Killswitch Ready Mobile OS
Built from first principles. No compromises.
I spent 20 years climbing cell towers and debugging RF systems. You know what I learned? Every OS we use is built on 50-year-old assumptions that don't make sense anymore.
So I built ferros. It's not Android with modifications. It's not Linux for mobile. It's a ground-up rethinking of what an operating system should be when you actually care about security, performance, and mathematical correctness.
The kill-switch isn't a feature. It's the architecture.
Click the image or plug to toggle power
instant shutdown and <1s boot time,
Full OS in under 3 seconds
Power loss at any moment is normal operation. Not an edge case. Not something to "handle gracefully." Just normal.
Hardware cutoff, no software in the loop
Ring architecture has no partial states to save
Boot and continue, no fsck or "recovery mode"
Operations complete or never existed
Traditional systems need complex shutdown because they maintain invariants: "page table must be consistent," "superblock must be updated," "buffers must be flushed."
ferros has one invariant: the ring is always valid. And because it's a ring, any point on it is as good as any other.
No beginning, no end. Addresses wrap using two's complement. Buffer overflows? Can't happen - there are no boundaries to overflow.
Every process gets two numbers:
Memory access check is two instructions:
fn check_access(ptr: usize, offset: usize, limit: usize) -> bool {
(ptr.wrapping_sub(offset)) < limit
}
Two CPU cycles. No page table lookups, no TLB, no segmentation faults.
Traditional systems: 5-10 memory accesses every TLB miss
ferros: 2 CPU cycles every time
Encryption keys live in CPU registers, never RAM. Custom RISC-V CSRs or ARM TrustZone. Even root can't read them.
Keys are stored in:
ChaCha20 crypto coprocessor encrypts faster than RAM bandwidth. All storage and memory encrypted by default.
Kill-switch zeroes keys instantly - hardware operation, not software cleanup.
Passless authentication via device fingerprints. Social attestation for identity. No passwords, no biometric theater.
A=1 - authenticate once per device lifetime, never again.
NFID (Near Field Identity): Optional paranoia layer. Prevents unauthorized device binding when someone borrows your car. Configurable from "unlocked" to "high security."
Not required for core passless operation - just prevents adding rogue devices.
Spectral color from sensor to display. Ring-based damage tracking. Only renders what you can actually see.
VSF (Versatile Storage Format):
Performance:
Superblock at random location. No fragmentation because rings rotate. Power loss? Any ring state is valid.
Key features:
Power loss handling:
Based on RedoxFS with ring topology instead of linear blocks.
ChaCha20 in dedicated silicon. Encrypts faster than RAM bandwidth. All storage and memory encrypted by default.
Hardware acceleration:
Integration:
ChaCha20 is faster than RAM on modern hardware (~3-4 GB/s per core). Dedicated unit is even better.
ferros runs on Glyph - hardware I designed from scratch for this OS. Not Android on commodity chips. Purpose-built silicon running purpose-built software.
No proprietary secure elements. No vendor black boxes. Just open RISC-V with custom extensions you can audit.
Physical SIM slot. No carrier lock-in. No eSIM DRM. Use any carrier's data plan worldwide.
Why physical SIM:
Software eSIM support: Implemented via GSMA SGP.22 client in ferros. Download profiles, store credentials in CSRs, use standard 3GPP authentication. Works with any carrier's SM-DP+ server.
Physical slot as fallback for carriers without eSIM support.
Purchase with BTC, SOL, XMR, or TOKEN. No credit cards. No fiat. No compromises.
No exceptions.
If you can't acquire cryptocurrency, you can't buy Glyph. That's not a bug - it's the filter. People who understand crypto understand why Glyph matters.
Photon messenger via TOKEN identity. No SMS. No legacy telephony. Pure sovereignty.
Glyph doesn't support:
What it does support:
If you need to call 911, get a burner phone for emergencies. Glyph is for sovereignty, not legacy infrastructure.
You can't buy Glyph on Amazon. You can't buy it with a credit card. You can't buy it on this website.
Glyph is available exclusively on the decentralized web. Same compositor that runs on the device renders the purchase experience. If you can't access fgtw.org/portal, you're not ready for Glyph.
Requirements to purchase:
You CANNOT use Glyph if you:
Glyph works if you:
Still here? You might be ready for Glyph.
Founders Edition: 1,000 units, $5,000, crypto only
Elite Edition: 10,000 units, $3,000, 6 months after Founders
Pro Edition: 100,000 units, $1,500, 12 months after Founders
Standard: 1M+ units, $600, 18-24 months after Founders
No traditional launch. No press releases. No review units. Just: "Portal is open. If you know, you know."
Why memory doesn't need boundaries and how two's complement wraparound eliminates entire classes of vulnerabilities.
Hardware power cutoff, CSR key zeroing, and why 0ms shutdown isn't a feature - it's a consequence of ring architecture.
(Coming soon)
How device fingerprints, social attestation, and NFID create genuinely passless authentication.
(Coming soon)
Spectral color, occlusion-aware rendering, and why HTML/CSS/JS needed to be replaced.
(Coming soon)
ferros is open source (MIT license). The OS, ring memory architecture, filesystem - all open.
What's open:
What's closed:
Hardware will open-source after Founders Edition ships and we've proven the design.
First Published: January 1, 2025
License: MIT (ferros modifications)
+
MIT (original Redox OS code)
Current: Architecture design, early implementation
Next 3 months:
Next 6 months:
Next 12 months:
Can I port ferros to my phone?
Yes. It'll work on PinePhone, Fairphone, etc. But you'll lose hardware kill-switch, crypto coprocessor, custom CSRs, and TOKEN attestation. Glyph is the complete package.
Why Rust?
Memory safety without garbage collection. Zero-cost abstractions. Compile-time guarantees. No unsafe code in critical paths.
Why RISC-V?
Open ISA. Custom extensions allowed. No Intel ME / AMD PSP backdoors. Auditable silicon.
Why not Linux?
Linux has 30M+ lines of C. Ring memory requires ground-up redesign. Kill-switch requires atomic-everything architecture. Microkernel prevents driver crashes from killing system.
Why no phone numbers?
Phone numbers are surveillance infrastructure tied to government ID. TOKEN provides cryptographic identity without surveillance. If you need PSTN, get a burner for emergencies.
What about app compatibility?
None. ferros doesn't run Android apps. Developers build for VSF or they don't ship on Glyph. This is intentional - legacy compatibility is how security gets compromised.
Is this vaporware?
Code is being written. Architecture is documented. Hardware is being designed. This README establishes prior art. Judge for yourself in 6 months when we ship alpha.
Built by Nick Spiker and contributors.
Sovereignty is a choice. Make it.