I have no idea. I've never developed an OS before.
Discussion
there's no need to, you are just creating a system-wide auth scheme based on bip-340 keys, literally just means a native signer enclave/bunker and a nostr based remote shell interface
also, yes, it would be easy to build this tooling and have a simple lock/unlock interface and permissions for event signing and everything, think like nos2x but it's SSH as well, so you can also use it to connect to your VPS or router and you could even then build further to create client services and ACL permissions systems that are generalised and cover everything, not just read/write access to relays, i mean everything, including blossom servers, CDN download, everything
it makes small scale peer to peer services spamproof and dos proof
Yeah, just do that.
