Please lets elaborate in more details into your plans mentioned on the:
A 19" networked HSM server
Please let me know, how security behind a networked key storage is provided?
Shall not a key storage be local for the host? If networked is possible then cloud too? Do you have a link on detailed description?
Physical data media destruction service (shredding)
Can you add a method to destroy HSM device with a verification by calling its some API to do so? If I remember correctly there were some IBM developments to do programmatically destroyable chips?
Merging FIDO2 capabilities with those of Nitrokey Pro and Nitrokey Storage, including a touch button
Do you have an idea of when it is possible to happen? non obligatory just a very approximated estimate like ±1 year, say 2021 or 2022?
Can you please keep producing Nitrokey Pro edition which is not flash-able by customer like it is now to avoid someone to replace the firmware silently. Do you provide some method to verify and display a firmware checksum even for a device not supporting firmware re-flashing to be sure it has a good version free of bugs?
What if even your company gets hacked for a while and we get a bunch of non re-flashable modules infected by some trojan on the market or already purchased local re-flashable keys are silently infected by a bad firmware if your master signature key is stolen sometimes?
What do you think about your company being able to defend at least itself from following threats:
A general-purpose secure server with Coreboot and Heads preinstalled, Measured Boot, deactivated Intel ME
Which HEADS do you refer in the context of this sentence? I know a linux distro named heads and it seems there was some firmware like related project with such name too.
Nitrokey with Bluetooth interface
Is not wireless device less secure than general USB?
What about more secure (than USB) PCI express bus?
Have a great 2020!
What about post quantum algos?
There are other company who already produce post quantum HSMs.