Skip to content
Open Secure-K OS is an operating system booting from a USB key in which you can safely create and store your personal and private data. It is a next generation live operating system following liveng patterns. Please refer to Resilient Linux, a fork of Open Secure-K OS which is actively developed.
Branch: master
Clone or download

Latest commit

Latest commit 2c334e6 Dec 31, 2019


Type Name Latest commit message Commit time
Failed to load latest commit information.
live-build Correct pinning preference Dec 21, 2018
screenshots Open Secure-K OS initial ISO image Oct 22, 2018
ABOUT.rst README and ABOUT dcos Oct 16, 2018
LICENSE Initial commit Oct 11, 2018
README.rst Update README.rst Dec 31, 2019


Open Secure-K OS

What is

Open Secure-K OS is an operating system booting from a USB key in which you can safely create and store your personal and private data. It is an advanced Debian Stretch Linux-based live USB operating system built for security: user and system data are saved encrypted within the USB key (AES 512bit), so the system can be used as a clean and safe environment for your on-line security-critical activities. Moreover Open Secure-K OS does not rely on the PC hard drive and, being a Linux derivative, it’s immune to most viruses and it’s spyware / adware / backdoor free.

Open Secure-K OS features a unique partitioning scheme - it is liveng-compliant (, -, which allows complete system and kernel update with a readonly system partition. GRUB is the bootloader for both BIOS and UEFI; the Linux Foundation’s preloader assures the Secure Boot compliance.

Unique system features are:

  • native encrypted persistence;
  • kernel update (on a ISO9660 filesystem, which is the best option for a live operating system because of its strength against data corruption and tampering);
  • UEFI, with UEFI Secure Boot compatibility, with a real efi partition;
  • user creation wizard upon the first boot. Live operating systems use to have the “live” user already created, while Open Secure-K OS pops up the Initial Setup interface in order to create one, together with language, keyboard and time zone.
None of the existing ISO9660-based live operating systems except Open Secure-K OS provides a kernel update feature.

At the end of the day, Open Secure-K OS is thought as a the most solid and secure base for your own live operating system - you can customize it at your will (only the very basic programs are installed by default).

Resilient Linux is a hard-drive installable operating system built upon Open Secure-K OS. Open Secure-K OS served as a proof of concept for the liveng technology and wont' be developed any more. Please refer to Resilient Linux, which is actively developed and can also be used as a live system.




How to build the initial ISO image

A Debian Stretch host is required for the build (64 bit preferred); other Debian-derived systems may work.

The Open Secure-K OS ISO image is built using the standard Debian live-build framework, so you first need to install it:

apt-get install -y live-build

Git clone this project as root.

In order to build a Secure-K OS image, open the terminal emulator as root:

cd /path/to/open-securekos/live-build
bash lb

A .iso image will be built according to your host architecture (if building on an amd64, a 64bit iso will be produced; an i386 iso will be built on i386 hosts).

Download a ready-to-use image

An already-built ISO image is also available, see this repository's Releases (

How to deploy

Open Secure-K OS Deployer ( is the deployment system for writing the initial Open Secure-K OS ISO image onto a USB key - it will create the liveng partitioning scheme: run the Deployer, select the image you have built (or downloaded) and type in a passphrase of your choice for LUKS-encrypting the data persistence partition (remember: Open Secure-K OS features native encrypted persistence), then click on Write. Deployer will write the Open Secure-K OS ISO image onto all the plugged-in (and listed) USB devices, thus creating the complete Open Secure-K OS operating system.

Some Open Secure-K OS notes:

  • use sudo for super-cow powers;
  • during the boot, you will be asked for the decryption password of the data persistence partition - the secret you enter while deploying;
  • system user will be created upon the first boot;
  • [only for 32 bit builds] a GNOME Initial Setup bug triggers a crash if setting the network in the Initial Setup interface. In this case, just reboot the system.
You can’t perform that action at this time.