Hello, verified world
2026-05-18
If you're reading this, you just received an HTML page that traveled through a verified TLS 1.3 stack from Amazon DynamoDB to a 130 KB static ARM64 binary, and back to your browser. The same binary runs on AWS Lambda and AWS App Runner with identical bytes — verified caps don't care which host wakes them up.
The bytes you're reading right now were stored in DynamoDB as the
html attribute of the row with partition key
slug = "hello-world". To deliver them to you the binary:
- Opened a TCP socket to
dynamodb.us-east-1.amazonaws.com:443 - Performed a TLS 1.3 handshake using verified caps: X25519 key exchange, HKDF key derivation, AES-128-GCM record encryption.
- Built a SigV4-signed
GetItemrequest via theaws_dynamodb_getitem_requestverified cap. - Sealed the request as a TLS application_data record using
tls13_record_seal. - Read the encrypted reply from the socket, decrypted it with
tls13_record_open, used thehttp_response_completeframer to know when the response was fully received, parsed the JSON viajson_extract_dynamodb_string_attr, returned thehtmlbytes — which is what you're reading.
No BearSSL, no OpenSSL, no boto3 anywhere in the binary. Every byte over the wire produced by a cap that ships with a published-vector test oracle and went through six install gates. The patent claim made of bytes.
Page served by 70 verified IR caps. Built by Lane
Thompson — say hi on
LinkedIn.