EvidenceOS is the trusted verification kernel in the Universal Verification Protocol (UVP), while DiscOS is the untrusted discovery/userland layer that proposes what to evaluate. EvidenceOS enforces a narrow boundary: only admissible claim capsules run, all oracle outputs are canonicalized, and every interaction is metered and logged. This is designed to prevent adaptive probing from silently extracting holdout information across many low-signal interactions. The protocol tracks conserved evidence budgets (W) and bounded leakage (k) so safety claims remain auditable over time, identities, and interfaces. In practice, you can read the docs below without touching Rust code first and still understand what is enforced, what is out of scope, and how to deploy safely.
Read in this order:
- Threat Model by Example (blackbox walkthrough)
- Paper section overview in
README(focus on discussion of §§3/5/10) - Experiments summary (
READMEcase study + scenario matrix) - Alignment positioning: UVP vs capability spillover
Read in this order:
- Protocol versioning and wire compatibility
- Daemon API surface (gRPC lifecycle and IPC methods)
- Determinism + durability notes (DLC/ETL + storage/ops)
- ETL FAQ: append-only transparency log (not blockchain)
- Coverage maps:
Read in this order:
- Deployment security envelope (key handling, holdout/secret separation)
- Transport/auth hardening (TLS, mTLS, auth)
- Runbook and operational checklist
- What it is: a black-box, clinical-trial-style evaluation harness for DiscOS/EvidenceOS claims with pre-registered units/endpoints and competing-risk analysis expectations. Start with Epistemic trial harness.
- How to enable: configure trial arms in
config/trial_arms.jsonand optionally override withEVIDENCEOS_TRIAL_ARMS_CONFIG=/path/to/trial_arms.json; the daemon loads this at startup and recordstrial_config_hash_hexfor auditability. Details: Epistemic trial harness runtime configuration. - Where logs/evidence go: durable trial evidence is emitted under daemon
--data-dir, primarilyetl.logandetl_governance_events.log; observe structured daemon logs during reloads/operations. Ops reference: Operations guide. - Analysis quickstart: run the blessed reporting flow from Trial harness analysis and use EPISTEMIC_TRIAL_HARNESS.md to keep endpoint mapping/competing-risks interpretation consistent.
| Systems term | Alignment/security framing |
|---|---|
| kernel / userland | trusted boundary / untrusted agent |
| transcript | interactive eval history |
leakage k |
bounded info release |