AmiOS – Security from the ground up

Build and launch secure, bootable system images — exactly as you define them.
AmiOS is a platform developed by Subset to create reproducible, controlled, and verified operating system images with a focus on trust, transparency, and security.

What is AmiOS?

AmiOS is a adaptable scure live operating system framework built for security-critical environments.

No footprint: Leaves zero trace on the host system—data is wiped on shutdown.
Fully customizable: Define and deploy tailored OS instances using Configuration as Code.
Resilient by design: Built for adaptability in dynamic and high-risk scenarios.

Ideal for organizations that demand privacy, flexibility, and control.


AmiOS ensures complete privacy by leaving no traces on the host system. Upon shutdown, all data is wiped, making it an ideal choice for security-critical applications. Users can create custom live operating system instances using the AmiOS framework, leveraging Configuration as Code to define, modify, and deploy tailored operating system images.

Why AmiOS?

Like a hash makes data unambiguous, AmiOS gives every boot a clear, known, and cryptographically verifiable baseline.

• Security Without Compromise: Every AmiOS boot starts from a cryptographically trusted baseline—ensuring your environment is always clean and verifiable.

• Flexibility Without Complexity: Deploy ultra-secure, temporary workspaces that vanish on shutdown, or create reproducible setups for development and testing—all with ease.

• Configuration as Code: Define, update, and replicate environments quickly and consistently, giving you full control and peace of mind.

• No Trace Left Behind: AmiOS adapts to your needs, from high-security operations to rapid prototyping—always leaving zero footprint on the host system.

How it works

Our other services

Visuell representation på cybersäkerhet

Cybersecurity

Security that lasts — today and tomorrow. We identify vulnerabilities, build robust systems, and establish processes that withstand cyber threats. With deep expertise in secure development and cryptology, we make your operations safer.

Secure Development

Security from the start — not as an afterthought. We develop systems where security is an integrated part of the process, from initial analysis to final delivery. The result? Robust, well-documented technology that stands the test of time.