@yosh Way back in the 1970s we worked on machines with true hardware Capability architectures (not that weak thing with that name in Linux).
Those architectures let us get closer to the security rule of giving no module more authority than it needed to get its job done.
(I once got to help design an OS and then to design/build the capability based computer to run it. But it was classified so nobody ever heard about it.)
I wish we would revive the lost technology of capability hardware architectures.
Here's one such effort: