Image
NØNOS (NONOS / NOX)

Your Computer.
Your Data.

NONOS is a new type of operating system which gives you a clean, private computer session that erases itself when you’re done. No history, no hidden tracking, nothing left behind for hackers or companies to dig through.

Image
Zero‑Trust Security

Apps and websites never get more access than they need.

Image
Runs in Memory Only

No data stored on your hard drive by default

Image
Private by Default

No telemetry, no tracking, no adtech spyware.

Image
Anonymous Networking

Built‑in onion‑routed mesh network to hide who you are & where you connect.

Backed by builders from Web3, cybersecurity & OS development

Image
Meet NØNOS

Is NØNOS for You? Yes!

Whether you're securing personal data, digital assets, or sensitive work, NONOS provides a sanctuary for your digital life. Find your profile and see how.

Retail

Home & Everyday Users
Image

You don’t want your searches, chats, and files harvested or sold.

You’re okay with tech, but not a “hacker”.

You just want a clean, safe computer that does what you tell it.

Threat: Profiling

NONOS PROTECTED:
Limit Data Scraping

Crypto

Crypto & Blockchain Users
Image

You use wallets or exchanges and worry about malware stealing your funds.

You’ve heard about $2+ billion in crypto stolen via hacks and scams in 2024 and don’t want to be part of that statistic.

Threat: Compromise

NONOS PROTECTED:
Wallet Protect Mode

High Risk

Journalist & Activist Users
Image

You handle sensitive information or sources.

You want a system that leaves no files and no logs on the machine when you’re done.

Threat: Forensics

NONOS PROTECTED:
Zero Trace Shutdown

Mobile

Remote & Travelling Users
Image

You often connect to a hotel, airport, or café Wi‑Fi.

You’d like a way to safely bank, trade, and log in from untrusted networks.

Threat: Interception

NONOS PROTECTED:
Encrypted Tunnels

Image
See how people use NØNOS
Image
The Problem - Today’s Computers Leak Everything

Your Current OS is the Weakest Link.

Windows, macOS and even mobile OSes were not built for a world of AI‑powered hackers and surveillance.

In 2024 alone, Windows had 1,360 reported vulnerabilities and macOS had 529 - and the number of exploits is still climbing.

Even if you use antivirus and VPNs, they sit on top of an OS that logs what you do and writes it to disk, where it can be recovered or stolen.

Image
Always recording

System logs, temp files and crash dumps stay on disk, even after you think you’ve deleted things.

Image
AI‑driven scams & malware

AI tools now create realistic phishing emails, fake voices, and deepfake videos at scale; 87% of organizations say they’ve already faced AI‑driven cyberattacks.

Image
Crypto & banking theft

Clipboard‑hijacking malware and keyloggers have quietly stolen hundreds of thousands of dollars in crypto from thousands of users.

Image
Harvest now, decrypt later

Attackers can store your encrypted data now and wait for quantum computers to break today’s encryption in the future.

Learn more about the solution
Image
Image
Nothing left behind

What Your OS Leaves Behind After Shutdown

Standard OS

Image

System Logs

Image

File Caches

Image

Browser History

Image

Encryption Keys

Image

Tracking Cookies

NØNOS

Image

Nothing left behind.
System memory is wiped clean.

Image
The Future Threat - AI & Quantum Make This Worse

Tomorrow’s Attacks are Already Being Built

Image
AI for hackers

Cybercriminals now use AI to:

Image

Write convincing phishing emails.

Image

Clone voices of loved ones.

Image

Generate deepfake videos promoting fake investments.

Image
Quantum computers vs. your data
Image

Many of today’s protections (like RSA and ECDSA keys) could be broken within minutes or hours on future quantum machines.

Image

Clone voices of Attackers can record encrypted traffic now and decrypt it later when quantum tech catches up.loved ones.

Image
Your current OS isn’t ready
Image

It still relies on older cryptography and trust models that assume attackers are “human‑speed”.

Image

It wasn’t designed for AI‑driven or quantum‑level adversaries.

Image
1995:

Built then

Image
2025:

Failing now

Image
2030:

Broken soon

Image

NONOS is Built with this Future in Mind

Image

Memory‑safe Rust

Image

Post‑quantum‑ready cryptography

Image

Zero‑trust design & onion‑routed networking

Image
The Solution

Meet NØNOS - Zero‑Trust OS Built for People, Not Your Data, Ads or Big Corporations.

NONOS is a new kind of operating system. It runs entirely in your computer’s memory, is written in a safe language (Rust), and uses anonymous, encrypted networking. When you’re done, the entire session disappears - so there’s nothing left to leak, track, or hack.

Image
Runs only in RAM

No files written to your hard drive by default.

Shut down = your session is wiped.

Image
Rust‑Built, Zero‑Trust Core

Built from scratch in Rust, avoiding the memory bugs that cause ~70% of serious security issues in C/C++ systems.

Apps never get more access than they need.

Image
Anonymous “Onion Mesh” Networking

Your traffic is routed through encrypted hops, hiding your IP and location.

Designed to be censorship‑resistant and ISP‑independent.

Image
Built‑In Crypto & zkAuth

Integrated Ethereum wallet; NONOS can act like a secure hardware wallet.

Zero‑knowledge logins (zkAuth) let you prove “it’s you” without exposing passwords or identity

Image
Post‑Quantum Ready

Incorporates post‑quantum cryptography at the OS level to stay safe in a world where classical encryption can be broken.

Image
Image
Image

Note: If you can boot from a USB stick, you can use NONOS. No coding required.

Image
How It Works

How NONOS Fits Into Your Life

(no terminal wizardry needed.)

01
Plug in your NONOS USB

NONOS runs from a bootable USB drive (or similar device).

You don’t have to replace your existing OS - you just boot into NONOS when you want maximum privacy.

02
Choose Your Mode

Private Browsing & Banking - check accounts, send crypto, pay bills.

Sensitive Work Session - write, research, talk to sources.

03
Do What You Need to Do

Use a secure browser and essentials inside NONOS

All apps run in isolated “capsules” so one program can’t spy on another.

04
Shut Down Everything Disappears

When you power off, everything in memory is wiped.

Optional: keep certain documents/keys on an encrypted USB that only unlocks when you choose.

Image
Watch a 2‑minute
“How NONOS Works” video
Image
Safer with NØNOS

Everyday things that Become Safer with NØNOS.

Image
Image
Safe Crypto Management

Generate and store keys in a secure NONOS environment.

Avoid clipboard hijackers and fake wallet apps that have already stolen hundreds of thousands of dollars worldwide.

Image
Research & Writing without Tracking

Browse, read, and take notes without feeding ad networks or data brokers.

Shut down and your reading & search history disappears.

Image
High‑Risk Conversations

Use encrypted messaging tools via NONOS when you’re speaking with vulnerable contacts (whistleblowers, sources, family in sensitive regions).

Nothing remains on the device when you’re done.

Image
Travel & Public Wi‑Fi

Connect from airports, hotels or cafés without trusting their networks.

NONOS’s onion mesh shields your traffic and hides your IP.

Image
Secure Online Banking

Log into your bank from a clean, ephemeral session with no keyloggers, no spyware, and no hidden remote‑access apps

Image
Why NONOS?

What Changes When You Switch Your Base Layer

Typical OS (Windows / macOS / Linux)
Image

Where it runs

From your hard drive

Image

Data left behind

Logs, temp files, caches, recent docs

Image

Core language

Mostly C/C++ with common memory bugs

Image

Networking

Through ISP & DNS (visible by many parties)

Image

Telemetry

Often enabled by default

Image

Future‑proofing

Built on pre‑quantum assumptions

Image
NONOS Zero‑Trust OS
Image

Where it runs

From RAM (memory only) - no trace after shutdown

Image

Data left behind

Nothing by default; optional encrypted storage only if you enable it

Image

Core language

Rust - a memory‑safe language designed to prevent these bugs

Image

Networking

Onion‑routed encrypted mesh, resistant to spying and censorship

Image

Telemetry

No telemetry by default; privacy is the starting point

Image

Future‑proofing

Adds post‑quantum‑ready cryptography & proof‑native design

Image
Image
Why NONOS?

Why NONOS is Safer Under the Hood

(without making your head spin)

Image
Memory‑Safe Rust Code

Many hacks happen because old languages let programmers accidentally write past the end of memory or reuse freed memory.

Rust stops those mistakes at compile time, which is why even governments and research labs are pushing for memory‑safe code.

Image
Microkernel, Not a Giant Blob

Traditional OSes run huge amounts of code in their most powerful layer. If anything there goes wrong, hackers get “god mode”.

NONOS keeps the trusted core tiny and runs everything else in separate boxes - so one misbehaving app can’t take over the whole system.

Image
Network Privacy by Default

Instead of relying on a separate VPN or Tor browser, NONOS bakes anonymous routing into the OS itself.

Your traffic travels through layers of encryption (“onion routing”) so observers see scrambled hops, not who you are.

Image
Image
For the curious: read the “How It Works” technical overview →
Image
Commercialisation & Longevity

Built to Last, Not a Weekend Experiment

NONOS is open and community‑driven, but it also has a real business plan so the OS can be maintained, supported, and improved for years.

Free Core

Millions of Users

Image
Free Core OS

The core NONOS OS is free to download and use.

Goal: get NONOS into the hands of millions of users worldwide.

Based on models like ProtonMail, which grew from 2M to nearly 70M users with a free‑first strategy.

Secure

Hardware Revenue

Image
Optional Secure Hardware

Official pre‑loaded & encrypted NONOS USB devices for convenience and extra security (target price ~$50).

Internal projections: 500k-1M units by ~2027 could generate $25-50M per year in revenue - enough to fund ongoing development and support.

Pro/Enterprise

Recurring Revenue

Image

Later

Pro & Enterprise Plans

Paid “Pro” version for power users & businesses, plus enterprise licenses for organizations that need support and integrations.

Combined, the pitch deck forecasts tens of millions of dollars in annual recurring revenue within 3-5 years, ensuring NONOS isn’t dependent on donations alone.

Image

Why this matters to you: A sustainable business model means security updates, bug fixes, and improvements keep coming - without ever selling your data.

Image
Roadmap Snapshot

Where NONOS is Going Next.

Now
Image
Core OS in Development

Rust microkernel, RAM‑only operation & cryptography foundations are being built and tested. (NONOS Docs)

Upcoming
Image
Private Beta for Early Supporters

Closed testing cycles with community feedback.

Focus on stability, hardware compatibility, and usability.

Public Beta
Image
First Consumer Release

Downloadable image + official NONOS USB drives.

Starting set of secure “capsule” apps (browser, wallet, messaging).

Beyond
Image
Ecosystem & Hardware

Encrypted USB hardware key, more apps, and partnerships with privacy‑friendly hardware vendors.

Image
Industry Experts

Built by OS, Crypto & Security Obsessives.

Image
Ek

Founder

Self-taught founder of NØNOS, creating the first Rust-based ZeroState OS with zk-proofs, sovereign mesh networking, and provable, portable post-identity applications.

Image
Ironhastag

CEO  & Co-founder

Finance professional bridging TradFi and DeFi, combining investment banking and blockchain experience to drive adoption, innovation, and growth across decentralized finance ecosystems globally.

Backed by builders from Web3, cybersecurity & OS development

Image
Join the Zero‑Trace Movement

Ready to Reclaim Your Machine?

You shouldn’t need to be a hacker to have a private, secure computer. NONOS gives you a fresh start every time you boot, shielding your life from spyware, scammers, and surveillance - now and in the AI + quantum future.