PH4NTXM β Official Public Repository
PH4NTXM is an Adaptive Identity Engine embedded within a live-only, stateless operating system. It is engineered for high-risk forensic research environments where compromise, seizure, or deep inspection are treated as inevitable conditions.
EXIT EQUALS ERASURE.
π Documentation
- Technical Overview β TECHNICAL-OVERVIEW.md
- Operational Tools β OPERATIONAL-TOOLS.md
- Distribution β DISTRIBUTION.md
πͺ Boot Personas
At startup PH4NTXM requires the operator to select a boot persona.
This selection occurs before any external network interaction and defines the systemβs operational posture for the entire session.
Each persona aligns network behavior, identity characteristics, and system fingerprinting patterns into a coherent operational model, preventing cross-layer inconsistencies that modern tracking systems rely on.
Available personas include:
-
LINUX
Network and system characteristics aligned with a modern Linux environment. -
WINDOWS
Behavioral and networking patterns modeled after contemporary Windows systems. -
ANDROID
Mobile-oriented identity and network characteristics. -
LONE WOLF
Isolation persona enforcing Tor-only networking.
All outbound traffic is transparently redirected through Tor with default-deny firewall rules and kernel-level controls designed to prevent clearnet leakage.
Once selected, the persona governs system behavior for the duration of the session.
β‘ Operational Architecture
The system is engineered around 14 core pillars of volatility and forensic resistance.
π‘οΈ Identity & Fingerprint Armor
-
Identity Dissolution
Hardware IDs, hostnames, and machine fingerprints are regenerated every boot. -
Dynamic Personas
Automatic generation of region-agnostic operational identities. -
Clock & Temporal Fuzzing
Subtle clock offsets to disrupt timestamp-based session correlation.
π Network Untraceability
-
Network Stack Fuzzing
Randomized TCP behavior and packet-level characteristics to prevent passive fingerprinting. -
Rotating DNS System
New resolver selection at every boot to mitigate metadata tracking. -
Lockdown Mode
Instant hardware-level network isolation (kill-switch). -
Tor & Brave Integration
Hardened, anonymous browsing paths enabled by default.
β£οΈ Memory & State Destruction
-
Amnesic Live Execution
Entire operating system runs exclusively in volatile RAM. No persistence by design. -
Nuke Kernel
Dedicated panic kernel (kexec) ensuring irreversible memory wiping on exit. -
Decoy RAM Seeding
Continuous memory contamination with cryptographic noise to defeat cold-boot and post-mortem analysis. -
USB Removal Nuke
Physical media removal triggers immediate, destructive teardown.
π System Hardening
-
Sensor Lockdown
Kernel-level detachment of microphone, camera, and audio drivers. -
Hardened Baseline
ASLR enforcement, namespace restriction, and privileged interface lockout. -
Volatile Firewall
Real-time brute-force defense operating strictly in-memory.
π Post-Quantum Cryptography
PH4NTXM integrates post-quantum cryptographic capabilities directly into the operating systemβs networking stack.
The build pipeline compiles the post-quantum provider from the Open Quantum Safe project and embeds it into the system during ISO creation.
Supported capabilities include:
-
Post-Quantum TLS
Hybrid key exchange using ML-KEM combined with modern elliptic-curve cryptography for forward compatibility with future quantum-resistant internet standards. -
Post-Quantum SSH
Hybrid key exchange mechanisms supported by modern OpenSSH implementations, enabling quantum-resistant secure shell sessions when supported by remote servers. -
System-wide Cryptographic Policy
PQ-capable algorithms are prioritized automatically across applications linked to the system OpenSSL libraries.
These mechanisms allow PH4NTXM to negotiate post-quantum hybrid encryption transparently whenever supported by external infrastructure, while maintaining secure classical fallback for compatibility with existing systems.
The goal is to provide a future-resilient cryptographic baseline aligned with the ongoing post-quantum standardization efforts led by the National Institute of Standards and Technology (NIST).
π Build Specifications
| Feature | Specification |
|---|---|
| Base System | Debian / XFCE (Hardened) |
| Architecture | AMD64 |
| Execution | RAM-only (USB removal ready) |
| Networking | Tor & Brave by default |
| Defense | Kernel-level sensor lockout |
π‘ Licensing & Source Code
PH4NTXM is a commercial, proprietary operating system.
This repository does not host source code or binaries for public distribution.
- Distribution: Controlled and on-demand
- Auditability: Full source code is provided only to verified licensees for independent audit and verification
- Terms: Reproduction or unauthorized redistribution is strictly prohibited
π© Contact & Ordering
To request access or verify a build, establish a secure connection using the PGP-encrypted channel below:
- Email:
ph4ntxmos@proton.me - PGP Key: Available in
ph4ntxm-public-key.ascwithin this repository
Note
Only PGP-encrypted communications from secure providers will be processed.
Clear all metadata from attachments before transmission.
π Legal
PH4NTXM is provided for lawful security research and authorized auditing only.
The operator assumes all responsibility for the use of this system.