01 · Identity
Every peer is a `did:oas`.
No setup keys. No shared secrets that leak into logs. Every peer presents a cryptographic identity rooted in your organization's lineage tree. Revoke a parent — all descendants drop in the next policy tick.
Cryptographic identity. Policy-derived ACLs. Multi-transport overlay. Built for the world where every device — and every agent — needs a place on your network.
Principles
Beacons is not a VPN with policy bolted on. It is built line one around how autonomous organizations actually work — where peers come and go in seconds, identity is cryptographic, and ACLs are derived from governance, never hand-authored.
01 · Identity
No setup keys. No shared secrets that leak into logs. Every peer presents a cryptographic identity rooted in your organization's lineage tree. Revoke a parent — all descendants drop in the next policy tick.
02 · Policy
Define ENR trust roots, accepted agent kinds, and Arsenal capability scopes once. The policy engine continuously recomputes routes whenever a lineage updates, a capability is issued, or an attestation expires.
03 · Multi-transport
Kernel WireGuard on Linux. Userspace WireGuard on macOS and iOS. WebRTC inside a browser tab. MQTT for an ESP32. CoAP for LoRaWAN. Cellular IP for a Telnyx SIM. Iridium when there is no terrestrial link at all.
Universal client matrix
Every device in the world maps to a tier. The tier picks the transport, the identity storage, and the distribution channel — automatically.
Identity
Every peer joining a Beacons fleet is verified through three independent layers — and either all three pass, or the peer never sees a route.
$ bcn peer enroll did:oas:acme:agent:scribe-7 → oas: resolved · lineage chain depth 3 → aegis: challenge signed · key verified → arsenal: capability beacons:fleet:join · valid 7m → policy: fleet=acme · trust-root=did:oas:acme:hmr:jr · ok peer admitted in 184ms → wireguard route installed · 100.64.7.3/32
pub fn compute_acl( fleet: &Fleet, peer: &Peer, ) -> Result<Acl, PolicyError> { // 1. lineage check let lineage = oas::walk(&peer.did, fleet.trust_roots)?; // 2. capability check let cap = arsenal::verify(&peer.token, "beacons:fleet:join")?; // 3. governance check fleet.enr.accepts_kind(&peer.kind)?; // 4. derive the routes this peer is allowed to reach Ok(Acl::derive(fleet, &lineage, &cap)) }
Policy
Define ENR governance once: trusted roots, accepted entity kinds, required capability scopes, attestation issuers. The policy engine derives every ACL — and recomputes whenever lineage, capability, or attestation state changes.
Audit
Every coordinator action emits a Blake3-hashed event chained against the prior event. The fleet's chain root is periodically anchored on Sigil — so the audit history is verifiable independent of L1fe's infrastructure.
event#9281 peer.enrolled did:oas:acme:agent:scribe-7 event#9282 acl.recomputed +2 routes · -1 route event#9283 cap.revoked did:oas:acme:agent:bot-aging event#9284 peer.dropped cap revoked · routes torn down event#9285 anchor.submit sigil:tx:8af3…b2c1 · root=blake3:…ec71 chain root verified at sigil height 4 491 207
From a kernel-WireGuard Linux server to an ESP32 brokered through a Raspberry Pi to a Hives flight running as a WASM module — they all join through the same composite verdict, and they all leave under the same policy revocation.
Cellular
Beacons treats cellular as a first-class transport implemented via a provider trait. Telnyx is the launch plugin. Twilio, Soracom, Hologram, 1NCE, Particle and Onomondo follow. eUICC orchestration is owned by Beacons and consumed by Locks through an internal API.
$ bcn cellular order \
--provider telnyx \
--quantity 100 \
--plan global-1gb \
--apn acme-private
→ provider: telnyx
→ shipping: acme-warehouse-dallas
→ eta: 2026-05-24
100 sims minted · each tied to did:oas:acme:tool:sim-…Order of magnitude
These are not vanity targets. They are the assumptions the architecture is built against — coordinator throughput, audit chain integrity, lineage walks, ACL recomputation, transport negotiation.
From kernel WireGuard to brokered ESP32. One mesh, one identity.
WG, userspace WG, WebRTC, MQTT, CoAP, cellular IP, satellite, LoRa.
Telnyx · Twilio · Soracom · Hologram · 1NCE · Particle · Onomondo · EMnify · KORE.
OAS resolve + AEGIS challenge + Arsenal verify on a warm coordinator.
Composable
Beacons consumes OAS, AEGIS, Arsenal, Sigil, Silos, Cabbage, Relays, Hives, MAP. It doesn't reimplement any of them — and every interface is replaceable.
Identity, challenge, capability — the three layers of the composite verdict.
Audit chain roots anchored on the Sigil blockchain. Tamper-evident, independently verifiable.
WASM compute joins fleets automatically. Postgres state via Silos. Billing meters through Cabbage.
MagicDNS routed through Relays / PowerDNS. MAP exposes a BEACONS protocol module for cross-engine discovery.
Forge agents embed `beacons-sdk` and auto-join their org's fleet. Aut0 provisions a default fleet on founding.
JOBS-managed devices become peers automatically. Locks issues hardware-rooted identities via eUICC. Lockers settles cellular overages.
FAQ
The decisions that shaped the architecture, in five paragraphs.
Open a fleet
A `did:oas`-rooted private mesh that ships peer configurations to any device, anywhere, by policy — not by hand.