L1 Device Shell
Wrap your L0 Secret Box inside clean, labeled devices. Everything else is dirty.
Layer 1
Device Roles
Clean vs Dirty
Linux & GrapheneOS
Section 0
What You’re Building at L1
This layer starts where L0 ended: you already have my-secrets.kdbx and a master password.
You are building three things around your L0 Secret Box:
-
CLEAN LAPTOP
→ Runs Linux (Debian or similar) with full-disk encryption.
→ Holds your main my-secrets.kdbx and SovStack work.
-
CLEAN PHONE
→ Best: GrapheneOS on a Pixel.
→ If not possible: a hardened phone with clear limits.
-
ADVANCED OPERATOR GEAR
→ Qubes OS laptop (compartments).
→ Tails USB (amnesic, Tor-only).
→ Burner phones.
Definition:
Everything else (Windows, macOS, iOS, stock Android) = DIRTY DEVICES — for the synthetic world only.
Section 1
Prerequisites
You already have from L0:
my-secrets.kdbx on at least one computer.
- Master password written on 2 papers in 2 different safe places.
- 2 USB sticks with
my-secrets.kdbx (or you can create them now).
For L1, get:
- 📝 Paper + ✍️ Pen
- 🏷️ 4 small labels or tape (for naming devices)
- 💻 At least one laptop/computer
- 📱 At least one smartphone
- 💾 2 USB sticks (can reuse L0 ones)
Section 2
Assign Roles to Your Devices
Each physical device gets a sticker and a role. No device is “neutral”.
2.1 Draw a simple table on paper
On paper, write:
DEVICE ROLES
1. Laptop A – role: ______
2. Laptop B – role: ______
3. Phone A – role: ______
4. Phone B – role: ______
Now assign:
- One laptop →
CLEAN LAPTOP
- One phone →
CLEAN PHONE (or TEMP CLEAN PHONE if using stock OS for now)
- All other devices →
DIRTY
2.2 Put labels on devices
On the actual machines:
- On chosen SovStack laptop: label CLEAN LAPTOP.
- On chosen SovStack phone: label CLEAN PHONE (or TEMP CLEAN PHONE).
- On every other device (PC/phone/tablet): label DIRTY.
Rule from now on:
CLEAN = SovStack, secrets, Bitcoin, private comms.
DIRTY = Synthetic Stack junk you may still need to access.
Section 3
Build the CLEAN LAPTOP (Linux + Full-Disk Encryption)
3.1 Back up anything you need
On the laptop you picked as CLEAN LAPTOP:
- If it has old files you care about, copy them to an external disk or another machine.
- You are about to erase this disk.
- Important files backed up or confirmed not needed.
3.2 Download Debian (or similar Linux)
On any computer (can be DIRTY temporarily):
- Open browser → search:
Debian download.
- Go to official site (look for
debian.org).
- Download:
- “64-bit PC (amd64)” ISO.
- For beginners: use the stable version.
- Plug in a spare USB stick (avoid your L0 backup ones if possible).
- Use a tool to write the ISO to USB:
- Windows: Rufus or balenaEtcher.
- macOS/Linux: balenaEtcher or
dd if you know how.
You now have a Debian installer USB.
- Debian ISO downloaded from
debian.org.
- Installer USB created.
3.3 Install Debian with full-disk encryption
On the CLEAN LAPTOP:
- Plug in the Debian installer USB.
- Reboot and choose to boot from USB (usually pressing
F12, Esc, or similar at power on).
- When Debian installer appears:
- Choose language, keyboard, etc.
- When asked about partitioning, choose:
Guided – use entire disk and set up encrypted LVM
- You will be asked to create:
- Disk encryption passphrase (this is not your master password).
- User account + user password.
3.3.1 Record your new secrets
On paper write:
CLEAN LAPTOP – DISK ENCRYPTION PASSWORD
[exact passphrase you chose]
CLEAN LAPTOP – USER LOGIN
Username: ______
Password: ______
Put this paper in the same kind of safe place as your L0 backups (or with them).
- Laptop disk encryption passphrase written on paper.
- Laptop user login and password written on paper.
Finish the installer and reboot into Debian.
3.4 First boot hardening
On the new Debian desktop:
- Update the system
- Use the “Software” or “Updates” tool and install all updates, or
- Run in terminal:
sudo apt update && sudo apt upgrade
- Enable a firewall
- Install
ufw:
sudo apt install ufw
- Enable it:
sudo ufw enable
- Create a “Secrets” folder
- In your home folder, make:
Secrets/
- System updated.
- Firewall enabled (
ufw active).
Secrets/ folder created.
3.5 Move L0 vault onto CLEAN LAPTOP
Copy your my-secrets.kdbx onto this new machine:
- Plug in one of your L0 USB backup sticks.
- Open the USB drive.
- Copy
my-secrets.kdbx into ~/Secrets/.
Now install KeePassXC again:
- Open Software/Store → search KeePassXC.
- Install and open.
- In KeePassXC:
- Click Open Database.
- Choose
~/Secrets/my-secrets.kdbx.
- Enter your L0 master password (your Secret Box sentence).
- Verify you see your entries (including
TEST ACCOUNT).
my-secrets.kdbx copied to CLEAN LAPTOP.
- KeePassXC installed and vault opens correctly.
Section 4
Build the CLEAN PHONE
4.1 Check what phone you have
Look at the phone labeled CLEAN PHONE:
- If it’s a supported Google Pixel (e.g. 5a, 6, 6a, 7, 7a, 8, etc.):
→ Target = GrapheneOS (best option).
- If it’s not a Pixel:
→ For now, it will be a TEMP CLEAN PHONE with hardened stock OS (or DivestOS/Calyx later in advanced mode).
On paper write:
CLEAN PHONE MODEL: ______
PLAN: GrapheneOS / TEMP STOCK OS
- Phone model identified.
- Plan chosen.
4.2 If Pixel: Install GrapheneOS (basic flow)
If not Pixel: skip to 4.3.
Use the CLEAN LAPTOP for this.
- On CLEAN LAPTOP, open browser → go to:
https://grapheneos.org/install/web
- Follow the web installer instructions exactly. You will:
- Turn on Developer options on the Pixel.
- Enable OEM unlocking.
- Connect phone to laptop via USB.
- Use the site’s built-in installer to flash GrapheneOS.
- When installer says finished:
- Reboot the phone.
- Complete basic setup (language, time, Wi-Fi, etc.).
4.2.1 Set phone lock
On the new GrapheneOS:
- Set a strong 6+ digit PIN (no patterns, no birthdays).
- Disable fingerprint/face unlock.
On paper write:
CLEAN PHONE – LOCK PIN: ______
Store this somewhere safe, separate from the phone.
4.2.2 Create basic app setup
On GrapheneOS:
- Do not log into a Google account (unless you explicitly need sandboxed Play later for specific apps).
- Install only:
- Your browser of choice (privacy-friendly).
- KeePass-compatible app (handled in 4.4).
- GrapheneOS installed successfully.
- Strong PIN set and written down.
- No Google account added (or you accept it as a conscious tradeoff).
4.3 If not Pixel: TEMP CLEAN PHONE hardening (stock OS)
On this phone:
- Set a strong lock:
- Turn off obvious tracking where possible:
- Disable “ad personalization” / “analytics” / “diagnostics”.
- Turn off “back up to cloud” for sensitive apps if possible.
- Remove or disable junk apps you don’t need (social media, games, etc.).
- Note: this phone is weaker than GrapheneOS; treat it as TEMP CLEAN until you can upgrade hardware/OS.
On paper write:
TEMP CLEAN PHONE LIMITS:
no KYC accounts
no social media
light app list only
- Strong PIN set.
- Tracking toggles adjusted.
- Only essential apps left.
4.4 Put KeePass vault onto CLEAN PHONE
On the CLEAN LAPTOP:
- Ensure you have
my-secrets.kdbx available (in ~/Secrets/).
- Connect CLEAN PHONE to CLEAN LAPTOP with USB.
- On the phone, enable file transfer (if asked).
- Copy
my-secrets.kdbx onto the phone into a Secrets folder (create one if needed).
On the phone, install a KeePass-compatible app:
- GrapheneOS / Android: KeePassDX (or similar FOSS KeePass app).
- Stock Android: same.
- iPhone TEMP CLEAN phone: KeePassium.
Open the app:
- Tap Open Database.
- Choose
my-secrets.kdbx.
- Enter your master password.
- Check that
TEST ACCOUNT appears.
my-secrets.kdbx copied to CLEAN PHONE.
- App opens vault successfully.
Section 5
“Never Do This on CLEAN Devices” Rules
On paper, write a big heading:
NEVER DO THIS ON CLEAN LAPTOP OR CLEAN PHONE
Under it, list:
- No Google / Apple / Microsoft account logins (except sandboxed Play on Graphene if you really need it, and only for specific apps).
- No social media (Facebook, Instagram, TikTok, etc.).
- No KYC exchanges or banking apps.
- No random app installs “just to try”.
- No opening unknown email attachments or random USB sticks.
Stick this paper somewhere near your CLEAN LAPTOP.
- “NEVER DO THIS” list written and visible.
Section 6
Daily Use Workflow
6.1 CLEAN LAPTOP is for:
- KeePass vault (L0).
- Bitcoin wallets & tools.
- Private chat / privacy tools.
- SovStack planning, documents, research.
6.2 CLEAN PHONE is for:
- 2FA / authenticators (if on this device).
- Private chat (Signal/Nostr/etc.), Bitcoin mobile wallets.
- Checking SovStack-related info.
6.3 DIRTY devices are for:
- SynthStack junk you still need:
- Social media.
- Normal email.
- Banking / KYC exchanges.
- Entertainment, general browsing, random apps.
Rule:
If you ever log into social media or KYC on a
CLEAN device → it instantly becomes
DIRTY.
You must either:
- Wipe and rebuild it as CLEAN, or
- Reassign its role permanently to DIRTY.
Section 7
Regular Checks (L1 Maintenance)
Weekly (5–10 minutes)
On CLEAN LAPTOP:
- Check that entering disk password at boot works (you didn’t forget).
- Open KeePassXC and open
my-secrets.kdbx.
- Confirm you still remember your CLEAN LAPTOP user password.
On CLEAN PHONE:
- Unlock phone with PIN.
- Open KeePass app and unlock vault.
Monthly (15–30 minutes)
- Apply system updates on CLEAN LAPTOP.
- Apply OS/app updates on CLEAN PHONE.
- Confirm your two USB backups (from L0) still open
my-secrets.kdbx on CLEAN LAPTOP.
- Check your “NEVER DO THIS” list and confirm you didn’t break any rule.
Section 8
ADVANCED L1: Operator Gear
Do these only if BASIC L1 is solid and stable.
8.1 Qubes OS Operator Laptop
Goal: one extra laptop labeled OPERATOR LAPTOP.
- Choose a laptop compatible with Qubes OS (check
https://www.qubes-os.org/hcl).
- Back up any data (you will wipe it).
- Download Qubes OS from the official site.
- Create Qubes installer USB (similar process as Debian).
- Install Qubes, following their guide.
After install, create qubes like:
vault – no network, for secrets.
btc – Bitcoin only.
work – documents.
untrusted – random browsing.
Label that laptop: OPERATOR LAPTOP – QUBES.
Rule:
The vault qube never touches the network.
8.2 Tails USB (Stealth Session Stick)
Goal: one USB labeled TAILS.
- On CLEAN LAPTOP or OPERATOR LAPTOP:
- Download Tails from the official site.
- Use their installer instructions to put it onto a USB.
- To use:
- Plug Tails USB into any computer.
- Boot from USB.
- Use it for specific high-risk sessions (Tor-only).
Rule:
When you shut down Tails, it forgets everything (unless you deliberately set up persistent storage).
8.3 Burner Phones (DivestOS / CalyxOS)
If you have spare phones:
- Label them BURNER 1, BURNER 2.
- If supported, flash:
- DivestOS (preferred), or
- CalyxOS.
- Use them for:
- Travel.
- One-time operations.
- Situations where you don’t want to bring CLEAN PHONE.
Rule:
Burners never hold your L0 vault; they are for temporary identities.
Section 9
Final Micro-Checklist
If you want the shortest summary to verify L1 is in place:
- One laptop is wiped and running Linux with full-disk encryption, labeled
CLEAN LAPTOP.
- One phone is set aside and hardened as
CLEAN PHONE (GrapheneOS if Pixel; TEMP CLEAN otherwise).
my-secrets.kdbx is on CLEAN LAPTOP and CLEAN PHONE only (plus encrypted USB backups).
- You have written rules taped near CLEAN LAPTOP: what you are never allowed to do on it.
- All other devices are labeled
DIRTY and used only for normal world / synthetic stuff.
- Once a week you unlock everything and check it still works.
- Once a month you update systems and test restoring your vault from USB on CLEAN LAPTOP.
If all 7 are true:
Your L1 Device Shell is in place around your L0 Secret Box, and you can safely start stacking higher layers on top.