T1114 - Email Collection, T1115 - Clipboard Data, T1113 - Screen Capture (Prevents a compromised monitor from exfiltrating this data).T1094 - Custom Command and Control Protocol (Prevents use of video cable auxiliary channels for C2).The development of SilentGlass addresses a niche but critical security gap, particularly for organizations handling highly sensitive information, such as government agencies, defense contractors, financial institutions, and R&D departments. For these organizations, the risk of a sophisticated hardware-based attack, while low in probability, is extremely high in impact.
By commercializing this technology, the NCSC is democratizing a high-assurance security control that was previously only available to nation-states. This allows corporations to protect themselves against advanced adversaries who might employ hardware-level attacks. The partnership with Goldilock Labs and Sony ensures that the device can be manufactured at scale and made available globally, raising the baseline for physical and hardware security in the private sector.
This article is about a defensive technology; there are no Indicators of Compromise.
This is a mitigation tool, not an attack. However, to identify systems that might need this protection, security teams could:
SilentGlass is a prevention and isolation tool. It doesn't detect attacks but rather makes a class of attacks impossible. The 'detection' is effectively the device blocking unauthorized data transfer by design. There is no response procedure other than noting that the security control worked as intended. Organizations deploying SilentGlass should document its presence in their system security plans and asset inventories.
SilentGlass is itself a mitigation control. It is designed to be a simple, robust, and foolproof way to secure the physical link between a computer and its display.
This tool is a prime example of Security by Design, removing the possibility of an attack vector through physical hardware constraints rather than relying on software that can be subverted.
D3FEND Techniques:
D3-IOPR: IO Port Restriction: This is a hardware implementation of I/O port restriction, specifically for the non-video channels of a display interface.SilentGlass is a physical device that limits the functionality of hardware (display ports) to prevent abuse.
Mapped D3FEND Techniques:
This tool provides a form of micro-segmentation at the physical layer, isolating the video data stream from any other potential data channels.
SilentGlass is a perfect, hardware-enforced implementation of I/O Port Restriction. For organizations handling highly sensitive data—such as defense, intelligence, or critical R&D—the risk of a compromised peripheral device cannot be ignored. The recommendation is to deploy SilentGlass on any workstation or in any conference room where classified or business-critical information is displayed. This is not a solution for every desktop, but a targeted control for high-value assets. By inserting SilentGlass between the computer and the monitor, the organization physically severs any potential command-and-control or data exfiltration channel that could be hidden in the auxiliary data streams of HDMI or DisplayPort. This provides a high level of assurance against sophisticated hardware-level attacks (e.g., a maliciously modified monitor) that would be invisible to traditional EDR or network security tools. It is a simple, non-configurable, and therefore highly reliable, security control.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats