Page cover

1. Introduction

In an ecosystem where every JSON-RPC call, every EIP-1559 tip, every blurred NFT bid, and every single WalletConnect signature is archived forever by at least nine different block-exploring companies, SerraOS represents the logical endpoint of operational security: a computing environment that refuses to exist the moment it is no longer needed.

It is not “private.” It is absent.

The user is granted a brief, cryptographically witnessed hallucination of an operating system. When the hallucination ends, the hardware is returned to a state indistinguishable from the day it left the factory—minus, of course, the cryptocurrency you consciously moved out while the hallucination was still running.

Last updated