English Français

CITADEL

Next Gen Subgraph OS

Adversary Resistant Computing

CITADEL

Next Gen Subgraph OS

Adversary Resistant Computing

Computing
for a Hostile Internet

Traditional operating systems accumulate security debt over time. Every installed application, every system update, every configuration change creates new attack vectors that persist indefinitely.

Citadel breaks this model entirely. Built from the ground up for users who face sophisticated adversaries, it provides strong isolation without the complexity of traditional air-gapped systems.

Core
Features

Tamper Resistant Foundation

The base Citadel system is completely read-only and protected by Linux's dm-verity filesystem integrity mechanism. If a single bit is modified, the system won't boot. Every restart returns to a cryptographically verified clean state.

Partitioned Workspaces

Create unlimited isolated "realms" for different projects, clients, or security contexts. Each realm operates as a completely separate computing environment with its own applications and data. Breach one realm, and the others remain untouchable.

Seamless Workflow

Despite the security architecture, applications from different realms can share your desktop. Visual indicators clearly distinguish which realm each window belongs to, maintaining security awareness without workflow disruption.

Atomic Updates

The entire base OS updates as a single signed binary blob. Updates are either fully applied or completely rolled back.

Verifiable Supply-Chain

Every component of Citadel builds reproducibly from known source code. Don't trust our binaries—verify them. Independent security researchers can compile identical binaries from the same sources, eliminating supply chain attacks.

Integrity Protection

dm-verity ensures the base OS won't boot if tampered with. Cryptographic verification protects against modification.

Defense In Depth

Citadel's security model is built on the principle that every layer should be independently verifiable and independently secure.

Foundation Layer:
Citadel Base

The minimal, immutable core that provides only essential services: kernel, init system, and graphics. No user applications, no persistent data, no configuration drift. Protected by cryptographic integrity verification.

Isolation Layer:
Hypervisor or Container Engine

Container-based realms offer near-native performance for trusted workloads. Hypervisor-based realms provide hardware-level isolation for high-risk activities like malware analysis.

Application Layer
User Realms

Completely isolated computing environments where your actual work happens. Each realm can only access its own data. Applications are read-only by default. Only user data persists across reboots.

Screenshots

See Subgraph OS in action

Who is it for?

Designed for users who require the highest levels of security and isolation

System
Administrators

Secure endpoints for privileged users at risk of targeted attacks

Software
Developers

Isolated development environments without cross-contamination

Security
Researchers

Safe analysis environments for malware and vulnerability research

Financial
Services

Secure workstations for executing sensitive financial transactions

Government

Compartmentalized computing for classified and sensitive operations

Embedded
Systems

Secure computing for vehicles, kiosks, and specialized hardware

Security
By Design

0 Persistent
Base Data
100% Reproducible
Builds
Isolated
Realms

Technical
Specifications

Base System

Distribution Base
Custom Linux build (not derivative)
Package Sources
Official upstream repositories
Init System
systemd
Display Server
Wayland
Desktop Environment
GNOME Shell
Filesystem Protection
dm-verity integrity verification
Update Mechanism
Atomic signed binary blobs

Realm Isolation

Container Engine
Linux namespaces + cgroups
Hypervisor
Custom Rust implementation
Guest Kernels
Modified Linux with reduced attack surface
Syscall Filtering
seccomp-bpf
Network Isolation
Per-realm virtual networks
File System Isolation
Separate mount namespaces
Process Isolation
PID namespaces + user namespaces

Build System

Build Reproducibility
100% reproducible from sources
Source Verification
Cryptographic signature checking
Build Environment
Isolated, deterministic containers
Toolchain
GCC/Clang with hardening flags
Binary Verification
Independent verification possible
Supply Chain
Direct from upstream repositories

Security Features

Boot Security
UEFI Secure Boot
Kernel Hardening
KASLR, SMEP, SMAP, Control Flow Integrity
Memory Protection
ASLR, stack canaries, heap protection
Compiler Security
Stack protector, fortify source, PIE
Runtime Protection
SELinux/AppArmor integration
Cryptography
Hardware crypto acceleration support

Minimum Requirements

CPU
Processor
x86_64 with virtualization
Intel VT-x or AMD-V
2+ cores recommended
RAM
Memory
8GB minimum
16GB recommended
32GB for multiple realms
SSD
Storage
32GB minimum
128GB recommended
NVMe for best performance

Hardware Compatibility

Feature
Container
Hypervisor
Intel VT-x
Required
AMD-V
Required
IOMMU
Optional
Recommended
TPM 2.0
UEFI Secure Boot
Required
Required
Graphics Acceleration
Native
Limited

Security Features

Filesystem Integrity

dm-verity provides cryptographic verification of every block in the base filesystem. Any tampering prevents boot, ensuring a pristine starting state.

Realm Sandboxing

Complete process, network, and filesystem isolation between realms using kernel namespaces or hardware virtualization.

Immutable Base

The core Citadel system is mounted read-only. No configuration drift, no persistent malware, no accumulated security debt.

Verified Boot Chain

UEFI Secure Boot through kernel loading ensures only cryptographically signed code executes during system startup.

Reproducible Builds

Every binary can be independently verified to match the claimed source code, eliminating supply chain compromise.

Hardware Security

TPM integration for cryptographic key storage and attestation. Hardware random number generation for strong entropy.

Proudly developed in

Montreal,
Quebec,
Canada

Proudly open source.

Get in Touch

We’d love to hear from you. Please email us info@subgraph.com.