Articles
Identity After the Endpoint
A small group of engineers is building protocols for the one transition the internet has never been able to acknowledge. The civil registry has been doing the same work, on paper, for two thousand years.
The Alignment Philosophers
A small field is trying to teach a category of machines what restraint is. The infrastructure beneath those machines was never built to know.
A brake is the admission a culture makes, usually late, that the thing it built to go is also the thing it has to stop. The brake is not in the engineering plans. The brake is what gets bolted on when the engineering plans collide with a person.
The Mycelial Protocol
What underground fungal networks already do, that the internet has never been built to understand
In a Douglas-fir stand in the southern interior of British Columbia, two seedlings are planted approximately a meter apart in a pot. The first is a Douglas-fir. The second is a ponderosa pine. The pot has been engineered with three soil compartments separated by mesh of three different aperture sizes:...
Transparency Fatigue
What happens to a population when the system for receiving everything outlives the sentiment for caring about anything
It is a Tuesday in the kind of late evening that has stopped being evening and become the soft early portion of the next day. The phone is on the bed. The thumb is moving without instruction. A child has been killed in a place whose name the thumb does...
The Human Page
Turning the page on the Human Transparency era.
A woman lies on her back on a CT scanner table. She is forty-three years old and was sent here because her primary care doctor felt something during a routine palpation: a small, vague firmness on the right side of her abdomen, just below the rib line. The order on...
Building the Ark
Is the reckoning coming?
There is a pattern that humans have run, in different soils and different centuries, every time they have built a single shared system to hold every kind of activity at once. The pattern terminates the same way. The system absorbs the cost of carrying everything. The cost compounds. The cost...
Internet Suburbs: Gated Zones in the Digital Megacity
The Open Internet as the Unregulated Urban Core
The open internet now functions as a vast, high-density megacity with minimal consistent zoning and sporadic enforcement. Its broad avenues still deliver unmatched discovery, viral creativity, and low-friction experimentation. Its side streets and alleys, however, host sophisticated scams, fraud farms, synthetic media, coordinated deception, and adaptive AI-driven operations at industrial...
The Gated Web
Infrastructure decay and the premium exit
Above eighteen thousand feet, the sky in the United States is Class A airspace. No aircraft enters it without clearance. Every pilot inside it is on an instrument flight plan, in two-way radio contact with a controller, transponding a discrete code that places the aircraft on a screen at a...
The Era of Transparency
When everyone can say anything, does that mean anything is true?
The most serious religious traditions in the West spent the better part of two thousand years organizing themselves around a single refusal. The name of the God of Israel was not pronounced aloud. After the Second Temple period, the four Hebrew letters — yod, heh, vav, heh — were written...
Ghost Rent:
The Annual Invoice for Users Who No Longer Exist
Enterprise SaaS waste is not a line item anyone chose to pay. It is the structural cost of infrastructure that cannot distinguish a user who will return from one who never will. The invoices arrive monthly. The ghosts accumulate annually. The architecture has no mechanism to stop billing for absence...
Dormant by Design:
Why Every Login Is a Liability When Absence Has No API
The exploit surface that vigilance cannot close Every credential ever issued to a person who stopped showing up is still, architecturally, an open invitation. Shadow accounts, orphaned OAuth tokens, passwords minted before modern security hygiene existed. The infrastructure does not know these doors are unguarded. It does not know the...
The Triggerless Internet
The internet was designed by people who assumed it would always have someone on the other end.
This is not a criticism. It is an observation about the conditions under which the foundational protocols were written. ARPANET connected machines that were on. TCP/IP assumed endpoints that would eventually respond. OAuth tokens expire on inactivity, but expiration is a cleanup function — a janitor arriving after the fact...
The Negative Space Problem: Why the Internet Has No Protocol for User Absence
Every protocol, every algorithm, every monetisation model assumes an active user. What happens architecturally when that assumption fails.
The internet is built entirely on presence signals. Every protocol assumes an active user. What happens architecturally when that assumption fails - and why no one has built the infrastructure to address it.