Immutable base
Fedora CoreOS, Ignition, Butane, rpm-ostree, and local RPM ownership for Vnyl components.
Vnyl is specified as a Fedora CoreOS-derived desktop/server environment: immutable at the base, monochrome at the surface, and strict about every public-facing detail.
Fedora CoreOS, Ignition, Butane, rpm-ostree, and local RPM ownership for Vnyl components.
Black, white, alpha surfaces, 1px refraction edges, and typography instead of pictogram icons.
Snapshot-oriented storage logic with BTRFS as the standard path and ZFS as an optional advanced channel.
Fedora Wine packages as compatibility only. No Windows, proprietary DLLs, or Microsoft runtimes are bundled.
30-language first-boot flow with RTL-aware layouts, Noto fallback fonts, and input-method validation.
Static-first PHP: no database, no sessions, no uploads, no tracking endpoint, and no build logic on shared hosting.
vnyl.live is a landing surface. Build logic, repositories, image composition, validation reports, local RPM packaging, installer logic, dashboard behavior, and manual rendering belong inside the Fedora CoreOS-based Vnyl repository and ISO workflow.
The website does not build, host, update, mirror, or distribute the operating environment. It only describes the product and provides contact points.
| Area | Decision | Practical effect |
|---|---|---|
| Site runtime | Two PHP pages, no database, no sessions. | Fewer moving parts exposed to the public internet. |
| Headers | CSP, HSTS on HTTPS, frame denial, nosniff, permissions policy. | Reduces common browser-side abuse classes. |
| Contact | Mail links only, no public form. | No form spam endpoint or upload handler. |
| Build logic | Not executed on shared hosting. | Compromise of the landing page cannot become a build-pipeline compromise. |
Vnyl is not designed for spam, malware hosting, phishing, unauthorized access, evasion services, or abusive network activity. Reports should include timestamps, source and destination addresses where available, logs, screenshots, and a concise description.
Use the abuse mailbox for urgent reports involving misuse, impersonation, network abuse, or public safety concerns.