Page cover

NØXTERM Overview


NØXTERM is a privacy-first, web-based terminal that executes commands in completely isolated Docker containers. Each session runs in an ephemeral environment that is destroyed the moment you disconnect, leaving no traces behind. This is not a remote desktop, SSH wrapper, or terminal emulator running on shared infrastructure. NOXTERM creates fresh, isolated containers for every session with explicit trust boundaries and optional anonymous network routing through the Anyone Protocol.

76MB
Open

What NØXTERM is

NOXTERM provides secure, isolated computing environments through four core components:

Ephemeral Container Sessions

Every terminal session spawns a dedicated Docker container. The container exists only for the duration of your session, no persistence, no logs, no traces. When you disconnect, the container and everything in it is destroyed.

Full Terminal Emulation

Native PTY (pseudo-terminal) support enables full terminal functionality including interactive applications like vim, nano, htop, and package managers. This is not a command executor, it's a complete terminal environment.

Privacy-First Architecture

Optional integration with the Anyone Protocol routes all container traffic through a decentralized anonymization network. Your real IP address never reaches destination services.

Zero-Trust Design

No implicit trust assumptions. Every session is isolated. No shared state between users. No activity logging. The system is designed so that even the operator cannot observe session contents.


Architecture Summary


Design Philosophy

Explicit Trust Boundaries

NØXTERM operates on the principle that trust must be explicit, minimal, and verifiable. Each session is a trust boundary. Containers cannot access host resources. Network traffic can be anonymized. Nothing persists.

No Hidden Subsystems

The architecture is designed for auditability. Session management is explicit. Container lifecycle is observable. Security policies are configurable and logged.

Privacy as Default

While privacy mode is optional, the entire system is designed around privacy-first principles. Even with privacy mode disabled, sessions are isolated and ephemeral. No command logging. No activity tracking.


Use Cases

Secure Code Execution

Run untrusted code in complete isolation. Test scripts, evaluate packages, or experiment with system configurations without risk to your host machine.

Anonymous Operations

When privacy mode is enabled, perform network operations without revealing your identity. Web requests, API calls, and downloads all route through the Anyone Protocol.

Clean Development Environments

Spin up fresh development environments instantly. No package conflicts, no state pollution, no cleanup required.

Education and Training

Provide isolated terminal environments for learning Linux, system administration, or security concepts without infrastructure overhead.


Technical Stack

Component
Technology

Backend

Rust 1.70+ with Axum web framework

Async Runtime

Tokio multi-threaded executor

Container API

Bollard (Docker API client)

Frontend

React 18 with TypeScript

Terminal Emulation

xterm.js

Database

PostgreSQL (optional, in-memory fallback)

Privacy Layer

Anyone Protocol (SOCKS5)


Current Status

NØXTERM is ready for being hosted in MVP release on our bare metal server at https://noxterm.com after community beta test with the following capabilities complete:

  • Full PTY terminal with interactive application support

  • Container lifecycle management with automatic cleanup

  • Anyone Protocol privacy integration

  • Security validation and rate limiting

  • Audit logging infrastructure

  • Cross-platform support (macOS, Linux, Windows)

See the Roadmap for planned features and development status.

Last updated

Was this helpful?