GitHub - PH4NTXMOFFICIAL/PH4NTXM

4 min read Original article β†—

PH4NTXM β€” Official Public Repository

PH4NTXM is an Adaptive Identity Engine embedded within a live-only, stateless operating system. It is engineered for high-risk forensic research environments where compromise, seizure, or deep inspection are treated as inevitable conditions.

EXIT EQUALS ERASURE.


πŸ“„ Documentation

  • Technical Overview β†’ TECHNICAL-OVERVIEW.md
  • Operational Tools β†’ OPERATIONAL-TOOLS.md
  • Distribution β†’ DISTRIBUTION.md

πŸšͺ Boot Personas

At startup PH4NTXM requires the operator to select a boot persona.
This selection occurs before any external network interaction and defines the system’s operational posture for the entire session.

Each persona aligns network behavior, identity characteristics, and system fingerprinting patterns into a coherent operational model, preventing cross-layer inconsistencies that modern tracking systems rely on.

Available personas include:

  • LINUX
    Network and system characteristics aligned with a modern Linux environment.

  • WINDOWS
    Behavioral and networking patterns modeled after contemporary Windows systems.

  • ANDROID
    Mobile-oriented identity and network characteristics.

  • LONE WOLF
    Isolation persona enforcing Tor-only networking.
    All outbound traffic is transparently redirected through Tor with default-deny firewall rules and kernel-level controls designed to prevent clearnet leakage.

Once selected, the persona governs system behavior for the duration of the session.


⚑ Operational Architecture

The system is engineered around 14 core pillars of volatility and forensic resistance.

πŸ›‘οΈ Identity & Fingerprint Armor

  • Identity Dissolution
    Hardware IDs, hostnames, and machine fingerprints are regenerated every boot.

  • Dynamic Personas
    Automatic generation of region-agnostic operational identities.

  • Clock & Temporal Fuzzing
    Subtle clock offsets to disrupt timestamp-based session correlation.


🌐 Network Untraceability

  • Network Stack Fuzzing
    Randomized TCP behavior and packet-level characteristics to prevent passive fingerprinting.

  • Rotating DNS System
    New resolver selection at every boot to mitigate metadata tracking.

  • Lockdown Mode
    Instant hardware-level network isolation (kill-switch).

  • Tor & Brave Integration
    Hardened, anonymous browsing paths enabled by default.


☣️ Memory & State Destruction

  • Amnesic Live Execution
    Entire operating system runs exclusively in volatile RAM. No persistence by design.

  • Nuke Kernel
    Dedicated panic kernel (kexec) ensuring irreversible memory wiping on exit.

  • Decoy RAM Seeding
    Continuous memory contamination with cryptographic noise to defeat cold-boot and post-mortem analysis.

  • USB Removal Nuke
    Physical media removal triggers immediate, destructive teardown.


πŸ”’ System Hardening

  • Sensor Lockdown
    Kernel-level detachment of microphone, camera, and audio drivers.

  • Hardened Baseline
    ASLR enforcement, namespace restriction, and privileged interface lockout.

  • Volatile Firewall
    Real-time brute-force defense operating strictly in-memory.


πŸ” Post-Quantum Cryptography

PH4NTXM integrates post-quantum cryptographic capabilities directly into the operating system’s networking stack.

The build pipeline compiles the post-quantum provider from the Open Quantum Safe project and embeds it into the system during ISO creation.

Supported capabilities include:

  • Post-Quantum TLS
    Hybrid key exchange using ML-KEM combined with modern elliptic-curve cryptography for forward compatibility with future quantum-resistant internet standards.

  • Post-Quantum SSH
    Hybrid key exchange mechanisms supported by modern OpenSSH implementations, enabling quantum-resistant secure shell sessions when supported by remote servers.

  • System-wide Cryptographic Policy
    PQ-capable algorithms are prioritized automatically across applications linked to the system OpenSSL libraries.

These mechanisms allow PH4NTXM to negotiate post-quantum hybrid encryption transparently whenever supported by external infrastructure, while maintaining secure classical fallback for compatibility with existing systems.

The goal is to provide a future-resilient cryptographic baseline aligned with the ongoing post-quantum standardization efforts led by the National Institute of Standards and Technology (NIST).


πŸ›  Build Specifications

Feature Specification
Base System Debian / XFCE (Hardened)
Architecture AMD64
Execution RAM-only (USB removal ready)
Networking Tor & Brave by default
Defense Kernel-level sensor lockout

πŸ›‘ Licensing & Source Code

PH4NTXM is a commercial, proprietary operating system.
This repository does not host source code or binaries for public distribution.

  • Distribution: Controlled and on-demand
  • Auditability: Full source code is provided only to verified licensees for independent audit and verification
  • Terms: Reproduction or unauthorized redistribution is strictly prohibited

πŸ“© Contact & Ordering

To request access or verify a build, establish a secure connection using the PGP-encrypted channel below:

  • Email: ph4ntxmos@proton.me
  • PGP Key: Available in ph4ntxm-public-key.asc within this repository

Note
Only PGP-encrypted communications from secure providers will be processed.
Clear all metadata from attachments before transmission.


πŸ“œ Legal

PH4NTXM is provided for lawful security research and authorized auditing only.
The operator assumes all responsibility for the use of this system.