Skip to content

juanitto-maker/GuardOS

Donate

GuardOS — AI‑Armored Personal Operating System (Open Source)

GuardOS hardens an individual computer (“cell”) using a layered (Onion) model:

  • Immutable base OS + verified boot
  • Strict app sandboxing & per‑app firewall
  • Local AI for anomaly detection + explainable prompts
  • Zero‑trust defaults, zero‑knowledge (opt‑in cloud)

Goal: “Military‑grade” resilience for everyday users, without breaking normal computing.

Why GuardOS?

Traditional security focuses on the perimeter. Modern attacks move across layers: firmware, boot, OS, apps, network, cloud, and user. GuardOS defends each layer and binds them with a local AI (“Aegis”) that explains risk and suggests safe actions.

Core Principles

  • Local‑first AI (offline by default)
  • Zero trust on a single machine
  • Immutable base, atomic rollback
  • Explainable security prompts
  • Open, auditable, reproducible builds

Quick Links

📖 GuardOS Genesis

Want to understand how GuardOS was born, the philosophy behind it, and how the onion‑layer model evolved?

Read the full literal transcript here:
👉 GENESYS.mdGuardOS Genesis Log: Literal Transcript

Status

This is an early, community‑led project. Expect rapid iteration. Join us in discussions and issues.

🔐 Security Model

GuardOS is built with a comprehensive, layered defense architecture known as the Onion Security Model, tackling modern threats such as:

  • Physical device seizure & forensic extraction (e.g., GreyKey)
  • Remote 0-click malware (e.g., Pegasus)
  • Firmware/BIOS-level implants
  • TLS interception and certificate injection
  • AI-based surveillance (e.g., Recall, Copilot, Gemini)
  • Stalkerware, USB malware, SS7 modem exploits

👉 Read the full GuardOS Security Model →

💬 Community & Support

Want to ask questions, share ideas, or get help with GuardOS?

Join the official GitHub Discussions:
👉 GuardOS Discussions

This is the place to:

  • Ask for help or clarification
  • Share feature requests and ideas
  • Follow project updates
  • Connect with other contributors

We're building GuardOS together — your input is welcome!

💡 For bug reports or technical issues, please use Issues.

Security


🚧 Project Progress [Updated: Sept 12, 2025]

📍 See full ROADMAP.md →

  • ✅ v0.1: Core architecture, SECURITY_MODEL.md, and Aegis AI concept drafted
  • ✅ Reference hardware selected: ThinkPad X230, T480, Framework 13
  • ✅ Community feedback loop started (Reddit + GitHub)
  • 🔄 v0.2: Nix flake + profiles under development (profiles/dev-test.yaml)
  • 🔄 v0.2: Flatpak sandboxing + per-app firewall config ongoing
  • 🔄 v0.2: Contributor onboarding docs being drafted
  • 🧪 v0.3: QEMU bootable ISO in planning stage
  • 🧠 Looking for contributors on:
    • Aegis watchdog shell scripting (detection + logging)
    • Flatpak sandbox and firewall testing
    • Installer polish (build.sh)
    • Real-device reproducibility feedback

🚀 Enhanced Security Features

Dual Boot Options

GuardOS introduces an innovative dual-boot system with two security modes:

  • Simple GuardOS: Traditional bare-metal execution for maximum performance
  • GuardOS²Q+: Advanced virtualization mode running GuardOS within QEMU for ultimate security isolation

This unique approach allows you to choose the right balance of performance and security for your workflow. GuardOS²Q+ is particularly recommended for AI development, security research, and testing untrusted code.

Learn more about dual-boot options


🔍 Deep Dive: Security Q&A

Curious how GuardOS handles firmware implants, Android backdoors, censorship, or social engineering? Wondering why we chose Heads over Libreboot, or Flatpak over VMs?

👉 Read our comprehensive Security & Architecture Q&A — It answers hard questions, admits blind spots, and explains why GuardOS remains relevant even under digital authoritarianism.


🤝 How to Contribute

You don’t need to be a Nix guru — GuardOS welcomes help from all security-minded devs.

Good first tasks:

  • Improve the installer (build.sh)
  • Write or test watchdog scripts (Bash/Python)
  • Suggest new security hardening techniques
  • Test reproducibility on real hardware
  • Translate documentation

Check issues labeled good first issue or open a discussion.


☕ Like it? Support the project at ko-fi.com/guardos

License

See LICENSE. SPDX: GPL-3.0-or-later

🙏 If you believe in privacy-first computing, support GuardOS on Ko‑fi.

About

No description, website, or topics provided.

Resources

License

Code of conduct

Contributing

Security policy

Stars

Watchers

Forks

Releases

No releases published

Sponsor this project

Packages

No packages published