Each vulnerability class that plagues conventional architectures is eliminated not by software mitigation but by the absence of the hardware mechanism that enables it, combined with dual-gate TSB validation that enforces capability security on every access.