Security Model
NØNOS implements a multi-layered security model where each layer provides independent guarantees.
Security Layers
┌─────────────────────────────────────────────────────────────┐
│ Layer 5: APPLICATION SANDBOXING │
│ Process isolation, capability-limited access │
├─────────────────────────────────────────────────────────────┤
│ Layer 4: CAPABILITY-BASED ACCESS CONTROL │
│ Unforgeable tokens, cryptographic binding │
├─────────────────────────────────────────────────────────────┤
│ Layer 3: MEMORY PROTECTION │
│ W^X, KASLR, guard pages, SMEP/SMAP │
├─────────────────────────────────────────────────────────────┤
│ Layer 2: KERNEL VERIFICATION │
│ Ed25519 signatures, BLAKE3 hashing │
├─────────────────────────────────────────────────────────────┤
│ Layer 1: BOOT CHAIN VERIFICATION │
│ UEFI Secure Boot, hardware root of trust │
└─────────────────────────────────────────────────────────────┘Layer 1: Boot Chain Verification
Layer 1: Boot Chain VerificationComponents
Guarantees
Layer 2: Kernel Verification
Layer 2: Kernel VerificationComponents
Verification Flow
Guarantees
Layer 3: Memory Protection
Layer 3: Memory ProtectionHardware Features
Feature
Protection
Memory Layout
Guarantees
Layer 4: Capability-Based Access Control
What are Capabilities?
Properties
Access Control Flow
Comparison to Traditional Unix
Unix
NØNOS Capabilities
Layer 5: Application Sandboxing
Layer 5: Application SandboxingProcess Isolation
Resource Limits
Cryptographic Foundations
Algorithms Used
Algorithm
Purpose
Security
Key Management
Threat Model
In Scope (Protected Against)
Partially Mitigated
Out of Scope
Security Guarantees Summary
Property
Guarantee
Last updated
Was this helpful?


