About NubiferOS

A specialized Linux distribution for cloud engineers who manage multiple accounts

NubiferOS is a specialized Linux distribution designed for cloud engineers who manage multiple cloud accounts—whether across the same provider or different ones. Built on Debian 12, it provides workspace isolation, secure credential management, and visual context indicators that prevent costly mistakes.

Why It Exists

Cloud engineers face real risks every day:

ProblemRiskHow NubiferOS Helps
Wrong accountRunning terraform destroy in productionWorkspace isolation prevents accidental cross-account operations
Credential leakageSecrets exposed in environment variablesGPG encryption + on-demand injection
Setup timeDays configuring a new machine50+ tools pre-installed, ready in 30 minutes
No contextWhich account am I in right now?Visual indicators show active workspace
Destructive commandsAccidental aws ec2 terminate-instancesRead-only mode blocks writes until unlocked

The Name

Nubifer (NOO-beh-fehr /ˈnuː.bɛ.fɛr/) comes from Latin meaning "cloud-bearer"—fitting for a workstation designed to carry your cloud workloads safely.

Design Philosophy

1. Security First

We use battle-tested tools like GPG and pass rather than inventing our own encryption. Your credentials are protected by proven technology that has been audited for decades.

2. Proven Over Novel

We integrate the best existing tools rather than building custom solutions:

NeedOur ChoiceWhy
Credential encryptionGPG + pass25+ years of security audits
Workspace isolationFirejailLightweight, proven namespaces
Display securityWaylandModern isolation, no keylogging
Disk encryptionLUKSIndustry standard, hardware-accelerated

3. Transparency Over Obscurity

All code is open source under GPL-3.0. You can audit every line that touches your credentials. No hidden components, no telemetry, no data collection.

4. Prevent Disasters

Workspace isolation significantly reduces the risk of wrong-account operations. Read-only mode lets you lock workspaces to block destructive commands. Visual indicators ensure you always know which account is active.

Technical Foundation

ComponentTechnologyPurpose
Base SystemDebian 12 (Bookworm)Stable, well-supported foundation
DesktopGNOME with WaylandModern display isolation
Disk EncryptionLUKS1 (mandatory)Protect data at rest
Credentialspass + GPG + GNOME KeyringThree-layer encryption
IsolationFirejail namespacesWorkspace separation
Access ControlAppArmor profilesLimit application permissions
FirewallUFW + fail2banNetwork protection

Roadmap

v1.0 Nimbus (Alpha)

Target: Individual cloud engineer, local workstation

FeatureStatus
Core workspace isolation✅ Complete
Credential management (GPG + pass)✅ Complete
Pre-configured tools (50+)✅ Complete
LUKS1 full disk encryption (mandatory)✅ Complete
Basic documentation✅ Complete
Wayland display isolation✅ Complete
AppArmor security profiles✅ Complete

v1.5 Stratus (Beta)

Target: Power users, multi-machine workflows

FeatureStatus
Single-password boot (keyfile in initramfs)🔄 Planned
Multi-machine credential sync via git🔄 Planned
Enhanced documentation🔄 Planned
Community feedback integration🔄 Planned
Hardware security key support (YubiKey)🔄 Planned

v2.0 Cumulus

Target: Small teams (5-20 engineers)

FeatureStatus
TPM 2.0 + PIN boot option📋 Planned
LUKS2 with Argon2id (GPU-resistant)📋 Planned
Team configuration management📋 Planned
Optional audit logging📋 Planned
Golden image support📋 Planned
Container-based workspaces (Podman)📋 Planned
Encrypted backup system📋 Planned

v3.0 Cirrus

Target: Enterprise deployments

FeatureStatus
Secure Boot enforcement📋 Future
MicroVM-based workspaces (Firecracker)📋 Future
Centralized management📋 Future
SSO/OIDC integration📋 Future
Compliance reporting📋 Future
Zero-trust networking📋 Future
Advanced threat detection📋 Future
Enterprise support options📋 Future

Boot Security

Currently, NubiferOS requires a LUKS passphrase at every boot. Future versions will offer:

OptionSecurity LevelUXBest For
Current (v1.0)HighPassword at bootSecurity-focused users
Keyfile (v1.5)HighSingle passwordGeneral use, VMs
TPM + PIN (v2.0)Very HighPIN at bootEnterprise, high-security

Out of Scope

These features are intentionally not planned:

FeatureReason
Real-time monitoringUse existing tools (Datadog, Grafana)
Cloud cost analysisUse cloud provider tools
Custom cloud APIsUse official SDKs
Gaming supportNot our target audience
Unencrypted installationLUKS is currently required (may be optional for cloud/VM deployments in future)

Open Source

NubiferOS is fully open source under the GPL-3.0 license.

ResourceLink
DownloadGet NubiferOS
FeaturesWhat's included
Why NubiferOS?How we compare
SecuritySecurity architecture
NubiferAIAI-native cloud operations
Built with AIOur development story
CommunityJoin Discord
Source CodeGitHub Repository
IssuesReport a Bug