/ Introduction
PlugOS Core Features

PlugOS is a portable, secure and private operating system developed by TrustKernel, designed to integrate high security, robust privacy, and rich intelligent experiences into a compact and versatile platform. Unlike conventional systems that compromise usability for security, PlugOS delivers a fully isolated, secure, and highly functional secondary system that can run on mainstream devices without modification.

Cross-Platform Plug-and-Play

PlugOS is built as an independent hardware system, enabling users to access a secure operating environment without jailbreaking, rooting, or flashing the host device. Using a USB-C connection, PlugOS can launch on iOS, Android, or Windows devices instantly.

This plug-and-play capability transforms PlugOS into a pocket-sized secondary device, providing unparalleled flexibility across personal, professional, and travel scenarios. Examples include:

  • Smartphone as Dual-System: One phone, two worlds. PlugOS allows users to run an independent workspace on their mobile device without switching accounts or altering the main system. For example, inserting a PlugOS device into an iPhone or iPad can run a fully functional Android system, giving users a separate privacy- or work-focused environment.
  • Tablet as Productivity Hub: PlugOS transforms a tablet into a dedicated light office environment, where work apps, files, and settings are fully isolated from personal entertainment apps.
  • PC as Personal Mobile Terminal: PlugOS can instantly load a personalized system environment on any computer, whether private or shared, maintaining full control over documents, configurations, and privacy.

By enabling a second secure and intelligent system anywhere, PlugOS eliminates the need for system modification or complex setup, ensuring consistent and efficient user experience across devices.


Rich Application Ecosystem

PlugOS balances security and usability, delivering full access to the Android ecosystem while maintaining strong privacy controls.

  • Full Android App Compatibility: Users can run mainstream Android applications, including communication, office productivity, entertainment, and professional tools.
  • Official Privacy-First App Library: Provides curated apps that are ad-free, tracker-free, and privacy-enhanced.
  • Optional Third-Party and GMS Integration: Users may authorize access to third-party app stores or the Google Mobile Services (GMS) framework to run applications that depend on GMS. This is fully controlled and transparent, preserving user autonomy over data and permissions.

PlugOS ensures users can enjoy broad application choice while retaining granular control over permissions, network access, and data flows.


Integrated Dual-System Experience

PlugOS breaks the barriers of traditional dual systems, delivering a seamless, efficient, and highly controllable integrated experience. It feels like operating two systems on the same screen, with smooth data flow and effortless switching.

  • Smart Clipboard Sharing: No more tedious copy-paste workarounds. PlugOS enables configurable clipboard sharing (one-way or two-way), making it easy to transfer text, links, and other content across systems.
  • Real-time Notification Sync: Stay informed without system switching. PlugOS delivers cross-system notification sync, ensuring you never miss important messages.
  • Fast & Secure File Sharing: PlugOS includes FlashTransfer for quick file imports and exports (apps, documents, media, etc.) between PlugOS and the host device. Shared folders further enable seamless two-way file access for efficient collaboration.
  • Granular Security Controls: All dual-system features can be toggled as needed, with clear risk prompts. This empowers users to strike the perfect balance between convenience and strict security.

This approach provides strong isolation by default while enabling fluid, user-controlled interoperability.


Hardware-Level Security Isolation

Conventional devices face countless malware and attack vectors, posing serious risks to user data and digital assets. PlugOS places digital security at its core, leveraging a unique low-level architecture for end-to-end protection.

Built on Trusted Execution Environment (TEE) and virtualization technologies, PlugOS integrates hardware isolation, dual-factor authentication, secure boot, full-disk encryption, and minimized interfaces to resist physical intrusion, system-level exploits, and supply chain attacks. Even in cases of device loss or cold boot attacks, user data remains unrecoverable.

  • Dual Authentication & Secure Boot: PlugOS verifies both the user and host device at the hardware level within a self-developed, production-proven TEE by TrustKernel. With a “verify-first, then boot” process, the system ensures security before any code loads, mitigating hardware and supply chain risks at the root.
  • Physical Isolation & Minimal Attack Surface: PlugOS operates independently, leaving no trace on the host system. It communicates only via a strongly encrypted USB-C channel, significantly reducing attack vectors.
  • Trusted Computing via TEE: Sensitive operations like key management, authentication, and data processing run inside an isolated TEE environment. Even if the host system is compromised, TEE data remains secure and intact.
  • Hypervisor Virtualization Framework: Unlike monolithic kernels prone to root exploits, PlugOS integrates a custom Hypervisor to isolate kernel-level operations, enhancing both attack resistance and stability.
  • Always-on Full-Disk Encryption: All stored data is automatically encrypted at rest. Unauthorized access is impossible, even if the hardware is seized.
  • Data Self-Destruct and Encrypted Backup: PlugOS supports brute-force detection and coercion-triggered self-destruction. If triggered, data is irreversibly wiped. Users can also rely on end-to-end encrypted backups to restore safely, maintaining exclusive data ownership.

System-Level Privacy Protection

In most mainstream systems, “default data collection” is the norm. Browsing history, keystrokes, location, communications, and habits are quietly logged, analyzed, and monetized under the guise of personalization. PlugOS takes the opposite path.

PlugOS treats user privacy as a core principle, ensuring your digital life belongs only to you. It never engages in data harvesting or behavioral profiling. From system architecture to default policies, PlugOS enforces a strict “local-only, no analysis, user-controlled” philosophy — meaning every digital action remains yours alone.

Privacy by Design: Zero Data Collection

  • No ads, no recommendations, no monitoring, no uploads.
  • Core apps (browser, keyboard, etc.) are designed for fully local operation, ensuring your inputs and interactions never leave the device.
  • No algorithmic distractions — just a pure, user-driven digital experience.

Sensor Virtualization: Block Hardware Fingerprinting

PlugOS virtualizes peripherals at the OS level, including GPS, SIM info, network state, and environmental sensors. This prevents hardware fingerprint tracking and safeguards identity. Users can dynamically toggle between virtualized sensors and real hardware (e.g., for navigation or calls), balancing privacy with functionality.

Controlled Connectivity: Transparent & Accountable

A system-level local firewall provides advanced privacy control, auditing all network activity in real time. It detects hidden trackers and unauthorized connections, giving users full visibility and control. Every connection is knowable, controllable, and traceable, ensuring true network privacy.

Data Sovereignty: Encrypted Backup & Recovery

PlugOS enables end-to-end encrypted backup and recovery, ensuring all data remains encrypted during storage, transfer, and restoration. This grants users true sovereignty over their data — “self-owned storage, self-owned recovery” — with confidentiality and ownership fully protected.


PlugOS redefines portable intelligent operating systems by integrating portability, security, and privacy without sacrificing usability. Its hardware-level isolation, dual-system integration, and privacy-first architecture create a trustworthy digital environment where users remain in full control of their data and experience.