Show HN: CapOS – A responsibility-gated OS stack with signed process execution We’ve built a functional prototype for an operating system layer that rejects the classic trust model. Every process, network access, and system action is explicitly scope-bound to a signed capability token (CapToken) – backed by a cryptographic wallet and domain-specific responsibility structure. Key Components: CapToken authentication for all system actions CapAuditDaemon (feedback, incidents, signed system state) Feedback replaces control – the system acts on effect, not permission CapNFTs as soulbound responsibility certificates VPN routing via chain-verified nodes (CapVPNRegistry.sol) Whitebook & mathematical formalization published on Zenodo No ACLs, no root, no anonymous processes. Only signed, trackable responsibility. Period. GitHub: https://ift.tt/ljqz9Q0 Docs/Whitebook: https://ift.tt/dFt8zYM Feedback kills control. Power demands responsibility. https://ift.tt/KzJbZYV May 2, 2025 at 04:53AM
0 Comments