The project is in a very early development stage and is not to be used with any sensitive data yet. We also don't have images available yet.
OnionBSD is an operating system that aims to preserve your privacy, security and anonymity. In a way, it's comparable to Tails, but not exactly:
- OnionBSD uses OpenBSD as the underlying OS (rather than
- OnionBSD is crafted with the philosophy that security can be used to enforce privacy;
- The default browser in OnionBSD - Chromium - is pledge()'d and unveil()'ed. But not to worry: the Tor Browser Bundle is included as well.
OnionBSD aims to be an alternative to Tails. Alternative in both the technical and philosophical way.
Short term goals
- Create the default XFCE flavour in two editions: live and installation.
- Make the default flavour as user-friendly as possible, so the average John Doe is able to use OnionBSD.
- Offer means to verify the OpenBSD components with the official project signature and the OnionBSD components via our signature.
- Write a wealth of information on proper and secure usage of the deep web.
Long term goals
- Use vmd(8) for further segmentation and isolation of processes - somewhat comparable with Qubes;
- Offer encryption with bioctl(8) for both the live and installed OnionBSD instances;
- Create an arm64 architecture version due to all the hassle with the x64 platform (looking at you, Intel);
- Offer a panic command, wiping and overwriting any and all data.
- Research whether it is possible to have the means to verify firmware verification of the host system.
Because Linux wouldn't be our choice (to put it mildly) for an application with the set of goals that Tails has. OpenBSD is a much more logical choice, as it has an extremist focus on security. Though security and privacy are often confused with one another, they are being completely different aspects. Eg, a system that offers anonymity (privacy) but is easy to break into (security) fails on both aspects.