Co-Founder & Security Engineer at Distrust (https://distrust.co)
Firm specializing in high assurance security consulting and engineering.
Clients: blockchain labs and companies, fin-tech, hedge funds, exchanges, electrical grid operators, healthcare providers, etc.
"[Supply chain threats increased by 1300% between 2020 and 2023]"
70%+ servers run Linux
~5% desktop / laptop users use Linux
~12 widely used Linux distributions
High risk environments require verifiability
Proprietary software = security through obscurity
Linux kernel
Software "packages"
Package manager
But they are not all equal...
What machine are packages built on?
Who maintains your Linux packages?
How are the packages delivered?
Mainainer creates a "package"
The package is reviewed
A centralized server builds the binary and signs it
Reproducible / deterministic builds
Full source bootstrapping
Cryptographic signing
Compiler
Build and Runtime Environment
Operating System + Packages
Additional CLI / Tools
Software Application
First Party Code
Third Party Code
Mostly downloaded as a binary
Even if the compiler is built from source, usually another compiler is used to do so
This means there is no clear providence to how we went from nothing to having a usable compiler
Consists of "stages", and hundreds of steps of starting from a human auditable rudimentary compiler and building up all the way up to a modern compiler
Bootstrapping programming languages
Code signing
Artifact signing
Multi-person signing
Open source Linux Distribution
From a <190 byte compiler written in machine code, StageX bootstraps all the compiler tools necessary to build the distribution, 100% deterministically.
FROM stagex/pallet-rust@sha256:b5bb9d8014a0f9b1d61e21e796d78dccdf1352f23cd32812f4850b878ae4944c AS build ADD . /src WORKDIR /src ARG TARGET x86_64-unknown-linux-musl RUN cargo build --release --target ${TARGET} FROM scratch COPY --from=build /app/target/${TARGET}/release/hello /usr/bin/hello CMD ["/usr/bin/hello"]
Built using hash-locked sources
Confirmed reproducible by multiple developers
Signed by multiple release maintainers
StageX offers prebuilt containers including all the packages necessary to run some of our most used software, such as:
rust
go
nodejs
nginx
redis
postgres
Full-source bootstrap
Use bit for bit determinism
Leverage cryptographic signing
Adding SBOM
Packaging more software
Fully automating software updates
Additional container runtimes like Podman and Kaniko
Additional chip architecture support such as ARM and RISC-V
Provide feedback
Support with development efforts
Become a sponsor
Email: anton@distrust.co / sales@distrust.co
Matrix Chat: #stagex:matrix.org
Docker Hub: https://hub.docker.com/u/stagex
Git Repo: https://codeberg.org/stagex/stagex
AirgapOS: https://git.distrust.co/public/airgap
EnclaveOS: https://git.distrust.co/public/enclaveos