Full Node Hardware — Updated Scoring, Ranking & Analysis

Composite = 0–100

A rigorously audited scoring model and ranked analysis of full node hardware through two stacked filters: (1) Bitcoin/FOSS/privacy maximalism, and (2) a sovereign-stack, anti-synthetic-stack ontology that prioritizes deep firmware control, out-of-band (ME/PSP) reduction, and long-term hackability.

Focus: firmware sovereignty, ME/PSP state, Boot Guard/fuses, blob load Also: stability, privacy surface, node I/O, energy, vendor alignment Method: weighted criteria (0–10 → 0–100)

1) Updated Scoring Model

All criteria are scored 0–10 per device, then converted to a 0–100 composite using the weights below. The model is intentionally biased toward deep-stack sovereignty: owning the boot chain, constraining or neutralizing out-of-band engines, and preserving future hackability.

Deep firmware sovereignty (35%)

  • Libreboot vs coreboot vs OEM UEFI
  • Intel ME / AMD PSP status (neutered, HAP-disabled, required)
  • Boot Guard / fuse state and long-term hackability
  • Overall “blob load” in the boot path

Everything else (65%)

  • Stability & maturity (10%) — board+firmware bug load, battle-testing
  • Privacy surface (10%) — radios, mgmt controllers, headless Ethernet-first viability
  • Performance & I/O (10%) — CPU headroom, NVMe/SATA topology
  • Energy & 24/7 viability (10%) — idle draw, thermals
  • Vendor & ecosystem alignment (10%) — openness posture, process hygiene
  • Replicability & parts (7.5%) — sourcing, spares, repair paths
  • Cost-to-sovereignty (7.5%) — sovereignty per unit money+hassle
Interpretation rule: “Open firmware” is not treated as a binary. A coreboot port that still requires Intel ME and heavy blobs can score well on openness, but will be hard-capped on sovereignty compared to Libreboot-class setups that neutralize ME and defeat Boot Guard.

2) Updated Ranking

The table shows the updated composite score (0–100) and the Deep Firmware score (0–10). Composite reflects the full weighted model; Deep Firmware isolates the most dominant dimension.

# Device Composite Deep Firmware
1 Dell OptiPlex 3050 Micro (DIY Libreboot) 89.2 10
2 Minifree Libreboot 3050 Micro 88.5 10
3 Protectli Vault Pro (VP-series) 86.8 9
4 Raspberry Pi 83.0 8
5 Purism Librem Mini v3 82.1 9
6 NovaCustom NUC Box (ME disabled/Dasharo) 80.2 8.5
7 Star Labs Byte (ME disabled) 80.0 8.5
8 System76 Meerkat (meer9) 79.8 8
9 Nitrokey NitroPC 2 79.2 8.5
10 Nitrokey Dasharo/TianoCore devices 79.2 8.5
11 Protectli V1000 series 79.0 7
12 NovaCustom NUC Box (ME enabled) 76.8 7.5
13 Star Labs Byte (ME dependent) 76.5 7.5
14 Lenovo ThinkCentre M920 Tiny (coreboot) 76.5 7.5
15 Topton N100 (X2F-N100 / H30W-N100-226) 74.0 6.5
16 Topton X2E N150 / BKHD H30W-N150 70.5 6.5

3) Tier 1 — Sovereign Apex

1) Dell OptiPlex 3050 Micro (DIY Libreboot) — 89.2 composite / 10 firmware

This is the highest-scoring path when Libreboot is installed directly onto the platform. The core advantage is not just “coreboot exists,” but that the Dell 3050 Micro route can reach a deeper sovereignty end state: Intel ME neutralization and Boot Guard defeat on this specific generation.

Deep firmware sovereignty: 10/10

  • Libreboot on this board uses me_cleaner to neuter Intel ME and uses deguard on MEv11 to disable Boot Guard checks on this platform.
  • This combination yields a uniquely strong long-term hackability posture: it is not only “ME interfaces off,” but “Boot Guard suppressed and ME reduced,” creating a path for future experiments that are structurally unavailable on many fused platforms.

Stability & maturity: 9/10

  • Libreboot’s install notes for the Dell 3050 Micro explicitly describe the current state as highly stable and mature, with previous device-specific issues (e.g., NVMe hotplug behavior and fan PWM behavior) addressed in later Libreboot revisions. (Libreboot Dell 3050 Micro docs)

Replicability & cost advantage

  • OptiPlex 3050 Micro units are common in the used market; the sovereignty end state is achievable with effort rather than vendor dependency.
  • Once Libreboot is installed, internal flashing and recovery is comparatively well supported and documented on this platform.
2) Minifree Libreboot 3050 Micro — 88.5 composite / 10 firmware

This is the “pre-flashed, curated” route to the same technical end state: Libreboot on the Dell 3050 Micro platform with ME neutralization and Boot Guard suppression. It scores almost as high as the DIY lane, but the cost-to-sovereignty ratio is lower due to the premium paid for curation and labor.

Deep firmware sovereignty: 10/10

  • Minifree ships the Dell 3050 Micro with Libreboot pre-installed, meaning it inherits the platform’s ME/Boot Guard posture described in the Libreboot docs. (Minifree Libreboot 3050 Micro)

Vendor alignment: strongest-in-class

  • Minifree’s mission is directly aligned with shipping Librebooted machines and supporting firmware freedom projects; this is one of the clearest vendor-alignment cases in the set.

Primary tradeoff

  • Premium pricing reduces cost-to-sovereignty score compared to self-sourcing and self-flashing.
3) Protectli Vault Pro (VP-series) — 86.8 composite / 9 firmware

This is the best “router-node cube” option in the set: a multi-NIC, fanless appliance form factor with a strong open firmware story and an explicit Intel ME disablement path.

Deep firmware sovereignty: 9/10

  • Protectli’s coreboot documentation explicitly frames coreboot as the path to disabling Intel ME on supported devices and describes what is disabled (e.g., MEI/HECI, PTT). (Protectli coreboot info)
  • Dasharo maintains variants for Protectli VP devices as part of its supported platform set. (Dasharo variants overview)

Stability & maturity: 9/10

  • Firewall-class appliances have a long 24/7 usage culture and Dasharo provides a structured release cadence. (VP2410 releases)

Privacy surface: 10/10

  • Fanless multi-NIC appliance shape; typically no radios, no microphones/cameras, no “laptop-class” peripherals.

Tradeoff

  • CPU headroom is solid for a full node and some services, but less comfortable than modern U/H-class mini PCs if heavy multi-service expansion is required.

4) Tier 1b — Non-x86 Sovereign Outlier

4) Raspberry Pi — 83.0 composite / 8 firmware

The “no Intel ME / no AMD PSP” advantage is structurally significant. The tradeoff is that the boot chain relies on proprietary SoC firmware components, and raw performance/I/O is lower than many x86 minis with NVMe.

Deep firmware sovereignty: 8/10

  • No ME/PSP class management engine exists on this platform.
  • However, Broadcom boot/GPU firmware blobs remain part of the boot path.

Energy & 24/7 viability: top tier

  • Excellent watts-per-uptime profile; widely used as a “set-and-forget” node platform.

Primary constraint

  • Lower storage I/O and CPU headroom than NVMe-backed x86 minis for larger multi-service stacks.

5) Tier 2 — Strong ME-off Coreboot/Dasharo Minis

5) Purism Librem Mini v3 — 82.1 composite / 9 firmware

A high-sovereignty mini PC lineage: coreboot-based firmware with Intel ME disabled via the HAP mechanism on documented versions, and a vendor that has published detailed ME disablement analysis.

Deep firmware sovereignty: 9/10

  • Coreboot documentation for the Librem Mini describes Intel ME being disabled via the HAP bit and the resulting interface shutdown (MEI/HECI). (coreboot: Purism Librem Mini)
  • Purism’s published deep dives provide additional technical context around their ME disablement approach. (Purism ME disablement post)

Tradeoffs

  • Boutique pricing impacts cost-to-sovereignty.
  • Even with ME disabled, modern Intel platforms still involve unavoidable blobs (e.g., FSP) in early init.
6) NovaCustom NUC Box (ME disabled / Dasharo) — 80.2 composite / 8.5 firmware

A Dasharo-aligned NUC-style mini PC with an ME disablement option. Strong general-purpose performance and I/O, with formal open-firmware ecosystem support.

Deep firmware sovereignty: 8.5/10

  • NovaCustom describes an Intel ME disabling feature on supported platforms. (NovaCustom ME disabling)
  • Dasharo’s overall approach is “open-source firmware distribution” while documenting remaining proprietary elements in the stack. (Dasharo OSF Trivia)

Ecosystem nuance

  • Shared ecosystem coupling exists across Dasharo-integrated vendors; supply-chain or ecosystem-level issues can be correlated.
7) Star Labs Byte (ME disabled) — 80.0 composite / 8.5 firmware

Coreboot-based mini with an ME-disabled “privacy” configuration and efficient low-power silicon. Slightly more gadget-like privacy surface due to radios, but still strong in open-firmware posture.

Deep firmware sovereignty: 8.5/10

  • Star Labs participates in coreboot development and Byte-related work appears in coreboot community discussions. (coreboot gerrit thread)

Privacy surface tradeoff

  • Wi-Fi/BT radios can be present; best practice is selecting configurations that minimize radios and management features.
8) System76 Meerkat (meer9) — 79.8 composite / 8 firmware

Strong open-firmware lineage via System76 Open Firmware (coreboot + EDK2). The ME story is typically “reduced/neutralized,” but less explicitly documented per-model than Purism/Libreboot lanes.

Deep firmware sovereignty: 8/10

Strength

  • Excellent general-purpose performance and vendor support; meaningful upstream contribution culture.
9) Nitrokey NitroPC 2 — 79.2 composite / 8.5 firmware

Dasharo/coreboot-based mini PC with an ME disablement posture on supported platforms and a vendor identity that is explicitly FOSS/security oriented. Slightly discounted due to ecosystem process history.

Deep firmware sovereignty: 8.5/10

  • Nitrokey’s product pages describe NitroPC lines and their security posture. (NitroPC Pro 2)
  • A publicly discussed vulnerability affecting Nitrokey devices and Dasharo/coreboot/Heads workflows illustrates the importance of vendor process hygiene. (NovaCustom advisory)
10) Nitrokey Dasharo/TianoCore devices — 79.2 composite / 8.5 firmware

Similar profile to NitroPC 2. In this ranking, these devices remain a solid Dasharo-aligned option without displacing the top-tier “ME neutered + Boot Guard defeated” Libreboot lane.

See also

11) Protectli V1000 series — 79.0 composite / 7 firmware

High-performance appliance-class platform with Dasharo support, but structurally limited by AMD PSP being unavoidable. Great node+services host; capped on deep sovereignty relative to ME-off Intel platforms.

Deep firmware sovereignty: 7/10

  • Dasharo maintains release notes for Protectli V1000 series. (V1000 releases)
  • Dasharo’s “OSF Trivia” emphasizes that modern platforms retain proprietary components and that AMD PSP is a persistent part of the stack. (OSF Trivia introduction)

Strength

  • Appliance-style privacy surface (NIC cube), strong compute headroom.

6) Tier 3 — ME-on Coreboot Minis & OEM Tin

12) NovaCustom NUC Box (ME enabled) — 76.8 composite / 7.5 firmware

The same hardware/ecosystem profile as the ME-disabled NovaCustom lane, but with ME left active for feature compatibility. Still better than OEM UEFI, but clearly behind the ME-off configuration in the sovereignty model.

Reference

13) Star Labs Byte (ME dependent) — 76.5 composite / 7.5 firmware

Same board family, but ME left active. The ranking explicitly penalizes “ME state dependent” configurations because the sovereignty outcome depends on post-purchase firmware choices.

Reference

14) Lenovo ThinkCentre M920 Tiny (coreboot) — 76.5 composite / 7.5 firmware

A commodity “ghost tin” with an official coreboot port. This improves the firmware posture versus OEM UEFI, but Intel ME remains present and model-specific disablement is less straightforward than Libreboot/Purism/Protectli lanes.

Deep firmware sovereignty: 7.5/10

Strength

  • Excellent used-market availability and good NVMe/SATA options; strong cost-to-performance.

Constraint

  • Vendor alignment is low; ME “kill” story is weaker than top-tier ME-neutralization approaches.

7) Tier 4 — Efficient but ME-heavy Whiteboxes

15) Topton N100 (X2F-N100 / H30W-N100-226) — 74.0 composite / 6.5 firmware

Not “OEM UEFI only”: there is an official coreboot port for the Topton N100 X2F firewall appliance. The hard cap comes from the platform requiring Intel ME and FSP blobs in the boot chain. Performance-per-watt is excellent; deep sovereignty is limited.

Key evidence

  • coreboot mainboard documentation for the Topton Alder Lake-N X2F-N100 notes the required IFD/ME region and FSP blobs, along with flashing and functionality notes. (coreboot: Topton X2F-N100)

Strength

  • Excellent watts-per-performance, multi-NIC privacy surface, NVMe + SATA capability.

Constraint

  • Vendor opacity and mandatory ME/FSP blob load cap sovereignty score.
16) Topton X2E N150 / BKHD H30W-N150 — 70.5 composite / 6.5 firmware

Similar “efficient router brick” profile to N100, but degraded by current stability concerns in the open-firmware ecosystem for this exact board family. Until instability is resolved and validated, this is not a preferred 24/7 node substrate.

Stability constraint

Strength

  • Low-watt performance and multi-NIC form factor remain attractive on paper.

8) Tier Summary

Absolute x86 sovereignty / long-term hackability

  • DIY Libreboot Dell 3050, Minifree Libreboot 3050: Boot Guard suppressed + ME neutered on this platform class. (Libreboot 3050 Micro)

Appliance-style sovereign cubes (ME off, low idle)

  • Protectli VP series: ME disablement via coreboot/Dasharo, multi-NIC fanless form factor. (Protectli coreboot)

General sovereign minis (ME disabled, not Libreboot-class)

  • Purism Librem Mini, NovaCustom (ME off), Star Labs Byte (ME off), NitroPC 2, System76 Meerkat

Commodity ghost tin with open-firmware path

  • Lenovo M920 Tiny (coreboot): excellent availability + performance, weaker ME “kill” story. (coreboot M920q)

Efficient but ME-heavy appliances

  • Topton N100/N150: great perf/Watt and form factor, capped by mandatory ME/FSP blob load. (coreboot X2F-N100)

Non-x86 special case

  • Raspberry Pi: no ME/PSP, very low power, but proprietary SoC firmware and lower I/O headroom.

This page intentionally embeds links at the point of relevance rather than in a bottom appendix. Source links emphasize primary documentation: Libreboot, coreboot docs, Dasharo docs, and vendor technical KB pages where applicable.