packages/os/linux/variants/milady-tails/docs/current-status.md
Last updated: 2026-05-19.
This branch is a working demo/productization branch, not a finished enterprise release.
6419dbee227317983ff2c6d02c3fd4bf97c6699ac1d26f0c98476f2ba58cfc10
out/binary.iso. Do
not use older named ISO copies in out/ for validation; they can be
stale. If the branch moves after this artifact, rebuild and validate the
exact release commit before publishing or flashing it as final.fb706edd7016b415e53fc263c37d09ed26d7f0d8d3bced250bde5b1b3ea9bec8
The latest validated artifact has QEMU visual evidence for boot, greeter, desktop, and app onboarding startup. The exact release commit must be rebuilt and revalidated if HEAD moves. It has not yet been flashed/readback-tested to USB, booted on real hardware, or validated for real USB Persistent Storage create/unlock/delete behavior.
The latest app blocker was packaged-runtime completeness: the app window
opened but the backend timed out because @elizaos/plugin-app-manager and
@elizaos/plugin-registry were copied as package folders without runtime
dist/index.js artifacts.
The latest validated artifact contains the fix:
just milady-app now builds runtime JS for those first-party plugin
packages when their dist/index.js files are absent.static-smoke.sh now checks that the staged overlay and installed chroot
copy both contain those plugin runtime artifacts./opt/milady/Resources/app/eliza-dist/node_modules/@elizaos/.Completed so far:
/api/auth/status from the staged
runtime.out/binary.iso.Still required before claiming a final USB demo:
fb706edd... artifact.Product ideas and production hardening are tracked in
production-readiness.md and
distribution-and-updates.md; they should not
delay tonight's demo proof unless they affect boot, app launch, persistence,
privacy, or USB safety.
The latest source audit does not add a new blocker for tonight's QEMU proof, but it does set the honest product boundary:
just milady-app before a full ISO build.apt-get, broad sudoers, or free-form root shell
actions are rejected for this product.The intended product claim is elizaOS Live: a Tails-derived live USB Linux distribution with the elizaOS app/runtime as the home AI surface. The normal desktop stays available, and Tails internals stay intact where renaming would break upstream contracts.
The app is already baked into the ISO as a factory fallback. The production
path is not to give the app unrestricted root; it is to keep the app/UI under
the amnesia user, keep root-owned supervision and launch policy in systemd,
and expose privileged actions through a named capability broker with approval,
argument allowlists, and audit evidence.
Fast Milady/eliza app updates should not require a full ISO every time. The right architecture is signed app/runtime bundles in encrypted Persistent Storage, verified into a root-owned runtime store, with rollback to the baked factory runtime. Base OS updates remain separate: signed full ISO first, then signed OS deltas or a Tails-style incremental update path once release infrastructure exists.
Large models should not be baked into every USB by default. The ISO should ship runtime support plus a signed model catalog. Onboarding can offer cloud sign-in, local-only mode, signed Eliza-1/local model download, or enterprise managed mirrors. Downloaded models belong in encrypted Persistent Storage; in amnesia mode they must disappear at shutdown.
The clean production gates remain: deterministic signed app artifacts, no hidden dev workspace resolution, release keyring and revocation metadata, SBOM/license/provenance, formal sudoers/capability-broker review, privacy proof for embedded browser/OAuth paths, and real USB persistence validation.
fb706edd... artifact.