|| เคถเฅเคฐเฅ€ ||

The OS That Always Has Your Back.
An immutable OS โ€” the core is read-only and can't be broken. Two system copies. One always safe. One command to update. One reboot to undo it โ€” always.

Zero telemetry ยท No ads ยท Open source ยท Free forever ยท Built on Arch Linux ยท Made in India ๐Ÿ‡ฎ๐Ÿ‡ณ

Your files, apps, and settings are always untouched โ€” built for reliability whether you're a home user, a developer, a gamer, or a corporate fleet.

0 Telemetry, ads, or tracking โ€” nothing phoning home, ever
1 Command to update the entire OS โ€” just type it and reboot when ready
0 Settings or files lost on update โ€” everything survives
1 Reboot to undo any update โ€” previous OS always ready
6 Security layers protecting you from first boot โ€” no setup, no configuration required
~15 Minutes to install โ€” Wi-Fi, NVIDIA, fingerprint, sound all work
100% Open source โ€” every script public and verifiable, nothing hidden
Enterprise & OEM-ready ยท Fleet deployment ยท GPG-verified images
Steam + Proton pre-installed ยท Android apps ยท Windows apps via Bottles
Built in India ๐Ÿ‡ฎ๐Ÿ‡ณ ยท Indian languages pre-configured ยท เคญเคพเคฐเคค เคฎเฅ‡เค‚ เคฌเคจเคพ

The Problems That Keep People on Windows. Shanios Solves Them.

These aren't Linux edge cases โ€” they're the everyday reasons people dread updates, avoid switching, or keep reinstalling. Each one is solved by architecture, not configuration.

"An update broke my computer. I spent the whole weekend trying to fix it."
How Shanios handles this
Shanios never touches your running system during an update โ€” it prepares the new version in the background. If anything is wrong, your previous working system is still in the boot menu. One reboot, and you're back. No fix required.
"I want to switch from Windows, but I'm scared of breaking something."
How Shanios handles this
With Shanios, the worst case is always: reboot to undo it. Every update can be reversed with one command. Your files, settings, and apps live in separate storage that no OS update or rollback ever touches. There is no "broke and have to reinstall" โ€” just reboot.
"macOS told me my Mac is no longer supported. I have to buy new hardware just to get updates."
How Shanios handles this
Shanios runs on any 64-bit x86 PC โ€” including older hardware Apple stopped supporting years ago. A machine Apple calls obsolete can run a fully up-to-date, secure, rolling-release OS. No planned obsolescence. No hardware upgrade required.
"My computer has been running for years and it's getting slower and weirder."
How Shanios handles this
Every Shanios update replaces the entire OS with a clean, verified image โ€” not patches on top of patches. There is no accumulation. Every user on the same channel runs the identical, fresh system.
"I opened too many tabs and my whole system locked up. Had to hard reset."
How Shanios handles this
Shanios includes an out-of-memory manager that runs system-wide. Under memory pressure it quietly terminates low-priority background tasks โ€” your active work keeps running. The system stays responsive instead of freezing solid, even on 4 GB RAM.
"I updated and now my dev tools are broken. I have a deadline tomorrow."
How Shanios handles this
If your dev environment lives in a Distrobox container or Nix environment, the OS updates underneath it without touching it. If you use system-level tools, rollback restores the exact previous OS state โ€” your tools, your versions, exactly as they were. Either way, the previous working state is always one reboot away.
"I'm worried an update will break something. I keep putting it off."
How Shanios handles this
Update when you're ready โ€” rollback is always one command away. Not ready to commit? You can simulate the full update without changing anything first. Your previous OS is kept until the next update cycle.
"My laptop lost power mid-update. Now I'm not sure what state it's in."
How Shanios handles this
Shanios blocks sleep and shutdown during an update. If power is cut anyway, your running OS is completely untouched โ€” updates always happen in the background copy, never in the live one. Boot normally; your system is exactly as you left it.

Who It's For

Whether you're tired of Windows surprises, switching from a Mac that's been cut off from updates, a gamer who can't afford a broken OS, or a developer who just needs things to work โ€” see which description fits you.

The IT Admin / OEM

Deploy from one identical, GPG-verified image. Roll back any machine โ€” no reimaging required. Previous OS copy always available in the boot menu. No per-device package drift. No "works on some machines" support calls. Standardized, auditable, reproducible. Automatic rollback on boot failure without user intervention โ€” if a bad update can't boot, the machine recovers itself before anyone notices.

The Developer

Your dev environment lives in a Distrobox container โ€” host OS updates atomically underneath it, the two never interfere. Use Ubuntu, Fedora, or any distro's toolchain in isolation. Test Android apps in hardware-accelerated Waydroid โ€” a full Android stack, not a slow emulator, no physical device needed. Run HPC workloads in Apptainer. Corporate VPN, fingerprint login, FIDO2/YubiKey, and smart card auth all work at first boot. Fewer broken updates, fewer lost deadlines.

The Researcher

Apptainer (the HPC standard) is pre-configured โ€” submit reproducible environments to clusters, share exact setups with collaborators, run isolated GPU workloads. The host OS itself is a GPG-signed, verifiable artifact: your full stack from kernel to container is reproducible and auditable, not just the workload inside it. Pair with an immutable host for a research environment that stays exactly as configured, indefinitely.

The Tired Linux User

You've reinstalled more times than you can count. You love Linux but you're done babysitting updates. Shanios gives you a rolling release's freshness with server-grade update reliability. When something goes wrong, you reboot โ€” not reinstall. Browser profiles run from RAM (Profile Sync Daemon), McFly gives your shell history a neural-network brain, and Btrfs compression cuts disk usage 30โ€“50%. The OS that earns trust by being boring.

The Linux Gamer

Steam, Proton, Heroic, Lutris, RetroArch, Bottles โ€” all pre-installed on KDE Plasma. NVIDIA drivers configured at first boot. MangoHud, GameScope, vkBasalt, OpenRGB, AntiMicroX โ€” the full stack without setup pain. GameMode runs globally so every game benefits automatically. Kernel tuned for gaming: low-latency scheduler, 3072 Hz timers, expanded memory maps. Racing wheels (Logitech, Thrustmaster, Fanatec), VR headsets (HTC Vive, Valve Index, PSVR) โ€” all pre-configured. An OS update never costs you a gaming session.

The Corporate Laptop User

Fingerprint login, smart card, YubiKey/FIDO2, and NFC auth all work at first boot. Full enterprise VPN suite (WireGuard, OpenVPN, Cisco AnyConnect-compatible, Fortinet, IPsec), printers, scanners โ€” no setup required. Secure Boot, TPM2 auto-unlock, and LUKS2 argon2id full-disk encryption for compliance. Hibernation works out of the box. An immutable, GPG-verified OS that IT can audit. Everything a work machine needs, nothing to configure after imaging.

PC Manufacturers & Vendors

Ship Shanios pre-installed across your product line โ€” GPG-signed images, Plymouth BGRT brand logo at boot, OEM first-run wizard, and one-command rollback that eliminates most support calls. No per-unit licence cost. See Enterprise & Vendors โ†’

School Labs & Family Computers

Kids can install games, change settings, and browse freely โ€” but they cannot accidentally break the OS itself. A reboot always brings it back to a known-good state. School labs can stop reimaging between terms โ€” no summer overtime for your IT coordinator. Family computers stay stable no matter what a teenager does.

Why Updates Can't Break Your Computer

This is what makes Shanios an immutable OS: the core system is permanently read-only โ€” nothing running on your machine can modify it, not even the root user. Shanios always keeps two complete, bootable copies of the OS on disk. You run on one; updates are prepared on the other. When you're ready, reboot into the new one. If anything's wrong, reboot back. Simple to use, nothing to manage. Here's how it works.

โ— Running Now
Your running OS (active copy)
This is what you're using right now. It is never touched during any update or rollback โ€” not even by root.
Core OS โ€” read-only, can't be accidentally changed
Your settings โ€” stored separately, untouched by any update
Your files โ€” never touched by updates or rollbacks
App & service data โ€” preserved across reboots
Update
โ–ถ
new OS prepared here โ€” you keep running normally
Rollback
โ—€
restored from timestamped backup โ€” one reboot
โ†ป Staging Update
Standby OS copy (the other one)
The new OS is prepared here โ€” completely separate from what you're running. A safety backup is taken before any writing begins. Think of these as your active and standby OS copies โ€” always ready to switch between.
โ‘  backup current standby copy (timestamped)
โ‘ก download & verify the new OS โ€” rejected if tampered
โ‘ข old copy removed only after new one is confirmed complete
โ‘ฃ set up your next boot โ€” your running OS untouched
backup stays ready so you can roll back anytime
Show step-by-step details
1

The updater updates itself first

Before doing anything else, shani-deploy downloads the latest version of itself from GitHub. A basic sanity check confirms the download is a valid script โ€” if a newer version is found, it re-executes immediately โ€” so you always run current deployment logic, no matter how long ago you installed.

2

Your system is protected during the update

Shanios blocks sleep, shutdown, and lid-close for the entire update โ€” so nothing interrupts it. If the system is powered off mid-update anyway, a deployment-pending flag is detected on next run of shani-deploy, which reports the interrupted state and prompts you to use --rollback to restore a clean state before proceeding.

3

It checks which OS copy you're running

Before doing anything, the updater confirms exactly which OS copy you're running. If there's already a staged update waiting for a reboot, it reports that rather than proceeding โ€” preventing any accidental double-deploy.

4

Download & verify โ€” tampered files are rejected

The update image is downloaded from Shanios's primary server with multi-connection resume support โ€” so a slow connection or interrupted download picks up where it left off. If the primary server is unavailable, a SourceForge mirror is used automatically. SHA256 and GPG signature are both verified against the public key on keyservers before the image is ever extracted. A tampered or incomplete image is rejected outright โ€” the update aborts, nothing changes.

5

A safety snapshot is taken before anything is written

Before writing anything, a timestamped backup of the inactive OS copy is taken. The new image is then extracted into it. The old copy is only removed after the new one is confirmed complete. If power is cut mid-extraction, both your running system and the backup are fully intact โ€” nothing is lost.

6

The new OS copy is set up and boot is prepared

The new OS copy is packaged into a single Unified Kernel Image (UKI โ€” kernel, initrd, and cmdline bundled together) and registered as your next boot target. Your currently running OS remains the default until you choose to reboot โ€” nothing changes on your live system until then.

7

You decide when to switch โ€” no forced reboots

Reboot on your schedule โ€” immediately, or days later. The pending update waits in the background. Your currently running OS boots exactly as normal until you choose to switch. Once you reboot and the new OS starts up cleanly, everything is finalised automatically.

8

Changed your mind? Roll back anytime with one command

Run sudo shani-deploy --rollback from the OS you want to keep. Shanios detects your active slot, restores the other copy from its last backup, regenerates its unified kernel image (UKI), updates the boot entries to point both slots correctly, and leaves your current system untouched. If a new OS ever fails to boot at all, systemd-boot detects the failure and reverts to the previous slot automatically โ€” no action needed from you.

  Your files, apps, and settings are never touched by OS updates or rollbacks. Everything personal lives in completely separate storage, independent of which OS copy is running. This separation โ€” between a locked OS core and your personal data โ€” is what "immutable" means in practice. Hibernation works out of the box โ€” no setup needed. Two update speeds: stable (default, tested monthly builds) and latest (most recent, more frequent). You choose when to switch.

Download Shanios โ€” It's Free

Two editions ยท Cryptographically verified ยท Zero telemetry

Everything Works. Nothing to Configure.

Every feature ships ready to use โ€” no add-ons, no setup required. Immutable OS core means nothing can break the system underneath these features. Privacy by default, gaming ready, tools for every kind of user.

Updates & Recovery

Updates That Never Break Your System

Every update runs in the background on a separate OS copy โ€” your live system is never touched. Reboot when ready to switch. Previous version stays available for rollback. You'll get a desktop notification when an update is ready.

shani-deploy prepares the standby OS copy: downloads the update, verifies its SHA256 + GPG signature, takes a safety snapshot first, extracts the new image, and registers it in the boot menu โ€” all without touching your running system.

The old candidate is deleted only after extraction succeeds. Sleep, shutdown, and lid-close are blocked for the duration of the update. A power cut mid-update leaves your current system completely untouched.

Two channels: stable (default, tested and validated builds โ€” new images released approximately monthly) and latest (newest available image, released more frequently, closer to cutting edge). Switch with -t latest. shani-deploy updates itself from GitHub before every run โ€” improvements reach you automatically.

Desktop update notifications โ€” a separate background checker (shani-update, running as a user-level systemd service) monitors for new OS images and sends a desktop notification when one is available. No need to remember to check โ€” you decide when to actually run shani-deploy to apply it.

Deployment pending flag โ€” if the update is interrupted by a power loss, the pending flag is detected the next time shani-deploy is run. It reports the incomplete state and directs you to run --rollback to restore a clean system before retrying.

Always recoverable: your previous OS copy stays intact after every update. If the new copy doesn't work for you, sudo shani-deploy --rollback restores it โ€” no recovery media, no reinstall.

Storage is shared between both OS copies โ€” keeping two system copies takes far less space than you'd think. See Performance & Storage Efficiency for full details.

The OS Can't Be Accidentally Broken โ€” It's Immutable

Shanios uses an immutable architecture โ€” the core OS is permanently read-only at runtime. Nothing you run, nothing you install, and nothing that goes wrong can corrupt it. Your personal files, settings, and apps live in completely separate storage and survive every update untouched.

Immutable root (/) โ€” mounted read-only at runtime. Even a process running as root cannot modify core system files during a live session. The system that passed QA is the system that runs.

/etc as OverlayFS โ€” your config changes live in @data/overlay/etc/upper, layered on top of the read-only OS root at boot. This means your customisations are always active regardless of which OS copy is running โ€” they are never inside the OS image itself and are unaffected by updates or rollbacks.

Services you enable persist. At boot, overlays mount first, then systemd daemon-reload runs โ€” so any unit you've enabled via systemctl enable survives every OS update exactly as expected.

/home and /root live in dedicated Btrfs subvolumes โ€” fully writable, shared between both OS images, unaffected by updates or rollbacks.

Selective /var management โ€” transient runtime state is cleared on reboot to reduce unnecessary writes and extend SSD lifespan. Important persistent state (NetworkManager, Bluetooth, printers, audio, Tailscale, fingerprint, TPM2 data, colord profiles) is preserved via bind mounts from @data and survives reboots unchanged.

@nix subvolume โ€” the Nix store is shared between both OS copies. Nix packages survive both updates and rollbacks, with no re-download required after switching.

Your Always-Available Fallback

Something goes badly wrong โ€” bad driver, failed update, worst case scenario. Your previous working system is always one reboot away. No recovery USB, no reinstall, no lost afternoon. If the new OS can't even boot, it switches back automatically.

Before writing to the inactive OS copy, shani-deploy snapshots it as @{slot}_backup_{timestamp}. If the update fails at any point, an emergency rollback restores the candidate automatically.

Automatic boot failure detection โ€” a boot-counting pipeline (mark-boot-in-progress โ†’ bless-boot โ†’ mark-boot-success โ†’ check-boot-failure โ†’ startup-check dialog) detects if a new OS copy fails to boot successfully. If the new copy can't boot, systemd-boot automatically reverts to the previous one โ€” without requiring any user action or recovery media.

Manual rollback: sudo shani-deploy --rollback from the OS copy you want to keep. Detects your active copy, restores the other from its latest snapshot, regenerates its UKI, and updates boot entries โ€” without touching your running system.

For OEM: rollback never requires reimaging. The previous OS copy is always in the systemd-boot menu โ€” no recovery media, no dispatch.

Your /home, apps, containers, and /etc config live in separate subvolumes โ€” OS rollback never touches them.

Security & Privacy

Defence-in-Depth Security Stack

Full-disk encryption, Secure Boot, a firewall, and multiple layers of protection โ€” all active the moment you boot for the first time. No setup required, nothing to configure.

Immutable root โ€” even root cannot modify core OS files at runtime, limiting the blast radius of malware and misconfiguration. Full details in the Core Architecture section.

6 Linux Security Modules active simultaneously โ€” Shanios sets lsm=landlock,lockdown,yama,integrity,apparmor,bpf in the kernel command line. Most Linux distributions enable one or two; Shanios runs all of them concurrently:
โ€ข AppArmor โ€” mandatory access control, confines processes to files and capabilities they legitimately need
โ€ข Landlock โ€” filesystem sandboxing at the process level
โ€ข Lockdown โ€” restricts the kernel from modifications even by root
โ€ข Yama โ€” restricts ptrace scope and other process tracing
โ€ข Integrity (IMA/EVM) โ€” runtime file integrity measurement
โ€ข BPF LSM โ€” eBPF-based policy hooks for dynamic security enforcement

LUKS2 with argon2id โ€” full-disk encryption with a modern memory-hard key derivation function. Argon2id is specifically designed to resist GPU and ASIC brute-force attacks. Optional at install, strongly recommended for laptops.

TPM2 auto-unlock โ€” sealed LUKS keys tied to PCR (Platform Configuration Register) state. The disk unlocks automatically on trusted hardware without requiring a passphrase at every boot, while remaining locked against physical disk removal or hardware tampering. TPM data persists across blue/green OS copy switches.

Secure Boot via shim-signed, sbctl, mokutil โ€” verifies bootloader and kernel haven't been tampered with before the system starts.

Intel ME kernel modules blacklisted โ€” the Intel Management Engine kernel modules (mei, mei_me) are blacklisted by default, removing the OS-level communication channel to Intel ME. Note: ME firmware itself operates below the OS and cannot be fully disabled via software alone โ€” but blacklisting the kernel modules eliminates the most accessible attack surface. This is a genuine privacy differentiator that most distributions do not do.

firewalld โ€” active from first boot. Zone-based firewall blocking all unsolicited inbound connections.

Flatpak sandboxing โ€” user apps get only the permissions they explicitly declare. No silent access to your home directory or system services.

Hardware security keys & smart cards โ€” FIDO2/U2F keys (libfido2), smart cards (opensc, ccid), and NFC (libnfc) all work out of the box. Use a YubiKey or similar for login and sudo authentication without any setup.

fwupd via LVFS โ€” keeps BIOS, NVMe, and peripheral firmware current. Outdated firmware is a major attack vector. Full details in the Hardware Support card.

No OS eliminates all risk. Network threats, zero-days in running services, and social engineering are outside what OS architecture alone can solve.

Zero Telemetry. Zero Ads.

No usage data collected. No crash reports. No ads. No background services phoning home. Your machine is yours โ€” and unlike most operating systems, you don't have to opt out of anything. Click to see exactly how this is enforced.

Many operating systems โ€” including some Linux distributions โ€” include opt-out telemetry, crash reporters, or usage analytics that run by default. Shanios has none of this.

No background services report your hardware, software usage, or system behaviour to any server. No identifiers are generated or transmitted. No crash data is collected without your explicit action.

Intel ME kernel modules blacklisted โ€” the Intel Management Engine kernel modules (mei, mei_me) are blacklisted, removing the OS-level communication channel to ME. Note: this prevents OS-to-ME communication but does not disable the ME firmware itself, which operates below the OS. It eliminates the most accessible attack surface without requiring a firmware modification.

The update tool (shani-deploy) connects to download servers to fetch images โ€” but sends only what any standard HTTP download requires. No system fingerprints, hardware IDs, or usage statistics are transmitted.

Because the entire codebase is public on GitHub, these claims are verifiable. You can read every script that runs on your system. No black box, no trust-us.

Supply Chain Integrity

Every update is verified before it's applied โ€” a tampered or corrupted file is rejected automatically. The entire build process is public, so you can verify it yourself. No black box, no trust required.

Supply chain attacks โ€” where malicious code is injected between a trusted source and the end user โ€” are one of the most serious threats facing software today. Shanios's update model is designed with this in mind.

Every OS image is GPG-signed before distribution. Before shani-deploy extracts a new image, it verifies both the SHA256 checksum and the GPG signature. A tampered or corrupted image is rejected outright โ€” the update aborts, nothing changes.

The build system and deploy toolchain are public on GitHub. The GPG signing key is publicly registered so anyone can verify OS images independently. You can verify that the image you receive was produced by the published build process and signed by the correct key โ€” without trusting any single party's word.

Downloads come from the primary R2 server (downloads.shani.dev) with multi-connection resume support. If R2 is unavailable, the script automatically discovers a SourceForge mirror. OS images are distributed as native Btrfs send streams, compressed with zstd โ€” not squashfs or OCI layers. On deployment, shani-deploy pipes the verified stream directly into btrfs receive, reconstituting the exact read-only subvolume that passed build-time QA. No intermediate unpacking, no format conversion โ€” what was signed is what gets written.

How Shanios Compares

An honest comparison โ€” including where others win. Coming from Windows or macOS: Shanios never requires a reinstall to recover from a bad update, collects zero telemetry, and is completely free โ€” things neither Windows nor macOS offer. For Linux users comparing distributions: we highlight where others genuinely beat us too.

vs Windows & macOS

What matters to you Shanios Free ยท Open Source Windows 11 Microsoft ยท Paid macOS Sequoia Apple ยท Requires Mac hardware
Bad update recovery โœ“ One reboot โ€” alwaysPrevious OS copy stays intact; automatic rollback on boot failure. No reinstall ever. โœ— Reinstall or System RestoreWindows Update can break boot; recovery often requires USB media or reinstall Partial โ€” Time MachineFull system restore requires Time Machine backup + reboot into recovery
Telemetry & data collection โœ“ Zero โ€” verified in public codeNo usage data, no crash reports, no analytics. Intel ME kernel modules blacklisted. Nothing phoning home. โœ— Extensive by defaultDiagnostic data, typing/inking telemetry, ad personalisation, Recall (AI screenshots). Opt-out buried in settings. โœ— SignificantUsage analytics, Siri data, iCloud integration, app usage reporting sent to Apple by default
Price Free โ€” alwaysCommunity edition is completely free. No licence key, no subscription, no trial. โ‚น14,999+ / $139+Home licence required. OEM copy tied to one machine. Pro costs more. Hardware cost: โ‚น90,000+macOS is free โ€” but requires Apple hardware. Cheapest Mac starts at ~$599 / โ‚น89,900.
Ads in the OS โœ“ None โ€” everNo ads anywhere in the OS or its tools. โœ— Ads in Start, File Explorer, lock screenMicrosoft increasingly places sponsored content and upsell prompts throughout the UI RareOccasional prompts to use Apple services (iCloud, Apple TV+); no banner ads
Your familiar apps โœ“ Pre-installed & compatibleBrowser, OnlyOffice (Word/Excel/PPT), VLC, Flatpak apps from Flathub, Android apps via Waydroid. Windows apps via Bottles (pre-installed on KDE; Flathub on GNOME) โœ“ Native Windows appsFull Windows software ecosystem โ€” .exe installers, Microsoft Store, Office 365 โœ“ Native Mac appsApp Store, Homebrew, most professional creative tools (Adobe, Final Cut, Logic)
Gaming โœ“ Full stack pre-installedSteam + Proton, Heroic (Epic/GOG/Amazon), RetroArch, Bottles for Windows titles, NVIDIA at first boot โœ“ Best native supportLargest library, DirectX native, anti-cheat works everywhere โœ— Very limitedSmall library, no DirectX, limited GPU options, no competitive anti-cheat
Security architecture โœ“ 6 kernel security modules activeAppArmor, Landlock, Lockdown, Yama, Integrity, BPF โ€” all on by default. TPM2 + Secure Boot + LUKS2 argon2id. Defender + TPM2 + Secure BootGood baseline; frequent vulnerability disclosures; large attack surface from app ecosystem โœ“ Strong by defaultGatekeeper, SIP, AMFI, sandboxed apps. Tight hardware/software integration helps.
Read-only, tamper-proof OS core โœ“ Always โ€” even root can't modify itCore OS is read-only. Malware can't persist across a reboot to the other copy. โœ— Writable by admin/malwareSystem32 modifiable by elevated processes; rootkits can persist across reboots Partial โ€” SIP protects system dirsSystem Integrity Protection blocks most changes; not fully immutable
Hardware freedom โœ“ Any x86-64 PCWorks on any UEFI machine โ€” your existing hardware, no upgrade required โœ“ Any modern PCWide hardware support; some older CPUs dropped with Win 11 โœ— Apple hardware onlyLocked to Mac/MacBook. No choice of manufacturer, no upgrades on most models.
Terminal / command line needed for daily use โœ“ Not requiredGUI for everything. OS updates use one terminal command (sudo shani-deploy) โ€” a desktop notification tells you when one is ready. โœ“ Not requiredFull GUI for all common tasks โœ“ Not requiredFull GUI for all common tasks; Terminal available for power users
Hibernation โœ“ Works out of the boxSwapfile sized to RAM created at install. Suspend-then-hibernate also configured. โœ“ WorksSupported; some driver/firmware issues on certain hardware Sleep-only on Apple SiliconTraditional hibernate not available on M-series Macs; Intel Macs support it
Open source & auditable โœ“ Fully openEvery build script, deploy tool, and signing key is public. Verify the full chain yourself. โœ— Closed sourceSource not available; security relies on trust in Microsoft โœ— Mostly closedDarwin kernel is open; everything above it is proprietary

Where Windows wins: native gaming anti-cheat, broadest .exe app compatibility, Microsoft Office native, DirectX.

Where macOS wins: Apple Silicon performance/battery, Final Cut/Logic Pro, tight hardware integration, iOS/iPad app ecosystem.

Shanios is not trying to beat either for every use case โ€” it's the right choice if you want a reliable, free, zero-telemetry, open-source daily driver on your existing PC hardware.

Feature / Criteria Shanios Arch ยท Blue-Green Traditional Linux Ubuntu / Arch / Fedora Fedora Silverblue OSTree ยท rpm-ostree Bazzite Fedora Atomic ยท Gaming SteamOS 3 Arch ยท Valve ยท Handheld Vanilla OS 2 Debian Sid ยท ABRoot NixOS Declarative ยท Nix
Update mechanism Btrfs send/receiveGPG-verified send stream piped directly into the inactive @blue/@green subvolume โ€” running system never touched Package layeringModifies live system directly OSTree commitsrpm-ostree layering possible, adds complexity OSTree + layeringPre-layered gaming packages on Fedora Atomic Full image swapA/B partition, Valve-controlled, Steam Deck optimised OCI image swapABRoot v2 transacts between two root partitions Generation switchDeclarative rebuild via Nix
Instant rollback โœ“ Always availablePrevious slot untouched; one reboot โ€” same speed as normal boot. Automatic on boot failure. โœ— No rollbackManual fix or reinstall โœ“ OSTree historyPrevious commit in boot menu โœ“ OSTree historyUp to 90 days of deployments โœ“ A/B partitionPrevious slot in boot menu โœ“ ABRoot rollbackabroot rollback to previous OCI image โœ“ Boot generationSwitch generations at boot
Zero telemetry / no ads โœ“ Verified โ€” codebase is publicNo tracking, no crash reports, no analytics โ€” ever. Intel ME kernel modules blacklisted by default, removing OS-level ME communication. Nothing phoning home. Varies by distroUbuntu has had opt-out telemetry; others vary โœ“ MinimalFedora opt-in countme data only โœ“ No telemetryInherits Fedora Atomic defaults Steam analyticsSteam hardware survey and usage data by default โœ“ No telemetryOpen source, no analytics โœ“ No telemetryCommunity project, no analytics
Cryptographic image verification โœ“ SHA256 + GPG, public key on keyserversEvery image verified before deployment โ€” independently auditable โœ— Package checksums onlyNo full-image GPG signing OSTree signingContent-addressed commits Signed container imagesInherited from Universal Blue / Fedora Atomic Valve-signed imagesClosed signing, not independently auditable OCI image integrityFsGuard checks binary integrity at boot Nix store hashesReproducible builds, content-addressed
Active kernel security modules 6 simultaneously activeAppArmor, Landlock, Lockdown, Yama, Integrity, BPF โ€” all on by default. No setup required. 1โ€“2 typicallyAppArmor (Ubuntu/Debian) or SELinux (Fedora/RHEL); rarely combined SELinuxOne LSM; strong but not combined SELinux + Secure BootInherits Fedora Atomic security defaults LimitedValve-managed; user-configurable security is restricted FsGuardBoot-time integrity; no kernel LSM stack by default ConfigurableNone by default; can be added via Nix config
TPM2 auto-unlock + Secure Boot โœ“ Both included & configuredTPM2 with PCR binding for passwordless LUKS unlock on trusted hardware; Secure Boot via shim/sbctl Manual setupPossible but requires significant manual work Secure Boot โœ“, TPM2 manualSecure Boot supported; TPM2 auto-unlock requires manual setup โœ“ Both supportedPre-configured on Bazzite LimitedValve-managed; limited user control Secure Boot โœ“LUKS2 at install; TPM2 integration varies ConfigurablePossible via Nix options; not default
OEM & deployment โœ“ Core design goalGPG-verified images, automatic boot-failure rollback, no-reimaging rollback, OEM wizard, BGRT boot logo โœ— Per-device driftNo standardised image model โœ— Not a focusNo OEM tooling or deployment story โœ— Gaming consumer focusNot designed for enterprise or OEM deployment PartialValve expanding to select OEM handhelds โ€” not general PC OEM OEM first-setup presentSetup wizard Reproducible configsPossible via NixOps / deploy-rs; steep setup
Software base / release cycle Arch Linux โ€” rollingAlways-current packages, latest kernels and drivers โ€” no 6-month wait VariesRolling (Arch) or fixed release (Ubuntu/Fedora) Fedora ~6-month cycleFixed release cadence Fedora Atomic ~6-monthGaming layer updated more frequently Arch โ€” Valve-curatedSlow to land on non-Deck PC hardware Debian Sid (near-rolling)Debian unstable branch NixOS stable / unstableStable = fixed; unstable = rolling
NVIDIA support โœ“ Works at first bootDrivers pre-installed; Vulkan/OpenGL included VariesOften manual driver install needed Supportedakmod-nvidia; can be tricky on rpm-ostree โœ“ Pre-installedProprietary NVIDIA drivers included and tested โœ— No official supportNVIDIA not officially supported on non-Deck hardware โœ“ Detected at installInstaller proposes NVIDIA OCI image if GPU detected Availablenixos.config.hardware.nvidia; manual but reproducible
Gaming stack included โœ“ KDE editionSteam, Heroic, Lutris, RetroArch, Bottles, MangoHud, GameScope, vkBasalt, peripherals, VR, racing wheels, kernel tuned with 3072 Hz timers โœ— Manual setupInstall and configure everything yourself โœ— Not includedInstall via Flatpak manually โœ“ Primary focusSteam Gaming Mode, handheld-optimised, HDR, VRR โœ“ Deepest integrationValve's Proton, Gamescope, Steam Deck hardware-optimised โœ— Not includedInstall via Flatpak; no gaming defaults โœ— Manual setupPossible, no gaming defaults
Container runtimes pre-configured โœ“ Full ecosystem with GUIsPodman+Pods, Distrobox+BoxBuddy, LXC/LXD, Apptainer, systemd-nspawn, Nix โ€” each with own subvolume. Plus Flatpak, Snap, AppImage for app ecosystems. PartialInstall individually as needed Toolbox / DistroboxPodman included; others manual Distrobox + PodmanSome extras via ujust scripts Distrobox + PodmanPre-installed from SteamOS 3.5+ APX subsystemsDistrobox-based multi-distro containers via APX GUI Nix-nativeDocker/Podman via config; no UI defaults
Android apps (Waydroid) โœ“ Pre-configuredIntel/AMD hardware-accelerated, service enabled at boot, dedicated subvolume, ARM translation included Manual installPossible, no defaults โœ— Not includedโ€” โœ“ AvailableSetup guide; ARM translation included โœ— Not availableGaming-focused, no Android layer โœ“ Via VSO v2Waydroid + F-Droid, experimental โœ— Not includedโ€”
Hibernation out of the box โœ“ Auto-configuredSwap subvolume (CoW disabled) sized to RAM at first deployment โ€” hibernation works without any manual setup VariesUsually manual swapfile or partition setup required โœ— Manual setupNot configured by default PartialGaming-focused; hibernation not a priority โœ— Not supportedSteam Deck uses suspend, not hibernate PartialDepends on OCI image; not guaranteed ConfigurablePossible via Nix options; not default
Profile Sync Daemon (browser from RAM) โœ“ Pre-configuredBrowser profiles run from RAM โ€” faster page loads, less SSD wear, syncs back on shutdown โœ— Not includedManual setup required โœ— Not includedโ€” โœ— Not includedโ€” โœ— Not includedโ€” โœ— Not includedโ€” โœ— Not includedโ€”
Indian language support โœ“ Designed in from day oneDevanagari, Tamil, Telugu + more; IBus pre-configured AvailableAdd-on; quality varies by distro AvailableInstall separately AvailableInstall separately Not a focusGaming-oriented; no i18n defaults AvailableInstall separately AvailableConfigure via Nix options
Price Community: freeEnterprise & OEM licensing available โ€” librewish@gmail.com Freeโ€” Freeโ€” Freeโ€” Freeโ€” Freeโ€” Freeโ€”
Setup complexity Low โ€” works out of the boxOEM wizard, all hardware configured, no post-install tuning Low to HighDepends heavily on chosen distro ModerateNew paradigm; good docs; Fedora familiarity helps LowDesigned for approachable gaming setup Low (supported hardware)Seamless on Steam Deck; PC install is community-only ModerateNew tooling (ABRoot, APX, VSO); docs maturing High โ€” intentionalDeclarative by design; steep learning curve, but reproducibility is the payoff

Reflects publicly documented behaviour as of early 2026 โ€” always check current docs before deciding.

Where others win: Bazzite/SteamOS for Steam Deck. NixOS for declarative reproducibility. macOS for Apple-exclusive creative apps (Final Cut Pro, Logic Pro). Shanios is the right fit for general hardware, rolling-release reliability, NVIDIA at first boot, and zero telemetry.

Download Shanios

Community edition โ€” open source, free, no account required. Enterprise & OEM editions available. Built on Arch Linux packages (rolling release) โ€” new OS images ship roughly monthly on the stable channel, more frequently on latest. Coming from Windows or Mac? Start with GNOME edition โ€” most familiar for switchers. Already on Linux? Pick your preferred DE โ€” GNOME for clean and minimal, KDE Plasma for power and gaming.

Shanios GNOME Edition desktop
Shanios GNOME Edition desktop screenshot

GNOME Edition

Arch Linux ยท systemd ยท Btrfs ยท rolling kernel ยท x86_64

OEM-Ready Enterprise & Professional Clean & Focused Desktop

Version 2026.03.10  ยท  ~5.4 GB  ยท  SHA256 + GPG signed  ยท  Actively maintained
signed_shanios-gnome-2026.03.10-x86_64.iso

What's included

Clean, focused desktop โ€” best for work, students, and Windows/Mac switchers. Browser, office suite, calendar, notes, media apps, VMs (GNOME Boxes), Waydroid, OnlyOffice, Vivaldi โ€” all pre-installed, nothing to configure. Full feature list โ†’

Shanios KDE Plasma Gaming Edition desktop
Shanios KDE Plasma Gaming Edition desktop screenshot

KDE Plasma Gaming Edition

Arch Linux ยท systemd ยท Btrfs ยท rolling kernel ยท x86_64

OEM-Ready Power User & Gaming ๐ŸŽฎ Recommended for Gamers

Version 2026.03.10  ยท  ~7.6 GB  ยท  SHA256 + GPG signed  ยท  Actively maintained
signed_shanios-plasma-2026.03.10-x86_64.iso

What's included

๐ŸŽฎ Best for gamers and power users. Steam, Heroic, Lutris, RetroArch, Bottles, GameMode โ€” all pre-installed. NVIDIA configured at first boot. Full KDE productivity suite, Waydroid, OnlyOffice, Vivaldi โ€” everything ready at first boot. Full feature list โ†’

Active community on Telegram ยท Source on GitHub ยท Questions answered personally by the developer
New to Linux? You're welcome here. Shanios is designed so you don't need Linux knowledge for daily use โ€” just a willingness to try. Want to try it before installing? Run the ISO in a VM first โ€” GNOME Boxes or VirtualBox let you install and test Shanios without touching your main system. If you get stuck, the Telegram community is active and friendly. Start with GNOME edition โ€” it's the most familiar if you're coming from Windows or Mac.
Need an enterprise or OEM deployment? SLA support ยท Fleet management ยท OEM image customisation ยท Volume licensing ยท Private update channel (in development). Get in touch โ†’

How to Install Shanios

Five steps. About 15 minutes. No Linux experience required.

Shanios needs its own dedicated drive โ€” it cannot share a drive with Windows or another OS.
The installer will erase the entire selected drive and set it up automatically. It creates a small boot area and uses the rest of the drive for the OS, your files, and apps โ€” all managed for you. You don't need to partition anything yourself.

Need to keep Windows? Use a second drive for Shanios. At startup, press F12 (or your laptop's boot key) to choose which drive to boot from.
1

Download & verify the ISO

Download the GNOME or KDE edition from the Download section. Before writing to USB, verify the file wasn't corrupted in transit โ€” the verify link is next to each download button. On Linux:

sha256sum signed_shanios-gnome-2026.03.10-x86_64.iso

Compare the output against the checksum on wiki.shani.dev. If they match, the file is intact.

2

Write to USB (8 GB+)

Windows: use Balena Etcher or Rufus.
Linux:

sudo dd bs=4M if=signed_shanios-gnome-2026.03.10-x86_64.iso \
  of=/dev/sdX status=progress oflag=sync

Replace /dev/sdX with your USB drive โ€” confirm with lsblk first. Do not use Ventoy.

3

Quick BIOS check

Access BIOS with F2, Del, or F10 at startup:

  • Disable Fast Boot
  • Disable Secure Boot (re-enable after install)
  • Set boot mode to UEFI โ€” legacy/CSM not supported
  • Set SATA to AHCI
  • Enable Virtualization (Intel VT-x / AMD-V)
4

Boot from USB & install

Press F12 at startup โ†’ select your USB โ†’ choose Install Shanios โ†’ follow the installer (~10โ€“15 min). Select your target drive โ€” it will be fully wiped.

Optional: enable LUKS2 full-disk encryption during install (recommended for laptops).

5

First boot & updates

Shanios configures everything automatically on first boot โ€” hardware, drivers, hibernation. Just wait for your desktop to appear.

To update the OS anytime:

sudo shani-deploy

A desktop notification tells you when an update is ready. Your running system is never touched during the update.

Stuck? Ask in the Telegram community โ€” developer responds personally.

Frequently Asked Questions

The questions people ask most before trying Shanios, answered directly.

Do I need to know Linux to use Shanios?
No โ€” not for everyday use. Both GNOME and KDE editions have full graphical interfaces for everything from settings to app installation. You do not need to open a terminal to browse, write documents, play games, or install apps. You will need one terminal command to update the OS: sudo shani-deploy โ€” that's it. If you want to go deeper (containers, Nix, custom configurations), Shanios gives you full access. If you don't, it stays out of your way. New to Linux? Start with the getting-started guide and feel free to ask questions in the Telegram community.
I'm coming from Windows. Will my apps work? Is this beginner-friendly?
Yes โ€” your familiar apps are here and the switch is more manageable than most expect. See the Windows or Mac Switcher section for a full rundown of app equivalents and what changes. Not sure it's right for you? Ask in the Telegram community before you install โ€” fast, friendly answers.
I'm coming from Mac. What changes? What stays the same?
What stays the same: The terminal works exactly as you'd expect โ€” bash or zsh, standard UNIX commands, familiar tools. Your browser (Firefox, Vivaldi pre-installed โ€” or install Chrome via Flatpak), office documents (OnlyOffice opens .docx/.xlsx/.pptx natively), and media files all transfer directly. Homebrew can be installed and works just as it does on macOS โ€” see the Homebrew section on wiki.shani.dev for setup details. Nix is also pre-installed โ€” it's a declarative, reproducible package manager (a different mental model from Homebrew, not a replacement) that keeps packages conflict-free and surviving OS updates; requires adding a channel once before use.

What's better: No Apple ID required. No iCloud. No subscription for basic features like iCloud Drive or full OS backups. No planned obsolescence โ€” hardware Apple stopped supporting in 2019 runs Shanios fine today. Bad update? One reboot back โ€” macOS has no equivalent. Full-disk encryption with no Apple key escrow.

What's different: Software comes from Flatpak (like an App Store, but open) rather than .dmg files. The update command is one terminal line: sudo shani-deploy. You have root access โ€” something macOS increasingly restricts. Some Mac-exclusive apps (Final Cut Pro, Logic Pro, Xcode) have no Linux equivalent โ€” check beforehand if these are essential to your workflow.
Can I install software? How does app installation work?
Yes โ€” the app store works exactly as you'd expect. Flatpak (via Flathub) is the main app store, with thousands of apps including all the popular ones. There's also Snap, portable AppImages, and for power users: Nix environments and containers via Distrobox. All persist across OS updates in their own dedicated storage โ€” completely separate from the OS itself. Nix packages live in their own dedicated storage shared between both OS copies, so they survive updates and rollbacks. Note: Nix requires adding a channel once before first use โ€” see wiki.shani.dev for the one-line setup. The point is that your apps and your OS are separate concerns โ€” an OS update can't break your apps, and your apps can't corrupt the OS.
Does Shanios need an account? Does it collect any data about me?
No account needed, no email, no registration โ€” just download and install. Shanios collects zero telemetry, sends no crash reports, and has no analytics of any kind. The update tool (shani-deploy) connects to download servers to fetch images โ€” but only transmits what any standard HTTP download requires. No hardware fingerprints, no system IDs, no usage statistics are sent. Intel Management Engine โ€” a low-level chip-level background process on Intel hardware โ€” is disabled by default, removing a known surveillance and attack surface. Because the entire codebase is public on GitHub, this is verifiable โ€” you can read every script that runs on your system.
Why does it need 32 GB minimum? That's more than most distros.
Shanios keeps two complete, bootable OS copies at all times โ€” that's how instant rollback works. The GNOME edition ISO is ~2.3 GB; the KDE Plasma edition is ~2.8 GB. The filesystem uses Btrfs zstd compression (typically cutting OS size 30โ€“50%) and continuous background deduplication via beesd, so content shared between the two copies is stored only once. In practice the real extra overhead is well below double a single-copy OS. 64 GB gives comfortable room for apps, containers, and updates. You'll need at least 10 GB free to stage an update.
What happens if an update fails mid-way?
Nothing happens to your running system โ€” it's in a completely separate copy and is never touched during an update. Before any writing begins, a timestamped backup of the standby copy is taken automatically. If the update fails for any reason (network drop, power cut, verification failure), the standby copy is restored from that backup. If power is lost mid-update, a deployment-pending flag is detected the next time you run shani-deploy โ€” it will prompt you to run --rollback to restore a clean state. To undo a completed update: sudo shani-deploy --rollback.
Does it work on my hardware? NVIDIA? Older machines?
Shanios includes Intel, AMD, and NVIDIA drivers pre-installed and configured including full Vulkan support. Printers, scanners, Bluetooth, Wi-Fi, game controllers, fingerprint readers, FIDO2/YubiKey, smart cards, NFC, Thunderbolt, iOS devices, and 5G modems are all pre-configured. It runs the standard Arch Linux kernel with broad hardware support. Firmware updates (BIOS, NVMe, SSD, keyboard controllers) are handled automatically via the Linux Vendor Firmware Service โ€” no manufacturer tools or USB drives needed. Minimum: 64-bit x86 CPU, 4 GB RAM, 32 GB storage.
How do I keep everything updated โ€” OS, apps, containers?
Each layer has its own command: OS with sudo shani-deploy, Flatpak with flatpak update (also auto-updates every 12 hours), Snap with snap refresh, Nix with nix-env -u, Podman containers with podman auto-update, firmware with fwupdmgr update. These are completely independent โ€” updating apps doesn't touch the OS, and vice versa. Desktop notifications tell you when a new OS update is ready, so you never need to remember to check.
How do I roll back if the new OS doesn't work for me?
From the OS copy you want to keep, run sudo shani-deploy --rollback. Shanios restores the other copy from its most recent backup and updates the boot menu โ€” without touching your running system. If a new OS ever fails to boot at all, it's detected automatically and the previous one takes over โ€” no action needed from you. Your personal files, apps, and settings live in completely separate storage and are never affected by any OS rollback.
Is it good for laptops? Battery life? Hibernation?
Yes. Fingerprint login works at first boot on supported hardware โ€” no setup required. Hibernation works out of the box โ€” a swapfile sized to your RAM is created during installation, nothing to configure. TPM2 auto-unlock means you can use full-disk encryption without typing a password at every boot โ€” the disk unlocks automatically on your own trusted hardware. Power Profiles Daemon is pre-installed โ€” switch between balanced, performance, and power-saver modes directly from the system settings in both GNOME and KDE. Your browser profile runs from memory (RAM) rather than writing constantly to your SSD, which measurably extends SSD life. Full-disk encryption (LUKS2) and Secure Boot are both fully supported.
Is it secure? What exactly is protected?
The system root is read-only โ€” even root can't modify core OS files at runtime. Updates are verified SHA256 + GPG before deployment. Six Linux Security Modules run simultaneously: Landlock, Lockdown, Yama, Integrity, AppArmor, and BPF LSM. Full-disk encryption protects all your data at rest using a modern, attack-resistant key algorithm (LUKS2 argon2id). TPM2 auto-unlock ties LUKS keys to hardware state. Secure Boot verifies the bootloader and kernel before the system starts. Intel ME kernel modules blacklisted by default, removing the OS-level communication channel to ME. Flatpak sandboxes user apps. firewalld blocks unsolicited inbound connections from first boot. Zero telemetry means no analytics attack surface. That said โ€” no OS eliminates all risk. Network threats, zero-days, and social engineering are outside what OS architecture alone can solve.
Is it really open source? Can I verify how updates work?
Fully. The build system, shani-deploy scripts, and every tool that runs on your system are public on GitHub. The GPG signing key is publicly registered so anyone can verify OS images independently. In an era of supply chain attacks, that isn't a nice-to-have โ€” it's the point. You don't have to trust claims. You can read the code, verify the key, and reproduce the build. Full technical documentation is at wiki.shani.dev.
Does every update download the full 2โ€“3 GB image?
Yes โ€” shani-deploy downloads a full OS image each time. This is the trade-off of the blue-green model: instead of incremental package patches (which can drift, conflict, and accumulate), you get a complete, verified, identical image every time. Downloads are resumable โ€” a dropped connection picks up where it left off. On a typical broadband connection it takes a few minutes. The previous OS copy is kept until your next update, so you can always roll back. If bandwidth is a genuine constraint, the stable channel ships roughly monthly โ€” you're not downloading 3 GB every day. To preview what would happen without downloading anything, run sudo shani-deploy --dry-run.
I already use Linux. Does my knowledge transfer? What about pacman and the AUR?
Yes โ€” Shanios is standard Arch Linux under the hood. systemd works exactly as you know it: systemctl enable/disable/start/stop, user services, timers, all of it. /etc is fully writable via an overlay mount โ€” config files, service overrides, and custom unit files all persist across updates and rollbacks. cron (via cronie, pre-installed), user crontabs, and systemd timers all work. Shell: bash and zsh pre-installed; fish available via Flatpak, Distrobox, or Nix. Everything else โ€” networking, firewall, SSH, VMs, containers, kernel parameters โ€” works exactly as you expect on Arch.

The one thing that changes: pacman -S won't work on the live root โ€” it's read-only by design, and package changes wouldn't survive an update anyway. Use Flatpak for user-facing apps, Distrobox for a full mutable Arch container with pacman + AUR helpers (survives updates in its own subvolume), Nix for reproducible per-environment packages, or AppImages for portable binaries. This is intentional โ€” keeping the OS clean and verified is what makes rollback reliable.
Who built this, and what happens if development stops?
Shanios is built by Shrinivas Vishnu Kumbhar โ€” a developer and researcher from Shivaji University, Kolhapur, India. The project grew from research into why server deployments stay reliable while desktop OS updates so often fail, and applies those same techniques to the everyday desktop. It's currently a one-person project โ€” a fair thing to ask about. The entire codebase โ€” build scripts, deploy tooling, signing workflow โ€” is public on GitHub under a free software licence. If development stopped, anyone could fork it and continue. shani-deploy is a standalone script, not a proprietary service. The goal is to grow into a sustainable team as enterprise licensing generates revenue. Until then: transparent, forkable, and not dependent on any closed infrastructure. Full background in the About section โ†’
I'm a PC manufacturer or vendor. What does OEM licensing actually include?
OEM licensing covers a private GPG-signed update channel, Plymouth BGRT brand logo at boot, image customisation, SLA support, and fleet management tooling. The community edition base is always open source โ€” licensing covers the private infrastructure and customisation layer on top. Full details, pricing, and pilot enquiries: Enterprise & Partners section or Telegram.
Can I dual-boot with Windows or another OS?
No โ€” the Shanios installer writes to the entire selected drive. It creates two partitions: a 1 GB EFI partition (FAT32) and a single Btrfs root partition. The two OS copies that make rollback possible are Btrfs subvolumes (@blue/@green) inside that single root partition โ€” not separate partitions. There is no option to install alongside an existing OS on the same drive. If you need to keep Windows, use a separate physical drive for Shanios and select which OS to boot via BIOS boot selection (usually F12 at startup) โ€” both drives coexist without interfering. Note: Shanios uses systemd-boot, which only shows Shanios boot entries โ€” it will not auto-detect other drives. Use BIOS boot selection (F12) to switch between drives. If you need Windows apps, Bottles (Wine-based, pre-installed on KDE; available on Flathub for GNOME) handles many Windows applications without needing Windows at all.
Download Free Ask a Question First

No account ยท No telemetry ยท Still unsure? The community on Telegram is active and welcoming.

Support the Project

Shanios is an independent, self-funded OS platform. Today's donations directly fund build servers, testing hardware, and development time. The roadmap โ€” sovereign infrastructure, global OEM programme, enterprise support organisation โ€” requires real resources. This is early-stage backing for something built to last.

Other ways to help

Spread the Word

Why it matters

Star the project on GitHub, share it with admins and developers who are tired of reinstalling, or write about your experience. Word of mouth is how small open-source projects grow.

Star on GitHub

Contribute

How to contribute

Report bugs, propose features, improve documentation, or contribute code. Whether you're a developer, tester, designer, or technical writer โ€” every contribution matters.

Get Involved

Join the Community

What's in the community

Real-time support, announcements, tips, and discussion on Telegram. Fast responses, active community.

Join Telegram

Roadmap

Where Shanios has been, where it is now, and where it is going. The hard architectural work is done. What follows is scaling it โ€” infrastructure, enterprise, and a platform built to last decades. Built in public โ€” every milestone tracked on GitHub.

โœ“ Shipped

Foundation

  • Atomic blue-green Btrfs updates
  • GPG + SHA256 image verification
  • Immutable root with OverlayFS /etc
  • TPM2 auto-unlock + LUKS2 argon2id
  • 6 Linux Security Modules
  • Intel ME kernel modules blacklisted by default
  • Hibernation auto-configured
โœ“ Shipped

User Experience

  • GNOME & KDE Plasma editions
  • OEM Initial Setup wizard
  • Full gaming stack (KDE)
  • Waydroid Android layer pre-configured
  • All container runtimes with GUIs
  • Desktop update notifications
  • Script self-update mechanism
โœ“ Shipped

Developer Platform

  • Distrobox + Apptainer pre-configured
  • Podman + Flatpak + Snap + Nix + AppImage
  • Stable + latest update channels
  • Dry-run mode for all operations
  • rollback, cleanup, storage-info flags
  • Power-failure safe deployment
  • R2 CDN + SourceForge mirror fallback
โ–ถ In Progress

Enterprise Infrastructure

  • Fleet management tooling
  • Private update channel infrastructure
  • Controlled rollout scheduling
  • Compliance audit documentation
  • Enterprise support SLA framework
โ†’ Next Up

Security & Attestation

  • Remote attestation support
  • Measured boot integration
  • Reproducible build verification
  • SBOM (Software Bill of Materials โ€” a machine-readable inventory of every package in an OS image, for auditing and CVE tracking)
  • CVE tracking dashboard
โ—Ž Planned

Platform Expansion

  • ARM64 / Snapdragon X Elite support
  • Immutable server edition
  • Cloud image (AWS, GCP, Azure)
  • Installer CLI for headless deploy
  • OEM partner portal
โ—Ž With Funding

Sovereign & Global Platform

  • Self-hosted build infrastructure (no GitHub dependency)
  • Own global CDN, mirror network, and package signing servers
  • Independent update infrastructure for enterprise customers
  • Dedicated hardware test lab
  • Worldwide OEM licensing programme
  • Enterprise support organisation (24/7 SLA)
  • Certified hardware partner network
  • Government-grade compliance certifications (CC, FIPS)
  • Shanios Cloud โ€” managed immutable infrastructure
  • Community edition remains free and open source โ€” always. This roadmap scales the platform, not the licence.
Follow on GitHub

All development is public. Issues, PRs, and discussions are open.

About the Platform

Why this OS exists, what it stands for, and the person behind it โ€” so you know what you're installing and why it was built this way. Shanios is not the right tool for everyone โ€” the compare section shows exactly where Bazzite, NixOS, and others genuinely win.

Why Shanios Exists

Servers have stayed reliable for years by updating to a standby copy, verifying everything cryptographically, and rolling back instantly on failure. Desktop operating systems never did this โ€” and users paid for it with reinstalls, broken updates, and wasted weekends. Shanios grew out of research at Shivaji University into exactly this gap. The result isn't just a better Linux distro โ€” it's a platform architecture designed from first principles to be reliable, auditable, and independent at any scale. Rollback in one reboot, strong security out of the box, hibernation that just works โ€” as defaults, not add-ons.

Radical Transparency

Every build script, deploy tool, and signing workflow is public on GitHub. The GPG signing key is on public keyservers. You can verify the full supply chain yourself โ€” end to end, without trusting anyone's word. Shanios is free software: free to use, study, modify, and share. See also: Is it really open source? in the FAQ.

Built in India ๐Ÿ‡ฎ๐Ÿ‡ณ

Shanios is built in India โ€” with Indian-language support (Devanagari, Tamil, Telugu, and more) designed in from the start. Indian scripts render correctly on first boot without any extra packages. IBus multi-language input is pre-configured. This is an intentional first-class feature, reflecting a project built where users shouldn't have to do extra work to use their native scripts.

Enterprise, OEM & Partners

The same architecture that keeps a developer's laptop reliable scales to a fleet of thousands. Shanios is open source and free for everyone โ€” that is not in conflict with being a viable business, it is the foundation of it. Whether you're a PC manufacturer, IT department, school network, or regional reseller โ€” the platform is the same. What changes is your update channel, your branding, and your SLA.

Platform Capabilities

Zero-Touch Fleet Deployment

Every machine in a fleet pulls from the same GPG-signed image. No per-machine package drift. No "works on most of them" support calls. When a new image ships, every machine either runs it or rolls back automatically โ€” with no manual intervention required.

Rollback Without a Dispatch

A bad update on a remote machine doesn't require on-site recovery. Boot-counting detects a failing OS copy and reverts automatically. For machines that do reach the desktop: one command, one reboot, previous state restored. No recovery USB. No reinstall. No on-site visit.

OEM-Ready Out of the Box

OEM Initial Setup wizard, Plymouth BGRT manufacturer logo, hardware-specific profiles, and pre-configured drivers for Intel, AMD, and NVIDIA โ€” all included. Shanios ships as a complete, verified, deployable image. No per-model post-processing required.

Security That Passes Audits

Immutable root, 6 active Linux Security Modules, LUKS2 argon2id full-disk encryption, TPM2 auto-unlock, Secure Boot, Intel ME kernel modules blacklisted by default, and firewalld active from first boot. The attack surface is minimized by architecture โ€” so it stays minimized regardless of what an end user does.

Cryptographic Trust Chain

Images are GPG-signed before distribution. SHA256 checksums are verified before deployment. The signing key, build scripts, and deployment tooling are all public and auditable โ€” independently, by anyone, at any time.

Private Update Channel (In Development)

Enterprise and OEM licensees will get a private, GPG-signed update channel โ€” fully independent from the public community release. Stage updates for internal validation, roll out in batches, pin specific versions. Contact to discuss early access.

Why Vendors & OEMs Should Care

No Windows Licence Cost on Every Unit

Every PC you ship with Windows carries a per-unit OEM licence cost that compresses your margin. Shanios has no per-unit cost โ€” a direct margin advantage at any volume, in any market.

OEM Windows licences typically cost $20โ€“$60 per unit (or โ‚น2,500โ€“โ‚น6,000 in India) depending on tier and volume. That cost is either absorbed into your margin or passed to the customer โ€” either way it is real money on every unit you ship.

Shanios has no per-unit licence cost. At any meaningful volume, the margin advantage compounds quickly โ€” pass it to the customer as a price advantage, keep it as margin, or both.

A Shanios-based device needs no Microsoft account at setup, no OneDrive push, no Cortana, no pre-installed trial software. You control what ships, the first-boot wizard, and the defaults.

Dramatically Lower Support Cost

A broken OS update is the most common support call for PC vendors. On Shanios, the customer runs one command and reboots. No reimaging. No courier. No engineer visit.

An in-warranty OS repair costs your service network 45โ€“90 minutes of technician time plus handling and logistics. On Shanios: sudo shani-deploy --rollback restores the previous verified state in under a minute. If the machine can't boot, it reverts automatically โ€” the customer may not even notice.

A vendor shipping 2,000 units/year with a 3% OS-related incident rate handles 60 incidents. At $30โ€“$50 per incident, that's $1,800โ€“$3,000/year in service cost that largely disappears โ€” and that scales with volume.

A Credible Answer to Data Sovereignty

Zero telemetry from the OS. No foreign key escrow. Fully auditable open-source code. The OS collects nothing and sends nothing โ€” verifiable by reading the source.

Windows sends telemetry to Microsoft. ChromeOS sends data to Google. macOS sends data to Apple. Shanios sends nothing โ€” zero telemetry, zero crash reports, zero analytics โ€” verifiable by reading the public source code on GitHub.

LUKS2 full-disk encryption with TPM2 auto-unlock means encryption keys never leave the device. No Apple key escrow, no Microsoft BitLocker backup to a foreign server. The key stays on your customer's hardware.

The genuine differentiator: an open-source, auditable OS that collects zero data and has zero foreign key escrow โ€” backed by a public codebase anyone can verify.

Revenue Models โ€” What You Can Build

OEM Hardware Sales

Ship Shanios pre-installed on laptops, desktops, or workstations. No per-unit licence cost, one-reboot recovery. Position on price against Windows OEMs and on capability against Chromebooks.

What you ship: Commodity x86 hardware with your brand's custom first-boot experience โ€” your logo via Plymouth BGRT, your OEM wizard, your defaults โ€” at a lower price point than Windows hardware while keeping equal or better margin.

Who buys it: Students and schools (price-sensitive), SME offices (browser, OnlyOffice, email), government procurement (open-source, auditable), cybercafรฉs (immutable OS, resets after every user).

Licensing structure: Flat annual rate covering your entire product line โ€” not per unit. Your cost stays fixed regardless of how many units you ship.

Fleet Deployment & Managed IT

Sell Shanios-based fleet deployments to schools, SMEs, and corporates as a managed service. The OS architecture makes that service extremely low-effort to deliver โ€” and therefore high-margin.

Deploy identically-imaged machines at a customer site. Charge a monthly or annual per-device fee. OS updates roll back automatically if they fail โ€” your SLA is backed by the platform architecture, not just your team's response time.

Managing 100 Windows desktops involves driver conflicts, patch management, AV renewals, and reimaging cycles. Managing 100 Shanios machines means pushing one verified image that either works or auto-reverts. Engineer-hours per device drop sharply.

Schools specifically: A managed Shanios fleet means near-zero IT burden between semesters โ€” no reimaging, no maintenance push.

Government & Institutional Tenders

Bid on government, public sector, and education tenders requiring an open-source, zero-telemetry, auditable OS. Requirements like these are tightening globally โ€” Shanios is purpose-built to meet them.

Governments, defence departments, public institutions, and universities worldwide are moving toward open-source, auditable OS platforms driven by data sovereignty and supply chain security requirements.

In India specifically: Central and state governments, PSU banks, and public universities deploy hundreds of thousands of desktops annually. Shanios provides: Indian-origin open-source OS, zero foreign telemetry, LUKS2 encryption, Secure Boot, no foreign key escrow, and Indian-language support from day one.

Near-term targets: State government computer labs, district court digitisation programmes, PSU bank branch terminal refresh cycles, and education ministry deployments.

Training & Certification

Package Shanios-based laptops for coding bootcamps and IT training institutes. A pre-configured, identical environment on every machine eliminates the "works on my setup" problem.

Deploy one verified image across all machines. Every student has the exact same environment. A student who breaks something reboots. At the end of a batch, sudo shani-deploy across all machines brings every device to the latest clean state โ€” no reimaging cycle, no technician weekend.

Pre-configured dev tooling โ€” VS Code via Flatpak, Distrobox for any language runtime โ€” makes Shanios a natural fit for developer training. Offer a hardware + OS + maintenance package at a fixed annual price.

Cybercafรฉ & Shared Computing

An immutable OS is the ideal shared computing platform. Users can't compromise it. No AV subscription, no reimaging cycle, no Windows licence per machine.

The immutable root means a user cannot persistently modify the OS. A full OS reset is one command and one reboot. For a chain of 10 cafรฉs with 20 machines each, the savings on Windows OEM licences alone are significant. Maintenance staff can focus on hardware rather than software cleanup.

Reseller & System Integration

Become an authorised Shanios reseller or system integrator for your region. Local deployment, training, support, and customisation on top of a complete platform. No software development required.

You do not need to build anything โ€” deploy it, support it, and sell it. Buy hardware at volume, deploy Shanios under your brand, charge for support and maintenance.

What you provide: Local sales, on-site deployment, first-line support, custom image configuration, and training for IT staff or end users.

What Shanios handles: OS development, security patching, kernel maintenance, driver support, and update infrastructure โ€” so your margins hold even as you scale.

Get in Touch

OEM licensing ยท Fleet deployment ยท Government tenders ยท Reseller partnerships ยท Enterprise pricing ยท Pilot deployments

Partnerships & Vendors

OEM, fleet, government tenders, reseller โ€” describe your company and what you're planning to build or deploy.

Enterprise & OEM

Describe your fleet size, use case, and what you need โ€” private update channel, SLA, OEM customisation, compliance docs, or a pilot deployment.

Message on Telegram Email Directly

librewish@gmail.com ยท Community edition is always free.

GNOME Edition KDE Edition Top