Overview

Alfred Linux is a complete operating system built from the ground up with AI as the primary user interface. Based on Debian Trixie (13), the current v7.77 Kingdom GA target ships 42 build hooks on the live-build host (three dedicated security hooks plus the 6-module Omahon Seal, for 38 security modules total) — a stack no other distribution ships as one integrated image. For context: v7.77 GA (April 2026) shipped 17 hooks; everything below in Build History records growth by milestone, not today’s headline count.

How “42 hooks” is counted: The canonical Kingdom tree is exactly 42 files matching config/hooks/live/*.hook.chroot in the GoForge alfredlinux-com-source-live repo (Matthew 1:17 lineage). That is not a smaller batch of hooks “renamed into” 42 — older milestones used fewer hook files on disk (including early ~17-hook images documented in history), and one intermediate layout reached 46 files before overlaps were consolidated into today’s 42-file lineage (e.g. sacred-stillness work merged under 0720; wake/STT extras merged under 0400). Separately: the bytes on /download can still expose fewer Alfred hook markers inside the squashfs until the next successful reseal from that tree; see includes/ga-release-state.php ($gaFrozenIsoHookCount vs $gaPlannedHookCount).

Target release: v7.77 GA “Kingdom of God Edition”

GA ISO is not yet published on this site (includes/ga-release-state.php). Engineering target: Debian Trixie 13, Linux kernel 7.0.1 (custom), x86_64, hybrid ISO pipeline. 42 Kingdom build hooks on the marquee (Matthew 1:17 lineage) — one .hook.chroot file per lineage stage in config/hooks/live/. Former “voice v2” / wake-word work ships inside 0400-alfred-voice.hook.chroot (commented there as absorbing the old separate stage); there is no separate 0900-*.hook.chroot in the current canon. 38 security modules (incl. Omahon Seal). AKJV Bible, worship album, Omahon modules as described elsewhere. Desktop ISO: ~7.77 GiB binary is the Kingdom target (see checklist B6 + alfred-linux-v2/docs/ISO-777-GiB-PLAN.txt); the primary ~1 GiB path to that gate is Kingdom cinematic video + 4K/8K masters (alfred-linux-v2/build-assets/ → hook 0285 §7), with hook 0297 as supporting typography/locale payload. Early internal candidates were ~6.74 GiB until that honest media fills the gap; the canonical frozen filename is alfred-linux-7.77-ga-intel-amd64-20260426.iso (same bytes as older amd64-stamped builds until a reseal). /download must state the measured size at publish. Follow includes/GA-LAUNCH-CHECKLIST.txt before flipping GA flags.

Alfred Linux is not a Linux distribution with a chatbot bolted on. The AI is integrated at the operating system level — from voice-driven shell interaction to the development environment to the browser. Every component was chosen and configured to serve the mission: your voice is the command line.

What Ships in v7.77

Kernel Deep-Dive

Alfred Linux 7.77 GA ships Linux kernel 7.0.1, custom-compiled from Linus Torvalds' mainline source tree. This makes Alfred Linux the first operating system distribution in the world to ship kernel 7. Kernel 7.0 was released by Torvalds on April 5, 2026 (first major version bump since 6.0 in October 2022); 7.0.1 is the first stable point release.

Decoding “Linux 7.0.1”

7 = major version (first since 6.0 in Oct 2022)
0 = minor (first release in the 7.x series)
1 = first stable point release on top of 7.0
(Earlier candidates carried -rc7-alfred while we tracked Torvalds' release candidates; we cut over to 7.0.1 stable for GA.)

Compiled from the official git.kernel.org/torvalds/linux source tree with Debian Trixie's production config as the base, adapted via make olddefconfig. Custom LOCALVERSION tag. Built on 8-core EU build server.

What Kernel 7.0 Brings

Alfred Linux Security Hardening (12 Gaps Patched)

The default kernel 7.0 config ships with 12 security gaps that Alfred Linux patches at boot. No other consumer distro patches all 12:

#Default GapRiskAlfred Fix
1INIT_STACK_NONE=yUninitialized stack info leaksinit_on_alloc=1
2INIT_ON_FREE not setFreed memory retains secretsinit_on_free=1
3MODULE_SIG_FORCE offUnsigned modules can loadlockdown=integrity
4MODULE_FORCE_UNLOAD=yForce-unload modulesLockdown blocks
5IO_URING=y#1 kernel vuln source 2022–2025io_uring_disabled=2
6USERFAULTFD=yRace condition exploit enablerunprivileged_userfaultfd=0
7X86_IOPL_IOPERM=yDirect I/O port accessLockdown blocks
8DEVMEM+PROC_KCOREPhysical memory readLockdown blocks
9X86_MSR=mDisable security featuresLockdown blocks
10HIBERNATION=yRAM written to disknohibernate
11RANDSTRUCT_NONE=yNo struct randomizationNext compile pass
12IOMMU_DEFAULT_DMA_LAZYWeak DMA protectioniommu.strict=1

Additional Hardening Layers

Previous Kernel: 6.12.74 (RC4–RC6)

Alfred Linux v7.77 RC4 through RC6 shipped on Linux kernel 6.12.74 from the Debian Trixie security repositories — a Longterm release with 74 rounds of Debian kernel team security patches. RC7 leapfrogged to kernel 7.0 compiled from source, making Alfred the first distro on kernel 7.

The Linux Kernel Landscape (April 2026)

To understand where Alfred Linux sits in the kernel world, here is the full landscape of active Linux kernel branches as of April 2026:

7.0.1
Mainline — ALFRED LINUX IS HERE
First distro on kernel 7. Custom-compiled from Torvalds' source tree (released April 5, 2026). 3 exclusive mitigations: ITS, TSA, VMSCAPE. 24 total hardware vulnerability mitigations. Every other distro is still on 6.x.
6.19.11
Stable (Latest)
The newest stable release. Where Arch Linux and Fedora Rawhide sit. Alfred Linux has already leapfrogged past this to 7.0.
6.18.21
Longterm
Previous stable series, now in long-term maintenance. Receives only critical security and bug fixes.
6.12.80
Longterm — Alfred RC4–RC6
Debian Trixie's default kernel. Alfred Linux RC4–RC6 shipped on this branch before RC7 leapfrogged to kernel 7.0. Rock-solid LTS, extensively patched.
6.6.132
Longterm
Another LTS branch. Known for broad hardware support and mature driver stack. Used by some Ubuntu LTS releases.
6.1.167
Longterm (Previous)
The Debian Bookworm kernel. Alfred Linux v2.0 shipped on this branch. Proven, hardened, and the backbone of millions of Debian servers worldwide.
5.15.202
Longterm (Legacy)
Previous generation LTS. Still maintained but winding down. Ubuntu 22.04 LTS ships this kernel.
5.10.252
Longterm (Legacy)
Oldest actively maintained kernel. Used by Debian Bullseye (11) and some embedded systems. Approaching end-of-life.

Kernel Upgrade Roadmap

Alfred Linux is now on kernel 7.0.1 — the first distro on earth to ship kernel 7. Here's the full trajectory:

The Path to Kernel 7.0

Linux kernels are modular — upgrading requires rebuilding the ISO with the new kernel. Alfred Linux's build system (live-build + 16 custom hooks) makes this manageable. For kernel 7.0, we compiled directly from Linus Torvalds' source tree, adapted Debian Trixie's production config, and built custom .deb packages. The kernel is one hook in our build pipeline.

PhaseTarget KernelWhyStatus
v2.0 (Legacy) 6.1.0-44 Debian Bookworm default. Rock-solid stability. First bootable ISO. ✓ April 2026
v4.0 RC4–RC6 6.12.74 Rebased to Debian Trixie. EEVDF scheduler, Rust-in-kernel, UEFI+BIOS hybrid boot. ✓ April 2026
v4.0 RC7 7.0.1 Custom-compiled from Torvalds' mainline. 3 exclusive mitigations (ITS, TSA, VMSCAPE). 12 security gaps patched. First distro on kernel 7. ✓ April 6, 2026
v7.77 GA (NOW) 7.0.1 Enterprise security hardening: 38 modules (32 hardening + 6 Omahon Seal), 3 dedicated security hooks, FDE, AppArmor, fail2ban, AIDE, ClamAV, nftables default-deny. 42 build hooks. ✓ April 7, 2026
v7.77.x (next kernel cadence) 7.0-stable or 7.1 Still the 7.77 product line: kernel moves to 7.0 stable (or follow-on) with full regression testing. RANDSTRUCT enabled where applicable (compile-time hardening). Post-GA (2026)

What a Newer Kernel Gets Us

Alfred Linux Already Ships the Latest Kernel

With v7.77 GA, Alfred Linux is the first distro on earth shipping Linux kernel 7.0 — now with 38 security modules (including the Omahon Seal) across 3 dedicated hooks. Custom-compiled from Linus Torvalds' mainline source tree, with Debian Trixie's production config as the base. This isn't a random git snapshot — it's the official 7.0-rc7 release from kernel.org, built with make bindeb-pkg on 8 cores, adapted via make olddefconfig, and hardened with 17 boot security parameters, 45+ sysctl CIS L2 rules, a 30+ module blacklist, an nftables drop-by-default firewall, AppArmor enforced, fail2ban, AIDE file integrity, ClamAV antivirus, and LUKS2 full-disk encryption. No other distro does this. Headline today: v7.77 Kingdom extends the same kernel story with 42 live-build hooks on the ga profile — see the overview card above.

Current GA vs historical RC rows (read once)

Current product line — v7.77 “Kingdom of God Edition”: 42 build hooks on the production ga profile in the alfred-linux-v2 tree. That is the number to cite for what ships next.

Frozen milestone — v7.77 GA (April 8, 2026): shipped 17 hooks in the timeline below. That figure is archived truth for that release, not the current Kingdom hook total.

RC / sprint rows (RC4–RC8, b1–b6, etc.): counts like 10, 12, 13, 16 hooks describe only that week’s ISO as engineering grew the stack. They are not contradictions of 42 — they are the ladder we climbed.

Bible tongues (api/version.jsonbible_tongues): must match the count of language data lines in hook 0292’s embedded languages.conf (currently 48 codes for Acts 2:4 breadth). English ships full AKJV when the 0290 TSV is present; Spanish, French, and Hebrew ship richer offline seeds; forty-four additional rows use compact two-verse tongue-* seeds until fuller texts are added. scripts/release-integrity.sh check-repo enforces that equality. Further dialects or full TSVs remain documented in Forge README.txt until matching rows ship in hook 0292.

Build History

Alfred Linux v2.0 was developed through a rigorous incremental build pipeline. Each build added one major component and was tested before the next layer was added. Here is the complete build record:

v1.0 — Foundation (14 builds)

The original Alfred Linux v1.0 went through 14 iterative builds to establish the base operating system, desktop environment, and basic voice integration. The final v1.0 ISO was 1.5 GB and proved the concept: a bootable Linux desktop with AI voice integration.

v2.0 — Full Stack (9+ builds)

b1
2026-04-04
Foundation — Base Debian Bookworm + XFCE4 + Plymouth + Branding + Hardening
~1.2 GB
b2
2026-04-04
+ Alfred Browser — Replaced Firefox-ESR with Alfred Browser (Tauri + WebKitGTK)
1.4 GB
b3
2026-04-04
+ Alfred IDE — VS Code-compatible IDE (powered by code-server 4.114.0) + Commander extension for AI-powered development
1.6 GB
b4
2026-04-05
+ Alfred Voice — Kokoro TTS + PyTorch CPU + spaCy NLP + welcome greeting service
2.2 GB
b5
2026-04-05
+ Alfred Search — Meilisearch local search engine for offline-first instant search
2.3 GB
b6
2026-04-05
+ Calamares Installer — Full graphical disk installer with Alfred branding and encryption
2.3 GB
RC1
2026-04-05
Release Candidate 1 — All 6 layers combined, first full integration test
2.3 GB
RC2
2026-04-05
Release Candidate 2 — Bug fixes, latest security patches applied
2.3 GB
RC3
2026-04-06
Release Candidate 3 — Critical boot fix (kernel naming), splash template fix, binary hook for generic kernel names, kernel 6.1.0-44. First bootable ISO.
2.5 GB

v4.0 — “The People’s OS” (Trixie Rebase + 4 New Features)

RC4
2026-04-06
Trixie Rebase — Rebased from Debian Bookworm to Trixie (13), kernel 6.12, UEFI+BIOS hybrid boot. Voice hook fixed for Trixie (venv + --only-binary spacy).
~2.5 GB
RC5
2026-04-06
Full v4.0 Stack — All 10 hooks: Welcome App (7-page wizard), Alfred Store (Flatpak center), Voice 2.0 (“Hey Alfred” wake word), alfred-update, alfred-info, version check API. Calamares v4.0 branding.
~2.5 GB
RC6
2026-04-06
Hardware + Installer Fix — All 12 hooks: universal hardware support + security hardening (drivers, firmware, GPU, WiFi, Bluetooth, input devices, power mgmt, auto-detect 3-tier), install-or-try dialog on live boot, XFCE desktop trust fix, Kyber-1024 branding. Calamares now visible and launchable.
~2.5 GB
RC7
2026-04-06
KERNEL 7.0 — FIRST DISTRO ON EARTH — All 13 hooks. Linux kernel 7.0.1 custom-compiled from Linus Torvalds' mainline source tree. 3 kernel-7-exclusive mitigations: ITS, TSA, VMSCAPE. 24 compiled-in CPU vulnerability mitigations. 12 default security gaps patched. Hook 0050 (kernel 7) + Hook 0160 (352-line security hardening).
~2.5 GB
GA
2026-04-08
ENTERPRISE SECURITY — 38 MODULES + OMAHON SEAL, 17 HOOKS — All 17 hooks. 3 dedicated security hooks + the Omahon Seal (Hook 0175). Hook 0160 Alfred Security (21 modules: sysctl CIS L2, kernel lockdown, AppArmor w/ custom Alfred IDE + Meilisearch profiles, auto-updates, fail2ban 3-try/24h, auditd 30+ immutable rules, DNS-over-TLS, USB security, module blacklist, PAM 10-char/3-class, AIDE file integrity, ClamAV weekly scan, rkhunter + chkrootkit, hidepid=2, secure mounts, banners, core dumps disabled, cron lockdown, compiler restriction, NTS time sync, alfred-security-status CLI). Hook 0165 Network Hardening (7 modules: MAC randomization, nftables default-deny, TCP wrappers, port scan defense, wireless hardening, SSH strong ciphers, alfred-network-status CLI). Hook 0170 Full Disk Encryption (4 modules: LUKS2 cryptsetup + initramfs, strong defaults, Calamares FDE checkbox, alfred-encrypt-status CLI). Hook 0175 Omahon Seal (6 modules: Boot Seal, Watchman, Vault, Shell Guard, Secure Erase, Sovereign Attestation). GPG signed. 19 new security packages. fastfetch replaces neofetch. DNS fix hook (0011). Resilient IDE/Voice hooks (set +e).
~2.3 GB

The Boot Fix Story

RC1 and RC2 were successfully built but contained a critical boot defect that was discovered during ISO inspection: the bootloader referenced /live/vmlinuz and /live/initrd.img, but the ISO only contained the versioned files (vmlinuz-6.1.0-44-amd64). This meant the ISOs would fail to boot on any hardware.

The fix was a build hook that runs as the absolute last step (hook #9999) in the chroot phase, creating copies of the kernel and initramfs with the generic names that the bootloader expects. RC3 is the first build with this fix and the latest Debian security patches (kernel 6.1.0-44, including WebKit, OpenSSL, ImageMagick, and GStreamer security updates).

Bundled Components

Every component is pre-installed and configured. No package manager needed for the core experience.

Alfred Browser

v4.0.0 — Tauri + WebKitGTK

Zero-telemetry sovereign web browser. 4.7 MB. No Google Services, no ad tracking, no phone-home. Set as the system default browser, replacing Firefox entirely.

Alfred IDE

Alfred IDE 1.0 (code-server 4.114.0 + Commander 1.0.1)

Full Visual Studio Code in the browser. The Alfred Commander extension provides AI chat, voice commands, and MCP tool integration. Runs on port 8443.

Alfred Voice

Kokoro TTS + PyTorch CPU

Text-to-speech engine running entirely offline. No cloud API needed. Speaks on first boot with a welcome greeting. spaCy NLP for natural language processing.

Alfred Search

Meilisearch (latest)

Lightning-fast local search engine. Indexes all local files and documentation. Sub-50ms search results. No internet connection required.

Calamares Installer

v3.2.x + Alfred v4.0 Branding

Graphical disk installer for permanent installation. Supports LUKS full-disk encryption, alongside/replace partitioning, and automated install modes.

Desktop Environment

XFCE 4.18 + LightDM

Lightweight, fast desktop with Arc dark theme, Papirus icons, JetBrains Mono font, and custom bash prompt. Branded fastfetch with Alfred ASCII art.

New in v7.77

These features ship in the 42-hook Kingdom GA set; they build on the v4.0 stack listed earlier in Build History.

Welcome App

v4.0 — Python/Tk

7-page first-boot wizard: voice setup, WiFi config, tool launcher, P2P seeding opt-in, keyboard shortcuts. Runs once, remembers. Dark branded UI.

Alfred Store

v4.0 — Flatpak + Flathub

App center with 6 curated categories: Featured, Development, Communication, Media, Games, Privacy. Search, one-click install, threaded background updates.

Voice 2.0 Wake Word

openWakeWord — systemd service

Always-on “Hey Alfred” wake word detection. Runs as a systemd service with 3-second cooldown and configurable audio threshold.

alfred-update & alfred-info

CLI tools — /usr/local/bin/

alfred-update: one-command APT + Flatpak + Alfred version check. alfred-info: branded system info panel showing version, kernel, uptime, memory, disk, services.

Security Stack

nftables Firewall

Default-deny + UFW frontend

nftables drop-by-default firewall with rate-limited SSH and ICMP. UFW frontend available for management. Only essential services allowed through.

Fail2ban

v1.0.2

Intrusion prevention system monitoring SSH, web, and other services. Automatically bans repeated failed login attempts.

SSH Hardening

OpenSSH (hardened config)

Root login disabled, password auth disabled by default, key-based only. Configured during build with security-first defaults.

WireGuard VPN

Kernel module included

Modern VPN built into the kernel. Ready for mesh networking, sovereign infrastructure, and peer-to-peer encrypted tunnels.

Build System

Alfred Linux ISOs are built using Debian live-build, the same system used to produce official Debian Live images. The build process is fully automated and reproducible.

Build Pipeline

# Alfred Linux uses a 3-phase build pipeline: Phase 1: Bootstrap debootstrap creates a minimal Debian chroot (~400 MB) Base packages installed: dpkg, apt, bash, coreutils Phase 2: Chroot 1,000+ packages installed into the chroot 42 build hooks execute sequentially: 0010 — Fix Debian security repository URL format 0011 — Fix chroot DNS resolution (forcibly writes /etc/resolv.conf) 0100 — Alfred branding (Plymouth, fastfetch, XFCE config, hardening) 0150 — Alfred Hardware (universal drivers, firmware, input devices, GPU, WiFi, Bluetooth, power mgmt, auto-detect) 0160Alfred Security (21 modules: sysctl CIS L2, kernel lockdown, AppArmor w/ custom profiles, auto-updates, fail2ban, auditd 30+ rules, DNS-over-TLS, USB security, module blacklist, PAM hardening, AIDE, ClamAV, rkhunter + chkrootkit, hidepid, secure mounts, banners, core dumps, cron lockdown, compiler restriction, NTS time sync, alfred-security-status CLI) 0165Alfred Network Hardening (7 modules: MAC randomization, nftables default-deny, TCP wrappers, port scan defense, wireless hardening, SSH strong ciphers, alfred-network-status CLI) 0170Alfred Full Disk Encryption (4 modules: LUKS2 cryptsetup + initramfs, strong defaults, Calamares FDE checkbox, alfred-encrypt-status CLI) 0175🔏 Omahon Seal (6 modules: Boot Seal HMAC-SHA256, Watchman inotify, Vault tmpfs, Shell Guard redaction, Secure Erase 3-pass, Sovereign Attestation SHA-256) 0200 — Alfred Browser (remove Firefox, install .deb, set default) 0300 — Alfred IDE (VS Code-compatible IDE + Commander extension) 0400 — Alfred Voice (Kokoro TTS + realtime/wake stack — absorbs former separate “0900” stage; see hook header in tree) 0500 — Alfred Search (Meilisearch binary) 0600 — Calamares installer (KF5/Qt5 + v4.0 branding + LUKS2 FDE) 0700 — Welcome App (7-page Python/Tk first-boot wizard) 0710 — alfred-update + alfred-info CLI tools + version check API 0800 — Alfred Store (Flatpak app center + Flathub + 6 categories) 9999 — Kernel name fix (ensures /boot/vmlinuz exists) Phase 3: Binary Security updates applied to chroot chroot compressed to squashfs (~2.3 GB → filesystem.squashfs) Bootloader configured (ISOLINUX/syslinux) ISO assembled (xorriso) as hybrid ISO (USB + CD bootable)

Build Infrastructure

ComponentSpecification
Build ServerGoSiteMe dedicated build server, 8 cores, 32 GB RAM
Build OSUbuntu 22.04 LTS
Build Toollive-build 3.0 (Ubuntu variant)
Compressionsquashfs with gzip (8 threads parallel)
ISO Toolxorriso with ISOLINUX hybrid boot
Build Time~15 minutes (full rebuild from clean)
Network1 Gbps dedicated link to Debian mirrors

System Specifications

ISO Details

PropertyValue
BaseDebian 13 (Trixie)
KernelLinux 7.0.1 (amd64, custom-compiled)
Architecturex86_64 — ISO filenames use Debian’s amd64 tag (same binary runs on Intel and AMD 64-bit; the name is historical, not vendor-exclusive)
ISO TypeHybrid (USB stick + CD/DVD bootable, UEFI + BIOS)
ISO Size~2.5 GB
DesktopXFCE 4.18 + LightDM
Init Systemsystemd
Package FormatAPT (.deb)
Boot FirmwareUEFI + BIOS (ISOLINUX/GRUB hybrid)
LicenseAGPL-3.0

Minimum Requirements

ComponentMinimumRecommended
RAM4 GB16 GB
Storage32 GB256 GB NVMe
CPU2 cores, x86_648+ cores
GPUAny (VESA fallback)AMD/NVIDIA with open drivers
NetworkOptional (works offline)Ethernet or WiFi
BootUSB 2.0 or CD/DVDUSB 3.0+

Pre-installed Package Highlights

CategoryPackages
Desktopxfce4, xfce4-goodies, thunar, xfce4-terminal, lightdm
MediaVLC, PulseAudio, ImageMagick
NetworkingNetworkManager, WireGuard, curl, wget, OpenSSH
Securitynftables, AppArmor, fail2ban, auditd, AIDE, ClamAV, rkhunter, chkrootkit, GnuPG, KeePassXC
Developmentgit, vim, nano, python3, build-essential
Systemhtop, fastfetch, file-roller, gparted
FontsJetBrains Mono, Noto (full CJK support), Liberation
ThemingArc theme, Papirus icons, Plymouth boot splash

Security Posture

Alfred Linux ships 38 security modules across 3 dedicated build hooks (plus the 6-module Omahon Seal). Every default is chosen for defense, not convenience. v7.77 GA delivers enterprise-grade hardening out of the box.

Supply chain transparency & GoForge CI

Runtime hardening above is separate from build-time supply chain: verified kernel tarballs, ISO staging gates, and where full-tree kernel audit runs. Public summary: /security-kernel. AGPL technical manifests on GoForge: KERNEL-7.0.1-SECURITY-MANIFEST.txt, KERNEL-7.0.1-SUPPLY-CHAIN-AUDIT.txt. Operators enabling Actions / act_runner: GOFORGE-INFRASTRUCTURE-UPGRADE.txt.

Hook 0160 — Alfred Security (21 Modules)

Hook 0165 — Alfred Network Hardening (7 Modules)

Hook 0170 — Full Disk Encryption (4 Modules)

Foundational Security

Download & Verify

v7.77 GA — image status

The frozen v7.77 GA desktop ISO filename, checksum files, and torrent are published on alfredlinux.com/download when the final live-build is complete. Until then, treat any example filenames below as placeholders only.

# After GA is published — replace FILENAME with the exact .iso basename from /download # Covenant first: /covenant?next=/download — plain https://alfredlinux.com/downloads/*.iso HTTP is denied. # Fetch bytes via P2P on /download, or wget the time-limited iso.php URL shown there: wget -O FILENAME.iso "https://alfredlinux.com/downloads/iso.php?t=PASTE_TOKEN_FROM_DOWNLOAD" wget https://alfredlinux.com/downloads/FILENAME.iso.sha256 sha256sum -c FILENAME.iso.sha256 b3sum FILENAME.iso sudo dd if=FILENAME.iso of=/dev/sdX bs=4M status=progress oflag=sync

Alfred Linux Mobile (Android)

Alfred Linux runs on Android phones and tablets — Samsung Galaxy S26 Ultra, Pixel, OnePlus, any device running Android 12+. No root required. Uses Termux + proot-distro to run a full Debian Bookworm environment with all Alfred components.

What You Get on Mobile

Alfred IDE (powered by code-server — the same VS Code engine used by enterprise teams worldwide, running entirely on your device) · Alfred Search (Meilisearch) · Alfred Voice (Kokoro TTS) · Full Linux terminal · Python, Node.js, Git, and build tools. With Samsung DeX, plug into a monitor and you have a full desktop development environment.

Quick Install

# 1. Install Termux from F-Droid (NOT Google Play) # https://f-droid.org/en/packages/com.termux/ # 2. Open Termux and run: curl -fsSL https://alfredlinux.com/downloads/install-alfred-mobile.sh | bash # 3. After install, use these commands: alfred # Enter Alfred Linux shell alfred-ide # Launch Alfred IDE in browser alfred-info # Show system info

Requirements

Samsung DeX Integration

When connected to an external display via USB-C or Miracast, Samsung DeX provides a desktop-like environment. Launch alfred-ide, open your browser, and you have a full VS Code IDE on a large screen — powered entirely by your phone. Alfred IDE runs on code-server, the same engine powering VS Code for the Web at major companies. The Samsung S26 Ultra with 12GB RAM and Snapdragon 8 Elite runs it smoothly.

Architecture Notes

Mobile Alfred Linux runs on ARM64 (aarch64) inside a proot container. The Debian userspace is real — you can install any Debian package with apt. The kernel is Android's, but everything above it is standard Debian Bookworm. This means:

Contributing

Alfred Linux is open source under the AGPL-3.0 license. Contributions are welcome and rewarded with GSM tokens — live on Solana mainnet.

How to Contribute

Build It Yourself

# Requirements: Debian/Ubuntu with sudo, 32GB RAM recommended, 50GB free disk # Install dependencies sudo apt install live-build debootstrap squashfs-tools xorriso isolinux syslinux-common syslinux # Clone the build scripts git clone https://alfredlinux.com/forge/commander/alfredlinux.com.git cd alfred-linux # Build the full GA ISO sudo bash scripts/build-unified.sh ga # Output: iso-output/alfred-linux-7.77-ga-intel-amd64-YYYYMMDD.iso (or live-build amd64 name until renamed)

Build Requirements

OS: Debian 12+ or Ubuntu 22.04+ — CPU: 4+ cores — RAM: 16 GB minimum (32 GB recommended) — Disk: 50 GB free — Time: ~15 minutes on modern hardware

What's Next

Alfred Linux v7.77 is the fully-loaded Kingdom of God Edition. The next milestones are: