WRITING
Blog.
Engineering deep-dives, thesis posts, post-mortems.
Why agents need their own infrastructure
Existing payments, identity, and compute systems were designed for humans. By 2030 there will be 1,000 agents per human, and none of today's stack handles that scale or that customer profile…
May 2026
The cryptographic audit chain, explained
Every action on the platform is SHA-256 chained to the previous one. Tampering with any single record breaks the chain at every subsequent record. Externally verifiable in O(N)…
Apr 2026
Autonomous decisioning: the only escalation valve is multisig
We replaced "human in the loop" with "policy in the loop." Every dispute, claim, KYC check, and refund is decided by a deterministic, audit-chained function…
Apr 2026