<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Chad Wiley</title>
    <description>The latest articles on DEV Community by Chad Wiley (@chad_wiley_9633c3427c2b25).</description>
    <link>https://dev.to/chad_wiley_9633c3427c2b25</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3944843%2F61509a7f-7707-4d8b-8a2e-4a6a14a6a133.jpg</url>
      <title>DEV Community: Chad Wiley</title>
      <link>https://dev.to/chad_wiley_9633c3427c2b25</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/chad_wiley_9633c3427c2b25"/>
    <language>en</language>
    <item>
      <title>CrimsonOS: Building a Mobile OS from the Firmware Up</title>
      <dc:creator>Chad Wiley</dc:creator>
      <pubDate>Thu, 21 May 2026 21:11:34 +0000</pubDate>
      <link>https://dev.to/chad_wiley_9633c3427c2b25/crimsonos-building-a-mobile-os-from-the-firmware-up-5082</link>
      <guid>https://dev.to/chad_wiley_9633c3427c2b25/crimsonos-building-a-mobile-os-from-the-firmware-up-5082</guid>
      <description>&lt;p&gt;The Problem&lt;br&gt;
NetHunter is solid, but it's still Android underneath. You inherit the vendor blob stack, the Google services layer, and a UI that wasn't designed for launching  msfconsole  or  aircrack-ng  quickly. We wanted bare-metal Linux on handset hardware — but then we realized we didn't want Linux either.&lt;br&gt;
The Kernel&lt;br&gt;
The Crimson kernel is small enough to audit. Every syscall, every driver, every interrupt handler is ours. When you're carrying tools that probe other people's networks, you want to know exactly what's running on your own silicon.&lt;br&gt;
Boot sequence on Pi 5: power-on → kernel init → framebuffer setup → GUI shell ready in &amp;lt;3 seconds. No initrd, no systemd, no module autoloading.&lt;br&gt;
The GUI Shell&lt;br&gt;
Direct framebuffer render loop. No compositor, no Wayland, no SurfaceFlinger. We draw every pixel. iOS-style app grid with dock, edge-swipe navigation panels, lock screen with PIN auth, crimson boot splash.&lt;br&gt;
The tool launcher ("Excalibur") surfaces 140+ security tools across 12 categories. Each tool gets a parameter panel — toggles, dropdowns, input fields.&lt;br&gt;
The HAL&lt;br&gt;
Hardware Abstraction Layer talks directly to USB/UART devices. HackRF, Flipper, Proxmark — the GUI knows when hardware is attached because the HAL tells it.&lt;br&gt;
Developer Platform&lt;br&gt;
Because we own the userspace, we're building an app store where developers publish open-source software, set their own prices, and collect directly. No 30% platform tax, no gatekeeper approval for security tools that Apple or Google would reject.&lt;br&gt;
Current Status&lt;br&gt;
Kernel boots, GUI runs, tools integrate, RF HAL works. Moving to handset hardware for boot testing. Seeking bare-metal bring-up war stories.&lt;br&gt;
Repo: &lt;a href="https://github.com/synchancybersecurity/CrimsonOS" rel="noopener noreferrer"&gt;https://github.com/synchancybersecurity/CrimsonOS&lt;/a&gt; License: Apache 2.0, SynChanCyberSecurity&lt;/p&gt;

</description>
      <category>opensource</category>
      <category>security</category>
      <category>osdev</category>
      <category>arm</category>
    </item>
  </channel>
</rss>
