Two product lines, named to make scope obvious to buyers: - 🔒 SilverMetal OS — we ship the operating system or ROM (Linux, Pixel, Samsung-unlocked, Motorola-unlocked) - 🛡️ SilverMetal Enhanced — we harden the OS the device already runs (Windows, macOS, iOS, generic Android) Repo alignment: - SilverVPN already exists as a SilverLABS product (server + MAUI client + Linux client + tunnel service). stack/vpn/ is now an integration pointer rather than a re-scaffold; per-platform READMEs reference it. - SilverApple is deprecated; SilverMetal Enhanced — iOS supersedes it. Migration step added as roadmap milestone 3I.1. - SilverDROID name clash explicitly noted as unrelated (it's the SilverSHELL AppStore Android client, not an Android ROM). - SilverChat may overlap with SilverVPN.Client.Chat; alignment decision added as roadmap milestone 1.1.1. Roadmap restructured: phases now track the OS/Enhanced split. Platform matrix re-sectioned and decision flowchart updated. README rewritten around the two-product-line framing. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
SilverMetal Enhanced — macOS
Status: Phase 3M (planning, post-Linux v1)
🛡️ SilverMetal Enhanced product line — we harden macOS in place. Apple's signed boot chain prevents an OS replacement.
Tier C-D — signed configuration profile + setup script + Stack ports. We configure everything Apple exposes.
Scope (v1)
- Signed
.mobileconfigprofile that:- Enforces FileVault
- Disables analytics, Siri uploads, advertising identifiers
- Configures application firewall
- Restricts iCloud to absolute minimum
- Enables Lockdown Mode (per-user opt-in guidance)
- Idempotent setup script for non-MDM hardening (default-app changes, Safari→SilverBrowser, etc.)
- Stack ports for macOS (universal binaries, notarised, signed)
- SilverVPN MAUI macOS client from existing
SilverLABS/SilverVPN - Setup guide for hardware-key 2FA, anti-forensics
Out of scope
- Anything requiring kernel extension or system extension privileges beyond what Apple sanctions
- Anything that disables SIP / Gatekeeper (we keep both ON)
- Anything that requires bypassing Apple's signing chain
Directory layout
To be populated in Phase 3M:
macos/
├── profile/ # .mobileconfig sources, signing
├── setup/ # idempotent setup script
├── stack-installer/ # native macOS Stack package builders (.pkg)
└── docs/ # setup guide, recommended apps
Verification gates
- Profile signature verifies under Apple's signing chain
- FileVault confirmed enabled post-install
- Stack apps install via signed
.pkg, run sandboxed where supported - Setup script idempotent (verified by re-run with no changes)
Upstream we depend on
- Apple macOS — base, unmodified
- macOS Privacy Guide / privacy.sexy — reference for hardening configs
- Lockdown Mode — Apple-provided, documented and enabled
SilverLABS/SilverVPN— MAUI macOS client (existing)