NØNOS

SOVEREIGNTY FROM Ø

ZeroState · Ed25519 · Groth16/BLS12-381 · AES-256-GCM · ML-KEM · ML-DSA

ZeroState by Design

Everything runs in RAM. When you shut down, data doesn't get deleted—it ceases to exist. Encryption keys live only in CPU registers. Power off and they vanish. Physics-based security.

Cryptographically Verified Boot

Ten-stage boot process with Ed25519 signature verification and mandatory Groth16 zero-knowledge attestation. The kernel proves its integrity before executing a single line of code.

~340,000 Lines of Rust

Complete microkernel with 33 subsystems: shell, graphics, networking, cryptography, filesystem, drivers. Built from scratch—no Linux, no BSD, no borrowed kernels.

Post-Quantum Cryptography

ML-KEM-768 and ML-DSA-3 for quantum-resistant encryption and signatures. Classical suite includes Ed25519, X25519, AES-256-GCM, ChaCha20-Poly1305, and BLAKE3.

10 Capability Types

Every privileged operation requires a cryptographic capability token. No root user, no ambient authority. Processes get exactly the permissions they need—nothing more.

Built-in Onion Routing

Three-hop encrypted circuits integrated into the network stack. All traffic anonymized transparently—no configuration, no external software. DNS queries go through the anonymity network too.

Internal Audit & Development

We rebuilt 38 syscalls from scratch. Memory locking, file locks, thread synchronization, extended attributes - all with proper implementations. 312 syscalls reviewed, 89 new modules, 75 max lines per file. Read the full report.

Alpha Release 0.8.4 — Microkernel Architecture

The first release where the complete graphical desktop runs on fully isolated userspace services. Twelve services communicating via synchronous IPC, each in its own virtual address space. A vulnerability in the network stack cannot compromise the filesystem. A bug in the display compositor cannot leak cryptographic keys.

Architectural Highlights

  • 12 Isolated Services — VFS, display, input, network, crypto, ZK, audio, GPU, apps, agents, shell, desktop
  • ~15,000 Line Kernel — Memory management, scheduling, IPC, capability tokens. Nothing else.
  • Three-Stage Boot Verification — Ed25519 signature, BLAKE3 hash attestation, Groth16 ZK proof
  • Capability-Gated Filesystem — No ambient authority. Applications get explicit path capabilities.
  • Isolated Cryptography — Private keys exist only in crypto_service. Applications receive signatures, never key material.
  • 4K Desktop — Double-buffered compositor with dirty region tracking, PNG wallpapers, 100Hz refresh

What's New in v0.8.4

  • Fixed PNG Decompression — Resolved initialization ordering deadlock during boot
  • Fixed IntelliMouse Protocol — Proper 4-byte packet handling for scroll wheel support
  • Boot Progress Logging — Serial output at each stage for debugging hangs
  • Non-Blocking VFS Init — Eliminated potential deadlock in service startup

Current Limitations

  • Single-core only (SMP support coming in v0.9)
  • Volatile storage by design—external media support for intentional persistence

Tested Hardware

HP ProBook/EliteBook, Dell Latitude, Lenovo ThinkPad, and QEMU/KVM with OVMF. See hardware compatibility for details.

Download · Installation Guide · Source Code