// capabilities
Every component engineered for zero-trust environments where reliability is non-negotiable.
Read-only squashfs base with a persistent overlay. The core system cannot be modified at runtime — only via verified OTA updates.
Dual system slots enable zero-downtime OTA updates. Automatic rollback after 3 failed boot attempts protects against bad updates.
AES-XTS with 512-bit keys on every partition. Server tokens unlock system; user PIN derives keys for personal data via PBKDF2.
Central enrollment, provisioning, and health monitoring. Manage thousands of devices from a single API with revoke and suspend controls.
17+ component tests covering CPU, GPU, storage, memory, and network. Health scoring from 0–100 with automated reporting to fleet.
Network recovery re-provisions from fleet server. Safe mode bypasses overlay. Manual rollback reverts to previous system slot.
Remote debug sharing via encrypted HTTP. Capture boot logs, install traces, and system diagnostics — streamed to your log receiver.
Custom XFCE theme with cyan glow borders, wireframe icons, compositor effects, and a purpose-built wallpaper. Beauty meets function.
// encryption architecture
Every byte on disk is encrypted. Two independent key domains isolate system integrity from user privacy.
System token read from /boot, HMAC-SHA256 signature verified, expiry checked. Expired tokens accepted for key extraction; invalid tokens halt boot.
Server-provided AES key extracted from token payload. System partition unlocked via LUKS. On failure, recovery mode initiated.
SHA-256 hash of squashfs image compared against signed manifest. Mismatch triggers automatic rollback to alternate slot.
Read-only squashfs as lower, apps partition as persistent upper. User config and PAM hooks injected. switch_root to systemd.
User enters PIN at LightDM login. PBKDF2-HMAC-SHA256 derives 64-byte key from PIN + certificate fingerprint + salt. Unlocks data, appdata, and swap.
Fleet-issued, time-limited token contains encrypted LUKS key. Automatic at boot — no user interaction required. Unlocks system and apps partitions.
Knowledge factor entered at login. Combined with device certificate fingerprint via PBKDF2 to derive unique encryption key for personal data.
// fleet management
Enroll, provision, monitor, and update every device from a single control plane.
Tokens auto-refresh on device checkin. Expired tokens still decrypt (key is valid) — only tampered tokens are rejected. Revoked devices get empty token response, locking system on next boot.
// system architecture
A vertically-integrated boot chain from GRUB to desktop, engineered for integrity at every layer.
version: 2.9.30
verified: true
boot_attempts: 0
status: running
version: 2.9.28
verified: true
boot_attempts: 0
status: standby
User-installed packages and config changes write to the overlay upper on the Apps partition. The base system image is never modified. Safe mode boots with a tmpfs overlay, bypassing all user modifications. Factory reset wipes the overlay, restoring pristine state.