The Locker Box concept

Published on 11 February 2026 01:15 PM
The Locker Box Computer
A concept


Since, in general, the technological solutions the society uses are in one way or another insecure, I came up with the idea of the Locker computer. What is The Locker Box? Locker Box Computer is a fully functional, multi-purpose Unix based workstation and a server designed for consumer/business/military market. It is supposed to be able to be an office machine, it will be suitable for web browsing, every day computing, computer graphics or even entertainment. It comes with a promise of never spy on the user and always stand by his side, the promise of loyality. Why BSD Unix? The BSD license allows the code to become proprietary, the most of the OS is supposed to be proprietary in the end for sake of the security of the user and security of the Locker Box Computers intellectual propriety. The Locker computer is supposed to provide maximum data security and user anonymity for the population. It is supposed to take unauthorized access to user data or metadata away from absolutely ANYONE, government or other bandits. The Locker project aims to bring an integrated, out of the box fully functional, universal unix computer unit, similar to other computers but in orientation of end user online security, internal data security, anonymity and privacy standards. The military model could find multiple uses in a conflict situation.

Features of the concept:

• Full ZFS disk encryption by default, key stored in a TPM chip
• Out of the box, preconfigured VPN for all users, all nodes world-wide available after extra payment (which will require a lot of networking infrastructure world wide)
• Development of GUI for components like package management, packet filter, jails, filesystem management, service management, VPN management, network, nfs, smb management
• When it comes to the hardware platform, I’d base it on ARM or RISC and rather avoid using x86 based platforms
• The system will require a process of software and hardware selection and then detailed audit
• One of the future features I see is a data kill switch. Lets say in combat condition a machine could be captured and even while being encrypted sent for analysis and possibly exploited for data. A bailout data killswitch could solve this issue. It would require a custom nvme device with a custom controller and a system drivers where predefined chunks of space on nvme memory contain containers that hold encrypted data. When “pulling” the switch, the controller would allow to instantly zero whole areas of the the drive, the predefined areas that hold the containers. That’s one of the ideas for future.