System Documentation

Official Resources

Everything you need to know about the installation process, legal disclaimers, and bug reports & feedbacks.

Docs will be updated soon.

Debian Installer

Hardenwing OS utilizes the robust and highly reliable Debian Installer (d-i) framework for system deployment. The installer has been meticulously configured and hardened to ensure that the initial system setup is secure from the very first boot.

During the installation process, the installer securely partitions the disk, applies base system integrity checks, and stages the initial root environment safely. Critical sudo bugs within standard installer frameworks have been manually addressed to guarantee a seamless and highly secure deployment of the Hardenwing OS core image.

Frequently Asked Questions

How is Hardenwing OS different from standard Debian?

Hardenwing includes security measures from the kernel level down to the network layer. It blacklists unnecessary kernel modules that would increase the attack surface and offers features like BadUSB protection. Additionally, Secure Boot is enabled by default and it uses Quad9 DNS. It is significantly more secure than vanilla Debian.

Are there any 3rd party repositories?

No. Only official Debian repositories are used.

Why did Hardened Slarpx become Hardenwing OS?

Slarpx was mostly an unusable prototype research project. It has been transformed into a more user-friendly, stable, and secure distribution that appeals to a broader audience.

Why aren't anonymization tools supported?

The Hardenwing OS firewall only allows basic internet access and implements a broad defense configuration. There is no specific rule banning VPNs and Tor by name. Instead, a much stricter and more secure "Default Deny - Whitelist" architecture is used.

The firewall only allows explicitly permitted ports to connect outbound (e.g. 80/443 for Web, 53 for DNS). Since WireGuard, OpenVPN, IPsec, or Tor's standard relay ports are not whitelisted, they are automatically dropped. The underlying assumption is: "If the system gets compromised, how hard can I make it for the attacker to exfiltrate data or establish a Command & Control connection?"

Can I do daily tasks on this distribution?

Partially. Hardenwing can be restrictive due to its hardening settings. It is not suitable for: Gaming, Programming (debug tools are blocked), Privacy (anonymization), Pentesting, or Multimedia.

Is Hardenwing suitable for my old PC?

No. Hardenwing is at the most sluggish level Debian can reach. CPU performance is significantly reduced due to heavy mitigations.

Can I install Nvidia closed-source drivers?

No. Hardenwing OS does not support closed-source drivers. Nvidia drivers cannot be loaded due to Secure Boot, and many required build tools cannot be run on the system.

Disclaimer

Hardenwing OS is provided "as is" without any warranties of any kind, either expressed or implied. The multi-layered defense architecture, kernel hardenings, and strict firewall policies may cause some software, network functions, or external devices to behave unexpectedly or fail to operate.

The user assumes full responsibility for any data loss, system instability, or usability issues that may arise from utilizing this hardened environment. By installing and using Hardenwing OS, you acknowledge that aggressive mitigation techniques are in place and that the distribution is fundamentally designed for maximum security, occasionally at the cost of convenience.

Development & Contact

This distribution is actively developed and maintained by Nixovena Linux and AI Labs. For feedback, bug reports, opinions, and everything else, get in touch.