This document discusses the Capsicum capability model and its use in sandboxing systems in FreeBSD. Capsicum allows tight sandboxing by limiting access when a process enters capability mode using cap_enter(). It describes debugging capabilities like ktrace and enotcap. It also introduces Casper, which provides additional capabilities through delegation before entering capability mode. Casper allows easier process separation by creating services run with user privileges that processes can then securely access through APIs. The document outlines several system services implemented through Casper and future work integrating it more fully with libc and sandboxing additional system services.