Security Architecture

Air-Gapped Computers: When and How to Use Offline Systems for High-Value Secrets

May 11, 2026 8 min read Haven Team

An air-gapped computer has no network interfaces — or has had them physically disabled or removed. It has never connected to the internet, and it never will. For a narrow but important class of use cases, this is the only architecture that actually works. Understanding when it's warranted, and what real air-gapping requires, prevents both over-use and under-use.


The term "air gap" describes the literal gap of air between a sensitive system and any network. The concept predates modern computing — isolated systems have been used in classified environments since the Cold War. What changed in the past decade is that targeted attacks against air-gapped systems became a documented reality rather than a theoretical concern. Stuxnet, which destroyed centrifuges at Iran's Natanz nuclear facility, crossed an air gap. The attack vector was USB drives carried by contractors who had no idea they were ferrying malware.

That example reframes the question. Air-gapping isn't a passive property — something you achieve once and maintain automatically. It's an operational discipline that must be actively upheld, and the most common failure mode is the humans using the system, not the hardware.

Who Actually Needs an Air-Gapped Machine

Before building one, be honest about whether your threat model justifies the operational overhead. Air-gapped systems are difficult to use and easy to break without realizing it. The use cases that warrant them are genuine but narrow:

When air-gapping is overkill

If your threat model is a remote attacker exploiting a vulnerability in your browser or email client, disk encryption plus a patched system is the right tool. Air-gapping imposes significant operational cost for a threat profile that more targeted software controls address more practically.

What "Air-Gapped" Actually Requires

A laptop with Wi-Fi turned off in software is not air-gapped. The wireless card is still physically present, still runs firmware, and is one driver bug or firmware exploit away from being a radio transmitter. True air-gapping means:

The USB Transfer Problem

Air-gapped systems are useless if nothing can get in or out. But every data transfer is a potential attack vector. The Stuxnet case is instructive: the malware was engineered specifically to jump air gaps via USB and was seeded into contractor organizations' supply chains years before its payload activated.

Practical mitigations for USB transfers:

Air-gapping is a last line of defense — it's meant to survive the failure of every other security control. That's only useful if the gap is real.

Operating Systems for Air-Gapped Use

The OS matters. A Windows installation with a stale patch level is a worse starting point than a minimal Linux installation, even when both are air-gapped. Common choices:

OS Best For Notes
Tails (live USB) Short-session sensitive work Amnesic by default. No persistent state unless configured. Good for document review.
Debian minimal Persistent air-gapped workstation Requires manual hardening. Smaller attack surface than full desktop installations.
Qubes OS Compartmentalization alongside air-gapped VMs Supports air-gapped VMs with no network access inside a networked host. Splits the threat model differently.
Windows Not recommended Larger attack surface, telemetry concerns, more complex to audit.

Side-Channel Attacks Against Air-Gapped Systems

A sophisticated adversary with physical proximity to an air-gapped machine can extract data without any network connection through side-channel attacks — a genuine and documented research area, though not a practical concern for most threat models.

Demonstrated techniques include:

For virtually all non-nation-state threat models, these attack paths are not relevant. If they are in your threat model, you're operating at a classification level where purpose-built shielded facilities are the standard tool, not a home-assembled air-gapped laptop.

The Practical Air-Gapped PGP Setup

The most common legitimate use case for an air-gapped machine in the privacy community is PGP master key management. The recommended workflow:

  1. Generate the master certification key on the air-gapped machine using GnuPG.
  2. Generate subkeys (signing, encryption, authentication) — also on the air-gapped machine.
  3. Export public key and subkeys to a USB drive. Move the USB to a networked machine and import.
  4. Store the master key offline — on the air-gapped machine's encrypted disk, plus encrypted backups on separate media in separate physical locations.
  5. The networked machine never sees the master private key. Subkeys can be revoked and replaced if compromised without touching the master.

This model is used by Linux distributions, certificate authorities, and security researchers who sign releases. It separates the high-value secret (the master certification key, which establishes your identity) from the operational keys (subkeys used daily), limiting blast radius if a daily-use device is compromised.

If you're managing encrypted communications at scale — for a newsroom, an activist organization, or any group that handles genuinely sensitive material — combining an air-gapped key management system with an application-layer encrypted messaging solution gives you defense in depth: the key material is protected even if the messaging infrastructure is compromised.

Communications security that doesn't require heroics

Haven handles the cryptographic complexity so your team can focus on the work. Encrypted email and chat, one app.

Try Haven Free →