Full Node Hardware — Updated Scoring, Ranking & Analysis
Composite = 0–100
A rigorously audited scoring model and ranked analysis of full node hardware through two stacked filters:
(1) Bitcoin/FOSS/privacy maximalism, and (2) a sovereign-stack, anti-synthetic-stack ontology that prioritizes deep firmware control, out-of-band (ME/PSP) reduction, and long-term hackability.
All criteria are scored 0–10 per device, then converted to a 0–100 composite using the weights below.
The model is intentionally biased toward deep-stack sovereignty: owning the boot chain, constraining or neutralizing out-of-band engines, and preserving future hackability.
Deep firmware sovereignty (35%)
Libreboot vs coreboot vs OEM UEFI
Intel ME / AMD PSP status (neutered, HAP-disabled, required)
Performance & I/O (10%) — CPU headroom, NVMe/SATA topology
Energy & 24/7 viability (10%) — idle draw, thermals
Vendor & ecosystem alignment (10%) — openness posture, process hygiene
Replicability & parts (7.5%) — sourcing, spares, repair paths
Cost-to-sovereignty (7.5%) — sovereignty per unit money+hassle
Interpretation rule: “Open firmware” is not treated as a binary. A coreboot port that still requires Intel ME and heavy blobs can score well on openness, but will be hard-capped on sovereignty compared to Libreboot-class setups that neutralize ME and defeat Boot Guard.
2) Updated Ranking
The table shows the updated composite score (0–100) and the Deep Firmware score (0–10).
Composite reflects the full weighted model; Deep Firmware isolates the most dominant dimension.
This is the highest-scoring path when Libreboot is installed directly onto the platform. The core advantage is not just “coreboot exists,”
but that the Dell 3050 Micro route can reach a deeper sovereignty end state: Intel ME neutralization and Boot Guard defeat on this specific generation.
Deep firmware sovereignty: 10/10
Libreboot on this board uses me_cleaner to neuter Intel ME and uses
deguard on MEv11
to disable Boot Guard checks on this platform.
This combination yields a uniquely strong long-term hackability posture: it is not only “ME interfaces off,” but “Boot Guard suppressed and ME reduced,”
creating a path for future experiments that are structurally unavailable on many fused platforms.
Stability & maturity: 9/10
Libreboot’s install notes for the Dell 3050 Micro explicitly describe the current state as highly stable and mature, with previous device-specific issues
(e.g., NVMe hotplug behavior and fan PWM behavior) addressed in later Libreboot revisions.
(Libreboot Dell 3050 Micro docs)
Replicability & cost advantage
OptiPlex 3050 Micro units are common in the used market; the sovereignty end state is achievable with effort rather than vendor dependency.
Once Libreboot is installed, internal flashing and recovery is comparatively well supported and documented on this platform.
This is the “pre-flashed, curated” route to the same technical end state: Libreboot on the Dell 3050 Micro platform with ME neutralization and
Boot Guard suppression. It scores almost as high as the DIY lane, but the cost-to-sovereignty ratio is lower due to the premium paid for curation and labor.
Deep firmware sovereignty: 10/10
Minifree ships the Dell 3050 Micro with Libreboot pre-installed, meaning it inherits the platform’s ME/Boot Guard posture described in the Libreboot docs.
(Minifree Libreboot 3050 Micro)
Vendor alignment: strongest-in-class
Minifree’s mission is directly aligned with shipping Librebooted machines and supporting firmware freedom projects; this is one of the clearest vendor-alignment cases in the set.
Primary tradeoff
Premium pricing reduces cost-to-sovereignty score compared to self-sourcing and self-flashing.
This is the best “router-node cube” option in the set: a multi-NIC, fanless appliance form factor with a strong open firmware story and an explicit Intel ME disablement path.
Deep firmware sovereignty: 9/10
Protectli’s coreboot documentation explicitly frames coreboot as the path to disabling Intel ME on supported devices and describes what is disabled (e.g., MEI/HECI, PTT).
(Protectli coreboot info)
Dasharo maintains variants for Protectli VP devices as part of its supported platform set.
(Dasharo variants overview)
Stability & maturity: 9/10
Firewall-class appliances have a long 24/7 usage culture and Dasharo provides a structured release cadence.
(VP2410 releases)
Privacy surface: 10/10
Fanless multi-NIC appliance shape; typically no radios, no microphones/cameras, no “laptop-class” peripherals.
Tradeoff
CPU headroom is solid for a full node and some services, but less comfortable than modern U/H-class mini PCs if heavy multi-service expansion is required.
4) Tier 1b — Non-x86 Sovereign Outlier
4) Raspberry Pi — 83.0 composite / 8 firmware
The “no Intel ME / no AMD PSP” advantage is structurally significant. The tradeoff is that the boot chain relies on proprietary SoC firmware components,
and raw performance/I/O is lower than many x86 minis with NVMe.
Deep firmware sovereignty: 8/10
No ME/PSP class management engine exists on this platform.
However, Broadcom boot/GPU firmware blobs remain part of the boot path.
Energy & 24/7 viability: top tier
Excellent watts-per-uptime profile; widely used as a “set-and-forget” node platform.
Primary constraint
Lower storage I/O and CPU headroom than NVMe-backed x86 minis for larger multi-service stacks.
A high-sovereignty mini PC lineage: coreboot-based firmware with Intel ME disabled via the HAP mechanism on documented versions, and a vendor that has published detailed ME disablement analysis.
Deep firmware sovereignty: 9/10
Coreboot documentation for the Librem Mini describes Intel ME being disabled via the HAP bit and the resulting interface shutdown (MEI/HECI).
(coreboot: Purism Librem Mini)
Purism’s published deep dives provide additional technical context around their ME disablement approach.
(Purism ME disablement post)
Tradeoffs
Boutique pricing impacts cost-to-sovereignty.
Even with ME disabled, modern Intel platforms still involve unavoidable blobs (e.g., FSP) in early init.
A Dasharo-aligned NUC-style mini PC with an ME disablement option. Strong general-purpose performance and I/O, with formal open-firmware ecosystem support.
Deep firmware sovereignty: 8.5/10
NovaCustom describes an Intel ME disabling feature on supported platforms.
(NovaCustom ME disabling)
Dasharo’s overall approach is “open-source firmware distribution” while documenting remaining proprietary elements in the stack.
(Dasharo OSF Trivia)
Ecosystem nuance
Shared ecosystem coupling exists across Dasharo-integrated vendors; supply-chain or ecosystem-level issues can be correlated.
Coreboot-based mini with an ME-disabled “privacy” configuration and efficient low-power silicon. Slightly more gadget-like privacy surface due to radios, but still strong in open-firmware posture.
Deep firmware sovereignty: 8.5/10
Star Labs participates in coreboot development and Byte-related work appears in coreboot community discussions.
(coreboot gerrit thread)
Privacy surface tradeoff
Wi-Fi/BT radios can be present; best practice is selecting configurations that minimize radios and management features.
Strong open-firmware lineage via System76 Open Firmware (coreboot + EDK2). The ME story is typically “reduced/neutralized,” but less explicitly documented per-model than Purism/Libreboot lanes.
Dasharo/coreboot-based mini PC with an ME disablement posture on supported platforms and a vendor identity that is explicitly FOSS/security oriented. Slightly discounted due to ecosystem process history.
Deep firmware sovereignty: 8.5/10
Nitrokey’s product pages describe NitroPC lines and their security posture.
(NitroPC Pro 2)
A publicly discussed vulnerability affecting Nitrokey devices and Dasharo/coreboot/Heads workflows illustrates the importance of vendor process hygiene.
(NovaCustom advisory)
Similar profile to NitroPC 2. In this ranking, these devices remain a solid Dasharo-aligned option without displacing the top-tier “ME neutered + Boot Guard defeated” Libreboot lane.
11) Protectli V1000 series — 79.0 composite / 7 firmware
High-performance appliance-class platform with Dasharo support, but structurally limited by AMD PSP being unavoidable. Great node+services host; capped on deep sovereignty relative to ME-off Intel platforms.
Deep firmware sovereignty: 7/10
Dasharo maintains release notes for Protectli V1000 series.
(V1000 releases)
Dasharo’s “OSF Trivia” emphasizes that modern platforms retain proprietary components and that AMD PSP is a persistent part of the stack.
(OSF Trivia introduction)
The same hardware/ecosystem profile as the ME-disabled NovaCustom lane, but with ME left active for feature compatibility.
Still better than OEM UEFI, but clearly behind the ME-off configuration in the sovereignty model.
Same board family, but ME left active. The ranking explicitly penalizes “ME state dependent” configurations because the sovereignty outcome depends on post-purchase firmware choices.
A commodity “ghost tin” with an official coreboot port. This improves the firmware posture versus OEM UEFI,
but Intel ME remains present and model-specific disablement is less straightforward than Libreboot/Purism/Protectli lanes.
Not “OEM UEFI only”: there is an official coreboot port for the Topton N100 X2F firewall appliance. The hard cap comes from the platform requiring Intel ME and FSP blobs in the boot chain.
Performance-per-watt is excellent; deep sovereignty is limited.
Key evidence
coreboot mainboard documentation for the Topton Alder Lake-N X2F-N100 notes the required IFD/ME region and FSP blobs, along with flashing and functionality notes.
(coreboot: Topton X2F-N100)
Strength
Excellent watts-per-performance, multi-NIC privacy surface, NVMe + SATA capability.
Constraint
Vendor opacity and mandatory ME/FSP blob load cap sovereignty score.
Similar “efficient router brick” profile to N100, but degraded by current stability concerns in the open-firmware ecosystem for this exact board family.
Until instability is resolved and validated, this is not a preferred 24/7 node substrate.
Stability constraint
coreboot’s issue tracker includes an open report for Topton X2E (N150) instabilities/timer issues (noted during the audit phase).
(coreboot ticket tracker (search Topton X2E))
Strength
Low-watt performance and multi-NIC form factor remain attractive on paper.
8) Tier Summary
Absolute x86 sovereignty / long-term hackability
DIY Libreboot Dell 3050, Minifree Libreboot 3050:
Boot Guard suppressed + ME neutered on this platform class.
(Libreboot 3050 Micro)
Appliance-style sovereign cubes (ME off, low idle)
Protectli VP series: ME disablement via coreboot/Dasharo, multi-NIC fanless form factor.
(Protectli coreboot)
General sovereign minis (ME disabled, not Libreboot-class)
Topton N100/N150: great perf/Watt and form factor, capped by mandatory ME/FSP blob load.
(coreboot X2F-N100)
Non-x86 special case
Raspberry Pi: no ME/PSP, very low power, but proprietary SoC firmware and lower I/O headroom.
This page intentionally embeds links at the point of relevance rather than in a bottom appendix. Source links emphasize primary documentation:
Libreboot,
coreboot docs,
Dasharo docs,
and vendor technical KB pages where applicable.