<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to Home</title><link>https://sourceforge.net/p/slarpx/wiki/Home/</link><description>Recent changes to Home</description><atom:link href="https://sourceforge.net/p/slarpx/wiki/Home/feed" rel="self"/><language>en</language><lastBuildDate>Mon, 20 Apr 2026 14:40:13 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/slarpx/wiki/Home/feed" rel="self" type="application/rss+xml"/><item><title>Home modified by Nixovena Linux &amp; AI Labs</title><link>https://sourceforge.net/p/slarpx/wiki/Home/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v9
+++ v10
@@ -1,468 +1 @@
-# HARDENED SLARPX
-Distribution: Hardened Slarpx Prototype
-Based on:  Debian(Stable)
-Version: 2.0
-Website/ Github/ SourceCode: will update
-Sha256sum: 9b11e0b52d7d1624e9a14dac91b46155e2642b5627ebcc293cd2c6b9a1ed16c2  
-
----
-
-## ⚠️ LEGAL NOTICE AND CRITICAL DISCLAIMER
-
-This document and the associated software (Slarpx) describe a system comprising highly experimental, high-risk, and aggressive security measures.
-
-1.  **NO WARRANTY:** This software is provided "AS IS". Developers shall not be held responsible for any hardware failures (e.g., reduced disk lifespan due to excessive I/O load), data loss (e.g., loss of encrypted disk keys), business interruptions, or legal liabilities resulting from the use of this system.
-2.  **INTENDED USE:** Slarpx is **NOT DESIGNED** for end-users, corporate office workers, or gamers. This system is designed for security research and security testing.
-3.  **MEDICAL/CRITICAL DEVICE WARNING:** Do not use this operating system in life-support units, nuclear facility control systems, or air traffic control, where a failure could result in fatal consequences. The "Active Kill" (Xennytsu) mechanism it contains immediately terminates any process it detects as a threat (even if critical).
-
----
-
-# CHAPTER 1: PHILOSOPHY AND THREAT MODEL
-
-For Slarpx, the only valid metric is **Minimization of the Attack Surface**.
-
-### 1.1 Design Principles
-*   **Security by Design:** Security is not a patch added later; it is the foundation of the system.
-*   **Default Deny:** Everything not explicitly permitted (network ports, file access, modules) is forbidden.
-*   **Active Hostility:** The system does not remain passive against unauthorized code running on it; it detects, slows down (Poison), and destroys them (Xennytsu).
-
----
-
-# CHAPTER 2: INSTALLATION GUIDE
-
-Installing Slarpx requires more meticulous preparation compared to standard Linux distributions.
-
-### 2.1 System Requirements
-*   **CPU:** 64-bit (x86_64/amd64) processor. (Virtualization extensions are recommended).
-*   **RAM:** Minimum 4GB (8GB+ recommended as Xennytsu and Poison perform in-memory analysis).
-*   **Storage:** Minimum 32GB SSD (HDD is not recommended; I/O performance is critical).
-*   **BIOS/UEFI:** After system installation, it is recommended to enable SECURE BOOT according to Debian documentation.
-
-### 2.2 Preparing Installation Media
-1.  **Download ISO File:** Obtain the `.iso` file from the official source.
-2.  **Integrity Verification:** Check the hash value of the downloaded file.

-    ```bash
-    sha256sum hardenedslarpx-1.0-amd64iso
-    # Must match the hash published by the developer.
-    ```
-3.  **USB Writing:** Write the ISO to the memory stick using the `dd` command. (Copy if using Ventoy, select "DD Image" mode if using Rufus).
-    ```bash
-    sudo dd if=slarpx.iso of=/dev/sdX bs=4M status=progress &amp;amp;&amp;amp; sync
-    ```
-
-### 2.3 Installation Steps
-1.  **Boot:** Start the system from the USB.
-2.  **Follow the steps of the Debian Installer**
-
-3.  **Disk Partitioning (CRITICAL):**
-    *   It is recommended to select the **Guided - Use entire disk and set up encrypted LVM** option.
-    *   An unencrypted installation renders Slarpx's security architecture (especially Coldboot protection) ineffective.
-    *   Set a strong "Passphrase" (at least 20 characters).
-
-### 2.4 First Boot After Installation (Post-Install)
-1.  Enter your LUKS password when the system starts.
-2.  Login (the default user is what you determined during installation).
-3.  First, check the system integrity:
-    ```bash
-    systemctl status xennytsu  # Should be Active (running)
-    systemctl status poison    # Should be Active (running)
-    ```
-
-Hardened Slarpx is a Headless system by default and has no desktop environment. 
-It is up to you whether to install a desktop environment or not, but for security, desktop environments using wayland are recommended, and avoid installing desktop environments termed as bloat.
-
-Labwc is a secure desktop environment compatible with Hardened Slarpx. Its attack surface is low and it runs over the wayland protocol.
-
-About Driver &amp;amp; Kernel Patches: Do not install Nvidia proprietary drivers in Hardened Slarpx; it will likely fail. Also, do not install kernel patches. Hardened Slarpx strictly restricts compilation. This measure is taken to prevent the compilation of exploits.
-
----
-
-# CHAPTER 3: KERNEL HARDENING ANALYSIS
-
-configurations under `/etc/sysctl.conf` and `/etc/modprobe.d/`.
-
-### 3.1 In-depth Analysis of Sysctl Parameters
-
-#### 3.1.1 Kernel Self-Protection (KSP)
-*   **`kernel.kexec_load_disabled = 1`**
-    *   *Technical Detail:* Disables the `kexec` system call.
-    *   *Security Impact:* Prevents a root user from loading their own manipulated kernel into memory during a reboot. This is the strongest defense against "Bootkit" and persistence attacks.
-*   **`kernel.yama.ptrace_scope = 3`**
-    *   *Technical Detail:* Sets the Ptrace (Process Trace) capability in the Linux Kernel to its most restrictive mode.
-    *   *Security Impact:* Debugging operations are completely forbidden. One process cannot read the memory of another (RWX/Read-Write-Execute memory injection is prevented). GDB and Strace will not work. It makes it impossible for malware to perform process injection.
-*   **`kernel.unprivileged_bpf_disabled = 1`**
-    *   *Technical Detail:* Prevents unprivileged users from loading eBPF (extended Berkeley Packet Filter) bytecode.
-    *   *Security Impact:* Closes BPF vulnerabilities (including Spectre variants), which are the most popular kernel exploit vectors of recent years.
-
-#### 3.1.2 Memory and Address Space Protections
-*   **`kernel.kptr_restrict = 2`**
-    *   *Effect:* Hides (zeroes out) kernel memory addresses within files like `/proc/kallsyms`. Prevents an attacker from finding the "offset" values needed for writing kernel exploits (KASLR Bypass mitigation).
-*   **`vm.mmap_min_addr = 65536`**
-    *   *Effect:* Prevents data from being written to the first 64KB of memory. Makes the exploitation of "Kernel NULL Pointer Dereference" vulnerabilities more difficult.
-*   **`fs.suid_dumpable = 0`**
-    *   *Effect:* Prevents "Core Dumps" from being created when SUID-bit programs crash. These dumps often contain sensitive information like password hashes from the `shadow` file or cryptographic keys.
-
-### 3.2 Module Blocking Strategy (`/etc/modprobe.d/disable.conf`) (/etc/modprobe.d/hardeneding.conf)
-
-install dv1394 /bin/false
-install firewire-core /bin/false
-install firewire-ohci /bin/false
-install firewire-net /bin/false
-install firewire-sbp2 /bin/false
-install ohci1394 /bin/false
-install raw1394 /bin/false
-install sbp2 /bin/false
-install video1394 /bin/false
-install garmin_gps /bin/false
-install gnss /bin/false
-install gnss-mtk /bin/false
-install gnss-serial /bin/false
-install gnss-sirf /bin/false
-install gnss-ubx /bin/false
-install gnss-usb /bin/false
-install pmt_class /bin/false
-install pmt_crashlog /bin/false
-install pmt_telemetry /bin/false
-install freevxfs /bin/false
-install hfs /bin/false
-install hfsplus /bin/false
-install jfs /bin/false
-install reiserfs /bin/false
-install gfs2 /bin/false
-install ksmbd /bin/false
-install cifs /bin/false
-install cifs_arc4 /bin/false
-install cifs_md4 /bin/false
-install nfs /bin/false
-install nfs_acl /bin/false
-install nfs_layout_nfsv41_files /bin/false
-install nfs_layout_flexfiles /bin/false
-install nfsd /bin/false
-install nfsv2 /bin/false
-install nfsv3 /bin/false
-install nfsv4 /bin/false
-install af_802154 /bin/false
-install appletalk /bin/false
-install ax25 /bin/false
-install decnet /bin/false
-install dccp /bin/false
-install econet /bin/false
-install eepro100 /bin/false
-install eth1394 /bin/false
-install ipx /bin/false
-install n-hdlc /bin/false
-install netrom /bin/false
-install p8022 /bin/false
-install p8023 /bin/false
-install psnap /bin/false
-install rose /bin/false
-install x25 /bin/false
-install atm /bin/false
-install ueagle-atm /bin/false
-install usbatm /bin/false
-install xusbatm /bin/false
-install c_can /bin/false
-install c_can_pci /bin/false
-install c_can_platform /bin/false
-install can /bin/false
-install can-bcm /bin/false
-install can-dev /bin/false
-install can-gw /bin/false
-install can-isotp /bin/false
-install can-raw /bin/false
-install can-j1939 /bin/false
-install can327 /bin/false
-install ifi_canfd /bin/false
-install janz-ican3 /bin/false
-install m_can /bin/false
-install m_can_pci /bin/false
-install m_can_platform /bin/false
-install phy-can-transceiver /bin/false
-install slcan /bin/false
-install ucan /bin/false
-install vxcan /bin/false
-install vcan /bin/false
-install tipc /bin/false
-install tipc_diag /bin/false
-install rds /bin/false
-install rds_rdma /bin/false
-install rds_tcp /bin/false
-install sctp /bin/false
-install sctp_diag /bin/false
-install hamradio /bin/false
-install floppy /bin/false
-install aty128fb /bin/false
-install atyfb /bin/false
-install cirrusfb /bin/false
-install cyber2000fb /bin/false
-install cyblafb /bin/false
-install gx1fb /bin/false
-install hgafb /bin/false
-install i810fb /bin/false
-install kyrofb /bin/false
-install lxfb /bin/false
-install matroxfb_base /bin/false
-install neofb /bin/false
-install pm2fb /bin/false
-install rivafb /bin/false
-install s1d13xxxfb /bin/false
-install savagefb /bin/false
-install sisfb /bin/false
-install sstfb /bin/false
-install tdfxfb /bin/false
-install tridentfb /bin/false
-install vfb /bin/false
-install viafb /bin/false
-install vt8623fb /bin/false
-install udlfb /bin/false
-install asus_acpi /bin/false
-install bcm43xx /bin/false
-install de4x5 /bin/false
-install prism54 /bin/false
-blacklist joydev
-blacklist amd76x_edac
-blacklist ath_pci
-blacklist evbug
-blacklist pcspkr
-blacklist snd_aw2
-blacklist snd_intel8x0m
-blacklist snd_pcsp
-blacklist usbkbd
-blacklist usbmouse
-
-Slarpx has blacklisted hundreds of kernel modules to reduce the attack surface.
-
-| Category | Blocked Modules | Rationale (Threat Vector) |
-| :--- | :--- | :--- |
-| **Physical Interfaces** | `firewire-core`, `thunderbolt`, `pcmcia` | **DMA Attacks:** Direct memory access can be achieved through these ports, bypassing encryption. |
-| **File Systems** | `cramfs`, `hfs`, `jfs`, `reiserfs`, `udf`, `gfs2` | **Kernel Bugs:** Old and rarely used file system drivers often contain "heap overflow" vulnerabilities. |
-| **Network Protocols** | `dccp`, `sctp`, `rds`, `tipc`, `ax25`, `ipx` | **Remote Exploitation:** These protocols are rarely used but form a large codebase in the kernel network stack, increasing RCE risk. |
-| **Video/Audio** | `snd_pcsp`, `joydev`, `vivied` | **Side Channel:** Precaution against the theoretical risk of data exfiltration via the system speaker (Air-gap hopping). |
-
----
-
-# CHAPTER 4: BOOTLOADER (GRUB) HARDENING AND BOOT SECURITY
-
-Slarpx's security layers start before the kernel even loads. The configurations under the `/etc/default/grub.d/` directory inject hundreds of hardening parameters into the Linux kernel.
-
-### 4.1 CPU Mitigations (`40_cpu_mitigations.cfg`)
-Highest-level protection settings for hardware-level vulnerabilities (Spectre, Meltdown, MDS) in modern processors are defined here.
-*   **`mitigations=full`**: Enables patches for all CPU vulnerabilities known by the kernel in the most secure (but slowest) mode.
-*   **`spectre_v2=on` / `spectre_bhi=on`**: Prevents Branch Target Injection and Branch History Injection attacks.
-*   **`l1tf=full,force`**: Aggressively closes the L1 Terminal Fault vulnerability in Intel processors.
-*   **`tsx=off`**: Disables the Intel Transactional Synchronization Extensions feature. TSX has been used as a vector in many "Speculative Execution" attacks.
-*   **`gather_data_sampling=force`**: Restricts the AVX instruction set to prevent Intel "Downfall" attacks or mandates protection if the microcode is updated.
-*   **`nosmt=force`**: (Optional/In a comment) Disables Hyper-Threading technology. This is the only way to prevent many "Cross-Thread" attacks (e.g., PortSmash).
-
-### 4.2 Kernel Hardening Params (`40_kernel_hardening.cfg`)
-Contains configurations for the kernel's memory management and internal security.
-*   **`slab_nomerge`**: Prevents the merging of kernel memory slabs of similar size. This makes it harder for a vulnerability in one area to affect another or for the memory layout to be predicted in "Heap Overflow" attacks.
-*   **`init_on_alloc=1` / `init_on_free=1`**: Zeroes out memory when it is allocated and freed. This prevents "Use-After-Free" attacks and the exfiltration of sensitive data remaining in memory (Data Leaks).
-*   **`page_alloc.shuffle=1`**: Randomizes (shuffles) the usage order of memory pages.
-*   **`randomize_kstack_offset=on`**: Randomizes the starting address of the kernel stack for every system call (syscall).
-*   **`vsyscall=none`**: Completely closes vsyscall addresses, which are used as "ROP Gates" by attackers because they are obsolete and at fixed addresses.
-*   **`debugfs=off`**: Closes the DebugFS system, which can leak excessive information about the kernel's internal structure.
-*   **`panic_on_taint=0xC0924`**: Causes the system to immediately shut down if the kernel is "tainted" (e.g., when an unsigned driver is loaded or a critical error occurs).
-*   **`kfence.sample_interval=100`**: Activates the KFENCE system, which continuously monitors memory security errors (Heap out-of-bounds, etc.) with low performance overhead.
-*   **`mem_encrypt=on`**: Enables the SME (Secure Memory Encryption) feature on AMD processors to counter Cold Boot attacks at the hardware level.
-
-### 4.3 Recovery and Console Restrictions (`41_recovery_restrict.cfg`)
-Doors that could allow a physical attacker to gain root privileges are closed.
-*   **`GRUB_DISABLE_RECOVERY="true"`**: Completely removes the "Recovery" mode from the GRUB menu.
-*   **`rd.emergency=halt` / `rd.shell=0`**: Prevents the system from opening an "Emergency Shell" if an error occurs during boot. Instead, the system shuts itself down ("halt"). Prevents a physical attacker from infiltrating the system by creating a boot error.
-
----
-
-# CHAPTER 5: ACTIVE DEFENSE SYSTEMS (ACTIVE DEFENSE)
-
-This chapter describes the defense mechanisms specially developed for Slarpx.
-
-### 5.1 Xennytsu : Exploit Killer Engine
-Xennytsu is a behavioral-based "Process Killer" engine rather than a signature-based one.
-
-#### 5.1.1 Working Principles
-The engine scans the `/proc` directory every `O(SCAN_INTERVAL_US)` (default: milliseconds). It calculates a "Threat Score" for each process. If the score exceeds the `KILL_THRESHOLD` (default: 50), the process is hit with a `SIGKILL` signal.
-
-#### 5.1.2 Detection Vectors
-1.  **Suspicious Command Chains (Command Line Analysis):**
-    *   Reverse Shell patterns: `nc -e`, `bash -i`, `sh -i`, `socat exec`.
-    *   Obfuscation: `base64 -d`, `openssl enc -d`.
-    *   Reconnaissance: `cat /etc/shadow`, `nmap`, `masscan`.
-    *   Payload Downloading: `curl | bash`, `wget -O - | sh`.
-2.  **Environment Variable Hijacking (Env Analysis):**
-    *   If `LD_PRELOAD`, `LD_LIBRARY_PATH`, or `LD_AUDIT` are seen in a process's environment variables, this is considered a "DLL Injection" attack, and the score is immediately increased.
-3.  **Namespace and Container Escapes:**
-    *   Commands like `nsenter --mount`, `capsh --gid=0` are flagged as container or sandbox escape attempts.
-
-#### 5.1.3 Sample Scoring Table
-*   `nc` is running: +10 Points
-*   `-e` is in `nc` arguments: +50 Points (KILL!)
-*   `curl` is running: +5 Points
-*   `curl` is piped (`|`) to `bash`: +60 Points (KILL!)
-
-### 5.2 Poison: Anti-Race Condition Engine
-Poison is a file-system level "Delayer" using the Linux `fanotify` API.
-
-#### 5.2.1 Technical Mechanism
-It captures access requests (OPEN, ACCESS) made to critical areas of the system (`/etc`, `/usr/bin`).
-If the accessing process is "suspicious" (fixed list of shells/interpreters), it waits the process at the kernel level for random microseconds using the `usleep(RANDOM)` function.
-
-#### 5.2.2 Defense Purpose
-This mechanism targets **TOCTOU (Time-of-Check to Time-of-Use)** vulnerabilities. An attacker's exploit code expects a certain amount of time to pass between checking a file's permission and writing to the file (Race Condition). Poison disrupts the exploit's timing by extending this duration artificially and randomly, causing it to fail. It also makes file-access-based brute-force attacks practically impossible.
-
-### 5.3 Silencer: 
-
-Its main purpose is to restrict unauthorized access to sensitive system data, and vigorously defend its own security policies if they are altered.
-
-Briefly, here is what it does:
-
-Restricts File Permissions: Narrows down permissions for sensitive kernel boundaries (/proc, /boot, /lib/modules), critical configuration files (/etc/shadow, etc.), and log files so ordinary users cannot read them.
-
-Kernel Hardening (sysctl): Enforces critical kernel security parameters (like ASLR, ptrace scope, dmesg_restrict, and preventing unprivileged eBPF) to their most secure values.
-
-Hides Processes: Remounts the /proc filesystem with hidepid=invisible so regular users can only see their own processes (mitigates information gathering).
-
-Disarms Attack Tools: Restricts ordinary users from executing dangerous compilers (gcc, gdb) and network analysis tools (nmap, tcpdump). It also removes SUID/SGID bits from commonly exploited binaries (like chfn, chsh).
-
-Prevents Leaks: Clears the dmesg buffer and completely disables core dumps.
-
-Persistent Monitoring (Daemon Mode): It runs continuously in the background (as a daemon). Every 5 seconds, it checks if any critical kernel settings were altered and instantly reverts them to the safe values. Every 30 seconds, it re-applies all the file permission restrictions to ensure nothing was bypassed.
-
-
-
----
-
-# CHAPTER 6: NETWORK ARCHITECTURE AND FIREWALL
-
-Network security is maintained by rules in the `/etc/nftables.conf` file and the `slarpx-dns` service.
-
-### 6.1 Nftables Rule Set Analysis
-
-#### 6.1.1 Egress Filtering (Outbound Control)
-Slarpx's most distinctive feature is its blocking of outbound traffic from the device.
-
-*   **Permitted Targets:**
-    *   TCP/80, TCP/443 (HTTP/HTTPS - Web Traffic)
-    *   UDP/TCP 53 (DNS - To Trusted Servers Only)
-    *   UDP 123 (NTP - Time Synchronization)
-    *   TCP 465/587/993 (Secure Email)
-*   **Blocked:**
-    *   Everything else (FTP, Torrent, IRC, Special Ports, Reverse Connect Shells).
-
-NOTE: IPv6 is blocked at the kernel level through Grub to reduce the attack surface. However, if enabled, the firewall will also harden IPv6 traffic.
-
-
-#### 6.1.2 DNS Locking
-To counter DNS poisoning and redirection attacks:
-1.  The `/etc/resolv.conf` file is fixed to **Quad9 (9.9.9.9)** DNS servers.
-
-This is controlled by the slarpx-dns service.
-
----
-
-# CHAPTER 7: FILE SYSTEM AND PERMISSIONS STRUCTURE
-
-The "Least Privilege" principle is applied to the file system.
-
-### 7.1 Restricting Compilers
-When an attacker infiltrates a system, they usually want to compile their own tools. To prevent this, development tools are restricted:
-```bash
-/usr/bin/gcc   -&amp;gt; 700 (rwx------) Root Only
-/usr/bin/make  -&amp;gt; 700 (rwx------) Root Only
-/usr/bin/clang -&amp;gt; 700 (rwx------) Root Only
-```
-In this way, an exploit running with `nobody` or `www-data` privileges cannot compile and run C code within the system.
-
-### 7.2 Immutable Files
-The following files cannot be changed while the system is running (not just write-protected, but structurally locked):
-*   `/etc/sudoers` (Prevents manipulation of privilege tables)
-*   `/etc/fstab` (Prevents changing disk mount points)
-*   `/etc/resolv.conf` (Protects DNS settings)
-
-This protection is provided through the permission-hardening service.
-
-# CHAPTER 10: MULTILAYER HARDENING
-
-Slarpx's security is reinforced not only with special engines (Xennytsu/Poison) but also by hardening standard Linux components to the highest level.
-
-### 10.1 APT Security (`/etc/apt/apt.conf.d/40hardened`) (`/etc/apt/apt.conf.d/40sandbox`) (`/etc/apt/apt.conf.d/40error-on-any`) 
-The following measures have been taken to prevent supply chain attacks and privilege escalation in the package management system:
-*   **Sandbox &amp;amp; Isolation:** Package download processes are delegated to a low-privileged user via `APT::Sandbox::User "_apt"`.
-*   **Network Security:** Strict chain verification for HTTPS sources is performed by mandating `Verify-Peer` and `Verify-Host`.
-*   **Integrity:** `AllowUnauthenticated` and `AllowInsecureRepositories` are strictly turned off. `Acquire::PDiffs "false"` ensures data integrity by always downloading the full index.
-*   **Anti-Forensics:** `.deb` files downloaded with `Keep-Downloaded-Packages "false"` are automatically deleted to clear the disk footprint.
-
-### 10.2 Resource Limits (`/etc/security/limits.d/hardened.conf`)
-Resource limits are optimized to maintain system stability and prevent DoS attacks (e.g., Fork Bomb):
-*   **Core Dumps:** Taking memory dumps during application crashes is completely forbidden with `hard core 0` (prevents sensitive data leakage).
-*   **Process Limits:** `nproc` limits (4096) meet the multi-process (sandboxing) needs of modern browsers while preventing uncontrolled process proliferation.
-*   **Stack Size:** The memory layout is fixed with `stack 8192` (8MB KB), making overflow attacks more difficult.
-
-### 10.3 Login Security and Faillock (`/etc/security/faillock.conf`)
-PAM-level restrictions are applied to prevent brute-force attacks:
-*   **Deny Threshold:** `deny = 5` (Account is locked after 5 consecutive failed attempts).
-*   **Lockout Time:** `unlock_time = 300` (The locked account is inaccessible for 5 minutes).
-
-### 10.4 Sudoers Hardening (`/etc/sudoers.d/hardening`)
-The sudo configuration has been rewritten to increase security during authorized operations:
-*   **Strict Umask:** `umask=0077` ensures that files created via sudo are only readable by root.
-*   **TTY Enforcement:** Non-terminal (script, etc.) manipulation of system calls and terminal hijacking attacks are prevented with `requiretty` and `use_pty`.
-*   **Session Management:** `timestamp_timeout=2` (Sudo privilege drops after 2 minutes) and `passwd_tries=3` (Failed password attempt limit).
-*   **Path Hijacking:** Users are prevented from running their own malicious binaries via sudo by mandating `secure_path`.
-
-### 10.5 Shell Environment (`/etc/profile.d/hardening.sh`)
-"Anti-Forensics" and restriction rules come into play from the moment the user session begins:
-*   **Automatic Logout:** Inactive terminals are automatically closed after 15 minutes with `TMOUT=900`.
-*   **Leave No Trace (Ghost Mode):** Command history is not recorded with `HISTFILE=/dev/null` and `HISTSIZE=0`. When the session is closed, the memory is cleared with `history -c`.
-*   **Development Restriction:** For normal users, compilers such as `gcc`, `make`, `cc` are blocked with aliases.
-*   **File Permissions:** Every new file created with the default `umask 077` becomes readable only by its owner.
-
----
-
-# CHAPTER 8: PRIVACY VS SECURITY (PRIVACY LIMITATIONS)
-
-**PLEASE READ THIS SECTION CAREFULLY.**
-
-Slarpx is **NOT** a "Privacy" distribution. It is a "Hardening" distribution. The difference between these two concepts is of vital importance.
-
-### 8.1 Fingerprinting Threat
-Paradoxically, Slarpx's extreme security settings make you **more visible** on the internet.
-*   **Fingerprint:** Causes your network packets to look very different from a standard Windows or Android device. A website can look at these packet characteristics and say, "This user is using Slarpx."
-*   **Browser Fingerprint:** Unique security configurations also leave distinguishing marks on the browser.
-
-### 8.2 Lack of Anonymity
-*   Unlike Tails OS or Whonix, Slarpx does not route traffic through the **Tor network** by default.
-*   Your IP address is clear.
-*   Your ISP can see which sites you enter (even if DNS is encrypted via SNI).
-*   Due to the strict firewall, Tor and VPN usage is restricted and requires a special configuration.
-
----
-Limitations 
-
-XENNYTSU
-
--Cannot detect some attacks because it runs in userspace
--Vulnerable to targeted attacks; can be disabled
--Vulnerable to very fast attacks
-
----
-
-# APPENDIX A: FREQUENTLY ASKED QUESTIONS (FAQ)
-
-**Q: Can I use this system on my main computer (Daily Driver)?**
-A: No. Games won't work, Netflix/Spotify (DRM issues and browser restrictions) may cause problems, and printers won't work. 
-
-**Q: I forgot my root password; can I recover it?**
-A: No. Changing GRUB boot parameters is locked, and Recovery Mode is off. If disk encryption (LUKS) is also present, your data is lost forever. This is a security feature (Anti-Forensics).
-
-**Q: Why was this system designed?**
-A: This system was developed for security research and hardening tests.
-
----
-
-**THIS IS NOT THE FINAL STATE OF THE PROJECT. IT IS ALWAYS OPEN TO MORE HARDENING AND IMPROVEMENT. IT DOES NOT CLAIM TO BE 100% SECURE. USE AT YOUR OWN RISK. THIS IS AN EXPERIMENTAL DISTRIBUTION.**
-
-**THERE ARE DEFICIENCIES IN THE DOCUMENTATION.**
-
----
-*End of Documentation*
+Details: https://nixovena.org/slarpx
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nixovena Linux &amp; AI Labs</dc:creator><pubDate>Mon, 20 Apr 2026 14:40:13 -0000</pubDate><guid>https://sourceforge.net14b937cf5699b6cf9176557f825ec9ac53d4a5c2</guid></item><item><title>Home modified by Rozeroxy</title><link>https://sourceforge.net/p/slarpx/wiki/Home/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Rozeroxy</dc:creator><pubDate>Mon, 13 Apr 2026 15:04:15 -0000</pubDate><guid>https://sourceforge.net7cc44ed64fe8640a469afc00b619daf54cc0cdd7</guid></item><item><title>Home modified by Rozeroxy</title><link>https://sourceforge.net/p/slarpx/wiki/Home/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v7
+++ v8
@@ -1,11 +1,9 @@
 # HARDENED SLARPX
 Distribution: Hardened Slarpx Prototype
 Based on:  Debian(Stable)
-Version: 1.0
-Website: slarpx.github.io
-Github/SourceCode: github.com/slarpx
-
-Sha256sum: 94ce3ebe806c4e53b5871210e2eaebef66117d56c7130e1610113b39a8873a29
+Version: 2.0
+Website/ Github/ SourceCode: will update
+Sha256sum: 9b11e0b52d7d1624e9a14dac91b46155e2642b5627ebcc293cd2c6b9a1ed16c2  

 ---

@@ -312,6 +310,26 @@
 #### 5.2.2 Defense Purpose
 This mechanism targets **TOCTOU (Time-of-Check to Time-of-Use)** vulnerabilities. An attacker's exploit code expects a certain amount of time to pass between checking a file's permission and writing to the file (Race Condition). Poison disrupts the exploit's timing by extending this duration artificially and randomly, causing it to fail. It also makes file-access-based brute-force attacks practically impossible.

+### 5.3 Silencer: 
+
+Its main purpose is to restrict unauthorized access to sensitive system data, and vigorously defend its own security policies if they are altered.
+
+Briefly, here is what it does:
+
+Restricts File Permissions: Narrows down permissions for sensitive kernel boundaries (/proc, /boot, /lib/modules), critical configuration files (/etc/shadow, etc.), and log files so ordinary users cannot read them.
+
+Kernel Hardening (sysctl): Enforces critical kernel security parameters (like ASLR, ptrace scope, dmesg_restrict, and preventing unprivileged eBPF) to their most secure values.
+
+Hides Processes: Remounts the /proc filesystem with hidepid=invisible so regular users can only see their own processes (mitigates information gathering).
+
+Disarms Attack Tools: Restricts ordinary users from executing dangerous compilers (gcc, gdb) and network analysis tools (nmap, tcpdump). It also removes SUID/SGID bits from commonly exploited binaries (like chfn, chsh).
+
+Prevents Leaks: Clears the dmesg buffer and completely disables core dumps.
+
+Persistent Monitoring (Daemon Mode): It runs continuously in the background (as a daemon). Every 5 seconds, it checks if any critical kernel settings were altered and instantly reverts them to the safe values. Every 30 seconds, it re-applies all the file permission restrictions to ensure nothing was bypassed.
+
+
+
 ---

 # CHAPTER 6: NETWORK ARCHITECTURE AND FIREWALL
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Rozeroxy</dc:creator><pubDate>Mon, 13 Apr 2026 15:04:13 -0000</pubDate><guid>https://sourceforge.netc906cacfee5e7bc3a82bcc10ff463f3676d88b76</guid></item><item><title>Home modified by Emir</title><link>https://sourceforge.net/p/slarpx/wiki/Home/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v6
+++ v7
@@ -2,6 +2,8 @@
 Distribution: Hardened Slarpx Prototype
 Based on:  Debian(Stable)
 Version: 1.0
+Website: slarpx.github.io
+Github/SourceCode: github.com/slarpx

 Sha256sum: 94ce3ebe806c4e53b5871210e2eaebef66117d56c7130e1610113b39a8873a29

&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Emir</dc:creator><pubDate>Sat, 24 Jan 2026 20:30:09 -0000</pubDate><guid>https://sourceforge.netfbe28e84fa75defdad9725a59ed9a0449ec67eac</guid></item><item><title>Home modified by Emir</title><link>https://sourceforge.net/p/slarpx/wiki/Home/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v5
+++ v6
@@ -1,4 +1,10 @@
 # HARDENED SLARPX
+Distribution: Hardened Slarpx Prototype
+Based on:  Debian(Stable)
+Version: 1.0
+
+Sha256sum: 94ce3ebe806c4e53b5871210e2eaebef66117d56c7130e1610113b39a8873a29
+
 ---

 ## ⚠️ LEGAL NOTICE AND CRITICAL DISCLAIMER
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Emir</dc:creator><pubDate>Sat, 24 Jan 2026 19:08:40 -0000</pubDate><guid>https://sourceforge.nete39d880c197098dd6d795c62e413d5ac7695d675</guid></item><item><title>Home modified by Emir</title><link>https://sourceforge.net/p/slarpx/wiki/Home/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Emir</dc:creator><pubDate>Sat, 24 Jan 2026 18:50:51 -0000</pubDate><guid>https://sourceforge.net04f8a72b4f1b01f56403a3163aab188900cf7b59</guid></item><item><title>Home modified by Emir</title><link>https://sourceforge.net/p/slarpx/wiki/Home/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v3
+++ v4
@@ -424,7 +424,7 @@
 # APPENDIX A: FREQUENTLY ASKED QUESTIONS (FAQ)

 **Q: Can I use this system on my main computer (Daily Driver)?**
-A: No. Games won't work, Netflix/Spotify (DRM issues and browser restrictions) may cause problems, and printers won't work. This system is a "War Station", not an entertainment center.
+A: No. Games won't work, Netflix/Spotify (DRM issues and browser restrictions) may cause problems, and printers won't work. 

 **Q: I forgot my root password; can I recover it?**
 A: No. Changing GRUB boot parameters is locked, and Recovery Mode is off. If disk encryption (LUKS) is also present, your data is lost forever. This is a security feature (Anti-Forensics).
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Emir</dc:creator><pubDate>Sat, 24 Jan 2026 18:50:33 -0000</pubDate><guid>https://sourceforge.netd6ddf3a19fb0bbeca1d0e91edb880d582ed7f26a</guid></item><item><title>Home modified by Emir</title><link>https://sourceforge.net/p/slarpx/wiki/Home/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v2
+++ v3
@@ -73,7 +73,7 @@

 # CHAPTER 3: KERNEL HARDENING ANALYSIS

-The heart of Slarpx lies in the configurations under `/etc/sysctl.conf` and `/etc/modprobe.d/`.
+configurations under `/etc/sysctl.conf` and `/etc/modprobe.d/`.

 ### 3.1 In-depth Analysis of Sysctl Parameters

@@ -434,9 +434,9 @@

 ---

-THIS IS NOT THE FINAL STATE OF THE PROJECT. IT IS ALWAYS OPEN TO MORE HARDENING AND IMPROVEMENT. IT DOES NOT CLAIM TO BE 100% SECURE. USE AT YOUR OWN RISK. THIS IS AN EXPERIMENTAL DISTRIBUTION.
-
-THERE ARE DEFICIENCIES IN THE DOCUMENTATION.
+**THIS IS NOT THE FINAL STATE OF THE PROJECT. IT IS ALWAYS OPEN TO MORE HARDENING AND IMPROVEMENT. IT DOES NOT CLAIM TO BE 100% SECURE. USE AT YOUR OWN RISK. THIS IS AN EXPERIMENTAL DISTRIBUTION.**
+
+**THERE ARE DEFICIENCIES IN THE DOCUMENTATION.**

 ---
 *End of Documentation*
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Emir</dc:creator><pubDate>Sat, 24 Jan 2026 18:48:46 -0000</pubDate><guid>https://sourceforge.net72663bd4ed7470399c37e77638723f3cf81ae9e3</guid></item><item><title>Home modified by Emir</title><link>https://sourceforge.net/p/slarpx/wiki/Home/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v1
+++ v2
@@ -1,8 +1,442 @@
-Welcome to your wiki!
-
-This is the default page, edit it as you see fit. To add a new page simply reference it within brackets, e.g.: [SamplePage].
-
-The wiki uses [Markdown](/p/slarpx/wiki/markdown_syntax/) syntax.
-
-[[members limit=20]]
-[[download_button]]
+# HARDENED SLARPX
+---
+
+## ⚠️ LEGAL NOTICE AND CRITICAL DISCLAIMER
+
+This document and the associated software (Slarpx) describe a system comprising highly experimental, high-risk, and aggressive security measures.
+
+1.  **NO WARRANTY:** This software is provided "AS IS". Developers shall not be held responsible for any hardware failures (e.g., reduced disk lifespan due to excessive I/O load), data loss (e.g., loss of encrypted disk keys), business interruptions, or legal liabilities resulting from the use of this system.
+2.  **INTENDED USE:** Slarpx is **NOT DESIGNED** for end-users, corporate office workers, or gamers. This system is designed for security research and security testing.
+3.  **MEDICAL/CRITICAL DEVICE WARNING:** Do not use this operating system in life-support units, nuclear facility control systems, or air traffic control, where a failure could result in fatal consequences. The "Active Kill" (Xennytsu) mechanism it contains immediately terminates any process it detects as a threat (even if critical).
+
+---
+
+# CHAPTER 1: PHILOSOPHY AND THREAT MODEL
+
+For Slarpx, the only valid metric is **Minimization of the Attack Surface**.
+
+### 1.1 Design Principles
+*   **Security by Design:** Security is not a patch added later; it is the foundation of the system.
+*   **Default Deny:** Everything not explicitly permitted (network ports, file access, modules) is forbidden.
+*   **Active Hostility:** The system does not remain passive against unauthorized code running on it; it detects, slows down (Poison), and destroys them (Xennytsu).
+
+---
+
+# CHAPTER 2: INSTALLATION GUIDE
+
+Installing Slarpx requires more meticulous preparation compared to standard Linux distributions.
+
+### 2.1 System Requirements
+*   **CPU:** 64-bit (x86_64/amd64) processor. (Virtualization extensions are recommended).
+*   **RAM:** Minimum 4GB (8GB+ recommended as Xennytsu and Poison perform in-memory analysis).
+*   **Storage:** Minimum 32GB SSD (HDD is not recommended; I/O performance is critical).
+*   **BIOS/UEFI:** After system installation, it is recommended to enable SECURE BOOT according to Debian documentation.
+
+### 2.2 Preparing Installation Media
+1.  **Download ISO File:** Obtain the `.iso` file from the official source.
+2.  **Integrity Verification:** Check the hash value of the downloaded file.
+    ```bash
+    sha256sum hardenedslarpx-1.0-amd64iso
+    # Must match the hash published by the developer.
+    ```
+3.  **USB Writing:** Write the ISO to the memory stick using the `dd` command. (Copy if using Ventoy, select "DD Image" mode if using Rufus).
+    ```bash
+    sudo dd if=slarpx.iso of=/dev/sdX bs=4M status=progress &amp;amp;&amp;amp; sync
+    ```
+
+### 2.3 Installation Steps
+1.  **Boot:** Start the system from the USB.
+2.  **Follow the steps of the Debian Installer**
+
+3.  **Disk Partitioning (CRITICAL):**
+    *   It is recommended to select the **Guided - Use entire disk and set up encrypted LVM** option.
+    *   An unencrypted installation renders Slarpx's security architecture (especially Coldboot protection) ineffective.
+    *   Set a strong "Passphrase" (at least 20 characters).
+
+### 2.4 First Boot After Installation (Post-Install)
+1.  Enter your LUKS password when the system starts.
+2.  Login (the default user is what you determined during installation).
+3.  First, check the system integrity:
+    ```bash
+    systemctl status xennytsu  # Should be Active (running)
+    systemctl status poison    # Should be Active (running)
+    ```
+
+Hardened Slarpx is a Headless system by default and has no desktop environment. 
+It is up to you whether to install a desktop environment or not, but for security, desktop environments using wayland are recommended, and avoid installing desktop environments termed as bloat.
+
+Labwc is a secure desktop environment compatible with Hardened Slarpx. Its attack surface is low and it runs over the wayland protocol.
+
+About Driver &amp;amp; Kernel Patches: Do not install Nvidia proprietary drivers in Hardened Slarpx; it will likely fail. Also, do not install kernel patches. Hardened Slarpx strictly restricts compilation. This measure is taken to prevent the compilation of exploits.
+
+---
+
+# CHAPTER 3: KERNEL HARDENING ANALYSIS
+
+The heart of Slarpx lies in the configurations under `/etc/sysctl.conf` and `/etc/modprobe.d/`.
+
+### 3.1 In-depth Analysis of Sysctl Parameters
+
+#### 3.1.1 Kernel Self-Protection (KSP)
+*   **`kernel.kexec_load_disabled = 1`**
+    *   *Technical Detail:* Disables the `kexec` system call.
+    *   *Security Impact:* Prevents a root user from loading their own manipulated kernel into memory during a reboot. This is the strongest defense against "Bootkit" and persistence attacks.
+*   **`kernel.yama.ptrace_scope = 3`**
+    *   *Technical Detail:* Sets the Ptrace (Process Trace) capability in the Linux Kernel to its most restrictive mode.
+    *   *Security Impact:* Debugging operations are completely forbidden. One process cannot read the memory of another (RWX/Read-Write-Execute memory injection is prevented). GDB and Strace will not work. It makes it impossible for malware to perform process injection.
+*   **`kernel.unprivileged_bpf_disabled = 1`**
+    *   *Technical Detail:* Prevents unprivileged users from loading eBPF (extended Berkeley Packet Filter) bytecode.
+    *   *Security Impact:* Closes BPF vulnerabilities (including Spectre variants), which are the most popular kernel exploit vectors of recent years.
+
+#### 3.1.2 Memory and Address Space Protections
+*   **`kernel.kptr_restrict = 2`**
+    *   *Effect:* Hides (zeroes out) kernel memory addresses within files like `/proc/kallsyms`. Prevents an attacker from finding the "offset" values needed for writing kernel exploits (KASLR Bypass mitigation).
+*   **`vm.mmap_min_addr = 65536`**
+    *   *Effect:* Prevents data from being written to the first 64KB of memory. Makes the exploitation of "Kernel NULL Pointer Dereference" vulnerabilities more difficult.
+*   **`fs.suid_dumpable = 0`**
+    *   *Effect:* Prevents "Core Dumps" from being created when SUID-bit programs crash. These dumps often contain sensitive information like password hashes from the `shadow` file or cryptographic keys.
+
+### 3.2 Module Blocking Strategy (`/etc/modprobe.d/disable.conf`) (/etc/modprobe.d/hardeneding.conf)
+
+install dv1394 /bin/false
+install firewire-core /bin/false
+install firewire-ohci /bin/false
+install firewire-net /bin/false
+install firewire-sbp2 /bin/false
+install ohci1394 /bin/false
+install raw1394 /bin/false
+install sbp2 /bin/false
+install video1394 /bin/false
+install garmin_gps /bin/false
+install gnss /bin/false
+install gnss-mtk /bin/false
+install gnss-serial /bin/false
+install gnss-sirf /bin/false
+install gnss-ubx /bin/false
+install gnss-usb /bin/false
+install pmt_class /bin/false
+install pmt_crashlog /bin/false
+install pmt_telemetry /bin/false
+install freevxfs /bin/false
+install hfs /bin/false
+install hfsplus /bin/false
+install jfs /bin/false
+install reiserfs /bin/false
+install gfs2 /bin/false
+install ksmbd /bin/false
+install cifs /bin/false
+install cifs_arc4 /bin/false
+install cifs_md4 /bin/false
+install nfs /bin/false
+install nfs_acl /bin/false
+install nfs_layout_nfsv41_files /bin/false
+install nfs_layout_flexfiles /bin/false
+install nfsd /bin/false
+install nfsv2 /bin/false
+install nfsv3 /bin/false
+install nfsv4 /bin/false
+install af_802154 /bin/false
+install appletalk /bin/false
+install ax25 /bin/false
+install decnet /bin/false
+install dccp /bin/false
+install econet /bin/false
+install eepro100 /bin/false
+install eth1394 /bin/false
+install ipx /bin/false
+install n-hdlc /bin/false
+install netrom /bin/false
+install p8022 /bin/false
+install p8023 /bin/false
+install psnap /bin/false
+install rose /bin/false
+install x25 /bin/false
+install atm /bin/false
+install ueagle-atm /bin/false
+install usbatm /bin/false
+install xusbatm /bin/false
+install c_can /bin/false
+install c_can_pci /bin/false
+install c_can_platform /bin/false
+install can /bin/false
+install can-bcm /bin/false
+install can-dev /bin/false
+install can-gw /bin/false
+install can-isotp /bin/false
+install can-raw /bin/false
+install can-j1939 /bin/false
+install can327 /bin/false
+install ifi_canfd /bin/false
+install janz-ican3 /bin/false
+install m_can /bin/false
+install m_can_pci /bin/false
+install m_can_platform /bin/false
+install phy-can-transceiver /bin/false
+install slcan /bin/false
+install ucan /bin/false
+install vxcan /bin/false
+install vcan /bin/false
+install tipc /bin/false
+install tipc_diag /bin/false
+install rds /bin/false
+install rds_rdma /bin/false
+install rds_tcp /bin/false
+install sctp /bin/false
+install sctp_diag /bin/false
+install hamradio /bin/false
+install floppy /bin/false
+install aty128fb /bin/false
+install atyfb /bin/false
+install cirrusfb /bin/false
+install cyber2000fb /bin/false
+install cyblafb /bin/false
+install gx1fb /bin/false
+install hgafb /bin/false
+install i810fb /bin/false
+install kyrofb /bin/false
+install lxfb /bin/false
+install matroxfb_base /bin/false
+install neofb /bin/false
+install pm2fb /bin/false
+install rivafb /bin/false
+install s1d13xxxfb /bin/false
+install savagefb /bin/false
+install sisfb /bin/false
+install sstfb /bin/false
+install tdfxfb /bin/false
+install tridentfb /bin/false
+install vfb /bin/false
+install viafb /bin/false
+install vt8623fb /bin/false
+install udlfb /bin/false
+install asus_acpi /bin/false
+install bcm43xx /bin/false
+install de4x5 /bin/false
+install prism54 /bin/false
+blacklist joydev
+blacklist amd76x_edac
+blacklist ath_pci
+blacklist evbug
+blacklist pcspkr
+blacklist snd_aw2
+blacklist snd_intel8x0m
+blacklist snd_pcsp
+blacklist usbkbd
+blacklist usbmouse
+
+Slarpx has blacklisted hundreds of kernel modules to reduce the attack surface.
+
+| Category | Blocked Modules | Rationale (Threat Vector) |
+| :--- | :--- | :--- |
+| **Physical Interfaces** | `firewire-core`, `thunderbolt`, `pcmcia` | **DMA Attacks:** Direct memory access can be achieved through these ports, bypassing encryption. |
+| **File Systems** | `cramfs`, `hfs`, `jfs`, `reiserfs`, `udf`, `gfs2` | **Kernel Bugs:** Old and rarely used file system drivers often contain "heap overflow" vulnerabilities. |
+| **Network Protocols** | `dccp`, `sctp`, `rds`, `tipc`, `ax25`, `ipx` | **Remote Exploitation:** These protocols are rarely used but form a large codebase in the kernel network stack, increasing RCE risk. |
+| **Video/Audio** | `snd_pcsp`, `joydev`, `vivied` | **Side Channel:** Precaution against the theoretical risk of data exfiltration via the system speaker (Air-gap hopping). |
+
+---
+
+# CHAPTER 4: BOOTLOADER (GRUB) HARDENING AND BOOT SECURITY
+
+Slarpx's security layers start before the kernel even loads. The configurations under the `/etc/default/grub.d/` directory inject hundreds of hardening parameters into the Linux kernel.
+
+### 4.1 CPU Mitigations (`40_cpu_mitigations.cfg`)
+Highest-level protection settings for hardware-level vulnerabilities (Spectre, Meltdown, MDS) in modern processors are defined here.
+*   **`mitigations=full`**: Enables patches for all CPU vulnerabilities known by the kernel in the most secure (but slowest) mode.
+*   **`spectre_v2=on` / `spectre_bhi=on`**: Prevents Branch Target Injection and Branch History Injection attacks.
+*   **`l1tf=full,force`**: Aggressively closes the L1 Terminal Fault vulnerability in Intel processors.
+*   **`tsx=off`**: Disables the Intel Transactional Synchronization Extensions feature. TSX has been used as a vector in many "Speculative Execution" attacks.
+*   **`gather_data_sampling=force`**: Restricts the AVX instruction set to prevent Intel "Downfall" attacks or mandates protection if the microcode is updated.
+*   **`nosmt=force`**: (Optional/In a comment) Disables Hyper-Threading technology. This is the only way to prevent many "Cross-Thread" attacks (e.g., PortSmash).
+
+### 4.2 Kernel Hardening Params (`40_kernel_hardening.cfg`)
+Contains configurations for the kernel's memory management and internal security.
+*   **`slab_nomerge`**: Prevents the merging of kernel memory slabs of similar size. This makes it harder for a vulnerability in one area to affect another or for the memory layout to be predicted in "Heap Overflow" attacks.
+*   **`init_on_alloc=1` / `init_on_free=1`**: Zeroes out memory when it is allocated and freed. This prevents "Use-After-Free" attacks and the exfiltration of sensitive data remaining in memory (Data Leaks).
+*   **`page_alloc.shuffle=1`**: Randomizes (shuffles) the usage order of memory pages.
+*   **`randomize_kstack_offset=on`**: Randomizes the starting address of the kernel stack for every system call (syscall).
+*   **`vsyscall=none`**: Completely closes vsyscall addresses, which are used as "ROP Gates" by attackers because they are obsolete and at fixed addresses.
+*   **`debugfs=off`**: Closes the DebugFS system, which can leak excessive information about the kernel's internal structure.
+*   **`panic_on_taint=0xC0924`**: Causes the system to immediately shut down if the kernel is "tainted" (e.g., when an unsigned driver is loaded or a critical error occurs).
+*   **`kfence.sample_interval=100`**: Activates the KFENCE system, which continuously monitors memory security errors (Heap out-of-bounds, etc.) with low performance overhead.
+*   **`mem_encrypt=on`**: Enables the SME (Secure Memory Encryption) feature on AMD processors to counter Cold Boot attacks at the hardware level.
+
+### 4.3 Recovery and Console Restrictions (`41_recovery_restrict.cfg`)
+Doors that could allow a physical attacker to gain root privileges are closed.
+*   **`GRUB_DISABLE_RECOVERY="true"`**: Completely removes the "Recovery" mode from the GRUB menu.
+*   **`rd.emergency=halt` / `rd.shell=0`**: Prevents the system from opening an "Emergency Shell" if an error occurs during boot. Instead, the system shuts itself down ("halt"). Prevents a physical attacker from infiltrating the system by creating a boot error.
+
+---
+
+# CHAPTER 5: ACTIVE DEFENSE SYSTEMS (ACTIVE DEFENSE)
+
+This chapter describes the defense mechanisms specially developed for Slarpx.
+
+### 5.1 Xennytsu : Exploit Killer Engine
+Xennytsu is a behavioral-based "Process Killer" engine rather than a signature-based one.
+
+#### 5.1.1 Working Principles
+The engine scans the `/proc` directory every `O(SCAN_INTERVAL_US)` (default: milliseconds). It calculates a "Threat Score" for each process. If the score exceeds the `KILL_THRESHOLD` (default: 50), the process is hit with a `SIGKILL` signal.
+
+#### 5.1.2 Detection Vectors
+1.  **Suspicious Command Chains (Command Line Analysis):**
+    *   Reverse Shell patterns: `nc -e`, `bash -i`, `sh -i`, `socat exec`.
+    *   Obfuscation: `base64 -d`, `openssl enc -d`.
+    *   Reconnaissance: `cat /etc/shadow`, `nmap`, `masscan`.
+    *   Payload Downloading: `curl | bash`, `wget -O - | sh`.
+2.  **Environment Variable Hijacking (Env Analysis):**
+    *   If `LD_PRELOAD`, `LD_LIBRARY_PATH`, or `LD_AUDIT` are seen in a process's environment variables, this is considered a "DLL Injection" attack, and the score is immediately increased.
+3.  **Namespace and Container Escapes:**
+    *   Commands like `nsenter --mount`, `capsh --gid=0` are flagged as container or sandbox escape attempts.
+
+#### 5.1.3 Sample Scoring Table
+*   `nc` is running: +10 Points
+*   `-e` is in `nc` arguments: +50 Points (KILL!)
+*   `curl` is running: +5 Points
+*   `curl` is piped (`|`) to `bash`: +60 Points (KILL!)
+
+### 5.2 Poison: Anti-Race Condition Engine
+Poison is a file-system level "Delayer" using the Linux `fanotify` API.
+
+#### 5.2.1 Technical Mechanism
+It captures access requests (OPEN, ACCESS) made to critical areas of the system (`/etc`, `/usr/bin`).
+If the accessing process is "suspicious" (fixed list of shells/interpreters), it waits the process at the kernel level for random microseconds using the `usleep(RANDOM)` function.
+
+#### 5.2.2 Defense Purpose
+This mechanism targets **TOCTOU (Time-of-Check to Time-of-Use)** vulnerabilities. An attacker's exploit code expects a certain amount of time to pass between checking a file's permission and writing to the file (Race Condition). Poison disrupts the exploit's timing by extending this duration artificially and randomly, causing it to fail. It also makes file-access-based brute-force attacks practically impossible.
+
+---
+
+# CHAPTER 6: NETWORK ARCHITECTURE AND FIREWALL
+
+Network security is maintained by rules in the `/etc/nftables.conf` file and the `slarpx-dns` service.
+
+### 6.1 Nftables Rule Set Analysis
+
+#### 6.1.1 Egress Filtering (Outbound Control)
+Slarpx's most distinctive feature is its blocking of outbound traffic from the device.
+
+*   **Permitted Targets:**
+    *   TCP/80, TCP/443 (HTTP/HTTPS - Web Traffic)
+    *   UDP/TCP 53 (DNS - To Trusted Servers Only)
+    *   UDP 123 (NTP - Time Synchronization)
+    *   TCP 465/587/993 (Secure Email)
+*   **Blocked:**
+    *   Everything else (FTP, Torrent, IRC, Special Ports, Reverse Connect Shells).
+
+NOTE: IPv6 is blocked at the kernel level through Grub to reduce the attack surface. However, if enabled, the firewall will also harden IPv6 traffic.
+
+
+#### 6.1.2 DNS Locking
+To counter DNS poisoning and redirection attacks:
+1.  The `/etc/resolv.conf` file is fixed to **Quad9 (9.9.9.9)** DNS servers.
+
+This is controlled by the slarpx-dns service.
+
+---
+
+# CHAPTER 7: FILE SYSTEM AND PERMISSIONS STRUCTURE
+
+The "Least Privilege" principle is applied to the file system.
+
+### 7.1 Restricting Compilers
+When an attacker infiltrates a system, they usually want to compile their own tools. To prevent this, development tools are restricted:
+```bash
+/usr/bin/gcc   -&amp;gt; 700 (rwx------) Root Only
+/usr/bin/make  -&amp;gt; 700 (rwx------) Root Only
+/usr/bin/clang -&amp;gt; 700 (rwx------) Root Only
+```
+In this way, an exploit running with `nobody` or `www-data` privileges cannot compile and run C code within the system.
+
+### 7.2 Immutable Files
+The following files cannot be changed while the system is running (not just write-protected, but structurally locked):
+*   `/etc/sudoers` (Prevents manipulation of privilege tables)
+*   `/etc/fstab` (Prevents changing disk mount points)
+*   `/etc/resolv.conf` (Protects DNS settings)
+
+This protection is provided through the permission-hardening service.
+
+# CHAPTER 10: MULTILAYER HARDENING
+
+Slarpx's security is reinforced not only with special engines (Xennytsu/Poison) but also by hardening standard Linux components to the highest level.
+
+### 10.1 APT Security (`/etc/apt/apt.conf.d/40hardened`) (`/etc/apt/apt.conf.d/40sandbox`) (`/etc/apt/apt.conf.d/40error-on-any`) 
+The following measures have been taken to prevent supply chain attacks and privilege escalation in the package management system:
+*   **Sandbox &amp;amp; Isolation:** Package download processes are delegated to a low-privileged user via `APT::Sandbox::User "_apt"`.
+*   **Network Security:** Strict chain verification for HTTPS sources is performed by mandating `Verify-Peer` and `Verify-Host`.
+*   **Integrity:** `AllowUnauthenticated` and `AllowInsecureRepositories` are strictly turned off. `Acquire::PDiffs "false"` ensures data integrity by always downloading the full index.
+*   **Anti-Forensics:** `.deb` files downloaded with `Keep-Downloaded-Packages "false"` are automatically deleted to clear the disk footprint.
+
+### 10.2 Resource Limits (`/etc/security/limits.d/hardened.conf`)
+Resource limits are optimized to maintain system stability and prevent DoS attacks (e.g., Fork Bomb):
+*   **Core Dumps:** Taking memory dumps during application crashes is completely forbidden with `hard core 0` (prevents sensitive data leakage).
+*   **Process Limits:** `nproc` limits (4096) meet the multi-process (sandboxing) needs of modern browsers while preventing uncontrolled process proliferation.
+*   **Stack Size:** The memory layout is fixed with `stack 8192` (8MB KB), making overflow attacks more difficult.
+
+### 10.3 Login Security and Faillock (`/etc/security/faillock.conf`)
+PAM-level restrictions are applied to prevent brute-force attacks:
+*   **Deny Threshold:** `deny = 5` (Account is locked after 5 consecutive failed attempts).
+*   **Lockout Time:** `unlock_time = 300` (The locked account is inaccessible for 5 minutes).
+
+### 10.4 Sudoers Hardening (`/etc/sudoers.d/hardening`)
+The sudo configuration has been rewritten to increase security during authorized operations:
+*   **Strict Umask:** `umask=0077` ensures that files created via sudo are only readable by root.
+*   **TTY Enforcement:** Non-terminal (script, etc.) manipulation of system calls and terminal hijacking attacks are prevented with `requiretty` and `use_pty`.
+*   **Session Management:** `timestamp_timeout=2` (Sudo privilege drops after 2 minutes) and `passwd_tries=3` (Failed password attempt limit).
+*   **Path Hijacking:** Users are prevented from running their own malicious binaries via sudo by mandating `secure_path`.
+
+### 10.5 Shell Environment (`/etc/profile.d/hardening.sh`)
+"Anti-Forensics" and restriction rules come into play from the moment the user session begins:
+*   **Automatic Logout:** Inactive terminals are automatically closed after 15 minutes with `TMOUT=900`.
+*   **Leave No Trace (Ghost Mode):** Command history is not recorded with `HISTFILE=/dev/null` and `HISTSIZE=0`. When the session is closed, the memory is cleared with `history -c`.
+*   **Development Restriction:** For normal users, compilers such as `gcc`, `make`, `cc` are blocked with aliases.
+*   **File Permissions:** Every new file created with the default `umask 077` becomes readable only by its owner.
+
+---
+
+# CHAPTER 8: PRIVACY VS SECURITY (PRIVACY LIMITATIONS)
+
+**PLEASE READ THIS SECTION CAREFULLY.**
+
+Slarpx is **NOT** a "Privacy" distribution. It is a "Hardening" distribution. The difference between these two concepts is of vital importance.
+
+### 8.1 Fingerprinting Threat
+Paradoxically, Slarpx's extreme security settings make you **more visible** on the internet.
+*   **Fingerprint:** Causes your network packets to look very different from a standard Windows or Android device. A website can look at these packet characteristics and say, "This user is using Slarpx."
+*   **Browser Fingerprint:** Unique security configurations also leave distinguishing marks on the browser.
+
+### 8.2 Lack of Anonymity
+*   Unlike Tails OS or Whonix, Slarpx does not route traffic through the **Tor network** by default.
+*   Your IP address is clear.
+*   Your ISP can see which sites you enter (even if DNS is encrypted via SNI).
+*   Due to the strict firewall, Tor and VPN usage is restricted and requires a special configuration.
+
+---
+Limitations 
+
+XENNYTSU
+
+-Cannot detect some attacks because it runs in userspace
+-Vulnerable to targeted attacks; can be disabled
+-Vulnerable to very fast attacks
+
+---
+
+# APPENDIX A: FREQUENTLY ASKED QUESTIONS (FAQ)
+
+**Q: Can I use this system on my main computer (Daily Driver)?**
+A: No. Games won't work, Netflix/Spotify (DRM issues and browser restrictions) may cause problems, and printers won't work. This system is a "War Station", not an entertainment center.
+
+**Q: I forgot my root password; can I recover it?**
+A: No. Changing GRUB boot parameters is locked, and Recovery Mode is off. If disk encryption (LUKS) is also present, your data is lost forever. This is a security feature (Anti-Forensics).
+
+**Q: Why was this system designed?**
+A: This system was developed for security research and hardening tests.
+
+---
+
+THIS IS NOT THE FINAL STATE OF THE PROJECT. IT IS ALWAYS OPEN TO MORE HARDENING AND IMPROVEMENT. IT DOES NOT CLAIM TO BE 100% SECURE. USE AT YOUR OWN RISK. THIS IS AN EXPERIMENTAL DISTRIBUTION.
+
+THERE ARE DEFICIENCIES IN THE DOCUMENTATION.
+
+---
+*End of Documentation*
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Emir</dc:creator><pubDate>Sat, 24 Jan 2026 18:47:26 -0000</pubDate><guid>https://sourceforge.net1cf0a212c704f4d8fd1e6328c49c62cc0113254d</guid></item><item><title>Home modified by Emir</title><link>https://sourceforge.net/p/slarpx/wiki/Home/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Welcome to your wiki!&lt;/p&gt;
&lt;p&gt;This is the default page, edit it as you see fit. To add a new page simply reference it within brackets, e.g.: &lt;span&gt;[SamplePage]&lt;/span&gt;.&lt;/p&gt;
&lt;p&gt;The wiki uses &lt;a class="" href="/p/slarpx/wiki/markdown_syntax/" rel="nofollow"&gt;Markdown&lt;/a&gt; syntax.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;&lt;h6&gt;Project Members:&lt;/h6&gt;
    &lt;ul class="md-users-list"&gt;
        &lt;li&gt;&lt;a href="/u/root0emir/"&gt;Emir&lt;/a&gt; (admin)&lt;/li&gt;
        
    &lt;/ul&gt;&lt;br/&gt;
&lt;p&gt;&lt;span class="download-button-69750ef3e65f1965d495f1d4" style="margin-bottom: 1em; display: block;"&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Emir</dc:creator><pubDate>Sat, 24 Jan 2026 18:27:00 -0000</pubDate><guid>https://sourceforge.netc9ed0b86458c19b77db4bef64b8f3a0518ed59bd</guid></item></channel></rss>