SECURITY · POSTURE

Sovereignty is not a feature. It is the substrate.

Every part of HYVE Ether OS is built so that no party — not us, not your ISP, not a future quantum-capable adversary — can read your data without your explicit consent. This page documents the five principles, the cryptographic primitives, and the certifications.

Five principles.

  1. 01

    Local-first by default

    All operator state lives in ~/.hyve/ on your machine, encrypted with vault-derived keys. The OS does not phone home, send telemetry, or upload activity. Relay endpoints carry only end-to-end-encrypted payloads we cannot decrypt.

  2. 02

    Post-quantum by construction

    ML-KEM-768 key exchange + 512-byte uniform cells + ChaCha20-Poly1305 AEAD + Ed25519 signatures across the substrate. Built for the day quantum computers break the rest of the internet — your data is encrypted against that day starting today.

  3. 03

    Hardware below software

    Camera, microphone, and other privacy-sensitive peripherals are gated at the kernel module level — below the userspace, below the browser. No software can override the hardware kill.

  4. 04

    Cryptographic recovery

    DataCore archives use Reed-Solomon GF(256) shard recovery — your archives survive partial corruption. Vault recovery uses Shamir 3-of-5 social threshold — your trusted contacts can collectively help you recover, no single party ever has full access.

  5. 05

    Auditable decisions

    Omega's decide() function is deterministic — same input, same output, every time, under 200 ns per rule. Every decision is reconstructible in Observatory. Auditors can replay any decision exactly.

Security features index.

Every security-relevant feature shipping in HYVE Ether OS, with patent-pending status flagged. Full claim list at /patents.

CURRENT BUILD · BUNDLE 14 + PRO PACK V2

18 security findings tracked · 14 fixed in current build

We run a continuous internal security audit and publish the count, not just the marketing. Findings are tracked under the shared HVE-2026-XXX numbering between the OS team and the website team. Open findings are scheduled against the next build; the four still open as of this build are ranked P2 or below and have documented mitigations. Higher transparency than zero-trust security marketing typically permits.

CERTIFICATION STATUS · IN PREPARATION

SOC 2 Type II — In Preparation, Not Yet Certified

SOC 2 Type II self-assessment in preparation. Several controls are implemented today (type-system-enforced wire shapes, per-tenant key isolation, parameterized SQL, OsRng). Not yet certified — full third-party audit scheduled post-launch.

Reporting a vulnerability.

If you discover a security issue in the OS, the website, or the relay endpoints, please email majixx@vibesoftwaresolutions.com with details. We acknowledge within 48 hours, ship a fix within 7 days for high-severity issues, and credit reporters in the public findings doc unless you ask otherwise.

We follow coordinated-disclosure norms: please give us a chance to patch before public disclosure. We do not litigate good-faith security research.