The UK's National Cyber Security Centre (NCSC), part of GCHQ, has announced the commercial launch of its first hardware product, a security device named SilentGlass. This plug-and-play gadget is a hardware-based data diode designed to protect against cyberattacks transmitted through video display cables. Available for both HDMI and DisplayPort connections, SilentGlass physically blocks any non-video data from passing between a computer and its monitor, effectively preventing malware injection or data exfiltration through the display interface. The NCSC developed the intellectual property and has licensed it to the UK firm Goldilock Labs for manufacturing and global sales, in partnership with Sony UK. The device, already deployed in high-security UK government environments, is now being made available commercially to protect critical infrastructure and other organizations handling highly sensitive data.
Product Name: SilentGlass Developer: UK National Cyber Security Centre (NCSC) Commercial Partner: Goldilock Labs Function: A threat-agnostic hardware data diode for video connections. Interfaces: HDMI and DisplayPort.
SilentGlass works by sitting inline between a computer's video output and the monitor's input. It physically ensures that only a one-way flow of video signal can occur, blocking any bidirectional communication or covert data channels that could be used to compromise the monitor's firmware or exfiltrate data from the display's internal processors. The NCSC states that while such attacks are not common, modern displays are complex computing devices in their own right, making them an "attractive target" for sophisticated state-sponsored espionage actors.
The device is designed to mitigate a specific and advanced threat vector:
This type of attack is most relevant in high-security environments (government, defense, intelligence) where even the most obscure attack surfaces must be protected. The commercial release indicates a desire to provide this level of protection to critical national infrastructure and other high-value private sector targets.
The immediate impact of SilentGlass is the availability of a niche but powerful security control for organizations with extreme security requirements. It provides a physical, verifiable guarantee against a class of hardware-level attacks that software defenses cannot address. For government agencies and critical infrastructure operators, this can help secure air-gapped or highly sensitive systems from advanced threats. The commercialization of NCSC-developed technology also represents a new model for government cybersecurity agencies to transition research into tangible products for the wider market, potentially raising the defensive baseline for key industries.
As a plug-and-play device, deployment is straightforward, requiring no software installation or complex configuration.
SilentGlass is itself a mitigation. It falls under the category of hardware-based security controls that enforce network segmentation and data flow policies at a physical level.
New article provides deeper technical analysis of NCSC's SilentGlass, detailing how it blocks HPD and I2C/DDC bus exploitation, and linking it to MITRE ATT&CK T1200 for hardware-based cyber threats.
The device itself is a hardware control that limits the functionality of I/O ports (HDMI/DisplayPort) to prevent bidirectional data flow.
Mapped D3FEND Techniques:
SilentGlass acts as a micro-segmentation device or data diode, isolating the computer from the monitor's compute capabilities.
Mapped D3FEND Techniques:
SilentGlass is a physical implementation of the IO Port Restriction defensive technique, specifically tailored for video ports. For organizations handling highly sensitive information, such as defense contractors, intelligence agencies, or critical infrastructure operators, deploying this device provides a high-assurance countermeasure against an often-overlooked threat vector. The recommendation is to deploy SilentGlass on any workstation that processes classified or business-critical information. This includes operator consoles in SCADA environments, analyst workstations, and executive laptops. By physically preventing any data from being sent from the monitor back to the computer, it effectively neutralizes threats like compromised monitor firmware (e.g., BadUSB-style attacks over HDMI) or advanced data exfiltration techniques that leverage the display's internal hardware. It should be part of a defense-in-depth strategy for securing endpoints in high-threat environments.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats