open source tools for verifiable security
Most systems still rely on single individuals or computers, unverifiable software, and opaque processes. We’re redesigning security for transparency from the ground up.
ready to use
Production-ready, verifiable open source tools.
Security-first Linux distribution for reducing supply chain risks. Minimal, bootstrapped, hermetic, deterministic, reproducible, and multi-party signed.
View git repository →Immutable Linux distribution for offline secret management. Diskless, reproducible, and hardened for air-gapped environments.
View git repository →Toolchain for generating and managing a wide range of cryptographic keys offline and on smartcards from a shared BIP39 mnemonic phrase.
View git repository →Framework for rapidly developing applications to perform transfer and staking cryptocurrency operations.
View git repository →building blocks
for provable security
Modern software systems still rely on trust—maintainers, IT admins, third-party providers. But what happens when they are compromised? How do you verify that your systems haven't been tampered with?
We’ve identified critical gaps and built tools to remove single points of failure across all levels of the software lifecycle—from toolchains and dependencies to how code is built, signed, verified and deployed.
By combining multi-party trust, remote attestation, and bit-for-bit reproducibility, we are eliminating trust assumptions, ensuring security isn't just a claim—it's provable. And as everything we do, all our software is open source.
See what we're building →our roadmap
We're actively building some tools—and raising support to build others. Here's what's in-progress and what's coming next.
backlog (fundraising)
backlog
Bootproof
Prove what software booted on a system via remote attestation technologies.
SourceId
Verify source code inegrity with hash-based fingerprints.
SigRev
Crowdsource and discover signed manual code reviews.
in-progress
Trove
Documentation for managing secrets that you can't afford to lose.
ReprOS
Create ephemeral build environments to eliminate persistent risks.
EnclaveOS
Immutable operating system for powering secure enclaves.
active
StageX
Hermetic, deterministic, reproducible, multi-signed OCI-based build toolchain.
AirgapOS
Minimal, immutable, offline-first swiss-army knife for secret management.
Keyfork
Derive keys from a single entropy source to simplify their management.
Icepick
Framework for offline cryptographic signing operations.
powered by distrust
Companies across high-risk industries adopt our methodologies and tooling to secure their critical systems.
Turnkey secures billions of dollars in digital assets and relies on Distrust tools to address fundamental risks in their technology stack.
Turnkey secures billions of dollars in digital assets and relies on Distrust tools to systematically address fundamental risks in their technology stack.
Learn more →The creators of the SUI blockchain, Mysten Labs, eliminate single points of failure in their systems with the help of Distrust tooling and advice.
Learn more →
Sidero Labs' Talos Linux, a widely used Kubernetes distribution, uses Distrust's StageX and services, to bolster their supply chain security.
Learn more →❝We want to use our knowledge to improve security, privacy, and freedom for as many people as possible. We believe that verifiable foundations for building technology are essential to human wellbeing and solving the coordination problem.❝ — Distrust team
fund open source development
Your support funds the tools. Your forks spread the mission. Help us build transparent, verifiable security tools — together.
Your support funds the tools. Help us build transparent, verifiable security tools — together.