Public Keys & Key IDs
Production signing keys embedded in the NØNOS bootloader.
Embedded Production Keys
The bootloader contains these trusted Ed25519 public keys:
Key 0: Primary Development Key
Algorithm: Ed25519
Purpose: Primary kernel signing
Public Key: 579adcf9f563fdaa6824b4f01d65ccb6fa1ef13fd99489a88848e641749b7ffbKey 1: Secondary Development Key
Algorithm: Ed25519
Purpose: Secondary/backup signing
Public Key: 3d4017c3e8438935a92b70aa74d1b7ebc9c982ccf2ec4968cc0cd55f12af4660Key 2: Recovery Key
Algorithm: Ed25519
Purpose: Emergency recovery
Public Key: fc51cd8e6218a1a38da47ed00230f0580816868d13ba3303ac5deb911548908025Key Metadata
The signing key includes metadata for audit:
Key ID Derivation
Key IDs are derived using BLAKE3:
Key Fingerprints
Primary (v1)
7931e665aa013b8cfbe0eb16fed5b132b129fe3814658b96ea047684c4f7e8e8
Key Storage
Development Key
Production Keys
Production keys are stored in:
Hardware Security Module (HSM)
Air-gapped secure storage
Multiple geographic locations
Public keys only are embedded in bootloader binary.
Signature Format
Verification Process
Key Rotation
To rotate production keys:
Generate new Ed25519 keypair (air-gapped)
Add new public key to bootloader source
Build and sign new bootloader with OLD key
Deploy bootloader update
Sign future kernels with NEW key
After transition period, remove old key
Multi-Signature Support
NØNOS supports N-of-M multisig for critical operations:
Kernel signing
1-of-3 (any key)
Community circuits
N-of-M configurable
Key rotation
2-of-3
Domain Separators
NONOS:KEYID:ED25519:v1
Key ID derivation
NONOS:CAPSULE:COMMITMENT:v1
Capsule commitment
NONOS:ZK:PROGRAM:v1
ZK program hash
NONOS:CIRCUIT_KEY:v1
Circuit key derivation
Verifying Key Authenticity
To verify you have authentic NØNOS keys:
Security Considerations
Key Compromise
Key CompromiseIf a key is compromised:
Remove compromised key from bootloader
Build new bootloader signed with uncompromised key
Deploy emergency update
Revoke old key in all documentation
Key Generation
Key GenerationProduction keys are generated:
On air-gapped hardware
Using hardware RNG (RDRAND + external entropy)
With multiple witnesses
With ceremony documentation
Last updated
Was this helpful?


