Skip to content
Open Secure-K OS is an operating system booting from a USB key in which you can safely create and store your personal and private data. It is a next generation live operating system following liveng patterns. Here you can find the live-build code for building the initial operating system image.
Shell
Branch: master
Clone or download
Latest commit 173cc42 Dec 21, 2018
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
live-build Correct pinning preference Dec 21, 2018
screenshots Open Secure-K OS initial ISO image Oct 22, 2018
.gitattributes
ABOUT.rst README and ABOUT dcos Oct 16, 2018
LICENSE
README.rst README Dec 21, 2018

README.rst

Open Secure-K OS

What is

Open Secure-K OS is an operating system booting from a USB key in which you can safely create and store your personal and private data. It is an advanced Debian Stretch Linux-based live USB operating system built for security: user and system data are saved encrypted within the USB key (AES 512bit), so the system can be used as a clean and safe environment for your on-line security-critical activities. Moreover Open Secure-K OS does not rely on the PC hard drive and, being a Linux derivative, it’s immune to most viruses and it’s spyware / adware / backdoor free.

Open Secure-K OS features a unique partitioning scheme - it is liveng-compliant (https://github.com/LumIT-Labs/liveng, https://liveng.readthedocs.io) -, which allows complete system and kernel update with a readonly system partition. GRUB is the bootloader for both BIOS and UEFI; the Linux Foundation’s preloader assures the Secure Boot compliance.

Unique system features are:

  • native encrypted persistence;
  • kernel update (on a ISO9660 filesystem, which is the best option for a live operating system because of its strength against data corruption and tampering);
  • UEFI, with UEFI Secure Boot compatibility, with a real efi partition;
  • user creation wizard upon the first boot. Live operating systems use to have the “live” user already created, while Open Secure-K OS pops up the Initial Setup interface in order to create one, together with language, keyboard and time zone.
None of the existing ISO9660-based live operating systems except Open Secure-K OS provides a kernel update feature.

Secure-K OS is built upon Open Secure-K OS.

At the end of the day, Open Secure-K OS is thought as a the most solid and secure base for your own live operating system - you can customize it at your will (only the very basic programs are installed by default).

Screenshots

screenshots/open-securek-os.1.png

screenshots/open-securek-os.2.png

Contribute to the project

Open Secure-K OS is a free and open source project; code and documentation contributions are welcome.

Open Secure-K OS is a LumIT Labs project.

How to build the initial ISO image

A Debian Stretch host is required for the build (64 bit preferred); other Debian-derived systems may work.

The Open Secure-K OS ISO image is built using the standard Debian live-build framework, so you first need to install it:

apt-get install -y live-build

Git clone this project as root.

In order to build a Secure-K OS image, open the terminal emulator as root:

cd /path/to/open-securekos/live-build
bash lb

A .iso image will be built according to your host architecture (if building on an amd64, a 64bit iso will be produced; an i386 iso will be built on i386 hosts).

Download a ready-to-use image

An already-built ISO image is also available, see this repository's Releases (https://github.com/LumIT-Labs/open-securekos/releases).

How to deploy

Open Secure-K OS Deployer (https://github.com/LumIT-Labs/open-securekos-deployer) is the deployment system for writing the initial Open Secure-K OS ISO image onto a USB key - it will create the liveng partitioning scheme: run the Deployer, select the image you have built (or downloaded) and type in a passphrase of your choice for LUKS-encrypting the data persistence partition (remember: Open Secure-K OS features native encrypted persistence), then click on Write. Deployer will write the Open Secure-K OS ISO image onto all the plugged-in (and listed) USB devices, thus creating the complete Open Secure-K OS operating system.

Some Open Secure-K OS notes:

  • use sudo for super-cow powers;
  • during the boot, you will be asked for the decryption password of the data persistence partition - the secret you enter while deploying;
  • system user will be created upon the first boot;
  • [only for 32 bit builds] a GNOME Initial Setup bug triggers a crash if setting the network in the Initial Setup interface. In this case, just reboot the system.

What about Secure-K OS?

Secure-K OS is built upon Open Secure-K OS and improves its community counterpart in some ways.

Unique Secure-K OS features are:

  • anti-tampering measures performed during the bootstrap: a self-checking kernel component is also available, which is responsible of verifying that system files have not been tampered, preventing the virtualization of the image, the use of the init= kernel boot parameter, and so on;

  • unencrypted key’s partition for data exchange;

  • Backup & Restore – an optional encrypted real-time system backup: system can be restored to a new USB key, useful in case of key theft or loss. Backup is performed into the Secure-K OS' cloud;

  • Secure-Zone, which allows:

    • anonymous browsing;
    • encrypted textual, audio and video chat;
    • encrypted and signed emails exchange with ease: a program called Key Manager is able to generate and exchange GPG keys with a central keyserver. This allows everyone running a Secure-K OS to send encrypted emails to another Secure-K OS user without manually retrieving the GPG key: process is done automatically by the modified Evolution email client build, which runs on top of every Secure-K OS.
You can’t perform that action at this time.