Hawser is a native SSH, SFTP, FTP and Telnet client with a local encrypted vault and optional zero-knowledge cloud sync. Heavy-duty connection that stays moored.
No more switching between iTerm + Cyberduck + 1Password. Hawser handles SSH, SFTP, FTP, Telnet, plus your credentials, in one native binary.
Native Rust SSH engine. Sub-millisecond keystroke latency, no Electron overhead, no JS bridge. Your terminal feels local even on a transatlantic link.
One UI for every transfer protocol. Drag-and-drop file transfers, side-by-side panes, dashboard for Docker and Kubernetes hosts.
SSH keys, passwords, host configs. AES-256-GCM at rest, Argon2id key derivation. No cloud dependency — your secrets stay on your disk.
Optional. Off by default. The server stores opaque ciphertext — we cannot decrypt your vault, even if compelled by court order.
Every save snapshots the previous version, kept locally. Roll back any corruption (cloud sync collision, disk hiccup) in one click. 5 versions retained.
Replay any past terminal session with full ANSI fidelity. Useful for incident postmortems and onboarding new engineers.
Mockups based on the current build — final UI may evolve before public release.
Native xterm-compatible engine, ANSI 256-color theme tuned for readability on dark.
Hosts, SSH keys, secrets, TOTP codes — all in one .ivault file. Touch ID unlock.
Two-pane local/remote, drag-and-drop transfers with live queue and per-file progress.
Live stack overview from the SSH session: CPU, memory, network, container health.
Hawser is designed under a strict threat model: the server is hostile, your laptop may be lost, and credentials must survive both.
The master key never leaves your devices. Cloud sync only sees AES-256-GCM ciphertext. Even with full server access, an attacker gets opaque blobs.
Stealing your sync account password lets an attacker download your ciphertext. Without the (separate) vault password, it stays unreadable.
Every save creates a new version, both locally (5 last) and on the cloud (30-day window). Corruption rolls back instantly.
The .ivault format is documented and shared across the ILYGO suite. Export, audit, script — your data is portable.
Master keys live in zeroized memory, scrubbed on drop. Auto-lock after configurable idle. No JS heap leaks.
Rust core, no Electron. Crypto via the RustCrypto org — battle-tested aes-gcm and argon2.
Same job, different priorities. Here's where we draw the line.
| Hawser | Termius | Royal TSX | iTerm + 1Password | |
|---|---|---|---|---|
| SSH / SFTP / FTP / Telnet | All four | Yes | Yes | SSH only |
| Native (no Electron) | Rust | Electron | Native | Native |
| Zero-knowledge sync | Yes | Server-side encryption | No | Via 1Password |
| Vault format open | Yes | No | No | No |
| Docker & K8s dashboards | Built-in | No | Plugin | No |
| Cross-platform | macOS first · Win/Linux soon | Yes | macOS only | macOS only |
| Local-first | Yes | Cloud-first | Yes | Yes |
| Price (single user) | Free desktop · Sync from 4€/mo | 10€/mo | 99€ one-time | 2 apps to buy |
Three steps. The server learns nothing about your vault contents.
The server's source code is open. Read it on GitLab to verify the zero-knowledge claim yourself.
Native binaries are in the works. The desktop app will be free; cloud sync is optional and starts free for 1 vault.