{%- include head.html -%} {%- include header.html -%}
software

open source tools for verifiable security


Most systems still rely on single individuals or computers, unverifiable software, and opaque processes. We’re redesigning security for transparency from the ground up.

live tools

Open source. Verifiable. Ready to use.


StageX

Minimal, security-first Linux distribution for verifiable builds. Bootstrapped from Stage 0, it's hermetic, reproducible, and cryptographically multi-signed.

AirgapOS

Immutable Linux distribution for offline secret management. Diskless, reproducible, and hardened for air-gapped environments.

Keyfork

Deterministic key management toolchain—offline, air-gapped and smartcard-ready. Built for secure recovery, reproducibility, and cryptographic resilience.

Icepick

Framework for building offline-first cryptocurrency tools—supporting transfers, staking, and signing across Bitcoin, Ethereum, Solana, and more.

live tools

XXXX Open source. Verifiable. Ready to use.

StageX

Minimal, security-first Linux distribution for verifiable builds. Bootstrapped from Stage 0, it's hermetic, reproducible, and cryptographically multi-signed.

View git repository
AirgapOS

Immutable Linux distribution for offline secret management. Diskless, reproducible, and hardened for air-gapped environments.

View git repository
Keyfork

Deterministic key management toolchain—offline, air-gapped and smartcard-ready. Built for secure recovery, reproducibility, and cryptographic resilience.

View git repository
Icepick

Framework for building offline-first cryptocurrency tools—supporting transfers, staking, and signing across Bitcoin, Ethereum, Solana, and more.

View git repository

our roadmap

We're actively building some tools—and raising support to build others. Here's what's in-progress and what's coming next.

{% include powered-by.html %}

building the missing pieces for provable security

Modern software systems still rely on trust—maintainers, IT admins, third-party providers. But what happens when they are compromised? How do you verify that your systems haven't been tampered with?

We’ve identified critical gaps and built tools to remove single points of failure across all levels of the software lifecycle—from toolchains and dependencies to how code is built, signed, verified and deployed.

By combining multi-party trust, remote attestation, and bit-for-bit reproducibility, we are eliminating trust assumptions, ensuring security isn't just a claim—it's provable. And as everything we do, all our software is open source.

See what we're building

❝You can't build a better world on unverifiable systems. We eliminate single points of failure by rethinking security from first principles, and open sourcing everything we build.❝ — Distrust team

want to help with our vision?

Fund the work. Fork the code. Join the mission.

{%- include footer.html -%}