Overview

Alfred Linux is a complete operating system built from the ground up with AI as the primary user interface. Based on Debian Trixie (13), the current v7.77 Kingdom GA target ships 150 build hooks on the live-build host (three dedicated security hooks plus the 6-module Omahon Seal, for 38 security modules total) — a stack no other distribution ships as one integrated image. For context: v7.77 GA (April 2026) shipped 17 hooks; we set a 42-hook milestone for Matthew 1:17 (Abraham → Christ) and the build outgrew it as observability, attestation, and the Kingdom-worship suite expanded. Everything below in Build History records growth by milestone, not today’s headline count.

How “150 hooks” is counted: 150 = files matching config/hooks/live/*.chroot + config/hooks/live/*.binary in the GoForge alfredlinux-com-source-live repo (147 chroot + 3 binary). The build also runs 23 stock Debian live-build hooks via config/hooks/normal/ symlinks (locale generation, apt cache, dbus machine-id removal, etc.) — for 173 total hooks executed at build time. We don’t count those 23 toward the marquee number because Debian wrote them, not us. Why not 42? 42 was the April 2026 milestone (Matthew 1:17, the 42 generations from Abraham to Christ). The Kingdom outgrew the marker as observability waves, attestation, the AI stack, and the worship suite landed. The original 42 are still in there at the foundation. Separately: the bytes on /download can still expose fewer Alfred hook markers inside the squashfs until the next successful reseal from that tree; see includes/ga-release-state.php ($gaFrozenIsoHookCount vs $gaPlannedHookCount).

Target release: v7.77 GA “Kingdom of God Edition”

General Availability — frozen ISO published on-site. Debian Trixie 13 base, Linux kernel 7.0.6 (custom compiled from source; debs in build/config/packages.chroot/), x86_64, UEFI+BIOS hybrid when built with the documented bootloader path. 150 build hooks in source (~150 active in the bytes shipping right now — the next reseal builds from the full 150). 38 security modules (including the Omahon Seal). AKJV Bible (94 books, 39,482 verses). 27-track worship album “Jesus Christ The Light Our Universe.” GPG signed (RSA-4096, Key ID: 32BCEDE8C8DD8B00). Omahon Seal: Boot Seal, Watchman, Vault, Shell Guard, Secure Erase, Sovereign Attestation. ISO size: see /download (measured du -h on the frozen artifact).

Alfred Linux is not a Linux distribution with a chatbot bolted on. The AI is integrated at the operating system level — from voice-driven shell interaction to the development environment to the browser. Every component was chosen and configured to serve the mission: your voice is the command line.

What Ships in v7.77

Kernel Deep-Dive

Alfred Linux 7.77 GA ships Linux kernel 7.0.6, custom-compiled from Linus Torvalds' mainline source tree. This makes Alfred Linux the first operating system distribution in the world to ship kernel 7. Kernel 7.0 was released by Torvalds on April 5, 2026 (first major version bump since 6.0 in October 2022); 7.0.1 was the first stable point release.

Decoding “Linux 7.0.6”

7 = major version (first since 6.0 in Oct 2022)
0 = minor (first release in the 7.x series)
1 = first stable point release on top of 7.0
(Earlier candidates carried -rc7-alfred while we tracked Torvalds' release candidates; we cut over to 7.0.1 stable, then upgraded to 7.0.6 for GA.)

Compiled from the official git.kernel.org/torvalds/linux source tree with Debian Trixie's production config as the base, adapted via make olddefconfig. Custom LOCALVERSION tag. Built on 8-core EU build server.

What Kernel 7.0 Brings

Alfred Linux Security Hardening (12 Gaps Patched)

The default kernel 7.0 config ships with 12 security gaps that Alfred Linux patches at boot. No other consumer distro patches all 12:

#Default GapRiskAlfred Fix
1INIT_STACK_NONE=yUninitialized stack info leaksinit_on_alloc=1
2INIT_ON_FREE not setFreed memory retains secretsinit_on_free=1
3MODULE_SIG_FORCE offUnsigned modules can loadlockdown=integrity
4MODULE_FORCE_UNLOAD=yForce-unload modulesLockdown blocks
5IO_URING=y#1 kernel vuln source 2022–2025io_uring_disabled=2
6USERFAULTFD=yRace condition exploit enablerunprivileged_userfaultfd=0
7X86_IOPL_IOPERM=yDirect I/O port accessLockdown blocks
8DEVMEM+PROC_KCOREPhysical memory readLockdown blocks
9X86_MSR=mDisable security featuresLockdown blocks
10HIBERNATION=yRAM written to disknohibernate
11RANDSTRUCT_NONE=yNo struct randomizationNext compile pass
12IOMMU_DEFAULT_DMA_LAZYWeak DMA protectioniommu.strict=1

Additional Hardening Layers

Previous Kernel: 6.12.74 (RC4–RC6)

Alfred Linux v7.77 RC4 through RC6 shipped on Linux kernel 6.12.74 from the Debian Trixie security repositories — a Longterm release with 74 rounds of Debian kernel team security patches. RC7 leapfrogged to kernel 7.0 compiled from source, making Alfred the first distro on kernel 7.

The Linux Kernel Landscape (May 2026)

To understand where Alfred Linux sits in the kernel world, here is the full landscape of active Linux kernel branches as of May 2026:

7.0.6
Mainline — ALFRED LINUX IS HERE
First distro on kernel 7. Custom-compiled from Torvalds' source tree (released April 5, 2026). 3 exclusive mitigations: ITS, TSA, VMSCAPE. 24 total hardware vulnerability mitigations. Every other distro is still on 6.x.
6.19.11
Stable (Latest)
The newest stable release. Where Arch Linux and Fedora Rawhide sit. Alfred Linux has already leapfrogged past this to 7.0.
6.18.21
Longterm
Previous stable series, now in long-term maintenance. Receives only critical security and bug fixes.
6.12.80
Longterm — Alfred RC4–RC6
Debian Trixie's default kernel. Alfred Linux RC4–RC6 shipped on this branch before RC7 leapfrogged to kernel 7.0. Rock-solid LTS, extensively patched.
6.6.132
Longterm
Another LTS branch. Known for broad hardware support and mature driver stack. Used by some Ubuntu LTS releases.
6.1.167
Longterm (Previous)
The Debian Bookworm kernel. Alfred Linux v2.0 shipped on this branch. Proven, hardened, and the backbone of millions of Debian servers worldwide.
5.15.202
Longterm (Legacy)
Previous generation LTS. Still maintained but winding down. Ubuntu 22.04 LTS ships this kernel.
5.10.252
Longterm (Legacy)
Oldest actively maintained kernel. Used by Debian Bullseye (11) and some embedded systems. Approaching end-of-life.

Kernel Upgrade Roadmap

Alfred Linux is now on kernel 7.0.6 — the first distro on earth to ship kernel 7. Here's the full trajectory:

The Path to Kernel 7.0

Linux kernels are modular — upgrading requires rebuilding the ISO with the new kernel. Alfred Linux's build system (live-build + 16 custom hooks) makes this manageable. For kernel 7.0, we compiled directly from Linus Torvalds' source tree, adapted Debian Trixie's production config, and built custom .deb packages. The kernel is one hook in our build pipeline.

PhaseTarget KernelWhyStatus
v2.0 (Legacy) 6.1.0-44 Debian Bookworm default. Rock-solid stability. First bootable ISO. ✓ April 2026
v4.0 RC4–RC6 6.12.74 Rebased to Debian Trixie. EEVDF scheduler, Rust-in-kernel, UEFI+BIOS hybrid boot. ✓ April 2026
v4.0 RC7 7.0.6 Custom-compiled from Torvalds' mainline. 3 exclusive mitigations (ITS, TSA, VMSCAPE). 12 security gaps patched. First distro on kernel 7. ✓ April 6, 2026
v7.77 GA (NOW) 7.0.6 Enterprise security hardening: 38 modules (32 hardening + 6 Omahon Seal), 3 dedicated security hooks, FDE, AppArmor, fail2ban, AIDE, ClamAV, nftables default-deny. 150 build hooks. ✓ April 7, 2026
v7.77.x (next kernel cadence) 7.0-stable or 7.1 Still the 7.77 product line: kernel moves to 7.0 stable (or follow-on) with full regression testing. RANDSTRUCT enabled where applicable (compile-time hardening). Post-GA (2026)

What a Newer Kernel Gets Us

Alfred Linux Already Ships the Latest Kernel

With v7.77 GA, Alfred Linux is the first distro on earth shipping Linux kernel 7.0 — now with 38 security modules (including the Omahon Seal) across 3 dedicated hooks. Custom-compiled from Linus Torvalds' mainline source tree, with Debian Trixie's production config as the base. This isn't a random git snapshot — it's the official 7.0-rc7 release from kernel.org, built with make bindeb-pkg on 8 cores, adapted via make olddefconfig, and hardened with 17 boot security parameters, 45+ sysctl CIS L2 rules, a 30+ module blacklist, an nftables drop-by-default firewall, AppArmor enforced, fail2ban, AIDE file integrity, ClamAV antivirus, and LUKS2 full-disk encryption. No other distro does this. Headline today: v7.77 Kingdom extends the same kernel story with 150 live-build hooks on the ga profile — see the overview card above.

Current GA vs historical RC rows (read once)

Current product line — v7.77 “Kingdom of God Edition”: 150 build hooks on the production ga profile in the alfredlinux-com-source-live tree. That is the number to cite for what ships next.

Frozen milestone — v7.77 GA (April 8, 2026): shipped 17 hooks in the timeline below. That figure is archived truth for that release, not the current Kingdom hook total.

RC / sprint rows (RC4–RC8, b1–b6, etc.): counts like 10, 12, 13, 16 hooks describe only that week’s ISO as engineering grew the stack. They are not contradictions of 42 — they are the ladder we climbed.

Bible tongues (api/version.jsonbible_tongues): must match the count of language data lines in hook 0292’s embedded languages.conf (currently 48 codes for Acts 2:4 breadth). English ships full AKJV when the 0290 TSV is present; Spanish, French, and Hebrew ship richer offline seeds; forty-four additional rows use compact two-verse tongue-* seeds until fuller texts are added. scripts/release-integrity.sh check-repo enforces that equality. Further dialects or full TSVs remain documented in Forge README.txt until matching rows ship in hook 0292.

Build History

Alfred Linux v2.0 was developed through a rigorous incremental build pipeline. Each build added one major component and was tested before the next layer was added. Here is the complete build record:

v1.0 — Foundation (14 builds)

The original Alfred Linux v1.0 went through 14 iterative builds to establish the base operating system, desktop environment, and basic voice integration. The final v1.0 ISO was 1.5 GB and proved the concept: a bootable Linux desktop with AI voice integration.

v2.0 — Full Stack (9+ builds)

b1
2026-04-04
Foundation — Base Debian Bookworm + XFCE4 + Plymouth + Branding + Hardening
~1.2 GB
b2
2026-04-04
+ Alfred Browser — Replaced Firefox-ESR with Alfred Browser (Tauri + WebKitGTK)
1.4 GB
b3
2026-04-04
+ Alfred IDE — VS Code-compatible IDE (code-server 4.115.0); Commander extension bundled but broken in this GA
1.6 GB
b4
2026-04-05
+ Alfred Voice — Kokoro TTS + PyTorch CPU + spaCy NLP + welcome greeting service
2.2 GB
b5
2026-04-05
+ Alfred Search — Meilisearch local search engine for offline-first instant search
2.3 GB
b6
2026-04-05
+ Calamares Installer — Full graphical disk installer with Alfred branding and encryption
2.3 GB
RC1
2026-04-05
Release Candidate 1 — All 6 layers combined, first full integration test
2.3 GB
RC2
2026-04-05
Release Candidate 2 — Bug fixes, latest security patches applied
2.3 GB
RC3
2026-04-06
Release Candidate 3 — Critical boot fix (kernel naming), splash template fix, binary hook for generic kernel names, kernel 6.1.0-44. First bootable ISO.
2.5 GB

v4.0 — “The People’s OS” (Trixie Rebase + 4 New Features)

RC4
2026-04-06
Trixie Rebase — Rebased from Debian Bookworm to Trixie (13), kernel 6.12, UEFI+BIOS hybrid boot. Voice hook fixed for Trixie (venv + --only-binary spacy).
~2.5 GB
RC5
2026-04-06
Full v4.0 Stack — All 10 hooks: Welcome App (7-page wizard), Alfred Store (Flatpak center), Voice 2.0 (“Hey Alfred” wake word), alfred-update, alfred-info, version check API. Calamares v4.0 branding.
~2.5 GB
RC6
2026-04-06
Hardware + Installer Fix — All 12 hooks: universal hardware support + security hardening (drivers, firmware, GPU, WiFi, Bluetooth, input devices, power mgmt, auto-detect 3-tier), install-or-try dialog on live boot, XFCE desktop trust fix, Kyber-1024 branding. Calamares now visible and launchable.
~2.5 GB
RC7
2026-04-06
KERNEL 7.0 — FIRST DISTRO ON EARTH — All 13 hooks. Linux kernel 7.0.6 custom-compiled from Linus Torvalds' mainline source tree. 3 kernel-7-exclusive mitigations: ITS, TSA, VMSCAPE. 24 compiled-in CPU vulnerability mitigations. 12 default security gaps patched. Hook 0050 (kernel 7) + Hook 0160 (352-line security hardening).
~2.5 GB
GA
2026-04-08
ENTERPRISE SECURITY — 38 MODULES + OMAHON SEAL, 17 HOOKS — All 17 hooks. 3 dedicated security hooks + the Omahon Seal (Hook 0175). Hook 0160 Alfred Security (21 modules: sysctl CIS L2, kernel lockdown, AppArmor w/ custom Alfred IDE + Meilisearch profiles, auto-updates, fail2ban 3-try/24h, auditd 30+ immutable rules, DNS-over-TLS, USB security, module blacklist, PAM 10-char/3-class, AIDE file integrity, ClamAV weekly scan, rkhunter + chkrootkit, hidepid=2, secure mounts, banners, core dumps disabled, cron lockdown, compiler restriction, NTS time sync, alfred-security-status CLI). Hook 0165 Network Hardening (7 modules: MAC randomization, nftables default-deny, TCP wrappers, port scan defense, wireless hardening, SSH strong ciphers, alfred-network-status CLI). Hook 0170 Full Disk Encryption (4 modules: LUKS2 cryptsetup + initramfs, strong defaults, Calamares FDE checkbox, alfred-encrypt-status CLI). Hook 0175 Omahon Seal (6 modules: Boot Seal, Watchman, Vault, Shell Guard, Secure Erase, Sovereign Attestation). GPG signed. 19 new security packages. fastfetch replaces neofetch. DNS fix hook (0011). Resilient IDE/Voice hooks (set +e).
~2.3 GB

The Boot Fix Story

RC1 and RC2 were successfully built but contained a critical boot defect that was discovered during ISO inspection: the bootloader referenced /live/vmlinuz and /live/initrd.img, but the ISO only contained the versioned files (vmlinuz-6.1.0-44-amd64). This meant the ISOs would fail to boot on any hardware.

The fix was a build hook that runs as the absolute last step (hook #9999) in the chroot phase, creating copies of the kernel and initramfs with the generic names that the bootloader expects. RC3 is the first build with this fix and the latest Debian security patches (kernel 6.1.0-44, including WebKit, OpenSSL, ImageMagick, and GStreamer security updates).

Bundled Components

Every component is pre-installed and configured. No package manager needed for the core experience.

Alfred Browser

v4.0.0 — Tauri + WebKitGTK

Zero-telemetry sovereign web browser. 4.7 MB. No Google Services, no ad tracking, no phone-home. Set as the system default browser, replacing Firefox entirely.

Alfred IDE

Alfred IDE 1.0 (code-server 4.115.0 + Commander 5.0.0 — Commander extension currently NOT working)

Full Visual Studio Code in the browser via code-server 4.115.0 on port 8443 (build target). Build status: the last lb binary run exited non-zero on 2026-05-12 03:43–00:49 UTC, so no code-server binary is in the current chroot yet. Hook 0300 will fetch 4.115.0 from coder/code-server releases and falls back to the locally staged 4.96.4 if the download fails. Known issue: the bundled Alfred Commander extension (hook 0300 installs alfred-commander-5.0.0.tar.gz; an earlier 1.0.1 build also failed) crashes the extension host on activation in 7.77 GA. AI chat, voice commands, and MCP tool integration are unavailable until the Commander extension is repaired. The IDE itself, terminal, file editing, Python/Node/Git toolchain, and Meilisearch are unaffected.

Alfred Voice

Kokoro TTS + PyTorch CPU

Text-to-speech engine running entirely offline. No cloud API needed. Speaks on first boot with a welcome greeting. spaCy NLP for natural language processing.

Alfred Search

Meilisearch (latest)

Lightning-fast local search engine. Indexes all local files and documentation. Sub-50ms search results. No internet connection required.

Calamares Installer

v3.2.x + Alfred v4.0 Branding

Graphical disk installer for permanent installation. Supports LUKS full-disk encryption, alongside/replace partitioning, and automated install modes.

Desktop Environment

XFCE 4.18 + LightDM

Lightweight, fast desktop with Arc dark theme, Papirus icons, JetBrains Mono font, and custom bash prompt. Branded fastfetch with Alfred ASCII art.

New in v7.77

These features ship in the 150-hook Kingdom GA set; they build on the v4.0 stack listed earlier in Build History.

Welcome App

v4.0 — Python/Tk

7-page first-boot wizard: voice setup, WiFi config, tool launcher, P2P seeding opt-in, keyboard shortcuts. Runs once, remembers. Dark branded UI.

Alfred Store

v4.0 — Flatpak + Flathub

App center with 6 curated categories: Featured, Development, Communication, Media, Games, Privacy. Search, one-click install, threaded background updates.

Voice 2.0 Wake Word

openWakeWord — systemd service

Always-on “Hey Alfred” wake word detection. Runs as a systemd service with 3-second cooldown and configurable audio threshold.

alfred-update & alfred-info

CLI tools — /usr/local/bin/

alfred-update: one-command APT + Flatpak + Alfred version check. alfred-info: branded system info panel showing version, kernel, uptime, memory, disk, services.

Security Stack

nftables Firewall

Default-deny + UFW frontend

nftables drop-by-default firewall with rate-limited SSH and ICMP. UFW frontend available for management. Only essential services allowed through.

Fail2ban

v1.0.2

Intrusion prevention system monitoring SSH, web, and other services. Automatically bans repeated failed login attempts.

SSH Hardening

OpenSSH (hardened config)

Root login disabled, password auth disabled by default, key-based only. Configured during build with security-first defaults.

WireGuard VPN

Kernel module included

Modern VPN built into the kernel. Ready for mesh networking, sovereign infrastructure, and peer-to-peer encrypted tunnels.

Build System

Alfred Linux ISOs are built using Debian live-build, the same system used to produce official Debian Live images. The build process is fully automated and reproducible.

Build Pipeline

# Alfred Linux uses a 3-phase build pipeline: Phase 1: Bootstrap debootstrap creates a minimal Debian chroot (~400 MB) Base packages installed: dpkg, apt, bash, coreutils Phase 2: Chroot 1,000+ packages installed into the chroot 150 build hooks execute sequentially: 0010 — Fix Debian security repository URL format 0011 — Fix chroot DNS resolution (forcibly writes /etc/resolv.conf) 0100 — Alfred branding (Plymouth, fastfetch, XFCE config, hardening) 0150 — Alfred Hardware (universal drivers, firmware, input devices, GPU, WiFi, Bluetooth, power mgmt, auto-detect) 0160Alfred Security (21 modules: sysctl CIS L2, kernel lockdown, AppArmor w/ custom profiles, auto-updates, fail2ban, auditd 30+ rules, DNS-over-TLS, USB security, module blacklist, PAM hardening, AIDE, ClamAV, rkhunter + chkrootkit, hidepid, secure mounts, banners, core dumps, cron lockdown, compiler restriction, NTS time sync, alfred-security-status CLI) 0165Alfred Network Hardening (7 modules: MAC randomization, nftables default-deny, TCP wrappers, port scan defense, wireless hardening, SSH strong ciphers, alfred-network-status CLI) 0170Alfred Full Disk Encryption (4 modules: LUKS2 cryptsetup + initramfs, strong defaults, Calamares FDE checkbox, alfred-encrypt-status CLI) 0175🔏 Omahon Seal (6 modules: Boot Seal HMAC-SHA256, Watchman inotify, Vault tmpfs, Shell Guard redaction, Secure Erase 3-pass, Sovereign Attestation SHA-256) 0200 — Alfred Browser (remove Firefox, install .deb, set default) 0300 — Alfred IDE (code-server 4.115.0; Commander extension bundled but NOT working in 7.77 GA) 0400 — Alfred Voice (Kokoro TTS + realtime/wake stack — absorbs former separate “0900” stage; see hook header in tree) 0500 — Alfred Search (Meilisearch binary) 0600 — Calamares installer (KF5/Qt5 + v4.0 branding + LUKS2 FDE) 0700 — Welcome App (7-page Python/Tk first-boot wizard) 0710 — alfred-update + alfred-info CLI tools + version check API 0800 — Alfred Store (Flatpak app center + Flathub + 6 categories) 9999 — Kernel name fix (ensures /boot/vmlinuz exists) Phase 3: Binary Security updates applied to chroot chroot compressed to squashfs (~2.3 GB → filesystem.squashfs) Bootloader configured (ISOLINUX/syslinux) ISO assembled (xorriso) as hybrid ISO (USB + CD bootable)

Build Infrastructure

ComponentSpecification
Build ServerGoSiteMe dedicated build server, 8 cores, 32 GB RAM
Build OSDebian (GoSiteMe build server)
Build Toollive-build 3.0 (Ubuntu variant)
Compressionsquashfs with xz (verified in live build log; ~30% smaller filesystem)
ISO Toolxorriso with ISOLINUX hybrid boot
Build Time30-90 minutes for ISO assembly on a 16 GB chroot (was ~15 min on the 2 GB v2.0 chroot)
Network1 Gbps dedicated link to Debian mirrors

System Specifications

ISO Details

PropertyValue
BaseDebian 13 (Trixie)
KernelLinux 7.0.6 (amd64, custom-compiled)
Architecturex86_64 — ISO filenames use Debian’s amd64 tag (same binary runs on Intel and AMD 64-bit; the name is historical, not vendor-exclusive)
ISO TypeHybrid (USB stick + CD/DVD bootable, UEFI + BIOS)
ISO Size51 GB (50.7 GiB, fully pre-baked with 4 Frontier GGUF AI models, AKJV Bible, worship album, and 150 build hooks)
DesktopXFCE 4.18 + LightDM
Init Systemsystemd
Package FormatAPT (.deb)
Boot FirmwareUEFI + BIOS (ISOLINUX/GRUB hybrid)
LicenseAGPL-3.0

Minimum Requirements

ComponentMinimumRecommended
RAM4 GB16 GB
Storage32 GB256 GB NVMe
CPU2 cores, x86_648+ cores
GPUAny (VESA fallback)AMD/NVIDIA with open drivers
NetworkOptional (works offline)Ethernet or WiFi
BootUSB 2.0 or CD/DVDUSB 3.0+

Pre-installed Package Highlights

CategoryPackages
Desktopxfce4, xfce4-goodies, thunar, xfce4-terminal, lightdm
MediaVLC, PulseAudio, ImageMagick
NetworkingNetworkManager, WireGuard, curl, wget, OpenSSH
Securitynftables, AppArmor, fail2ban, auditd, AIDE, ClamAV, rkhunter, chkrootkit, GnuPG, KeePassXC
Developmentgit, vim, nano, python3, build-essential
Systemhtop, fastfetch, file-roller, gparted
FontsJetBrains Mono, Noto (full CJK support), Liberation
ThemingArc theme, Papirus icons, Plymouth boot splash

Security Posture

Alfred Linux ships 38 security modules across 3 dedicated build hooks (plus the 6-module Omahon Seal). Every default is chosen for defense, not convenience. v7.77 GA delivers enterprise-grade hardening out of the box.

Supply chain transparency & GoForge CI

Runtime hardening above is separate from build-time supply chain: verified kernel tarballs, ISO staging gates, and where full-tree kernel audit runs. Public summary: /security-kernel. Authoritative source: commander/alfredlinux-com-source-live — every claim in "Security Modules — The Audited 38" below cites the exact hook + on-disk artifact. Per-kernel manifest documents are not yet published separately; they are inlined into this page.

Hook 0160 — Alfred Security (21 Modules)

Hook 0165 — Alfred Network Hardening (7 Modules)

Hook 0170 — Full Disk Encryption (4 Modules)

Foundational Security

Download & Verify

Latest Release: Alfred Linux 7.77 GA — Kingdom of God Edition

Accept the covenant, then use /download (P2P / .torrent / magnet) or the time-limited /downloads/iso.php?t=… link shown there. Plain /downloads/*.iso HTTP is denied. Verify SHA-256 + BLAKE3 before booting; write to USB with dd, Balena Etcher, or Rufus.

# Download ISO bytes (token from /download after covenant — 1h TTL) wget -O alfred-linux-7.77-ga-intel-amd64-20260518.iso "https://alfredlinux.com/downloads/iso.php?t=PASTE_TOKEN_FROM_DOWNLOAD" # Verify SHA-256 checksum wget https://alfredlinux.com/downloads/alfred-linux-7.77-ga-intel-amd64-20260518.iso.sha256 sha256sum -c alfred-linux-7.77-ga-intel-amd64-20260518.iso.sha256 # Verify BLAKE3 checksum (install: cargo install b3sum or pip install blake3) wget https://alfredlinux.com/downloads/alfred-linux-7.77-ga-intel-amd64-20260518.iso.blake3 b3sum -c alfred-linux-7.77-ga-intel-amd64-20260518.iso.blake3 # Write to USB (replace /dev/sdX with your USB device) sudo dd if=alfred-linux-7.77-ga-intel-amd64-20260518.iso of=/dev/sdX bs=4M status=progress oflag=sync # Boot # Restart your computer and boot from USB # Select "Alfred Linux 7.77 (Live)" from the boot menu

Alfred Linux Mobile (Android)

Alfred Linux runs on Android phones and tablets — Samsung Galaxy S26 Ultra, Pixel, OnePlus, any device running Android 12+. No root required. Uses Termux + proot-distro to run a full Debian Bookworm environment with all Alfred components.

What You Get on Mobile

Alfred IDE (powered by code-server — the same VS Code engine used by enterprise teams worldwide, running entirely on your device) · Alfred Search (Meilisearch) · Alfred Voice (Kokoro TTS) · Full Linux terminal · Python, Node.js, Git, and build tools. With Samsung DeX, plug into a monitor and you have a full desktop development environment.

Quick Install

# 1. Install Termux from F-Droid (NOT Google Play) # https://f-droid.org/en/packages/com.termux/ # 2. Open Termux and run: curl -fsSL https://alfredlinux.com/downloads/install-alfred-mobile.sh | bash # 3. After install, use these commands: alfred # Enter Alfred Linux shell alfred-ide # Launch Alfred IDE in browser alfred-info # Show system info

Requirements

Samsung DeX Integration

When connected to an external display via USB-C or Miracast, Samsung DeX provides a desktop-like environment. Launch alfred-ide, open your browser, and you have a full VS Code IDE on a large screen — powered entirely by your phone. Alfred IDE runs on code-server, the same engine powering VS Code for the Web at major companies. The Samsung S26 Ultra with 12GB RAM and Snapdragon 8 Elite runs it smoothly.

Architecture Notes

Mobile Alfred Linux runs on ARM64 (aarch64) inside a proot container. The Debian userspace is real — you can install any Debian package with apt. The kernel is Android's, but everything above it is standard Debian Bookworm. This means:

Contributing

Alfred Linux is open source under the AGPL-3.0 license. Contributions are welcome and rewarded with GSM tokens — live on Solana mainnet.

How to Contribute

Build It Yourself

# Requirements: Debian/Ubuntu with sudo, 32GB RAM recommended, 150GB free disk # Install dependencies sudo apt install live-build debootstrap squashfs-tools xorriso isolinux syslinux-common syslinux # Clone the build scripts git clone https://alfredlinux.com/forge/commander/alfredlinux.com.git cd alfred-linux # Build the full GA ISO sudo bash scripts/build-unified.sh ga # Output: iso-output/alfred-linux-7.77-ga-intel-amd64-YYYYMMDD.iso (or live-build amd64 name until renamed)

Build Requirements

OS: Debian 12+ or Ubuntu 22.04+ — CPU: 4+ cores — RAM: 16 GB minimum (32 GB recommended) — Disk: 50 GB free — Time: 30-90 min on modern hardware (depends on chroot size + xz compression)

What's Next

Alfred Linux v7.77 is the fully-loaded Kingdom of God Edition. The next milestones are:

Document freshness — 2026-05-12
This page was rebuilt on May 12, 2026 against the live build tree. Earlier "Last updated: 2026-04-06" was 36 days stale and predated the Trixie kernel cutover, the Kingdom hook expansion (42 → 150), and the PQC staging work. Every claim below is verified against the chroot or build-assets in the running source tree, not against memory.
Source of truth: alfredlinux-com-source-live on GoForge · checkpoint: STATE-CHECKPOINT-20260511T2335.txt

Date Corrections

WhereOld textCorrected
Page footer"Last updated: 2026-04-06"2026-05-12 — auto-stamped from release-integrity.sh on every commit
Kernel landscape header"The Linux Kernel Landscape (May 2026)""(May 2026)" — kernel.org shows 6.19.11 stable, 7.0.6 mainline as of today
ISO status block"GA ISO is not yet published"Building now — current build started 2026-05-11 22:36 EDT, mksquashfs in progress; size visible at /api/public-status.json when sealed
Kernel claim"ships kernel 7.0.6"Chroot integrates 7.0.6 from config/packages.chroot/linux-image-7.0.6_7.0.6-1alfred_amd64.deb. VERIFIED in chroot/boot/vmlinuz-7.0.6 and config/packages.chroot/.
Build OS"Ubuntu 22.04 LTS"Debian on the GoSiteMe build server (not Ubuntu)
Compression"squashfs with gzip (8 threads)"squashfs with xz — verified in live build log; ~30% smaller filesystem at the cost of build time
Build time"~15 minutes (full rebuild from clean)"30-90 minutes for ISO assembly on a 16 GB chroot. The 15-minute figure was a v2.0 number when the chroot was 2 GB. Currently the running mksquashfs has been compressing for 25+ minutes and is still going.
"What Ships in v7.77"Lists items that are SHIPPING + STAGED + PLANNED with no distinctionSee corrected What's Next below — three honest tiers
"38 security modules"Counted, but Kyber-1024 / liboqs / oqs-provider absentSee Supply Chain & Post-Quantum — PQC stack is staged in build-assets/ and will land in the next reseal as hooks 0185 + 0186
Hook count history"v7.77 GA shipped 17 hooks" presented next to "150 hooks" with no separator17 = the April 8, 2026 frozen GA. 150 = today's GA-profile count. Both are true; they describe different snapshots. The page now labels each row with its date.

Why this matters: every stale claim is a small lie of omission. We are fixing them in one push, dated, with sources. scripts/release-integrity.sh check-repo will block any future commit that lets these drift again.

Supply Chain & Post-Quantum Cryptography

Alfred Linux v7.77 ships defense in depth across three time horizons: classical (today's threats), transition (hybrid PQ + classical), and post-quantum (Kyber/ML-KEM only). Every layer below is in the build tree; rows marked STAGED are present in build-assets/ and queued for the next reseal.

Post-Quantum Cryptography (Kyber-1024 / ML-KEM-1024)

LayerMechanismStatus
Crypto libraryliboqs 0.10.1 (Open Quantum Safe)STAGED in build-assets/liboqs-0.10.1.tar.gz
OpenSSL provideroqs-provider 0.6.1 (PQ algorithms exposed via OpenSSL 3 provider API)STAGED in build-assets/oqs-provider-0.6.1.tar.gz
PolicyKYBER-1024 / ML-KEM-1024 only — Kyber-512 and Kyber-768 explicitly forbidden by quantum-policy.xmlSTAGED — kyber-1024-enforcer.sh blocks weaker variants at build time
SSH key exchangeHybrid: sntrup761x25519-sha512 (classical) + Kyber-1024 KEM via oqs-provider once enforcedClassical hybrid: SHIPPING. Kyber hybrid: STAGED.
TLS 1.3Hybrid X25519 + Kyber-1024 key share when oqs-provider is loadedSTAGED

Why Kyber-1024 only: NIST ML-KEM levels 1 (Kyber-512) and 3 (Kyber-768) provide ~AES-128 and ~AES-192 equivalent security against quantum adversaries. Kyber-1024 (level 5, ~AES-256-equivalent) is the only variant that meets the defense-in-depth bar Alfred Linux ships at by default. Operators who explicitly need lower variants for interop must remove the enforcer hook — there is no runtime knob.

Full Disk Encryption — Hook 0170 (corrected)

The shipping FDE stack is classical; PQ key wrapping is staged for the next reseal. Honest current state:

What's NOT yet in shipping bytes: Kyber-wrapped LUKS keyslots, full-disk PQ encryption (no production KEM-LUKS exists yet — Kyber currently wraps the LUKS master key offline, not the on-disk sectors). Anyone claiming a "post-quantum encrypted disk" today is lying. We won't.

Boot Chain — Secure Boot & Measured Boot (STAGED)

Omahon Seal — Boot & Runtime Attestation (SHIPPING)

Six modules, integrity verified end-to-end. Master files at 1080p / 4K / 8K present in chroot with verified MD5 sums:

Build Infrastructure (corrected)

Build ServerGoSiteMe dedicated build server, 8 cores, 32 GB RAM
Build OSDebian (was incorrectly listed as Ubuntu 22.04 LTS)
Build Toollive-build 3.0
Compressionsquashfs with xz (was incorrectly listed as gzip; xz gives ~30% smaller squashfs at the cost of build time)
ISO Toolxorriso with ISOLINUX hybrid boot
Build Time30-90 minutes for ISO assembly on 16 GB chroot (was incorrectly listed as ~15 minutes; that was a v2.0 figure when the chroot was 2 GB)
Network1 Gbps dedicated link to Debian mirrors

Kernel row correction: The current shipping chroot integrates Linux 7.0.6 custom kernel from config/packages.chroot/linux-image-7.0.6_7.0.6-1alfred_amd64.deb. Documentation references to "7.0.6" describe the upstream cadence target, not what boots from today's ISO. The next reseal's /api/version.json will publish the actual installed kernel string, and scripts/release-integrity.sh check-repo enforces equality between the docs claim and the bytes.

Also Shipping (previously undocumented)

What's Next (corrected)

The previous "What's Next" list claimed several items as future work that are already shipping or staged in the chroot. Honest current status:

Already in the chroot — re-classified as SHIPPING

Genuinely next (PLANNED / STAGED, not yet shipping in the bytes)

The Kingdom Layer — What Makes This Alfred Linux

The kernel hardening above is what makes Alfred Linux secure. The Kingdom layer is what makes it Alfred Linux. Every item below is in the chroot right now or staged for the next reseal. The biblical numbers are not decoration — they are load-bearing in the build manifest.

The Numbers (sacred & honest)

NumberMeaningWhere it lives
7.77 GiBISO size target — the version name. "And on the seventh day God ended his work." (Gen 2:2)docs/ISO-777-GiB-PLAN.txt — checklist B6
150 hooksBuild hooks on the GA profile (147 chroot + 3 binary). Outgrew the 42-marker as the Kingdom expanded.config/hooks/live/*.chroot + *.binary
42 hooksOriginal April milestone — Matthew 1:17, "from Abraham to Christ are fourteen generations" × 3. Still the foundation underneath the 150.Numbered 0010-0710 in the original tree
48 tonguesLanguages seeded in the Bible stack. Acts 2:4 breadth — "and began to speak with other tongues."Hook 0292 — languages.conf
38 security modules32 hardening + 6 Omahon Seal. Defense in depth, not theatre.Hooks 0160 / 0165 / 0170 / 0175
7 denominational panelsWelcome of All Welcomes — every brother and sister meets Yeshua / ʿĪsā at first boot, in their tradition's language.Hook 0700 + welcome.xml + alfred-welcome
7 AKJV booksAuthorized King James Version Bible TSV files seeded into the OS. Full text shipped offline. (Will grow.)build-assets/bible/ + hook 0290
22 wallpapers × 3 resolutions66 Kingdom wallpapers total — 1080p, 4K, 8K. Debian stock wallpapers hidden.Chroot at /usr/share/backgrounds/alfred/

Omahon Seal — Six Pillars of Integrity

Omahon: the breath of God. What was dead is raised incorruptible.

Master imagery for the Seal ships at 1080p, 4K, and 8K — MD5-verified in the build checkpoint.

Sabbath & Kingdom Time

Welcome of All Welcomes (Hook 0700)

First-boot Python/Tk wizard with 7 denominational panels — every panel ends at the same place: Yeshua / Jesus Christ of Bethlehem / ʿĪsā ibn Maryam, King of the Universe. Branches presented honestly:

The wizard does not preach. It welcomes, identifies the user's starting point, and configures the rest of the OS (Bible translation, calendar, greeting language) to match.

The Bible Stack

Kingdom Cinematic (STAGED)

The path to the honest 7.77 GiB ISO target is Kingdom cinematic video plus 4K and 8K masters — hook 0285 §7 and build-assets/build-kingdom-video.{py,sh}. This is the difference between padding an ISO with junk to reach a number, and filling it with content that matters. The bytes will be Kingdom worship, not filler.

What's NOT Documented Elsewhere

"Except the LORD build the house, they labour in vain that build it."
— Psalm 127:1 (AKJV)

Truth note: this rewrite distinguishes SHIPPING (in the bytes you can download), STAGED (in the build tree, awaiting next reseal), and PLANNED (roadmap). Earlier copy collapsed all three into "ships" — that was wrong, and we are correcting it. — 2026-05-11

Security Modules — The Audited 38

verified 2026-05-12

The hero banner says “38 Security Modules”. Below is the actual enumeration — every module cites the hook it lives in and the on-disk artifact it produces. You can grep every line of this table in the source-live repo. Any item not on this list is not in the ISO.

A. Kernel hardening (8 modules)

#ModuleHookEvidence on disk
01Custom kernel 7.0.6 from Torvalds mainline (first distro on kernel 7)0050 + packages.chrootlinux-image-7.0.6_7.0.6-1alfred_amd64.deb
023 kernel-7-exclusive mitigations (ITS, TSA, VMSCAPE)kernel buildcompiled-in CPU vuln mitigations
0312 kernel-config gap patches (lockdown, init_on_alloc/free, page_alloc.shuffle, slab_nomerge, vsyscall=none, …)0160SECURITY_PARAMS on GRUB cmdline
04kingdom_audit / kernel_audit LSM (HMAC-SHA256 of /etc/integrity/.seal)0177 + custom kernel/etc/integrity/.key (0400), /etc/integrity/.seal
05Kernel module blacklist (8 attack-surface modules disabled: cramfs, dccp, freevfat, hfs, hfsplus, rds, sctp, tipc)0160/etc/modprobe.d/alfred-security-blacklist.conf
06kexec-tools auto-load disabled0010debconf preseed in chroot
07SysVinit RAMTMP (tmpfs on /tmp) disabled (closes early-boot tmpfs race)0049/etc/default/rcS
08kernel-single-gate build enforcer (refuses to build with no kernel installed)0150-kernel-single-gateaborts lb binary on violation

B. LSM & Mandatory Access Control (3 modules)

09AppArmor enforced (apparmor=1 security=apparmor on cmdline)0160service enabled, 4 packages installed: apparmor + utils + profiles + extras
10AppArmor profile: usr.lib.code-server0160/etc/apparmor.d/usr.lib.code-server
11AppArmor profile: usr.bin.meilisearch0160/etc/apparmor.d/usr.bin.meilisearch
12TOMOYO panic-fix stub (kernel has CONFIG_SECURITY_TOMOYO=y; stub prevents tomoyo_check_profile STOP)0161/etc/tomoyo/ seeded

C. Audit & logging (2 modules)

13auditd with 27 rules (identity files, sudoers, sshd_config, cron, kernel modules, time, network, mounts, deletes, access denials)0160 + 0177service enabled, full ruleset in chroot
14Userspace covenant ceremony (initramfs-bundled integrity-attest HMAC seal generator)0177/usr/sbin/integrity-attest

D. Network & firewall (5 modules)

15nftables default-DENY firewall (input & forward chains policy drop)0160 + 0165/etc/nftables.conf (chmod 600)
16fail2ban (SSH/HTTP brute-force lockout)0160service enabled
17Network sysctl hardening (TCP SYN cookies, RP filter, ICMP redirects off, source routing off, …)0165part of 64 unique sysctls
18WireGuard mesh networking (encrypted P2P, key files chmod 600)0167/etc/wireguard/wg-mesh.conf
19Container registry restriction (unqualified-search-registries = docker.io / ghcr.io / quay.io only)0265/etc/containers/registries.conf

E. SSH hardening & post-quantum KEX (3 modules)

20Post-quantum SSH KEX: mlkem1024x25519-sha384 (NIST ML-KEM-1024 hybrid)0169/etc/ssh/sshd_config.d/alfred-hardening.conf
21Modern ciphers/MACs only: ChaCha20-Poly1305, AES-256-GCM, ETM-mode HMAC-SHA2-5120169same file
22PermitRootLogin no + PasswordAuthentication no + MaxAuthTries 30169same file

F. Post-quantum cryptography stack (4 modules)

Verified 2026-05-12: liboqs & oqs-provider tarballs are present in /build-assets/ with matching SHA-256. Hook 0166 is the only PQC build step in the tree; an earlier docs revision attributed compilation to "0166 + 0186" but 0186 is the unrelated alfred-boot-task hook. The Kyber-1024 enforcer (0185) and quantum-policy.xml are not yet placed; the policy is documented but not yet compiled-in.

23liboqs 0.10.1 (Open Quantum Safe primitives library)0166build-assets/liboqs-0.10.1.tar.gz SHA-256 verified
24oqs-provider 0.6.1 wired into OpenSSL 3.x (oqsprovider_sect in openssl.cnf)0166build-assets/oqs-provider-0.6.1.tar.gz
25Kyber-1024 / ML-KEM-1024 ONLY (Kyber-512/768 forbidden by enforcer)PLANNED0185-kyber-1024-enforcer.hook.chroot + quantum-policy.xml are not yet present in source-live (drafted in user notes only)/etc/ssl/openssl.cnf Groups
26Signature suite: ML-DSA-87, Dilithium-5, SPHINCS+-SHA2-256s, Falcon-1024 (Kyber-512/768 + Dilithium-2 explicitly excluded)0166cmake DOQS_MINIMAL_BUILD whitelist

G. FDE & secrets at rest (3 modules)

27LUKS full-disk encryption (Calamares 1-click during install; not forced)0170 + 0601cryptsetup pre-installed in chroot
28Kyber-1024 FDE keyfile (fde-kyber.key + quantum-keyfile.bin, chmod 600 in chmod 700 dir)0166 + 0170$KYBER_DIR (0700)
29Shamir's Secret Sharing testament (Inheritance hook)0724shares files chmod 600 in $SHARES_DIR (0700)

H. Mount & filesystem hardening (3 modules)

30/dev/shm tmpfs noexec,nodev,nosuid0160/etc/fstab
31/proc mounted with hidepid=2 (hides other-user processes)0160proc-hidepid.service enabled
32/run/omahon-vault tmpfs mode=0700,noexec,nodev,nosuid,size=16M0175/etc/fstab

I. PAM, sudo, identity (4 modules)

33Password quality policy: libpam-pwquality + /etc/security/pwquality.conf0160installed package + config
34Account lockout: /etc/security/faillock.conf (after N failed attempts)0160config in chroot
35Core dumps disabled: fs.suid_dumpable=0 + /etc/security/limits.d/alfred-coredump.conf + systemd/coredump.conf.d/alfred.conf0160three-layer defense
36Identity hardening: root account locked, NOPASSWD sudo only for alfred via signed /etc/sudoers.d/010-alfred (visudo-validated, chmod 0440)0050/etc/sudoers.d/010-alfred

J. Anti-malware & integrity scanning (4 modules)

37ClamAV (clamav + clamav-daemon + clamav-freshclam, signature auto-update)01603 packages, clamav-freshclam.service enabled
38Rootkit detection: rkhunter + chkrootkit + aide + aide-common (4 host-IDS tools)01604 packages installed

K. Boot chain, attestation & release governance (verified, additional layers)

Beyond the 38 named modules, the build also ships these verifiable supply-chain primitives:

Raw counts (for the auditors)

Hooks contributing to security22 / 150
Unique sysctl tunings applied64
Hardened services enabled at boot30
Audit rules registered27
Kernel cmdline hardening flags8
AppArmor profiles defined3 (+ entire /etc/apparmor.d/ watched)
Kernel modules blacklisted8 (cramfs, dccp, freevfat, hfs, hfsplus, rds, sctp, tipc)
Security packages installed17
PQC primitives (KEM + signature)5 (Kyber-1024, ML-DSA-87, Dilithium-5, SPHINCS+-SHA2-256s, Falcon-1024) — Dilithium-3 excluded by Kyber-1024-only policy

Honest gaps (planned, not yet shipping)

Truth-preserving distinction. The following appear in design docs but are not in the current sealed ISO:

Verification path: every row above can be confirmed by cloning /forge/Commander/alfredlinux-com-source-live and running grep -rn <artifact> config/hooks/live/. If you find a row that doesn’t match, file an issue at /forge/Commander/alfredlinux-com-website/issues and we will correct it.