Security

Understanding NubiferOS security architecture

Security is the foundation of NubiferOS, not an afterthought. We publish our threat model so you can verify our claims.

Security Layers

NubiferOS implements defense in depth with eight security layers:

┌─────────────────────────────────────────────────────┐
│  Application Sandboxing (Firejail)                 │
├─────────────────────────────────────────────────────┤
│  Credential Encryption (GPG/pass)                  │
├─────────────────────────────────────────────────────┤
│  Desktop Isolation (Wayland)                       │
├─────────────────────────────────────────────────────┤
│  Mandatory Access Control (AppArmor)               │
├─────────────────────────────────────────────────────┤
│  Kernel Hardening & Firewall                       │
├─────────────────────────────────────────────────────┤
│  CPU Security Mitigations                          │
├─────────────────────────────────────────────────────┤
│  Full Disk Encryption (LUKS)                       │
└─────────────────────────────────────────────────────┘

Documentation

Quick Summary

What We Protect Against

✅ Credential theft from disk ✅ Cross-account credential access ✅ Accidental destructive operations ✅ Keylogging between applications ✅ Supply chain attacks

What We Partially Mitigate

⚠️ CPU side-channel attacks (kernel mitigations enabled) ⚠️ Cold boot attacks (LUKS encryption, kernel hardening) ⚠️ Application-level exploits (sandboxing limits blast radius) ⚠️ Network-based attacks (firewall, fail2ban)

What We Don't Protect Against

⚡ Hardware keyloggers and DMA attacks ⚡ Nation-state actors ⚡ Firmware and UEFI attacks ⚡ Social engineering ⚡ Compromised cloud providers

Security Tools

We use battle-tested, audited tools rather than custom solutions:

ToolPurposeIn Use Since
GPGCredential encryption1999
passPassword management2012
FirejailApplication sandboxing2014
AppArmorMandatory access control2007
WaylandDisplay isolation2012
LUKSDisk encryption2004

Source Code


Threat Model

What NubiferOS protects against and explicit security boundaries

Disk Encryption

Understanding LUKS encryption in NubiferOS and planned improvements

Credential Security

How NubiferOS protects your cloud credentials with multi-layer encryption

Workspace Isolation

How Linux namespaces and Firejail prevent cross-account credential access