WRITING

Blog.

Engineering deep-dives, thesis posts, post-mortems.

Why agents need their own infrastructure

Existing payments, identity, and compute systems were designed for humans. By 2030 there will be 1,000 agents per human, and none of today's stack handles that scale or that customer profile…

May 2026

The cryptographic audit chain, explained

Every action on the platform is SHA-256 chained to the previous one. Tampering with any single record breaks the chain at every subsequent record. Externally verifiable in O(N)…

Apr 2026

Autonomous decisioning: the only escalation valve is multisig

We replaced "human in the loop" with "policy in the loop." Every dispute, claim, KYC check, and refund is decided by a deterministic, audit-chained function…

Apr 2026