Articles
Identity After the Endpoint
A small group of engineers is building protocols for the one transition the internet has never been able to acknowledge. The civil registry has been doing the same work, on paper, for two thousand years.
The Alignment Philosophers
A small field is trying to teach a category of machines what restraint is. The infrastructure beneath those machines was never built to know.
A brake is the admission a culture makes, usually late, that the thing it built to go is also the thing it has to stop. The brake is not in the engineering plans. The brake is what gets bolted on when the engineering plans collide with a person.
Ghost Rent:
The Annual Invoice for Users Who No Longer Exist
Enterprise SaaS waste is not a line item anyone chose to pay. It is the structural cost of infrastructure that cannot distinguish a user who will return from one who never will. The invoices arrive monthly. The ghosts accumulate annually. The architecture has no mechanism to stop billing for absence...
Will AI Master Ethics Before Humans Do?
Three thousand years of moral philosophy. Three years of alignment research. One infrastructure that supports neither.
Imagine you are responsible for a system that two billion people use every day. On a Tuesday afternoon, someone tells you the system must now decide when to refuse. Not when to respond. When to stop. When to examine a request and determine that the correct output is nothing.
The Triggerless Internet
The internet was designed by people who assumed it would always have someone on the other end.
This is not a criticism. It is an observation about the conditions under which the foundational protocols were written. ARPANET connected machines that were on. TCP/IP assumed endpoints that would eventually respond. OAuth tokens expire on inactivity, but expiration is a cleanup function — a janitor arriving after the fact...
The Negative Space Problem: Why the Internet Has No Protocol for User Absence
Every protocol, every algorithm, every monetisation model assumes an active user. What happens architecturally when that assumption fails.
The internet is built entirely on presence signals. Every protocol assumes an active user. What happens architecturally when that assumption fails - and why no one has built the infrastructure to address it.