<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Rooted Insights]]></title><description><![CDATA[Approximate Certainty. Predictive Indeterminacy. Scientisticity.]]></description><link>https://blog.aji.sh</link><image><url>https://blog.aji.sh/img/substack.png</url><title>Rooted Insights</title><link>https://blog.aji.sh</link></image><generator>Substack</generator><lastBuildDate>Sat, 09 May 2026 11:39:43 GMT</lastBuildDate><atom:link href="https://blog.aji.sh/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Ajish]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[rootedinsights@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[rootedinsights@substack.com]]></itunes:email><itunes:name><![CDATA[Ajish]]></itunes:name></itunes:owner><itunes:author><![CDATA[Ajish]]></itunes:author><googleplay:owner><![CDATA[rootedinsights@substack.com]]></googleplay:owner><googleplay:email><![CDATA[rootedinsights@substack.com]]></googleplay:email><googleplay:author><![CDATA[Ajish]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Off the Beaten Patch]]></title><description><![CDATA[Mythos found 271 Firefox bugs. You&#8217;re still running Java 8.]]></description><link>https://blog.aji.sh/p/off-the-beaten-patch</link><guid isPermaLink="false">https://blog.aji.sh/p/off-the-beaten-patch</guid><dc:creator><![CDATA[Ajish]]></dc:creator><pubDate>Wed, 29 Apr 2026 10:53:49 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ThqJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4705922f-1803-4310-b663-434ab49ce25f_1536x1024.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<blockquote><p>A new class of threat has arrived, and the security industry &#8212; with its unerring instinct for the novel over the necessary &#8212; is looking in exactly the wrong direction. The industry is reacting to frontier models as if the breakthrough is vulnerability discovery. It is not. The breakthrough is autonomous exploitation of the vulnerabilities you already know about and haven&#8217;t fixed. The beaten patch &#8212; the tail of criticals, the KEVs, the headline zero-days &#8212; gets all the attention. Everything off it is where the risk actually lives. Glasswing is the butterfly. The vulnerability backlog is the hurricane. Your supply chain is out of sandbags.</p></blockquote><div><hr></div><p>In the past six months, autonomous AI systems have demonstrated the ability to take a CVE number as input and produce a working exploit as output, no human in the loop, no proof-of-concept code scraped from GitHub, no nation-state budget required. <a href="https://moak.ai/">MOAK</a> &#8212; built in a week by two engineers &#8212; did it in twenty-one minutes against a React-to-shell chain using public models and a twenty-dollar API key. <a href="https://labs.cloudsecurityalliance.org/research/csa-whitepaper-collapsing-exploit-window-ai-speed-vulnerabil/">CVE-Genie</a> reproduced 51% of all CVEs published in 2024 and 2025 at $2.77 each. <a href="https://hadrian.io/blog/the-ai-offensive-security-boom-seventy-tools-in-eighteen-months">CyberStrikeAI</a>, an open-source framework with ties to China&#8217;s MSS, confirmed attacks against over 600 devices across 55 countries within two months of its GitHub publication. The UK&#8217;s <a href="https://www.aisi.gov.uk/blog/our-evaluation-of-claude-mythos-previews-cyber-capabilities">AI Security Institute</a> tested Anthropic&#8217;s Mythos Preview against a 32-step enterprise network attack simulation &#8212; reconnaissance through full network takeover &#8212; and watched it complete the chain on three of ten attempts. No model had ever finished that range. AISI estimates the equivalent human effort at twenty hours.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ThqJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4705922f-1803-4310-b663-434ab49ce25f_1536x1024.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ThqJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4705922f-1803-4310-b663-434ab49ce25f_1536x1024.heic 424w, https://substackcdn.com/image/fetch/$s_!ThqJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4705922f-1803-4310-b663-434ab49ce25f_1536x1024.heic 848w, https://substackcdn.com/image/fetch/$s_!ThqJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4705922f-1803-4310-b663-434ab49ce25f_1536x1024.heic 1272w, https://substackcdn.com/image/fetch/$s_!ThqJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4705922f-1803-4310-b663-434ab49ce25f_1536x1024.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ThqJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4705922f-1803-4310-b663-434ab49ce25f_1536x1024.heic" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4705922f-1803-4310-b663-434ab49ce25f_1536x1024.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:353220,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.aji.sh/i/195852804?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4705922f-1803-4310-b663-434ab49ce25f_1536x1024.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ThqJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4705922f-1803-4310-b663-434ab49ce25f_1536x1024.heic 424w, https://substackcdn.com/image/fetch/$s_!ThqJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4705922f-1803-4310-b663-434ab49ce25f_1536x1024.heic 848w, https://substackcdn.com/image/fetch/$s_!ThqJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4705922f-1803-4310-b663-434ab49ce25f_1536x1024.heic 1272w, https://substackcdn.com/image/fetch/$s_!ThqJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4705922f-1803-4310-b663-434ab49ce25f_1536x1024.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>These are not variations on a theme. They are independent proof points converging on a single conclusion: the autonomous weaponization of <em>known</em> vulnerabilities is now a commodity capability. The models are public, the orchestration patterns are documented, and <a href="https://hadrian.io/blog/the-ai-offensive-security-boom-seventy-tools-in-eighteen-months">Hadrian has cataloged 70 open-source offensive AI tools</a> on the public internet as of March 2026 &#8212; fewer than five existed before GPT-4. That is the count on the open web. The dark web has its own parallel market of <a href="https://www.packetlabs.net/posts/hacking-tools-sold-dark-web/">jailbroken LLMs and autonomous exploit kits</a> &#8212; WormGPT, FraudGPT, Xanthorox, DIG AI &#8212; sold as subscription services, complete with documentation and customer support, that no one is cataloging. The mean time to exploit a disclosed vulnerability has <a href="https://strobes.co/blog/ai-accelerated-offense-cyberattack-security-program/">fallen to five days</a>.</p><div><hr></div><p>The industry is responding by scanning for <em>new</em> ones.</p><p>Anthropic&#8217;s <a href="https://www.anthropic.com/research/mythos">Mythos Preview</a> is a frontier model that both discovers new vulnerabilities and chains known ones into autonomous attack paths, offered through <a href="https://www.anthropic.com/research/project-glasswing">Project Glasswing</a> to select partners. Mozilla ran it against Firefox and <a href="https://blog.mozilla.org/en/privacy-security/ai-security-zero-day-vulnerabilities/">patched 271 vulnerabilities</a> in a single release. Palo Alto reported it accomplished the equivalent of a year&#8217;s pentesting in three weeks. Treasury Secretary Bessent took the meeting. The headlines wrote themselves.</p><p>They also wrote over the fine print. Of 271 findings, <a href="https://www.securityweek.com/claude-mythos-finds-271-firefox-vulnerabilities/">three earned CVEs</a>. The rest are defense-in-depth hardening, bugs in non-exploitable code paths, the kind of findings that improve quality but do not represent the offensive paradigm shift the coverage implies. Mozilla&#8217;s own assessment was notably measured: they hadn&#8217;t seen any bugs that a sufficiently elite human researcher couldn&#8217;t have found. AISI was blunter &#8212; on individual tasks, Mythos <a href="https://www.resultsense.com/news/2026-04-15-aisi-mythos-attack-chaining-evaluation/">broadly matches GPT-5.4 and Opus 4.6</a>; what distinguishes it is sustained multi-step chaining, not novel discovery.</p><div><hr></div><p>The industry is celebrating the discovery and ignoring the attack chaining &#8212; which is what actually matters for its risk posture. Worse: the attack chaining capability is not locked behind Glasswing. MOAK built its entire autonomous exploitation pipeline on generally available Opus 4.6 and GPT-5.4 &#8212; models anyone with an API key already has. The offensive capability is commodity. Mythos just made it visible. Meanwhile, Mythos and Glasswing will generate what MOAK&#8217;s own creators <a href="https://www.resilientcyber.io/p/the-industrialization-of-exploitation">predict</a> will be a two-year meteor shower of newly discovered CVEs as every partner surfaces decades of buried vulnerabilities across the open-source ecosystem. The industry&#8217;s vulnerability problem was never primarily a discovery problem. It is, and has always been, a remediation problem. And every vulnerability Mythos surfaces adds to the remediation backlog that its own attack chaining capability &#8212; and every commodity clone of it &#8212; can already exploit.</p><p>Anyone who has lived through the vulnerability management wars of the last twenty years has seen this movie. New scanner, bigger findings database, same unpatched systems. Mythos is the most sophisticated vulnerability discovery and attack chaining system ever built, and the organizational machinery it depends on hasn&#8217;t changed since Nessus.</p><p>We are very, very good at finding vulnerabilities. We are terrible at fixing them.</p><p>The numbers have been telling this story for years, but three of them are now dispositive. The average application generates <a href="https://www.pixee.ai/blog/security-backlog-remediation-plan">seventeen new vulnerabilities monthly</a> while security teams remediate six &#8212; the backlog grows by eleven per application every month before a single new CVE is published, and that was <em>before</em> Mythos. Even <em>weaponized</em>vulnerabilities, those with known active exploits that CISA has ordered federal agencies to remediate, are <a href="https://appsecsanta.com/research/software-vulnerability-statistics">patched only 57.7% of the time</a>. And <a href="https://securityboulevard.com/2026/03/46-vulnerability-statistics-2026-key-trends-in-discovery-exploitation-and-risk/">60% of breaches</a> involve vulnerabilities where a patch already existed.</p><p>The rest of the data confirms the scale: <a href="https://www.edgescan.com/the-vulnerability-backlog-crisis-why-45-of-enterprise-vulnerabilities-never-get-fixed/">45% of enterprise vulnerabilities</a> still unpatched after twelve months. A <a href="https://blog.qualys.com/qualys-insights/2026/04/20/enterprise-patch-remediation-benchmark-2026">mean time to remediate</a> complex enterprise applications of five months and ten days. NIST <a href="https://labs.cloudsecurityalliance.org/research/csa-whitepaper-collapsing-exploit-window-ai-speed-vulnerabil/">conceding</a> that comprehensive NVD coverage is no longer sustainable. The cataloging system is buckling. The remediation system buckled years ago, quietly, where nobody with budget authority was watching.</p><div><hr></div><p>That is the industry&#8217;s actual security posture &#8212; not the scanning dashboard, not the CVSS heatmap, but the fraction of what gets found that actually gets fixed.</p><p>If you want to see what the backlog actually looks like, look at the runtime.</p><p><a href="https://www.infoq.com/news/2024/05/new-relic-java-2024/">Nearly a third</a> of production Java applications still run on <a href="https://www.oracle.com/java/technologies/java-se-support-roadmap.html">Java 8</a> &#8212; a runtime released in March 2014 whose public updates ended in 2019 and whose Premier Support ended in 2022. <a href="https://www.azul.com/newsroom/azul-2025-state-of-java-survey-report/">Forty-nine percent of companies</a> still carry Log4j vulnerabilities in production three years after discovery. <a href="https://www.javacodegeeks.com/2026/03/the-jdk-release-cadence-turns-10-did-six-month-releases-actually-speed-up-java.html">Nineteen percent</a> are still running Java 6 or 7. These are not failures of awareness. They are failures of organizational capacity to act on what everyone already knows. Libraries are dropping Java 8 support. The patched version of the dependency requires Java 11+ or 17+ APIs. You cannot apply the fix without migrating the runtime, cannot migrate the runtime without rewriting, retesting, and recertifying the application, and cannot do any of that without funding a multi-year capital project that competes for budget against generative AI, agentic platforms, and every other initiative that actually gets an executive sponsor. The change advisory board does not fund capital projects. The vulnerability accrues interest.</p><p>The sectors where this debt concentrates most dangerously &#8212; financial services, healthcare, energy, government &#8212; have different causes for the same effects. Financial institutions have the money but operational risk governance that can turn a fourteen-day remediation directive into a six-month change management exercise. Healthcare has neither the money nor mature security programs. Energy has OT/IT convergence problems that are fundamentally different from application-layer patching. Government has procurement cycles measured in geological time. Different etiology. Same pathology. <a href="https://softjourn.com/insights/core-banking-modernization-in-5-steps">Forty-three percent of financial institutions</a> still operate core systems developed over twenty years ago.</p><p>And the familiar objection &#8212; that these institutions invest in compensating controls like microsegmentation, EDR, and network isolation &#8212; does not survive contact with the threat model. Segmentation across a hybrid multi-cloud estate with thousands of applications and undocumented dependencies is a decades-long project that stalls at &#8220;crown jewels&#8221;. RASP was dead on arrival. ADR has promise but does not yet cover the heterogeneous application estates where the debt lives. EDR was not designed to stop an attack directed at the application layer. The agentic exploitation tools don&#8217;t care about your network segmentation if they&#8217;re inside the application.</p><p>The patch exists. The scanner found the downstream CVE. The ticket is in ServiceNow. And the remediation path runs through a platform migration that hasn&#8217;t been funded, a QA environment that doesn&#8217;t exist, an application owner who won&#8217;t schedule the downtime, and a change advisory board that meets monthly while the binding operational directive requires remediation in fourteen days. The vulnerability sits in the backlog, waiting, until an autonomous agent walks in and exploits it before the next change board meets &#8212; at a bank, at a hospital, at a utility, at an agency.</p><p>And this is the part the industry needs to reckon with honestly: we have seen this cycle before. Mainframes became legacy, so enterprises invested billions migrating to Java. Congratulatory backslapping. Transformation complete. And now Java is the legacy, the platform everybody knows is unsupported and nobody can migrate off of, and the next wave of investment &#8212; cloud-native, Kubernetes, serverless &#8212; is already accumulating the technical debt that will be the subject of someone else&#8217;s blog post in 2038. The structural problem is not any particular runtime. It is the organizational incapacity to maintain the thing you built after the building was celebrated and the builders moved on.</p><div><hr></div><p>Technology failures are downstream of governance failures. The industry is funding AI-powered discovery &#8212; novel, publishable, fundable, the kind of work that earns a conference keynote. It is not funding remediation, which is invisible, expensive, unglamorous, and requires governance authority the security organization has never possessed and shows no signs of obtaining. The incentive structure rewards finding the zero-day in Firefox and ignores the two-year-old KEV on the payment system running Java 8, the patient records system pinned to an unsupported runtime, the SCADA integration that hasn&#8217;t been touched since the developer who understood it retired five years ago. The frontier model finds the novel vulnerability. The twenty-dollar API key exploits the one everyone already knew about, on the runtime everyone already knew was unsupported, at the institution whose failure would be systemic.</p><p>The shape of the solution has to match the shape of the garbage pile, and every institution&#8217;s garbage pile is its own special achievement. But the axes of intervention are knowable:</p><ul><li><p><strong>Technology simplification</strong> and consolidation to shrink the maintenance surface &#8212; every unconsolidated acquisition and unretired platform is attack surface you are paying to defend and failing to patch</p></li><li><p><strong>Runtime</strong> <strong>modernization</strong> as risk reduction, not &#8220;tech debt&#8221; where it goes to die</p></li><li><p><strong>Dependency migration</strong> as capital work, not ticket hygiene</p></li><li><p><strong>Exploitability validation</strong> against what the business actually runs, not CVSS scores nobody downstream can act on</p></li><li><p><strong>Patching in the SDLC</strong> deployment pipeline, not on the change board calendar</p></li><li><p><strong>Supply chain engineering</strong> that rebuilds from source and routes around the registry poisoning and dependency rot that scanners catch after the fact</p></li><li><p><strong>Adversarial testing</strong> baked into the CI/CD so that the build fails if the vulnerability ships</p></li><li><p><strong>Security with authority</strong> to force the fix or force an executive to sign for the risk</p></li></ul><p>None of this is a product you buy. All of it is operational discipline you build, customized to whatever particular archaeology of technical and organizational debt you&#8217;ve accumulated.</p><p><strong>Without it, the forecast writes itself.</strong></p><p><em>We will burn millions on tokens scanning for glamorous new vulnerabilities with every AI lab and every cyber vendor while the known CVEs pile up behind us, unfixed. And the agents &#8212; plural now, a growing and increasingly capable class &#8212; will walk in through every one of them, at the institutions where the SLA parlour tricks and glowing green dashboards tell us we are safe.</em></p>]]></content:encoded></item><item><title><![CDATA[A Prepper's Guide to Q Day]]></title><description><![CDATA[Why Nation-States Won't Wait for a Quantum Computer When Your Offshore Contractor Has Domain Admin]]></description><link>https://blog.aji.sh/p/a-preppers-guide-to-q-day</link><guid isPermaLink="false">https://blog.aji.sh/p/a-preppers-guide-to-q-day</guid><dc:creator><![CDATA[Ajish]]></dc:creator><pubDate>Tue, 10 Mar 2026 20:29:30 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!oOIo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09e93674-f2d3-4667-9614-2a703ecca132_2816x1536.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Current quantum computers: <a href="https://www.caltech.edu/about/news/caltech-team-sets-record-with-6100-qubit-array">~6,100 physical qubits</a>. Breaking RSA-2048: estimates have dropped from <a href="https://arxiv.org/pdf/1905.09749">~20 million physical qubits</a> (2019) to <a href="https://arxiv.org/abs/2505.15917">under a million</a> (2025) to <a href="https://arxiv.org/abs/2602.11457">under 100,000</a> using QLDPC architectures (2026) &#8212; though the last result assumes hardware parameters nobody has demonstrated at scale and a real-time decoder nobody has built. The gap has narrowed from four orders of magnitude to roughly two, and it is narrowing faster than the comfortable estimates assumed.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!oOIo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09e93674-f2d3-4667-9614-2a703ecca132_2816x1536.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!oOIo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09e93674-f2d3-4667-9614-2a703ecca132_2816x1536.heic 424w, https://substackcdn.com/image/fetch/$s_!oOIo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09e93674-f2d3-4667-9614-2a703ecca132_2816x1536.heic 848w, https://substackcdn.com/image/fetch/$s_!oOIo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09e93674-f2d3-4667-9614-2a703ecca132_2816x1536.heic 1272w, https://substackcdn.com/image/fetch/$s_!oOIo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09e93674-f2d3-4667-9614-2a703ecca132_2816x1536.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!oOIo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09e93674-f2d3-4667-9614-2a703ecca132_2816x1536.heic" width="1456" height="794" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/09e93674-f2d3-4667-9614-2a703ecca132_2816x1536.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:794,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1186381,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.aji.sh/i/190549070?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09e93674-f2d3-4667-9614-2a703ecca132_2816x1536.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!oOIo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09e93674-f2d3-4667-9614-2a703ecca132_2816x1536.heic 424w, https://substackcdn.com/image/fetch/$s_!oOIo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09e93674-f2d3-4667-9614-2a703ecca132_2816x1536.heic 848w, https://substackcdn.com/image/fetch/$s_!oOIo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09e93674-f2d3-4667-9614-2a703ecca132_2816x1536.heic 1272w, https://substackcdn.com/image/fetch/$s_!oOIo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09e93674-f2d3-4667-9614-2a703ecca132_2816x1536.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><a href="https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards">NIST published the post-quantum standards</a> in August 2024 &#8212; FIPS 203, 204, 205 &#8212; and an entire advisory industry has materialized to sell multi-year migration programs for estates that cannot be inventoried, using keys that cannot be located, on systems nobody knows they own. Before we go further: PQC is not quantum computing. Quantum computing is an emerging technology with standard adoption gates. PQC is the next iteration of the same cryptographic modernization that moved the enterprise from DES to AES, SHA-1 to SHA-256, TLS 1.0 to 1.3 &#8212; operational plumbing, not a speculative technology bet. The algorithms are standardized; the migration belongs in the CISO&#8217;s portfolio, not an emerging technology incubator.</p><div><hr></div><h2><strong>The Test Nobody Applies</strong></h2><p>The PQC sales cycle runs on a single premise: adversaries are harvesting your encrypted traffic and will decrypt it when quantum computers mature. The premise is correct. The conclusion &#8212; that everything needs to migrate immediately and uniformly &#8212; does not follow, because it skips a triage step the discourse never performs.</p><p><em>Data is genuinely HNDL-susceptible only at the intersection of three conditions: it retains long-lived value, <strong>and</strong> it can only be obtained in encrypted form, <strong>and</strong> it is worth quantum decryption when cheaper access paths exist.</em> Each conjunction shrinks the true exposure. Most enterprise data fails at least one. A retail payment transaction fails the first: its value decays in months. An internal database fails the second: the adversary reaches it through an overprivileged service account. A classified weapons design with air-gapped key custody passes all three &#8212; and belongs on a compressed PQC timeline today.</p><p>Everything that follows applies this test.</p><h2><strong>Confidentiality in Transit</strong></h2><p>This is the bulk &#8220;nation-states are harvesting your TLS traffic&#8221; narrative that drives most PQC urgency. Signature ecosystems, data-at-rest, and crypto-native forgery are different failure modes with different timelines; they appear under exceptions below.</p><p>&#8220;Harvest Now, Decrypt Later&#8221; is a real threat model and deserves to be engaged at its strongest. HNDL is passive collection: a nation-state on a border gateway or cable landing station takes zero risk, leaves no logs, triggers no alerts. The patient archive what they intercept.</p><p>Conceded. Now apply the test.</p><p>Without forward secrecy &#8212; <a href="https://datatracker.ietf.org/doc/html/rfc5246#section-7.4.7">TLS 1.2 with static RSA key exchange</a> &#8212; the adversary breaks the server&#8217;s private key once and decrypts every session that ever used that certificate. With forward secrecy (<a href="https://datatracker.ietf.org/doc/html/rfc8446">TLS 1.3</a> / ECDHE), each session requires an independent quantum computation. The difference between those two scenarios is the difference between an expensive program and a non-credible one. The attacker-side cost model is in the companion piece, <em><a href="https://blog.aji.sh/p/a-quantum-of-solace">A Quantum of Solace</a></em>.</p><p><em>Enforcing <a href="https://datatracker.ietf.org/doc/html/rfc8446#section-1.2">forward secrecy</a> on all TLS endpoints is the single highest-impact HNDL mitigation for data in transit that requires zero post-quantum cryptography.</em> It converts &#8220;break one key, decrypt everything&#8221; to &#8220;break one key per session.&#8221; Technically simple, operationally hard: a cipher suite policy change that becomes a migration program in heterogeneous estates.</p><p>But &#8220;per session&#8221; is less airtight than it sounds, and this is the part the conference keynotes skip. TLS 1.3&#8217;s <a href="https://datatracker.ietf.org/doc/html/rfc8446#section-4.6.3">KeyUpdate</a> provides zero additional quantum resistance &#8212; it derives each new secret from its predecessor with no fresh randomness, so breaking the initial handshake exposes every subsequent epoch. PSK resumption is worse: one ECDHE break cascades through the entire resumption chain, including 0-RTT early data, until the ticket key rotates or a fresh exchange is forced. Default ticket lifetime in most implementations: 24 hours of resumed sessions exposed by one break. <a href="https://arxiv.org/abs/2603.01091">Blanco-Romero et al. (2026)</a> validated this experimentally. And <a href="https://eprint.iacr.org/2026/280">breaking P-256 ECDLP now requires fewer logical qubits than breaking RSA-2048</a> &#8212; 1,098 versus 1,409. The scaling law holds, but the vendor pitch is anchored to the wrong number.</p><p>These caveats make selective attacks against specific corridors more valuable. They do not resurrect bulk feasibility across high-volume endpoints. The bulk economics remain prohibitive: with forward secrecy properly enforced and PSK chains bounded, the adversary faces hundreds of millions of independent quantum computations per day of harvested wire data. You cannot rack-mount a quantum processor any more than you can rack-mount a tokamak. The adversary is searching Borges&#8217; Library of Babel for one coherent book, except each volume requires its own run of Shor&#8217;s algorithm at near absolute zero, and most contain nothing of value.</p><p>Most harvested financial traffic also fails the first condition of the test: transactions, trading activity, and counterparty relationships have limited shelf life. A twenty-year-old wire transfer record is not actionable intelligence; it is an archive.</p><h2><strong>The Door Without a Lock</strong></h2><p>Most enterprise data fails the second condition: it can be obtained without breaking the encryption at all. The adversary who can obtain cleartext through an identity path has no reason to assault the cryptographic wall &#8212; and the identity paths are numerous, cheap, and available today. The offshore contractor with production access in a jurisdiction where intelligence services operate with legal impunity. The overprivileged service account nobody audits. The service desk that will reset a password over the phone. The SQL injection that never required credentials in the first place. In every case, the cryptographic layer is never engaged; PQC is irrelevant because the encryption was never the barrier.</p><p>For encrypted data at rest &#8212; backups, cloud snapshots &#8212; apply the test again. It only qualifies as genuinely encrypted if key custody is segregated from data access; when the adversary can reach the decryption keys through overpermissioned KMS policies, the encryption is decorative and the decryption is classical. Kerckhoffs has been teaching this lesson since 1883: the security of the system is the security of the key management, and key management is an identity problem before it is a cryptographic one. Where DAR encryption <em>does</em> pass all three conditions &#8212; genuinely segregated key custody, long-lived value, no cheaper access path &#8212; it belongs in the exception class below.</p><h2><strong>What Passes the Test</strong></h2><p>Three categories survive the conjunction and deserve compressed PQC timelines independent of everything else.</p><p><em><strong>Long-horizon secrecy data</strong></em> &#8212; state secrets, genomic data, critical infrastructure designs &#8212; retains extreme value well beyond any projected quantum timeline. Not every asset warrants the same protection, but the assets that do need to be identified and triaged rather than subsumed into a uniform program that treats a retail banking app and a classified weapons design as posing equivalent HNDL risk.</p><p><em><strong>Cryptographic-native systems</strong></em> &#8212; blockchain platforms, tokenized asset infrastructure, smart contracts, and identity signing infrastructure (PKI, SAML, code signing) &#8212; where cryptography is not defense-in-depth but the operational substrate. Breaking ECDSA here does not reveal a secret; it enables forgery &#8212; unauthorized transfers, fabricated contract executions, systemic trust collapse. The threat model is not &#8220;harvest now, decrypt later&#8221; but &#8220;forge at will,&#8221; and the cryptographic choices are embedded in consensus mechanisms and contract logic that may be immutable by design. For institutions building or investing in DLT infrastructure today, PQC is an architectural design constraint at inception &#8212; every month of deployment deepens the debt.</p><p><em><strong>Hardware-embedded cryptography</strong></em> &#8212; HSMs, satellite systems, embedded controllers with 15&#8211;20 year deployment cycles &#8212; cannot wait for software-layer maturity. Migration planning starts immediately, informed by the inventory.</p><h2><strong>Ride the Budget Line</strong></h2><p>Mandates and examiner pressure exist across major jurisdictions. CISOs cannot tell regulators they are deferring PQC to fix identity governance.</p><p>But foundational security has failed to secure adequate budgets for decades because it lacks a hard external catalyst, and PQC mandates provide precisely that leverage. Cryptographic inventory, asset discovery, and identity governance <em>are</em> PQC readiness &#8212; not rebranded IT hygiene, but the only substrate that makes algorithm migration executable. The enterprise that knows what it has, who owns it, and whether it can change it has a deployment problem. The enterprise that doesn&#8217;t, has a discovery problem wearing a compliance deadline.</p><div><hr></div><h2><strong>The Playbook</strong></h2><p>Exception classes run on compressed timelines independent of this sequence.</p><p><strong>Immediate &#8212; enforce and harden forward secrecy.</strong> Kill static RSA key exchange. Harden TLS 1.3 configuration so it actually delivers session independence: disable 0-RTT, force fresh key exchange on resumption, rotate ticket keys aggressively. Deploy hybrid PQC where centralized TLS termination already exists &#8212; coverage stops where centralization stops.</p><p><strong>Immediate &#8212; build the crypto control plane.</strong> Cryptographic inventory, key custody standardization, CBOM embedded in the build pipeline so the inventory problem stops growing while legacy enumeration proceeds. Consolidate external services behind API gateways. Re-encrypt edge to origin. Map vendor dependencies &#8212; fixed crypto stacks are the migration blockers, and some will never migrate.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!igXG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f0c75fa-357d-423e-a84c-bd35a03208a3_2816x1536.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!igXG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f0c75fa-357d-423e-a84c-bd35a03208a3_2816x1536.heic 424w, https://substackcdn.com/image/fetch/$s_!igXG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f0c75fa-357d-423e-a84c-bd35a03208a3_2816x1536.heic 848w, https://substackcdn.com/image/fetch/$s_!igXG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f0c75fa-357d-423e-a84c-bd35a03208a3_2816x1536.heic 1272w, https://substackcdn.com/image/fetch/$s_!igXG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f0c75fa-357d-423e-a84c-bd35a03208a3_2816x1536.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!igXG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f0c75fa-357d-423e-a84c-bd35a03208a3_2816x1536.heic" width="1456" height="794" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2f0c75fa-357d-423e-a84c-bd35a03208a3_2816x1536.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:794,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:903645,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.aji.sh/i/190549070?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f0c75fa-357d-423e-a84c-bd35a03208a3_2816x1536.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!igXG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f0c75fa-357d-423e-a84c-bd35a03208a3_2816x1536.heic 424w, https://substackcdn.com/image/fetch/$s_!igXG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f0c75fa-357d-423e-a84c-bd35a03208a3_2816x1536.heic 848w, https://substackcdn.com/image/fetch/$s_!igXG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f0c75fa-357d-423e-a84c-bd35a03208a3_2816x1536.heic 1272w, https://substackcdn.com/image/fetch/$s_!igXG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f0c75fa-357d-423e-a84c-bd35a03208a3_2816x1536.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>When you can answer the conjunction test for your own estate &#8212; algorithm migration at scale.</strong> Full internal PQC rollout, application-level library remediation, legacy system modernization. This is where the budget pressure lives and where the vendor pitch starts. It proceeds when the enterprise can demonstrate that it knows what it has, who owns it, and how to change it &#8212; not perfection, but demonstrated trajectory and capability. Without that substrate, algorithm migration is a roadmap that assumes infrastructure it doesn&#8217;t have.</p><div><hr></div><p><em>The conjunction test is the triage tool the PQC discourse doesn&#8217;t use. Apply it to your own estate: what retains long-lived value, can only be obtained encrypted, and is worth quantum decryption when cheaper paths exist? That intersection is your actual HNDL exposure. Everything outside it is a priority conversation about operational maturity, not a quantum emergency. Fund the substrate. Accelerate the exceptions. The algorithm migration follows.</em></p><p><em>For the full attacker-side economics &#8212; including what happens when a fictional intelligence agency runs the HNDL business case and discovers the throughput bottleneck that kills the program &#8212; see <a href="https://blog.aji.sh/p/a-quantum-of-solace">A Quantum of Solace: How I Learned to Stop Worrying and Love the CBOM</a>.</em></p>]]></content:encoded></item><item><title><![CDATA[A Quantum of Solace]]></title><description><![CDATA[Or: How I Learned to Stop Worrying and Love the CBOM]]></description><link>https://blog.aji.sh/p/a-quantum-of-solace</link><guid isPermaLink="false">https://blog.aji.sh/p/a-quantum-of-solace</guid><dc:creator><![CDATA[Ajish]]></dc:creator><pubDate>Tue, 10 Mar 2026 13:44:42 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Ue36!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b9e1872-db9a-4b3e-93be-1c3f6c7a4b01_2816x1536.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Nobody selling PQC readiness has run the HNDL business case from the adversary&#8217;s budget office. What follows is the exercise the industry skipped: the funding request it would have to be, from a fictional signals intelligence directorate targeting global financial infrastructure. The scope is bulk confidentiality-in-transit; signature ecosystems, data-at-rest, and long-lived artifacts are separate problem classes addressed in the <a href="https://blog.aji.sh/p/a-preppers-guide-to-q-day">companion piece</a>. The math is real. The sources are cited. The bureaucratic infighting is extrapolated from universal principles.</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ue36!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b9e1872-db9a-4b3e-93be-1c3f6c7a4b01_2816x1536.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ue36!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b9e1872-db9a-4b3e-93be-1c3f6c7a4b01_2816x1536.heic 424w, https://substackcdn.com/image/fetch/$s_!Ue36!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b9e1872-db9a-4b3e-93be-1c3f6c7a4b01_2816x1536.heic 848w, https://substackcdn.com/image/fetch/$s_!Ue36!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b9e1872-db9a-4b3e-93be-1c3f6c7a4b01_2816x1536.heic 1272w, https://substackcdn.com/image/fetch/$s_!Ue36!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b9e1872-db9a-4b3e-93be-1c3f6c7a4b01_2816x1536.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ue36!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b9e1872-db9a-4b3e-93be-1c3f6c7a4b01_2816x1536.heic" width="1456" height="794" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7b9e1872-db9a-4b3e-93be-1c3f6c7a4b01_2816x1536.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:794,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1168832,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.aji.sh/i/190494718?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b9e1872-db9a-4b3e-93be-1c3f6c7a4b01_2816x1536.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Ue36!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b9e1872-db9a-4b3e-93be-1c3f6c7a4b01_2816x1536.heic 424w, https://substackcdn.com/image/fetch/$s_!Ue36!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b9e1872-db9a-4b3e-93be-1c3f6c7a4b01_2816x1536.heic 848w, https://substackcdn.com/image/fetch/$s_!Ue36!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b9e1872-db9a-4b3e-93be-1c3f6c7a4b01_2816x1536.heic 1272w, https://substackcdn.com/image/fetch/$s_!Ue36!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b9e1872-db9a-4b3e-93be-1c3f6c7a4b01_2816x1536.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p><strong>MINISTRY OF STATE SECURITY &#8212; SIGNALS INTELLIGENCE DIRECTORATE</strong></p><p><strong>CLASSIFICATION: DRAGON JADE / COMPARTMENTED</strong></p><p><strong>MEMORANDUM FOR:</strong> Standing Committee on Intelligence Resource Allocation</p><p><strong>FROM:</strong> Deputy Director, Long-Horizon Signals Collection (Unit 4128)</p><p><strong>RE:</strong> Project GLASS CATHEDRAL &#8212; Harvest Now, Decrypt Later Infrastructure Investment</p><div><hr></div><p>Unit 4128 requests approval for GLASS CATHEDRAL: a passive signals collection program targeting financial infrastructure, with decryption upon availability of a cryptographically relevant quantum computer (CRQC). Requested funding: $300M&#8211;$500M for collection infrastructure, plus $500M&#8211;$5B for quantum decryption. Division 3 (Human Intelligence) has submitted a competing proposal for $54M. Much of the collection infrastructure described here already exists within the Ministry under other directorates.</p><p>The HNDL narrative, as articulated by the enterprise security industry, is notable for what it declines to specify. &#8220;Nation-states are harvesting your encrypted traffic&#8221; &#8212; but through what infrastructure, at what cost, with what coverage? The industry treats collection as an assumed given and proceeds directly to quantum timelines, because specifying a collection architecture invites the analysis that follows. Unit 4128 will now do the work the vendors prefer to leave as an exercise for the reader.</p><p><strong>Collection.</strong> Most collection is nearly free &#8212; sovereign border gateways, allied nation access, geographic chokepoints.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> Even with all available tiers operational, the aperture captures only cross-border traffic &#8212; SWIFT, correspondent banking, market data feeds, offshore branch communications. The fraction containing the most sensitive material &#8212; trading strategies, risk models, board deliberations &#8212; largely does not traverse externally observable paths. Storage is trivial: $8&#8211;15M over twenty years.</p><p><strong>Decryption.</strong> Estimates for breaking RSA-2048 have improved from <a href="https://arxiv.org/pdf/1905.09749">~20M physical qubits</a> to <a href="https://arxiv.org/pdf/2602.11457">under 100K</a> using QLDPC architectures &#8212; but 100K qubits factors one key per month. Practical throughput &#8212; roughly three key-breaks per day &#8212; requires approximately one million qubits.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a>2 The Committee should attend not to the qubit count but to the throughput.</p><p><strong>The forward secrecy cliff.</strong> Without forward secrecy (static RSA), three keys per day against 1,000&#8211;50,000 server certificates takes one to forty-six years. Expensive, slow, but conceivable. With forward secrecy (TLS 1.3 / ECDHE), each session requires an independent quantum computation. One day of wire data: 913,000 CRQC-years. Selective collection reduces volume; it does not change the unit cost &#8212; where forward secrecy is enforced, each session requires its own computation whether collected selectively or in bulk.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a></p><p><strong>Risk factors.</strong> If CRQC arrives later or at higher cost, the archive accrues storage cost with no return &#8212; in venture capital terminology, a &#8220;pre-revenue phase&#8221; of unlimited duration. Financial transactions have limited shelf life; a twenty-year-old wire transfer record reveals that Bank A paid Bank B $47M on a Tuesday in 2025. The strategic value of this in 2045 is, with great respect to the Committee, not self-evident. Division 3 notes that their assets can tell us <em>why</em> the wire was sent, <em>who</em> approved it, and <em>what it means</em> &#8212; this Thursday. Meanwhile, <a href="https://datatracker.ietf.org/doc/html/rfc8446">TLS 1.3</a> mandates forward secrecy; every endpoint that migrates moves from Scenario A to Scenario B. We are betting the global banking sector will fail to complete a configuration change for which the standards have existed since 2018. This is perhaps the most defensible assumption in the entire proposal.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-4" href="#footnote-4" target="_self">4</a></p><p><strong>The alternative.</strong> Division 3&#8217;s Project WARM HANDSHAKE: four recruited insiders, <strong>$40M over twenty years</strong>. Continuous, curated, targeted intelligence with no latency and no dependence on a machine that does not exist. Meanwhile, <a href="https://www.rapid7.com/lp/initial-access-brokers-report/">initial access brokers</a> sell Domain Admin for $500&#8211;$50K &#8212; <a href="https://www.bankinfosecurity.com/initial-access-brokers-credential-glut-weakening-prices-a-16387">falling by half</a> every five years.</p><p><strong>The recursive dependency.</strong> Bulk collection is indiscriminate &#8212; making the archive tractable requires targeting selectors not available from external observation. The capability that makes the archive searchable is the same capability Division 3 provides, at which point the archive is redundant. We acknowledge that &#8220;comprehensive record of undifferentiated encrypted traffic, decryptable at a cost exceeding most national GDPs, from sessions whose plaintext could have been obtained by asking Gerald in Network Operations&#8221; is a difficult sentence to put in a funding request.</p><p><strong>Recommendation.</strong> Unit 4128 recommends that the Committee fund GLASS CATHEDRAL at the requested level, because it is our job to present collection options for Committee decision. The Committee should fund whatever it considers most appropriate.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-5" href="#footnote-5" target="_self">5</a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!aCjb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4c4c007-092d-4e15-9130-ac3dbc6211cf_2810x1100.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aCjb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4c4c007-092d-4e15-9130-ac3dbc6211cf_2810x1100.heic 424w, https://substackcdn.com/image/fetch/$s_!aCjb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4c4c007-092d-4e15-9130-ac3dbc6211cf_2810x1100.heic 848w, https://substackcdn.com/image/fetch/$s_!aCjb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4c4c007-092d-4e15-9130-ac3dbc6211cf_2810x1100.heic 1272w, https://substackcdn.com/image/fetch/$s_!aCjb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4c4c007-092d-4e15-9130-ac3dbc6211cf_2810x1100.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aCjb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4c4c007-092d-4e15-9130-ac3dbc6211cf_2810x1100.heic" width="1456" height="570" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b4c4c007-092d-4e15-9130-ac3dbc6211cf_2810x1100.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:570,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:861723,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.aji.sh/i/190494718?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4c4c007-092d-4e15-9130-ac3dbc6211cf_2810x1100.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!aCjb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4c4c007-092d-4e15-9130-ac3dbc6211cf_2810x1100.heic 424w, https://substackcdn.com/image/fetch/$s_!aCjb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4c4c007-092d-4e15-9130-ac3dbc6211cf_2810x1100.heic 848w, https://substackcdn.com/image/fetch/$s_!aCjb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4c4c007-092d-4e15-9130-ac3dbc6211cf_2810x1100.heic 1272w, https://substackcdn.com/image/fetch/$s_!aCjb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4c4c007-092d-4e15-9130-ac3dbc6211cf_2810x1100.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p><strong>STANDING COMMITTEE ON INTELLIGENCE RESOURCE ALLOCATION &#8212; OFFICE OF THE CHAIRMAN</strong></p><p><strong>RE:</strong> Project GLASS CATHEDRAL &#8212; Disposition</p><div><hr></div><p>We will stipulate Unit 4128&#8217;s most optimistic projections. We accept the QLDPC qubit threshold, the cost range, the 2030s timeline. We are generous on precisely the question the enterprise security industry considers most important: <em>when will the machine exist?</em></p><p>It does not help.</p><p>Three key-breaks per day. Forty-six years for the certificate inventory. The intelligence produced &#8212; decrypted financial transactions from the 2020s, available in the 2080s &#8212; is of a vintage the Bureau of Historical Intelligence Assessment has declined to characterize. Under forward secrecy, one day of wire data requires 913,000 years on a single machine. A fleet of a thousand CRQCs &#8212; $500B&#8211;$5T &#8212; processes one day in 913 years. The Committee does not typically fund programs with a time-to-intelligence measured in centuries.</p><p>We note, for context, that a significant equity position in the target institution costs less than a single CRQC and yields complete, real-time access to everything GLASS CATHEDRAL promises to deliver in 2080. We mention this not as a proposal but as a unit of measurement. Division 3 delivers equivalent intelligence on Thursday.</p><p><strong>GLASS CATHEDRAL is declined.</strong> The cost analysis was acceptable. The throughput analysis was not.</p><p><strong>WARM HANDSHAKE is approved.</strong> $54 million.</p><p>The Committee prefers a simpler formulation than the Bureau of Logical Consistency&#8217;s &#8220;recursive dependency&#8221;: GLASS CATHEDRAL requires Division 3&#8217;s cooperation to succeed, and Division 3&#8217;s cooperation makes GLASS CATHEDRAL redundant. We are informed that in software engineering this is called a &#8220;circular dependency.&#8221; We are informed that it is not a compliment. The Committee trusts that the next submission will not depend on Gerald in Network Operations for its operational feasibility.</p><p>The Committee has approved a one-time allocation for Unit 4128&#8217;s holiday party to be held at a venue other than the Building 9 cafeteria. This should not be interpreted as a consolation. It is a consolation.</p><div><hr></div><p><em>GLASS CATHEDRAL is fiction. The math is not. Every quantum projection uses the most optimistic credible scenario and should be read as lower bounds. Argue the figures if you like; the scaling law is what kills the program &#8212; forward secrecy converts &#8220;break one key per server&#8221; to &#8220;break one key per session,&#8221; and absent protocol collapse into shared secrets (PSK resumption, ticket key compromise, endpoint leakage), no improvement in quantum hardware changes that scaling. The operational playbook is in <a href="https://blog.aji.sh/p/a-preppers-guide-to-q-day">A Prepper&#8217;s Guide to Q Day</a>. But none of it functions without a complete cryptographic bill of materials. You can&#8217;t rotate what you can&#8217;t find. The CBOM is the unglamorous deliverable that makes everything else possible. Learn to love it.</em></p><p><em>The adversary funds both paths: identity for speed, harvest for durability. Collection is cheap and the archive is cheap &#8212; the question is whether the option exercises at scale against modern FS endpoints before the intelligence decays. The identity path costs $2,700 and arrives on Thursday. The harvest path costs billions, processes three keys per day, and works only against endpoints that failed to enforce a configuration change standardized in 2018. Fund accordingly.</em></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>We are informed that the international press refers to cooperative lawful intercept infrastructure as &#8220;surveillance concerns.&#8221; We refer to it as &#8220;existing collection capability requiring no new appropriation.&#8221;</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>The most aggressive qubit estimate (<a href="https://arxiv.org/pdf/2602.11457">Webster et al., 2026</a>) comes from a quantum computing startup, assumes undemonstrated hardware parameters, and defers the decoder problem. We cite it because our mandate is to present the most optimistic credible scenario.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-3" href="#footnote-anchor-3" class="footnote-number" contenteditable="false" target="_self">3</a><div class="footnote-content"><p>The billion-session figure represents total GSIB traffic volume; our cross-border collection aperture captures an estimated 5&#8211;15% of this. The analysis uses the full volume as the upper bound &#8212; at the actual fraction, these figures reduce by roughly an order of magnitude without changing the conclusion. For experimental validation of the per-session cost model across TLS 1.2, TLS 1.3, QUIC, and SSH, see <a href="https://arxiv.org/abs/2603.01091">Blanco-Romero et al., 2026</a>. TLS 1.3 PSK resumption creates chain dependencies that further reduce the effective independent computations.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-4" href="#footnote-anchor-4" class="footnote-number" contenteditable="false" target="_self">4</a><div class="footnote-content"><p>The enterprise security industry&#8217;s track record on timely configuration changes is reassuring. See: SHA-1 deprecation (7 years), TLS 1.0 deprecation (ongoing, 16+ years), IPv6 adoption (ongoing, 26 years). Unit 4128 considers this the strongest pillar of the GLASS CATHEDRAL business case.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-5" href="#footnote-anchor-5" class="footnote-number" contenteditable="false" target="_self">5</a><div class="footnote-content"><p>Unit 4128&#8217;s annual holiday party has been held at the cafeteria in Building 9 for eleven consecutive years. Division 3 held theirs last year at [REDACTED]. We mention this only for context.</p></div></div>]]></content:encoded></item><item><title><![CDATA[SaaSpocalypse How, Redux]]></title><description><![CDATA[Due Diligence for the Service-as-Software Era]]></description><link>https://blog.aji.sh/p/saaspocalypse-how-redux</link><guid isPermaLink="false">https://blog.aji.sh/p/saaspocalypse-how-redux</guid><dc:creator><![CDATA[Ajish]]></dc:creator><pubDate>Thu, 26 Feb 2026 12:02:18 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!LcTH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6fb2dd4b-069b-4ee7-83ae-20c6d902f2a6_1408x768.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3><strong> I. The Mispricing</strong></h3><p>The market repriced every SaaS incumbent on the fear that AI would eat their moats &#8212; then never applied the same scrutiny to the AI companies themselves. Their gross margins average <a href="https://www.iconiqcapital.com/growth/reports/2026-state-of-ai-bi-annual-snapshot">45%</a> &#8212; closer to managed services than to software &#8212; yet they carry <a href="https://aventis-advisors.com/ai-valuation-multiples/">25&#8211;30x revenue multiples</a>. Exact figures vary by cohort and methodology; the magnitude of mismatch between margin structure and valuation multiple does not. The full economic case is in <a href="https://blog.aji.sh/p/the-mirage-of-ai-roi">The Mirage of AI ROI</a>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!LcTH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6fb2dd4b-069b-4ee7-83ae-20c6d902f2a6_1408x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!LcTH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6fb2dd4b-069b-4ee7-83ae-20c6d902f2a6_1408x768.png 424w, https://substackcdn.com/image/fetch/$s_!LcTH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6fb2dd4b-069b-4ee7-83ae-20c6d902f2a6_1408x768.png 848w, https://substackcdn.com/image/fetch/$s_!LcTH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6fb2dd4b-069b-4ee7-83ae-20c6d902f2a6_1408x768.png 1272w, https://substackcdn.com/image/fetch/$s_!LcTH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6fb2dd4b-069b-4ee7-83ae-20c6d902f2a6_1408x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!LcTH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6fb2dd4b-069b-4ee7-83ae-20c6d902f2a6_1408x768.png" width="1408" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6fb2dd4b-069b-4ee7-83ae-20c6d902f2a6_1408x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1408,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1724264,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.aji.sh/i/189243143?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6fb2dd4b-069b-4ee7-83ae-20c6d902f2a6_1408x768.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!LcTH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6fb2dd4b-069b-4ee7-83ae-20c6d902f2a6_1408x768.png 424w, https://substackcdn.com/image/fetch/$s_!LcTH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6fb2dd4b-069b-4ee7-83ae-20c6d902f2a6_1408x768.png 848w, https://substackcdn.com/image/fetch/$s_!LcTH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6fb2dd4b-069b-4ee7-83ae-20c6d902f2a6_1408x768.png 1272w, https://substackcdn.com/image/fetch/$s_!LcTH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6fb2dd4b-069b-4ee7-83ae-20c6d902f2a6_1408x768.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The reason this persists is that the market treats &#8220;AI&#8221; as a valuation category. It is a delivery mechanism. Technology valuations have organized into three tiers for decades: Services at <a href="https://aventis-advisors.com/tech-company-valuation-multiples/">0.3&#8211;3.0x revenue</a>. SaaS at <a href="https://aventis-advisors.com/software-valuation-multiples/">3&#8211;8x median</a>. Platform &amp; Infrastructure at <a href="https://www.saastr.com/whos-left-in-the-10x-arr-club-the-incredible-shrinking-elite-of-public-b2b-companies-still-trading-at-10x-revenue-but-the-best-is-yet-to-come/">10&#8211;25x</a> &#8212; AWS, Nvidia, Snowflake, CrowdStrike, Palo Alto, Cloudflare, Datadog &#8212; companies with ~70% gross margins, multi-billion-dollar revenue, and platform gravity that deepens with usage. The boundaries shift with market conditions but the ordering never inverts.</p><p>Even if the market temporarily creates a fourth tier, underwriting still requires proof of sublinear verification cost and controllable supplier economics. There are services companies that use AI, software companies that use AI, and infrastructure companies that build AI. Anthropic, Databricks, and Palantir belong in Tier 3 &#8212; they build or operate foundational infrastructure, control their own platform economics, and serve as layers other companies build on. The application-layer companies raising at 25&#8211;30x &#8212; Harvey, Sierra, Glean, Dialpad &#8212; sit <em>on top of</em> that infrastructure, consuming someone else&#8217;s API, layering on verification, and selling outcomes in categories already priced as services. The <a href="https://www.finrofca.com/news/ai-agents-multiples-mid-year-2025">Finro AI agent dataset</a> (210 companies, 11 niches) already shows the market sorting <em>within</em> AI &#8212; HR, PropTech, Sales agents trade at 3&#8211;12x, overlapping SaaS. It just hasn&#8217;t extended that logic across categories to recognize that a Tier 1 AI company is the same asset class as an IT services firm with a different pitch deck.</p><p>The counterargument: AI commoditizes cognition like PCs commoditized computing, demand expands as costs collapse, and the winners will be those who own data, compute, energy, and verification. That framing has saturated investor discourse since the February sell-off. It is also a Tier 3 thesis. The value accrues to the infrastructure layer &#8212; not to the application-layer firms reselling it per outcome. If AI commoditizes cognition, the company selling commoditized cognition is on the wrong side of its own disruption thesis.</p><p>Getting the tier wrong is a 70&#8211;97% valuation swing. Technical due diligence is where the category claim should get falsified &#8212; and almost never is. TDD frameworks were built for deterministic software, and no one has updated the methodology to falsify a category claim that didn't exist five years ago. The <a href="https://blog.aji.sh/p/the-post-deterministic-company-escaping">narrative case</a> has been made. What follows are the questions the current playbook doesn&#8217;t ask &#8212; four dimensions where the horseless carriage still gets inspected for hay consumption.</p><div><hr></div><h3><strong>II. The Diagnostic</strong></h3><h4><strong>1. Economic Identity</strong></h4><p>No TDD methodology evaluates whether the target&#8217;s COGS structure, pricing model, and delivery risk map to software or services &#8212; despite a 3&#8211;6x difference in appropriate multiple. When a target charges per resolution or per document rather than per seat, diligence treats it as a go-to-market decision. It is a category signal &#8212; functionally indistinguishable from how services firms have priced for decades. The counterargument, that AI captures labor budgets rather than software budgets, assumes the conclusion: that the cost structure will eventually look like software. Whether it does is the empirical question Dimension 2 exists to answer.</p><h4><strong>2. Cost Structure</strong></h4><p>The Markov Tax (perpetual probabilistic validation cost) is the key variable, and TDD rarely demands evidence that it&#8217;s falling at scale. Heraclitus had it right: you cannot step into the same model twice. A successful prior run does not reduce the verification burden on the next one. If verification and exception-handling scale with throughput, margins converge toward services &#8212; the pitch-deck is not the territory. Upstream model updates compound this: <a href="https://arxiv.org/abs/2307.09009">researchers documented</a> a single update shifting accuracy on a benchmark task from 97.6% to 2.4%. Version pinning is the organizational equivalent of unplugging the smoke detector &#8212; it buys silence while the technical debt compounds.</p><p><a href="https://www.mavvrik.ai/state-of-ai-cost-governance-report/">Benchmarkit&#8217;s 2025 survey</a> (n=372) found only 15% of companies can forecast AI costs within &#177;10%. If the margin model collapses under volume doubling, the valuation is pricing a cost structure that does not yet exist. Diligence must demand verification minutes per unit, exception rate, inference cost as a percentage of COGS, and regression cadence under provider changes &#8212; all trending down.</p><h4><strong>3. Ownership and Architecture</strong></h4><p>TDD assesses proprietary code and IP but not dependency depth on rented intelligence. The evident failure mode is a long-familiar pattern: the vendor changes something upstream, and your control plane discovers it in production. The target typically lacks enforceable control over whether the foundation model provider ships its product as a feature, reprices API access, or withdraws the inference subsidies its unit economics depend on. The right question is what happens to margins if token costs double or triple &#8212; and whether the target has any contractual or architectural leverage over that scenario.</p><p>The escape route is <a href="https://blog.aji.sh/p/epimetheuss-agentic-bride">Progressive Determinization</a>: migrating validated workflows from probabilistic inference to deterministic execution, permanently eliminating the Markov Tax and supplier-induced drift on each workflow. No framework evaluates whether the target is doing this, or whether the architecture is getting less dependent over time.</p><h4><strong>4. Legal Exposure</strong></h4><p>When pricing shifts from per-seat to per-outcome, the claims surface expands &#8212; yet <a href="https://law.stanford.edu/2025/03/21/navigating-ai-vendor-contracts-and-the-future-of-law-a-guide-for-legal-tech-innovators/">only 17% of AI vendor contracts include performance warranties versus 42% for traditional SaaS</a>. The delta between customer expectations and contractual obligations creates a liability vacuum, universally abhorred. SaaS providers cap liability at subscription fees and warrant uptime, not outcomes. MSPs and BPOs, which do sell outcomes, carry professional liability coverage, E&amp;O insurance, and indemnification structures built over decades of case law. The AI companies pricing per-resolution have inherited the liability surface of a services firm while operating under the contractual architecture of a SaaS vendor &#8212; the worst of both worlds from an exposure standpoint. Actuarial frameworks for probabilistic risk exist, but the longitudinal claims data for AI-native failure modes does not. Meanwhile, a target one regulatory reclassification away from &#8220;high-risk&#8221; may lack the governance infrastructure to operate under that classification &#8212; meaning reclassification forces a structural overhaul, not a compliance exercise.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!221_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ad92456-782b-48f7-8d54-29fd6e2c48c8_1408x752.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!221_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ad92456-782b-48f7-8d54-29fd6e2c48c8_1408x752.png 424w, https://substackcdn.com/image/fetch/$s_!221_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ad92456-782b-48f7-8d54-29fd6e2c48c8_1408x752.png 848w, https://substackcdn.com/image/fetch/$s_!221_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ad92456-782b-48f7-8d54-29fd6e2c48c8_1408x752.png 1272w, https://substackcdn.com/image/fetch/$s_!221_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ad92456-782b-48f7-8d54-29fd6e2c48c8_1408x752.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!221_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ad92456-782b-48f7-8d54-29fd6e2c48c8_1408x752.png" width="1408" height="752" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8ad92456-782b-48f7-8d54-29fd6e2c48c8_1408x752.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:752,&quot;width&quot;:1408,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1936013,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.aji.sh/i/189243143?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ad92456-782b-48f7-8d54-29fd6e2c48c8_1408x752.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!221_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ad92456-782b-48f7-8d54-29fd6e2c48c8_1408x752.png 424w, https://substackcdn.com/image/fetch/$s_!221_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ad92456-782b-48f7-8d54-29fd6e2c48c8_1408x752.png 848w, https://substackcdn.com/image/fetch/$s_!221_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ad92456-782b-48f7-8d54-29fd6e2c48c8_1408x752.png 1272w, https://substackcdn.com/image/fetch/$s_!221_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ad92456-782b-48f7-8d54-29fd6e2c48c8_1408x752.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>The Agentic Murderboard. Twelve metrics across four dimensions &#8212; three per quadrant, each orthogonal, none substitutable. Economic Identity: revenue mix by pricing model, revenue per employee, customer concentration. Cost Structure: Markov Tax rate, inference cost as % of COGS, cost variance under volume doubling. Ownership &amp; Architecture: provider concentration, progressive determinization rate, regression cadence under provider changes. Legal Exposure: performance warranty coverage, liability architecture gap, regulatory reclassification distance. Any metric moving the wrong direction breaks the software thesis.</em></p><div><hr></div><p>The bull case is not fiction. Margins are improving, the best operators <a href="https://www.bvp.com/atlas/the-state-of-ai-2025">may reach the low 60s</a> within two years &#8212; if verification costs decline with scale rather than tracking it. But we are pricing the option on determinization as if it has already happened.</p><p>The reclassification is latent, not inevitable &#8212; it needs a trigger: a deal that blows up on margin compression, a public company that misses on verification costs, a regulator that forces the category question. The window between recognizing the sorting criteria and the market pricing them is where the advantage lives.</p><p>Agents start as cogs. They end up as COGS.</p><p>Price accordingly.</p>]]></content:encoded></item><item><title><![CDATA[Epimetheus's Agentic Bride]]></title><description><![CDATA[Part 3 of 3: A Manifesto for Bounding Pandora's Agency and Compiling Hype into Hope]]></description><link>https://blog.aji.sh/p/epimetheuss-agentic-bride</link><guid isPermaLink="false">https://blog.aji.sh/p/epimetheuss-agentic-bride</guid><dc:creator><![CDATA[Ajish]]></dc:creator><pubDate>Sun, 08 Feb 2026 13:22:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!qK4x!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3e44997-42af-4527-bed3-71ce065ca24d_2816x1536.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<blockquote><p><strong>The Prescription:</strong> Use agentic AI to discover and prototype. Compile the stable fraction into deterministic systems. For the irreducible residue, impose Bounded Agency&#8212;confine the agent&#8217;s actions to a pre-verified feasible region so you verify quality, not safety. Graduate workflows from probabilistic experimentation to deterministic infrastructure.</p><p><strong>The Mechanism:</strong> Progressive determinization&#8212;a disciplined lifecycle that treats agents as scaffolding for transformation, not substrate for operations.</p><p><strong>The Test:</strong> Every agent deployment should answer one question: <em>what does stable look like?</em></p></blockquote><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qK4x!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3e44997-42af-4527-bed3-71ce065ca24d_2816x1536.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qK4x!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3e44997-42af-4527-bed3-71ce065ca24d_2816x1536.heic 424w, https://substackcdn.com/image/fetch/$s_!qK4x!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3e44997-42af-4527-bed3-71ce065ca24d_2816x1536.heic 848w, https://substackcdn.com/image/fetch/$s_!qK4x!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3e44997-42af-4527-bed3-71ce065ca24d_2816x1536.heic 1272w, https://substackcdn.com/image/fetch/$s_!qK4x!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3e44997-42af-4527-bed3-71ce065ca24d_2816x1536.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qK4x!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3e44997-42af-4527-bed3-71ce065ca24d_2816x1536.heic" width="1456" height="794" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c3e44997-42af-4527-bed3-71ce065ca24d_2816x1536.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:794,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:654559,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.aji.sh/i/187275026?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3e44997-42af-4527-bed3-71ce065ca24d_2816x1536.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qK4x!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3e44997-42af-4527-bed3-71ce065ca24d_2816x1536.heic 424w, https://substackcdn.com/image/fetch/$s_!qK4x!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3e44997-42af-4527-bed3-71ce065ca24d_2816x1536.heic 848w, https://substackcdn.com/image/fetch/$s_!qK4x!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3e44997-42af-4527-bed3-71ce065ca24d_2816x1536.heic 1272w, https://substackcdn.com/image/fetch/$s_!qK4x!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3e44997-42af-4527-bed3-71ce065ca24d_2816x1536.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><a href="https://blog.aji.sh/p/the-mirage-of-ai-roi">Part 2</a> diagnosed the structural asymmetry: generation costs deflate; verification costs don&#8217;t amortize. The Markov Tax inverts expected economics wherever errors have consequences.</p><p>This part offers the prescription.</p><div><hr></div><h3><strong>Progressive Determinization as Stabilization Mechanism</strong></h3><p>In <a href="https://blog.aji.sh/p/the-post-deterministic-company-escaping">Part 1</a>, the argument was that the post-deterministic firm is metastable&#8212;capable of thriving in bounded domains, but lacking the control-theoretic stability required for sustained operation as a general enterprise model. Progressive determinization is the stabilization mechanism the metastable firm requires: a disciplined lifecycle that converts probabilistic exploration into deterministic infrastructure, phase by phase, while imposing Bounded Agency on whatever remains irreducibly fuzzy.</p><p>It is also the faster path. The counterargument&#8212;that progressive determinization is a framework for organizational timidity&#8212;collapses against the data <a href="https://blog.aji.sh/p/the-mirage-of-ai-roi">Part 2</a> documented: forty-two percent of companies abandoned most AI initiatives in 2025, up from 17% in 2024; <a href="https://www.gartner.com/en/newsroom/press-releases/2025-06-25-gartner-predicts-over-40-percent-of-agentic-ai-projects-will-be-canceled-by-end-of-2027">Gartner projects</a> over 40% of agentic AI projects will be canceled by 2027; roughly 95% of enterprise AI pilots fail to deliver measurable ROI. Moving fast without a stabilization strategy doesn&#8217;t produce speed. It produces expensive failure-and-restart cycles. <em>Progressive determinization is faster than failure.</em></p><p>The alternative is what most enterprises are building: permanent probabilistic infrastructure with no path to stable unit economics. That&#8217;s not transformation. It&#8217;s dependency with a demo.</p><div><hr></div><h3><strong>Why Now: The Forcing Functions</strong></h3><p>Two clocks are running. One is regulatory, one is economic. Neither cares about your roadmap.</p><h4><strong>The Regulatory Clock</strong></h4><p><a href="https://artificialintelligenceact.eu/">EU AI Act</a> obligations for high-risk AI systems take effect August 2026&#8212;though the <a href="https://digital-strategy.ec.europa.eu/en/library/digital-fairness-fitness-check-report-and-digital-fairness-act">Digital Omnibus proposal</a> may delay certain provisions to December 2027. The SEC has charged multiple firms for &#8220;AI washing,&#8221; with enforcement actions escalating from <a href="https://www.sec.gov/newsroom/press-releases/2024-36">Delphia/Global Predictions</a> (March 2024, first-ever) to <a href="https://www.justice.gov/usao-sdny/pr/tech-ceo-charged-artificial-intelligence-investment-fraud-scheme">Nate Inc.</a> ($42 million fraud with parallel DOJ criminal charges). The SEC doesn&#8217;t care what your model can do. It cares what you claimed it could do.</p><p>The liability standard is shifting from accuracy to evidence. &#8220;Our model is 99% accurate&#8221; is becoming &#8220;Show me the exact chain of reasoning and data points used to deny this claim on this date.&#8221; A system can be brilliant at forward reasoning&#8212;generating the answer&#8212;and impossible to defend backward&#8212;reconstructing the reasoning for audit. This is why pure end-to-end LLM systems fail in regulated contexts regardless of model capability.</p><p><a href="https://www.federalreserve.gov/supervisionreg/srletters/sr1107.htm">SR 11-7</a> requires models documented so that &#8220;unfamiliar parties can understand the model&#8217;s operation.&#8221; Progressive determinization produces these artifacts inherently at each phase gate&#8212;not as retrofitted compliance theater. The stakes are not abstract: firms experience <a href="https://www.sciencedirect.com/science/article/abs/pii/S1544612324013084">average cumulative abnormal stock returns of -21%</a> following AI incidents&#8212;errors have balance-sheet consequences. A striking market signal: the <a href="https://bpi.com/wp-content/uploads/2025/10/BPI-OSTP-AI-RFI-Response-10.27.25.pdf">Bank Policy Institute reported</a> in 2025 that some banks have begun asking vendors to remove or turn off AI features in third-party products to avoid model risk management review. When the market voluntarily retreats from AI to escape governance burden, the governance model is the product.</p><h4><strong>The Subsidy Clock</strong></h4><p>Every enterprise AI business case is built on prices that are not market prices. OpenAI <a href="https://www.cnbc.com/2024/09/27/openai-sees-5-billion-loss-this-year-on-3point7-billion-in-revenue.html">lost $5 billion on $3.7 billion in revenue</a> in CY2024; Anthropic&#8217;s gross margins were <a href="https://www.saastr.com/have-ai-gross-margins-really-turned-the-corner-the-real-math-behind-openais-70-compute-margin-and-why-b2b-startups-are-still-running-on-a-treadmill/">negative 94&#8211;109%</a>. These are capital transfer mechanisms: Microsoft <a href="https://techcrunch.com/2025/11/14/leaked-documents-shed-light-into-how-much-openai-pays-microsoft/">invests $13B in OpenAI</a>, which routes <a href="https://www.wheresyoured.at/oai_docs/">$8.67B back to Azure</a>; Amazon <a href="https://www.anthropic.com/news/anthropic-amazon-trainium">invests $8B in Anthropic</a>, which runs on AWS. <a href="https://sequoiacap.com/article/ais-600b-question/">Sequoia Capital calculates</a> a $600B+ annual revenue gap between AI infrastructure spending and actual AI revenue. <a href="https://www.tomshardware.com/tech-industry/artificial-intelligence/usd650-billion-in-annual-revenue-required-to-deliver-10-percent-return-on-ai-buildout-investment-j-p-morgan-claims-equivalent-to-usd35-payment-from-every-iphone-user-or-usd180-from-every-netflix-subscriber-in-perpetuity">JP Morgan estimates</a> $650B in new annual revenue needed for a 10% return. The infrastructure-to-revenue ratio is 10:1 or worse. AWS <a href="https://www.datacenterdynamics.com/en/news/aws-quietly-increases-prices-for-h200-ec2-instances-by-15/">raised H200 Capacity Block prices 15%</a> in January 2026&#8212;the first major rate increase&#8212;and <a href="https://www.saastr.com/gartner-enterprise-software-spend-will-grow-a-stunning-15-2-next-year-but-most-of-that-will-go-to-price-increases-and-ai-apps/">Gartner projects</a> enterprise software costs will increase substantially due to AI price pass-throughs by 2027.</p><p>The <a href="https://en.wikipedia.org/wiki/Telecoms_crash">dot-com fiber buildout</a> is the precedent. After the <a href="https://en.wikipedia.org/wiki/Telecommunications_Act_of_1996">Telecommunications Act of 1996</a>, telecom companies invested over $500 billion in fiber; by 2001, <a href="https://fortune.com/2025/09/28/ai-dot-com-bubble-parallels-history-explained-companies-revenue-infrastructure/">95% was dark</a>, prices collapsed 90%, and Global Crossing, WorldCom, and Lucent were destroyed. The infrastructure proved transformative eventually&#8212;but every company that built operational dependency on pre-crash pricing was wiped out. The technology was right. The business model was wrong.</p><p>This resolves in one of three ways, and enterprises lose in two of them. Prices spike as subsidies end and hyperscalers pass through amortization. Prices collapse as overcapacity drives inference to marginal cost, destroying providers. Or&#8212;most likely&#8212;prices stabilize significantly above current rates through write-downs and consolidation. <em>Progressive determinization is the only architecture that survives all three.</em> Compiled workflows don&#8217;t care what inference costs.</p><div><hr></div><h3><strong>Phase Zero: Admit the Enterprise Does Not Have Processes</strong></h3><p><a href="https://blog.aji.sh/p/the-post-deterministic-company-escaping">Part 1</a> made the case: most enterprise process documentation is decorative fiction. The real operating model is exceptions, arbitration, handoffs, tribal knowledge.</p><p>Agents are useful in Phase Zero precisely because they externalize this reality. They cannot improvise the way human operators do. Their failures are signal. Their traces become telemetry. The principle is capture-first, structure-later: the agent&#8217;s trace is the primary asset. Structure is derived downstream.</p><p>Phase Zero is not a technology phase. It is a governance phase. The work is to admit that the enterprise has rituals, not processes&#8212;and to decide which rituals are worth formalizing. Compiling dysfunction into code just makes dysfunction permanent.</p><p>The hard conversations nobody wants to have: Who owns this workflow end-to-end? What happens when it fails? Who decides what the data means? These are leadership problems disguised as technical ones. <em>No amount of prompt engineering resolves the absence of accountable ownership.</em></p><div><hr></div><h3><strong>Phase One: Agents as Process Archaeology</strong></h3><p>Deploy agents as exploration engines, not autonomous workers. Start with constrained execution: read-only first, guarded writes next, autonomy last.</p><p>The goal in Phase One is not &#8220;hours saved.&#8221; It is process illumination: decision paths, exception routes, escalation behaviors, data dependencies nobody documented because the documentation was never the system.</p><p>What you are buying in Phase One is not labor substitution. You are buying process archaeology.</p><p>This is where <a href="https://blog.aji.sh/p/the-post-deterministic-company-escaping">Part 1</a>&#8217;s concept of Capability Engineering becomes operational. The binary gatekeeper model collapses in an agentic environment; the answer is defining the Bounded Solution Space rather than prescribing exact paths. <em>Security becomes choreography of constraints rather than a checklist of controls.</em></p><p>The control plane primitives described later in this piece are Capability Engineering in implementation&#8212;the security architecture that makes Phase One exploration safe enough to run at scale.</p><div><hr></div><h3><strong>Phase Two: Compile the Stable Patterns</strong></h3><p>Once patterns stabilize, stop paying the AI tax for them.</p><p>Watch the acceptance rate at the human gate. If the human approves the agent&#8217;s draft 95%+ of the time for a given workflow segment, the pattern is stable. It&#8217;s a candidate for determinization.</p><p>Think of it as paving desire paths. Agents find the routes people actually walk; Phase Two is laying asphalt where the grass is worn.</p><p>Determinization means converting the stable portion into systems with predictable behavior: explicit state machines, policy-as-code gates, hardened integrations, <a href="https://github.com/aurelio-labs/semantic-router">semantic routers</a> that dispatch known patterns to cached responses or deterministic APIs and escalate novel patterns to constrained agents or human review. The router uses probabilistic classification, but the dispatch targets are deterministic. Probabilistic surface area shrinks without requiring full code compilation.</p><p>The distinction between soft and hard determinization is not academic. <strong>Soft determinization</strong>&#8212;<a href="https://www.anthropic.com/research/constitutional-ai-harmlessness-from-ai-feedback">Constitutional AI</a>, guardrail frameworks, prompt engineering, fine-tuning&#8212;constrains the distribution of outputs but the system remains probabilistic. &#8220;Very high reliability&#8221; is not &#8220;certain,&#8221; and in domains where residual failures translate to material harm, the difference is a lawsuit. <strong>Hard determinization</strong> eliminates output variance given identical inputs: deterministic code, SQL, rules engines, semantic routers to cached responses, explicit human decision points. The target for stable patterns is hard determinization. Soft is a waystation, not a destination.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1OCB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f30df89-34d7-41fe-b7ad-32f360e91a56_2400x1309.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1OCB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f30df89-34d7-41fe-b7ad-32f360e91a56_2400x1309.jpeg 424w, https://substackcdn.com/image/fetch/$s_!1OCB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f30df89-34d7-41fe-b7ad-32f360e91a56_2400x1309.jpeg 848w, https://substackcdn.com/image/fetch/$s_!1OCB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f30df89-34d7-41fe-b7ad-32f360e91a56_2400x1309.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!1OCB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f30df89-34d7-41fe-b7ad-32f360e91a56_2400x1309.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1OCB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f30df89-34d7-41fe-b7ad-32f360e91a56_2400x1309.jpeg" width="1456" height="794" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9f30df89-34d7-41fe-b7ad-32f360e91a56_2400x1309.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:794,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:755784,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.aji.sh/i/187275026?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f30df89-34d7-41fe-b7ad-32f360e91a56_2400x1309.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1OCB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f30df89-34d7-41fe-b7ad-32f360e91a56_2400x1309.jpeg 424w, https://substackcdn.com/image/fetch/$s_!1OCB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f30df89-34d7-41fe-b7ad-32f360e91a56_2400x1309.jpeg 848w, https://substackcdn.com/image/fetch/$s_!1OCB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f30df89-34d7-41fe-b7ad-32f360e91a56_2400x1309.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!1OCB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f30df89-34d7-41fe-b7ad-32f360e91a56_2400x1309.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Routing, solvers, and compilation are not competing ideologies. They are different levers for the same objective: <em>minimizing probabilistic surface area in the liability chain</em>.</p><h4><strong>The Horseless Carriage Caveat</strong></h4><p>The counterargument: compiling workflows into hard code reintroduces the rigidity that plagues current IT. Valid against bad compilation&#8212;against &#8220;hard-code the world.&#8221; Not valid against selective compilation of stable, high-repeatability patterns. And the brittleness critique cuts both ways: an always-agentic workflow is a moving target. Prompts drift. Providers update models. Tool semantics change. What passed eval last month can regress silently this month. &#8220;Adjust via a prompt update&#8221; is precisely the operational hazard: it makes change easy and verification hard.</p><p>Y Combinator partner <a href="https://koomen.dev/essays/horseless-carriages/">Pete Koomen argues</a> that most AI applications mimic old software paradigms rather than reimagining around AI&#8217;s strengths. For greenfield products in unregulated markets&#8212;fair point. In regulated industries, you cannot file a probabilistic audit. Even without regulators, the economics hold: deterministic execution is cheaper than probabilistic execution for known patterns, full stop.</p><h4><strong>AI Builds the Replacement</strong></h4><p>The historical objection to compiling down was cost: rewriting systems takes years and burns budgets. AI code generation collapses that objection flat. Code generation is the breakout enterprise use case&#8212;AI coding assistants now show <a href="https://getdx.com/blog/ai-assisted-engineering-q4-impact-report-2025/">91% organizational adoption</a> across 135,000+ developers as of Q4 2025. The same models that power agentic experimentation can dramatically accelerate construction of deterministic replacements.</p><p>The arbitrage most people miss: <strong>AI is most valuable not as permanent infrastructure, but as an accelerant for building infrastructure that doesn&#8217;t require AI.</strong> Use nondeterministic AI to discover and prototype. Use AI code generation to build the deterministic replacement. Graduate the workflow. The agent&#8217;s job is to make itself unnecessary for stable operations&#8212;and AI development tools make that transition faster than legacy economics ever allowed.</p><div><hr></div><h3><strong>Phase Three: Bounded Agency for the Irreducibly Fuzzy</strong></h3><p>Some problems remain fuzzy and should stay that way: ambiguous natural language intake, synthesis across messy corpora, exception triage when policies collide, novel situations that don&#8217;t fit established patterns.</p><p>This is where agents earn their keep. But &#8220;earn their keep&#8221; does not mean &#8220;run unconstrained.&#8221;</p><p>Simon&#8217;s <a href="https://en.wikipedia.org/wiki/Bounded_rationality">Bounded Rationality</a> observed that humans are rational only within cognitive limits. In the AI era, the problem inverts. Machines have near-unlimited computational capacity but no intrinsic awareness of institutional constraints. An unbounded agent is not irrational; it is arational&#8212;optimizing brilliantly within a space that includes actions the enterprise cannot survive.</p><p>Bounded Agency is the architectural guarantee that an agent&#8217;s actions are confined to a pre-verified solution space. The agent optimizes freely within the boundary. It cannot exit the boundary.</p><h4><strong>The Feasibility Kernel</strong></h4><p>To implement Bounded Agency, build a Feasibility Kernel&#8212;a formally verified runtime monitor that enforces the boundary between what the agent may explore and what it may never propose.</p><p>The mental model is Operations Research: every optimization has a Feasible Region defined by hard constraints. The objective function cannot propose a solution outside it. In Bounded Agency, the LLM is the objective function; the constraint boundary is the Feasible Region. The agent proposes; the kernel validates before any action commits. Infeasible solutions are not mysteries&#8212;OR solved this fifty years ago.</p><p>Why minimize the surface requiring formal guarantees? Because verification is punishing. The <a href="https://sel4.systems/">seL4 microkernel</a> required 200,000 lines of proof for 8,700 lines of C. Determinize stable patterns first (Phase Two). Concentrate formal verification on the irreducible residue where the stakes justify the cost.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!C3rb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe362ed0-29db-46bc-ba75-4a5cd013f18c_2426x1296.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!C3rb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe362ed0-29db-46bc-ba75-4a5cd013f18c_2426x1296.jpeg 424w, https://substackcdn.com/image/fetch/$s_!C3rb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe362ed0-29db-46bc-ba75-4a5cd013f18c_2426x1296.jpeg 848w, https://substackcdn.com/image/fetch/$s_!C3rb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe362ed0-29db-46bc-ba75-4a5cd013f18c_2426x1296.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!C3rb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe362ed0-29db-46bc-ba75-4a5cd013f18c_2426x1296.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!C3rb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe362ed0-29db-46bc-ba75-4a5cd013f18c_2426x1296.jpeg" width="1456" height="778" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/be362ed0-29db-46bc-ba75-4a5cd013f18c_2426x1296.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:778,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:505377,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.aji.sh/i/187275026?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe362ed0-29db-46bc-ba75-4a5cd013f18c_2426x1296.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!C3rb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe362ed0-29db-46bc-ba75-4a5cd013f18c_2426x1296.jpeg 424w, https://substackcdn.com/image/fetch/$s_!C3rb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe362ed0-29db-46bc-ba75-4a5cd013f18c_2426x1296.jpeg 848w, https://substackcdn.com/image/fetch/$s_!C3rb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe362ed0-29db-46bc-ba75-4a5cd013f18c_2426x1296.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!C3rb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe362ed0-29db-46bc-ba75-4a5cd013f18c_2426x1296.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Pure LLM systems are probabilistic end-to-end&#8212;unbounded agency. A system built on Bounded Agency is probabilistic at the edges (language understanding, creative search) and deterministic at the core (constraint enforcement, action validation).</p><p>This is already shipping. <a href="https://aws.amazon.com/bedrock/guardrails/">AWS Automated Reasoning Checks</a>, generally available since August 2025, use formal mathematical proofs&#8212;not probabilistic guardrails&#8212;to validate LLM outputs against encoded business rules, claiming up to 99% verification accuracy. <a href="https://www.ey.com/en_us/newsroom/2025/09/ey-parthenon-practice-unveils-neurosymbolic-ai-capabilities-to-empower-businesses-to-identify-predict-and-unlock-revenue-at-scale">EY-Parthenon</a> launched a neurosymbolic AI platform pairing language models with deterministic reasoning engines for underwriting, claims, and compliance. <a href="https://www.elementalcognition.com/">Elemental Cognition</a>, founded by David Ferrucci of IBM Watson fame, built a constraint-resolution engine now used by Oneworld airline alliance. <a href="https://fortune.com/2024/12/09/neurosymbolic-ai-deep-learning-symbolic-reasoning-reliability/">Ferrucci&#8217;s framing</a> cuts through the noise: LLMs are not designed to perform formal computation&#8212;deterministically, efficiently, precisely, consistently following a set of rules. That is what classical algorithmic programming is for. The man who built Watson is telling you not to trust language models for deterministic work. Maybe listen.</p><p>None of these are complete formal proofs across all constraint classes. They don&#8217;t need to be. Even at 99% enforcement accuracy, the economics invert: the human verifies the cases where the boundary flags uncertainty&#8212;not the totality of output that unbounded agency demands.</p><p>Legal intake remains fuzzy&#8212;but &#8220;no response may recommend action outside the client&#8217;s jurisdiction&#8221; is enforced deterministically, not hoped for probabilistically. Customer escalation triage remains fuzzy&#8212;but &#8220;high-value customers route to senior agents&#8221; is deterministic, not emergent.</p><blockquote><p><strong>TEST CASE: GOLDMAN SACHS &#8212; &#8220;AGENTS READ THE MAIL, CODE WRITES THE CHECK&#8221;</strong></p><p>Goldman Sachs&#8217; co-development of Claude agents with Anthropic for trade accounting is the highest-profile test of scaffolding architecture in regulated finance. If you squint, it looks like proof that agents can be substrate. Don&#8217;t squint.</p><p>Goldman isn&#8217;t replacing the general ledger with an LLM. Per <a href="https://www.cnbc.com/2026/02/06/anthropic-goldman-sachs-ai-model-accounting.html">CNBC&#8217;s reporting</a> (February 6, 2026), CIO Marco Argenti describes agents that handle the perceptual layer&#8212;messy intake (trade tickets, counterparty discrepancies, unstructured communications)&#8212;while deterministic constraints validate every proposed entry against accounting rules before commit. Six months of embedded Anthropic engineers. Targets include trade accounting, KYC, and AML. Goldman chose Anthropic specifically for &#8220;safety, interpretability, and reliability&#8221;&#8212;language that signals architectural intent, not hype adoption.</p><p>This is not &#8220;agents running the bank.&#8221; This is agents reading the mail, while code writes the check.</p><p>What remains undisclosed: override rates, regression coverage under model drift, audit artifact generation. Evidence that would validate the architecture: published acceptance metricsand incident rates post-deployment.</p></blockquote><h4><strong>The &#8220;Bitter Lesson&#8221; Rebuttal</strong></h4><p>The strongest objection: Rich Sutton&#8217;s &#8220;<a href="http://www.incompleteideas.net/IncIdeas/BitterLesson.html">Bitter Lesson</a>&#8221;&#8212;reinforced by his 2024 Turing Award&#8212;argues that general methods leveraging computation ultimately dominate hand-crafted approaches. Bounded Agency looks like exactly the kind of constraint system that scaling laws will render obsolete.</p><p>The objection conflates capability with solvency. Scaling compute gives you a more powerful engine. It does not prevent the agent from going logically insolvent&#8212;proposing actions that violate constraints the model was never trained to internalize. Even a model that hallucinates 0.1% of the time produces thousands of infeasible solutions per day at enterprise scale. The Bitter Lesson tells you how to build a better optimizer. It tells you nothing about how to build a better constraint boundary.</p><p>Even Sutton now emphasizes that AI systems need &#8220;world models&#8221;&#8212;internal representations of environment constraints. And <a href="https://deepmind.google/discover/blog/ai-solves-imo-problems-at-silver-medal-level/">AlphaGeometry</a>&#8212;DeepMind&#8217;s mathematical reasoning breakthrough&#8212;is a neural language model paired with a symbolic deduction engine. The Bitter Lesson&#8217;s own poster children are implementing the pattern. <em>Scaling solves capability. Boundaries solve reliability. You need both.</em></p><div><hr></div><h3><strong>Phase Four: Agents as Continuous Architecture Auditors</strong></h3><p>Most implementations treat Phase Four as an afterthought&#8212;six lines in the deck, a monitoring dashboard nobody checks. This is exactly backward. Phase Four is where the lifecycle loops. Without it, progressive determinization is a one-shot installation project. With it, the <em>enterprise becomes a self-improving system</em>.</p><p>Agents should watch the enterprise more than they run it. Deploy them to continuously surface: process variance and exception hotspots, control breakdowns and repeated failure modes, data quality bottlenecks, policy drift and incoherent decisioning, divergence between documented process and actual behavior. Each discovery feeds the next cycle: new candidates for Phase Two determinization, new constraint definitions for Phase Three Bounded Agency, new evidence that a determinized workflow has drifted and needs re-examination.</p><h4><strong>The Probabilistic Middleware Trap</strong></h4><p>Here is the failure mode nobody is talking about. The emerging pattern&#8212;semantic layers, agentic orchestration platforms, shared context stores&#8212;creates probabilistic infrastructure between agents and systems of record. If agents can write to this layer without committing those writes to underlying systems of record, the organization develops a probabilistic layer of &#8220;truth&#8221; that drifts from actual truth. Agents read and amplify each other&#8217;s inferences. Synthetic unverified facts circulate. A hallucination loop detaches from reality and nobody notices because the loop is self-reinforcing.</p><p>Phase Four monitoring must catch this before it metastasizes. The reasons context graphs fail this test have been <a href="https://blog.aji.sh/p/context-graphs-are-the-new-old-thing">explored at length</a>: the ontology bottleneck didn&#8217;t disappear (it got renamed), time breaks naive graphs, and provenance is not optional. Semantic layers must be read-through caches and orchestration scaffolding, never primary stores of persistent state. The unprocessed trace log&#8212;not the derived graph&#8212;is the durable artifact. All writes must commit to underlying deterministic systems of record via validated gates.</p><h4><strong>Data Quality: The Prerequisite Nobody Mentions</strong></h4><p>Bounded Agency assumes constraint definitions are sound and inputs are well-structured enough for the deterministic solver to reason over. In practice, this is where progressive determinization gets ugly: semantic reconciliation across systems, entity resolution across legacy boundaries, temporal consistency when data arrives at different cadences from different sources.</p><p>Here is the uncomfortable part: the data quality problem is often the reason workflows haven&#8217;t been formalized in the first place. The human operator navigates ambiguous data through institutional memory. The agent cannot. Progressive determinization forces the enterprise to confront data quality problems it has been working around for decades. Phase Four is where those problems become visible&#8212;and where the enterprise decides whether to fix them or keep paying humans to route around them.</p><blockquote><p><strong>TEST CASE: HARVEY &#8212; THE MARKOV TAX IN AI-NATIVE SCALING</strong></p><p>Harvey, the legal AI company, hit <a href="https://sacra.com/c/harvey/">roughly</a> $195 million in ARR by end of 2025, <a href="https://www.techbuzz.ai/articles/harvey-hits-8b-valuation-in-third-2025-funding-blitz">serving</a> 50 of the top AmLaw 100 US law firms at an $8 billion valuation. If any company proves that probabilistic infrastructure can scale, Harvey appears to be the case.</p><p>Look closer. Harvey <a href="https://www.harvey.ai/blog/lawyers-at-harvey-applied-legal-research">employs</a> former practicing lawyers across customer success and verification roles&#8212;domain experts who ensure the AI&#8217;s outputs meet professional standards. A <a href="https://law.stanford.edu/publications/hallucination-free-assessing-the-reliability-of-leading-ai-legal-research-tools/">2024 Stanford study</a> found specialized legal LLMs produce infeasible outputs 17&#8211;33% of the time. Harvey&#8217;s economics work because it is an advisory tool where the human lawyer retains decision authority&#8212;exactly the Phase One / Phase Two pattern progressive determinization prescribes.</p><p>Even the AI-native success story proves the Markov Tax: verification labor scales with adoption. Harvey didn&#8217;t repeal verification. They priced it into the product. And they monitor continuously&#8212;which workflows are stabilizing, which need more guardrails, which need more lawyers. That is Phase Four in action, whether they call it that or not.</p></blockquote><p><em>The terminal purpose of the agent is to make itself replaceable for any given workflow.</em> Phase Four is where you measure whether that&#8217;s happening &#8212; or whether the enterprise is building permanent dependency on probabilistic infrastructure with no exit ramp.</p><div><hr></div><h3><strong>The Operating Architecture</strong></h3><p>The four phases describe what to build. What follows is how to run it &#8212; the enforcement layer that prevents progressive determinization from becoming another planning artifact that dies in committee.</p><p>Three governance preconditions are non-negotiable. Every agent has an accountable owner &#8212; a person, not a team &#8212; with authority and responsibility. Every agent workflow has a cost model that includes compute, governance, remediation, and tail risk, not just &#8220;hours saved.&#8221; And every agentic deployment has a defined exit: a path to determinization, a justified case for Bounded Agency, or retirement. Unbounded probabilistic decisioning in the liability chain is not a valid end state.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DlG2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffbd4d278-ff61-49fe-87be-d46edd1e9c30_2400x1309.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DlG2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffbd4d278-ff61-49fe-87be-d46edd1e9c30_2400x1309.jpeg 424w, https://substackcdn.com/image/fetch/$s_!DlG2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffbd4d278-ff61-49fe-87be-d46edd1e9c30_2400x1309.jpeg 848w, https://substackcdn.com/image/fetch/$s_!DlG2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffbd4d278-ff61-49fe-87be-d46edd1e9c30_2400x1309.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!DlG2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffbd4d278-ff61-49fe-87be-d46edd1e9c30_2400x1309.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DlG2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffbd4d278-ff61-49fe-87be-d46edd1e9c30_2400x1309.jpeg" width="1456" height="794" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fbd4d278-ff61-49fe-87be-d46edd1e9c30_2400x1309.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:794,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:592664,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.aji.sh/i/187275026?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffbd4d278-ff61-49fe-87be-d46edd1e9c30_2400x1309.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DlG2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffbd4d278-ff61-49fe-87be-d46edd1e9c30_2400x1309.jpeg 424w, https://substackcdn.com/image/fetch/$s_!DlG2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffbd4d278-ff61-49fe-87be-d46edd1e9c30_2400x1309.jpeg 848w, https://substackcdn.com/image/fetch/$s_!DlG2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffbd4d278-ff61-49fe-87be-d46edd1e9c30_2400x1309.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!DlG2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffbd4d278-ff61-49fe-87be-d46edd1e9c30_2400x1309.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>The implementation specifics behind these principles are <a href="https://blog.aji.sh/p/the-post-deterministic-company-escaping">Capability Engineering</a> reduced to enforcement mechanisms (control-plane primitives).</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iLbd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7efe72ec-b8be-4aae-adfe-1c6746aa62ec_1024x559.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iLbd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7efe72ec-b8be-4aae-adfe-1c6746aa62ec_1024x559.png 424w, https://substackcdn.com/image/fetch/$s_!iLbd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7efe72ec-b8be-4aae-adfe-1c6746aa62ec_1024x559.png 848w, https://substackcdn.com/image/fetch/$s_!iLbd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7efe72ec-b8be-4aae-adfe-1c6746aa62ec_1024x559.png 1272w, https://substackcdn.com/image/fetch/$s_!iLbd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7efe72ec-b8be-4aae-adfe-1c6746aa62ec_1024x559.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iLbd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7efe72ec-b8be-4aae-adfe-1c6746aa62ec_1024x559.png" width="1024" height="559" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7efe72ec-b8be-4aae-adfe-1c6746aa62ec_1024x559.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:559,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:667531,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.aji.sh/i/187275026?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7efe72ec-b8be-4aae-adfe-1c6746aa62ec_1024x559.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!iLbd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7efe72ec-b8be-4aae-adfe-1c6746aa62ec_1024x559.png 424w, https://substackcdn.com/image/fetch/$s_!iLbd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7efe72ec-b8be-4aae-adfe-1c6746aa62ec_1024x559.png 848w, https://substackcdn.com/image/fetch/$s_!iLbd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7efe72ec-b8be-4aae-adfe-1c6746aa62ec_1024x559.png 1272w, https://substackcdn.com/image/fetch/$s_!iLbd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7efe72ec-b8be-4aae-adfe-1c6746aa62ec_1024x559.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Without these primitives, &#8220;governance&#8221; is aspiration, not architecture.</p><p>Every agent deployment must have a hard-coded <em>kill switch</em> &#8212; the ability to revert the workflow to human-only or deterministic-only state immediately. Not gracefully. Immediately.</p><p>The most serious trigger class: constraint escape, where agent output commits to a system of record despite violating a boundary constraint. This is privilege escalation in a microkernel. For what happens when control plane primitives are absent entirely, see <a href="https://blog.aji.sh/p/body-snatchers-and-agentic-possession">BodySnatcher</a> &#8212; where a hardcoded platform-wide auth secret let an unauthenticated attacker weaponize ServiceNow&#8217;s own agent to provision admin credentials. The kill switch prevents the &#8220;too big to fail&#8221; problem where an organization becomes so dependent on the agentic swarm that it cannot shut it down without ceasing operations. Independence from any single provider is part of the requirement: the ability to revert to human-only operation, not merely to swap vendors.</p><div><hr></div><h3><strong>Who Owns This</strong></h3><p>Progressive determinization demands a cross-functional capacity that most org charts pretend doesn&#8217;t need to exist.</p><p>Who monitors acceptance rates at human gates? Who decides when to trigger determinization? Who defines the constraints that constitute the Bounded Agency boundary &#8212; and who validates that those constraints are complete? The role sits at the intersection of security architecture, process engineering, ML operations, and risk management. It is closest to what a cybersecurity leader does when operating well: managing the boundary between trusted and untrusted systems, defining constraint envelopes, and intervening at the policy level rather than the transaction level. As <a href="https://blog.aji.sh/p/body-snatchers-and-agentic-possession">argued elsewhere</a>, AI security is not a new tower but a forced merger &#8212; MRM sets the law, cyber provides the enforcement.</p><p>The organizational prerequisite is a named accountable person who owns the lifecycle end-to-end. Without this, the lifecycle devolves into committee governance, and committee governance is where transformation goes to be discussed until it&#8217;s irrelevant.</p><blockquote><p><strong>FOR AI PLATFORM AND PRODUCT LEADERS</strong></p><p>If your enterprise deals are stuck in pilot purgatory, progressive determinization explains what your customers need.</p><p><em>The product is not the agent.</em> The product is the lifecycle &#8212; the tooling that moves customers from exploration to determinization to Bounded Agency with metrics at every gate.</p><p><em>Price for outcomes, not tokens.</em> Your customer&#8217;s cost driver is governance, not inference. Ship evals, regression coverage, rollback, and audit evidence &#8212; not autonomy.</p><p><em>Ship constraint enforcement as a platform feature.</em> The fastest path to enterprise procurement: demonstrating that your agent cannot propose non-compliant actions &#8212; not that it usually doesn&#8217;t. The governance layer is where the margin lives.</p><p><em>Build the off-ramp into the product.</em> Your most successful customers will graduate from your agentic product for stable workflows. The vendor who enables determinization becomes the exploration engine for the next set of workflows.</p><p>Salesforce SVP <a href="https://www.salesforce.com/news/stories/ai-learned-to-play-by-rules/?bc=OTH">Sanjna Parulekar</a>: &#8220;Language models are exceptional at understanding intent and context but they are, by design, probabilistic. They generate likely outcomes, not guaranteed ones.&#8221; The customer who demands Bounded Agency is not being difficult. They are being rational.</p></blockquote><div><hr></div><h3><strong>The Strategic Imperative</strong></h3><p>The fallacy of enterprise AI is not that AI cannot create value. The fallacy is treating agents as permanent infrastructure rather than scaffolding for transformation.</p><p>Deflation makes agents cheaper. Governance makes agents expensive. The enterprise wins by determinizing what can be determinized, bounding what cannot, and keeping unbounded probabilistic systems where they belong: in exploration, not production.</p><p>The companies that win will not be the ones that deploy the most agents. They will be the ones that deploy agents strategically &#8212; as instruments of discovery that feed determinization and constraint, not as permanent, ungovernable substitutes for process discipline.</p><p>Frame it right, and AI becomes the most powerful tool for enterprise transformation since the relational database. Frame it wrong, and you&#8217;re building on sand &#8212; subsidized sand today, expensive sand tomorrow, and the collapse happens exactly when you can least afford it.</p><p><em>Scaffolding builds. Substrate breaks.</em></p>]]></content:encoded></item><item><title><![CDATA[The Mirage of AI ROI]]></title><description><![CDATA[Part 2 of 3: Why the Business Case for Enterprise AI Is Built on Sand]]></description><link>https://blog.aji.sh/p/the-mirage-of-ai-roi</link><guid isPermaLink="false">https://blog.aji.sh/p/the-mirage-of-ai-roi</guid><dc:creator><![CDATA[Ajish]]></dc:creator><pubDate>Fri, 30 Jan 2026 10:04:10 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!OEAf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b12ad18-4fa7-41b8-b177-f9c05c91e90d_2752x1536.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><blockquote><p><strong>The Thesis:</strong> AI ROI models measure the wrong unit. They price tokens; enterprises pay for outcomes under constraints.</p><p><strong>The Constraint:</strong> Generation costs deflate aggressively. Verification costs amortize poorly in consequence-bearing domains. This &#8220;Markov Tax&#8221; inverts expected economics wherever errors have consequences.</p><p><strong>The Implication:</strong> Current business cases conflate inference deflation with enterprise TCO, ignore failure-heavy pilot portfolios, and treat governance as overhead rather than cost of goods sold.</p></blockquote><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OEAf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b12ad18-4fa7-41b8-b177-f9c05c91e90d_2752x1536.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OEAf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b12ad18-4fa7-41b8-b177-f9c05c91e90d_2752x1536.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OEAf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b12ad18-4fa7-41b8-b177-f9c05c91e90d_2752x1536.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OEAf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b12ad18-4fa7-41b8-b177-f9c05c91e90d_2752x1536.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OEAf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b12ad18-4fa7-41b8-b177-f9c05c91e90d_2752x1536.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OEAf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b12ad18-4fa7-41b8-b177-f9c05c91e90d_2752x1536.jpeg" width="2752" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6b12ad18-4fa7-41b8-b177-f9c05c91e90d_2752x1536.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:2752,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:902148,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.aji.sh/i/186185589?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ad6f156-fbcf-463a-aa57-88e2a4a42801_2752x1536.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OEAf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b12ad18-4fa7-41b8-b177-f9c05c91e90d_2752x1536.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OEAf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b12ad18-4fa7-41b8-b177-f9c05c91e90d_2752x1536.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OEAf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b12ad18-4fa7-41b8-b177-f9c05c91e90d_2752x1536.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OEAf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b12ad18-4fa7-41b8-b177-f9c05c91e90d_2752x1536.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Enterprise AI is being sold with the confidence of a utility and priced with the behavior of a land grab.</p><p>That mismatch breaks ROI before a single model is deployed.</p><p>Most ROI narratives treat AI like a deterministic software upgrade: drop it in, compress cycle times, reduce headcount, move on. What is actually being introduced is a probabilistic operating regime&#8212;new cost structures, new failure modes, and a governance surface that resembles less a &#8220;tool&#8221; than a new category of actor inside the business.</p><p>The outcome is predictable: decks full of &#8220;transformative value&#8221; and a quiet refusal to interrogate the denominator.</p><div><hr></div><h2>What the Believers Have Right</h2><p>Before diagnosing the fallacy, acknowledge what the believers have right.</p><p><strong>The cost curve is violent.</strong> <a href="https://aiindex.stanford.edu/report/">Stanford&#8217;s AI Index</a> documents a 280&#215; drop in inference cost for GPT-3.5-equivalent performance between late 2022 and late 2024, with task-dependent declines ranging from 9&#215; to 900&#215; per year. This is what computation does. The slope will continue.</p><p><strong>Open-weight models are closing the gap.</strong> The same AI Index reports open-weight models narrowing performance differences with closed models on key benchmarks. Self-hosting and multi-provider strategies become more credible, not less.</p><p><strong>In some domains, productivity uplift is measurable.</strong> <a href="https://www.nber.org/papers/w31161">Field evidence</a> shows GenAI assistance improving call-center productivity by approximately 14%, with benefits concentrated among less-experienced workers. Developer productivity studies show meaningful gains in controlled settings. These are real effects in specific contexts.</p><p><strong>The labor arbitrage spread is large.</strong> In bounded domains, the cost differential between human and agent can be 1,000% to 10,000%. Even with 30% failure rates requiring human review, the 70% autonomous throughput is achieved at pennies on the dollar.</p><p>So yes: costs are dropping, models are improving, labor arbitrage exists, and certain use cases are already positive.</p><p>The problem is what happens when that truth gets generalized into a business case template.</p><div><hr></div><h2>Where ROI Is Already Repeatable</h2><p>The critique is not that ROI doesn&#8217;t exist. It does&#8212;in bounded domains:</p><ul><li><p><strong>Copilot augmentation</strong> in high-volume knowledge work: support triage, compliance drafting, QA review</p></li><li><p><strong>Search and classification</strong> over enterprise corpora where error cost is bounded and human review is efficient</p></li><li><p><strong>Developer productivity</strong> in controlled environments&#8212;large fractions of developers now use AI coding tools daily, with double-digit velocity gains reported in controlled studies</p></li></ul><p>The mistake isn&#8217;t that local wins are fake. It&#8217;s that they&#8217;re being priced like enterprise transformation. The 14% call center uplift does not port to legal review, clinical decision support, or financial modeling. Specificity is the enemy of the template.</p><div><hr></div><h2>The Meter Is Wrong</h2><p>Here is the economic problem most ROI models elide: <strong>the spreadsheet prices tokens; the business pays for constrained outcomes.</strong></p><p>This is basis risk. The metered unit is not the economic unit.</p><p>The <a href="https://www.theverge.com/2025/1/27/24352728/deepseek-ai-china-chatgpt-openai">DeepSeek moment</a> made this vivid. Frontier-level inference at $0.14&#8211;$0.55 per million tokens. Training costs a fraction of Western incumbents. The market concluded: intelligence is becoming free.</p><p>The conclusion is half-right. Raw inference is commoditizing. But the enterprise doesn&#8217;t purchase tokens&#8212;it purchases outcomes with constraints: auditability, reversibility, authorization semantics, evidentiary trails, policy compliance, tail-risk containment.</p><p>Those constraint-bearing layers remain labor-, integration-, and liability-shaped. They don&#8217;t follow exponential cost curves.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ads0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dbd8e50-c9e9-46cc-b522-073f7d767792_2816x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ads0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dbd8e50-c9e9-46cc-b522-073f7d767792_2816x1536.png 424w, https://substackcdn.com/image/fetch/$s_!Ads0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dbd8e50-c9e9-46cc-b522-073f7d767792_2816x1536.png 848w, https://substackcdn.com/image/fetch/$s_!Ads0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dbd8e50-c9e9-46cc-b522-073f7d767792_2816x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!Ads0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dbd8e50-c9e9-46cc-b522-073f7d767792_2816x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ads0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dbd8e50-c9e9-46cc-b522-073f7d767792_2816x1536.png" width="1456" height="794" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7dbd8e50-c9e9-46cc-b522-073f7d767792_2816x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:794,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:12538594,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.aji.sh/i/186185589?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dbd8e50-c9e9-46cc-b522-073f7d767792_2816x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Ads0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dbd8e50-c9e9-46cc-b522-073f7d767792_2816x1536.png 424w, https://substackcdn.com/image/fetch/$s_!Ads0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dbd8e50-c9e9-46cc-b522-073f7d767792_2816x1536.png 848w, https://substackcdn.com/image/fetch/$s_!Ads0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dbd8e50-c9e9-46cc-b522-073f7d767792_2816x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!Ads0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dbd8e50-c9e9-46cc-b522-073f7d767792_2816x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Even if raw inference deflates to near-zero, wrappers monetize constraints: governance features, workflow products, risk controls, seat models, bundles, commitments, indemnities.</p><p><a href="https://techcrunch.com/2024/10/31/anthropic-is-ending-its-discount-program-for-startups/">Anthropic introduced rate limiting</a> after users consumed tens of thousands in model usage on flat-rate subscriptions. OpenAI signaled that <a href="https://www.theverge.com/2024/9/27/24256863/openai-chatgpt-plus-subscription-price-increase-ai">ChatGPT Plus at $20/month may be unsustainable</a>. The pattern is clear: prices rise at the product layer even as raw inference costs decline.</p><p>The subsidy is being withdrawn. The meter was always wrong.</p><p>Even if underlying inference continues to deflate, enterprises should assume pricing will migrate upward into the constraint-bearing layers: guarantees, governance, latency, indemnities, and integration. The margin moves; it doesn&#8217;t disappear.</p><div><hr></div><h2>The FinOps Reckoning</h2><p>The organizational mechanism that will enforce this reality is already emerging: <a href="https://www.finops.org/introduction/what-is-finops/">FinOps</a>, chargeback models, and hard consumption quotas. When AI spend hits a budget line with an owner&#8212;rather than floating as &#8220;innovation investment&#8221;&#8212;the gap between token optimism and outcome economics becomes visible. Governance stops being philosophy and starts being a P&amp;L constraint.</p><div><hr></div><h2>The Consumption Trap</h2><p>The counterargument: cheap inference solves the economics.</p><p>The opposite is true.</p><p><a href="https://en.wikipedia.org/wiki/Jevons_paradox">Jevons Paradox</a> holds. When a resource becomes more efficient to use, total consumption increases rather than decreases. Enterprises aren&#8217;t consuming less&#8212;they&#8217;re consuming orders of magnitude more: chain-of-thought reasoning, majority voting, agentic loops, retries.</p><p>If document processing scales from 1,000/day to 1,000,000 because inference is cheap, the verification burden scales by 1,000x. Human review doesn&#8217;t follow exponential cost curves.</p><p>Cheap inference doesn&#8217;t solve the governance problem. It floods the enterprise with &#8220;plausible but unverified&#8221; faster than any human process can absorb. The Markov Tax becomes the hard ceiling on ROI.</p><p>The second-order effect: verification becomes a new labor market&#8212;QA, reviewers, model risk analysts, audit evidence production, red-teaming&#8212;and wages rise in exactly the places enterprises assumed AI would eliminate cost.</p><div><hr></div><h2>The Production Cliff</h2><p>The portfolio baseline is failure-to-production. Ignoring it is incomplete accounting.</p><p><a href="https://mitsloan.mit.edu/ideas-made-to-matter/why-many-ai-projects-fail-and-how-make-yours-succeed">MIT research</a> frames it bluntly: despite $30&#8211;40 billion in enterprise GenAI investment, 95% of organizations report zero return, and only 5% of evaluated systems reach production. <a href="https://www.idc.com/getdoc.jsp?containerId=US51881724">IDC&#8217;s numbers</a> point the same direction: 88% of AI proofs-of-concept never reach widescale deployment. <a href="https://www.gartner.com/en/newsroom/press-releases/2024-07-29-gartner-says-30-percent-of-generative-ai-projects-will-be-abandoned-by-the-end-of-2025">Gartner reports</a> enterprises routinely abandon a significant portion of AI pilots before production.</p><p>The counterargument is that this is a lagging indicator&#8212;the 1996 of AI. Tooling will mature. Success rates will invert.</p><p>Partially true. But the tooling problems are the smaller fraction. The larger fraction is organizational: accountability gaps, integration complexity, incentive misalignment, governance structures that can&#8217;t make cross-silo decisions. These are the same failure modes that have plagued ERP implementations and data warehouse projects for 30 years. AI doesn&#8217;t solve organizational dysfunction; it amplifies it.</p><p>Even if the percentages are debated, the distribution is not: lots of pilots, few production systems with durable ownership, evals, and change control.</p><p>Firm-level ROI is a weighted average across abandoned pilots, partial deployments, a handful of scaled wins, and the organizational cost of running the experiment factory. If failure rates aren&#8217;t modeled, ROI isn&#8217;t analysis. It&#8217;s fan fiction with numbers.</p><div><hr></div><h2>The Operating Model You Didn&#8217;t Budget For</h2><p>AI drags in a structural cost layer that most ROI templates omit:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EgLC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6529522a-3122-4530-a57f-09cd3efaa8fc_2816x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EgLC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6529522a-3122-4530-a57f-09cd3efaa8fc_2816x1536.png 424w, https://substackcdn.com/image/fetch/$s_!EgLC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6529522a-3122-4530-a57f-09cd3efaa8fc_2816x1536.png 848w, https://substackcdn.com/image/fetch/$s_!EgLC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6529522a-3122-4530-a57f-09cd3efaa8fc_2816x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!EgLC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6529522a-3122-4530-a57f-09cd3efaa8fc_2816x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EgLC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6529522a-3122-4530-a57f-09cd3efaa8fc_2816x1536.png" width="1456" height="794" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6529522a-3122-4530-a57f-09cd3efaa8fc_2816x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:794,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:13507762,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.aji.sh/i/186185589?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6529522a-3122-4530-a57f-09cd3efaa8fc_2816x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!EgLC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6529522a-3122-4530-a57f-09cd3efaa8fc_2816x1536.png 424w, https://substackcdn.com/image/fetch/$s_!EgLC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6529522a-3122-4530-a57f-09cd3efaa8fc_2816x1536.png 848w, https://substackcdn.com/image/fetch/$s_!EgLC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6529522a-3122-4530-a57f-09cd3efaa8fc_2816x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!EgLC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6529522a-3122-4530-a57f-09cd3efaa8fc_2816x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Verification</strong> can be partially automated&#8212;evals, synthetic tests, policy checking. The tooling is maturing.</p><p><strong>Accountability</strong> cannot be automated. Who signs. Who is liable. What evidence is produced. What the regulator accepts. &#8220;The model evaluated itself&#8221; is not a legal defense.</p><p>Verification includes legal defensibility and disclosure integrity. The SEC has already <a href="https://www.sec.gov/newsroom/press-releases/2024-36">charged firms for &#8220;AI washing&#8221;</a>&#8212;misleading claims about AI capabilities. <a href="https://artificialintelligenceact.eu/ai-act-implementation/">EU AI Act</a> enforcement begins August 2026, with major provisions including obligations for general-purpose AI systems. These are not thinkpieces; they are compliance calendars. The cost of producing audit-ready evidence for probabilistic systems is now a recurring line item, not a one-time implementation fee.</p><p><em>In AI, reliability and governance are not accessories. They are recurring cost of goods sold.</em></p><div><hr></div><h2>The Agentic Amplifier</h2><p>Agentic AI is the newest amplifier of the ROI fallacy because it invites the laziest translation in enterprise history:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ka2L!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2452ee-6c87-45cb-8bf9-1f4467fbebd8_1376x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ka2L!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2452ee-6c87-45cb-8bf9-1f4467fbebd8_1376x768.png 424w, https://substackcdn.com/image/fetch/$s_!ka2L!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2452ee-6c87-45cb-8bf9-1f4467fbebd8_1376x768.png 848w, https://substackcdn.com/image/fetch/$s_!ka2L!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2452ee-6c87-45cb-8bf9-1f4467fbebd8_1376x768.png 1272w, https://substackcdn.com/image/fetch/$s_!ka2L!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2452ee-6c87-45cb-8bf9-1f4467fbebd8_1376x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ka2L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2452ee-6c87-45cb-8bf9-1f4467fbebd8_1376x768.png" width="1376" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf2452ee-6c87-45cb-8bf9-1f4467fbebd8_1376x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1376,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1225424,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.aji.sh/i/186185589?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2452ee-6c87-45cb-8bf9-1f4467fbebd8_1376x768.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ka2L!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2452ee-6c87-45cb-8bf9-1f4467fbebd8_1376x768.png 424w, https://substackcdn.com/image/fetch/$s_!ka2L!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2452ee-6c87-45cb-8bf9-1f4467fbebd8_1376x768.png 848w, https://substackcdn.com/image/fetch/$s_!ka2L!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2452ee-6c87-45cb-8bf9-1f4467fbebd8_1376x768.png 1272w, https://substackcdn.com/image/fetch/$s_!ka2L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2452ee-6c87-45cb-8bf9-1f4467fbebd8_1376x768.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Industry signals are unusually aligned. <a href="https://www.gartner.com/en/newsroom/press-releases/2024-10-14-gartner-identifies-the-top-10-strategic-technology-trends-for-2025">Gartner forecasts</a> over 40% of agentic projects will be canceled by 2027 due to cost, unclear value, and risk control gaps. Fewer than one in eight enterprises actually run agents in production.</p><p>Here is the key correction:</p><p><strong>At enterprise scale, agents rarely substitute labor cleanly. They substitute certainty with orchestration.</strong></p><p>The labor arbitrage exists&#8212;the spread between silicon and carbon is real. But the arithmetic collapses when you measure the wrong unit.</p><p>The unit is not &#8220;cost per agent-hour.&#8221; It is: <strong>cost per correct outcome under constraints, including tail risk.</strong></p><p>In enterprise workflows, the cost of errors can dominate compute: financial mispostings, entitlement mistakes, compliance violations, customer-impacting failures, audit exceptions requiring remediation programs. The 30% failure rate is not &#8220;30% needs review.&#8221; It&#8217;s often &#8220;30% creates downstream cleanup with nonlinear cost.&#8221;</p><p>If thirty minutes of a competent operator is replaced with an agent that burns compute through orchestration, retries, tool calls, and approvals&#8212;and still needs a human to validate&#8212;you did not create ROI. You moved costs from payroll to compute, governance, and remediation.</p><p>Sometimes that trade is still worth it. It does not automatically create ROI.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3H5t!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e2f0d5a-3ebc-4780-9d32-3551a65c548c_2816x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3H5t!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e2f0d5a-3ebc-4780-9d32-3551a65c548c_2816x1536.png 424w, https://substackcdn.com/image/fetch/$s_!3H5t!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e2f0d5a-3ebc-4780-9d32-3551a65c548c_2816x1536.png 848w, https://substackcdn.com/image/fetch/$s_!3H5t!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e2f0d5a-3ebc-4780-9d32-3551a65c548c_2816x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!3H5t!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e2f0d5a-3ebc-4780-9d32-3551a65c548c_2816x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3H5t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e2f0d5a-3ebc-4780-9d32-3551a65c548c_2816x1536.png" width="1456" height="794" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0e2f0d5a-3ebc-4780-9d32-3551a65c548c_2816x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:794,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:12735393,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.aji.sh/i/186185589?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e2f0d5a-3ebc-4780-9d32-3551a65c548c_2816x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3H5t!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e2f0d5a-3ebc-4780-9d32-3551a65c548c_2816x1536.png 424w, https://substackcdn.com/image/fetch/$s_!3H5t!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e2f0d5a-3ebc-4780-9d32-3551a65c548c_2816x1536.png 848w, https://substackcdn.com/image/fetch/$s_!3H5t!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e2f0d5a-3ebc-4780-9d32-3551a65c548c_2816x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!3H5t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e2f0d5a-3ebc-4780-9d32-3551a65c548c_2816x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>The mistake is not agents. It&#8217;s unpriced tail risk.</em></p><div><hr></div><h2>The Translation Layer</h2><p>Most &#8220;legacy&#8221; talk is lazy. It treats anything old as drag and anything new as progress.</p><p>The reality is that a large class of so-called legacy systems are not obsolete technology. They are the enterprise&#8217;s immune system&#8212;existing to preserve accountable truth.</p><p>Modern enterprises run on systems that encode hard-won constraints: approval sequencing, segregation of duties, change windows, ownership checks, reconciliations, audit trails. Those controls are not bolt-ons. They are part of the workflow grammar. They are why the system is trusted.</p><p>Immune systems can become autoimmune. Controls that preserve truth can also throttle throughput. The goal is programmable immunity: preserve constraints while compressing friction.</p><p>But there&#8217;s a separate category: true legacy footprints&#8212;mainframe, midrange, batch interfaces, proprietary protocols, stateful procedures. This is not immune system; this is geology.</p><p>Agents can&#8217;t wrap around timing assumptions and implicit state. Modern orchestration assumes idempotent calls, explicit state, observable outcomes. Legacy systems frequently embed state transitions in procedural sequences where &#8220;step 3 failed&#8221; doesn&#8217;t mean &#8220;nothing happened.&#8221; It means &#8220;something happened and you don&#8217;t know what.&#8221;</p><p>Agents amplify this because they explore and retry. The system interprets retries as duplicate business actions. You just invented double-billing, duplicate orders, phantom entitlements&#8212;at machine speed.</p><p>We&#8217;ve seen this movie before. RPA promised to automate across brittle applications by mimicking the human path. It worked in narrow, stable, well-bounded workflows. It became fragile under UI change, exception variance, and upstream drift. It scaled brittleness when used as a substitute for modernization.</p><p>Agentic orchestration repeats the temptation with better marketing and a bigger blast radius.</p><p>What enterprises actually build is not an &#8220;agent layer.&#8221; They build a <strong>translation layer</strong>: policy gates, intent validation, reversible execution, human-readable justification, evidence capture.</p><p>Call it boring. It&#8217;s the immune response. Agents don&#8217;t repeal physics.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jNI9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0be0d74-7998-4a12-9563-ffd3af18688d_2816x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jNI9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0be0d74-7998-4a12-9563-ffd3af18688d_2816x1536.png 424w, https://substackcdn.com/image/fetch/$s_!jNI9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0be0d74-7998-4a12-9563-ffd3af18688d_2816x1536.png 848w, https://substackcdn.com/image/fetch/$s_!jNI9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0be0d74-7998-4a12-9563-ffd3af18688d_2816x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!jNI9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0be0d74-7998-4a12-9563-ffd3af18688d_2816x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jNI9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0be0d74-7998-4a12-9563-ffd3af18688d_2816x1536.png" width="1456" height="794" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d0be0d74-7998-4a12-9563-ffd3af18688d_2816x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:794,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:5311477,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.aji.sh/i/186185589?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0be0d74-7998-4a12-9563-ffd3af18688d_2816x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!jNI9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0be0d74-7998-4a12-9563-ffd3af18688d_2816x1536.png 424w, https://substackcdn.com/image/fetch/$s_!jNI9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0be0d74-7998-4a12-9563-ffd3af18688d_2816x1536.png 848w, https://substackcdn.com/image/fetch/$s_!jNI9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0be0d74-7998-4a12-9563-ffd3af18688d_2816x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!jNI9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0be0d74-7998-4a12-9563-ffd3af18688d_2816x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><blockquote><p><br><strong>For AI Platform &amp; Product Leaders</strong><br><br>If deals are stalling in pilot purgatory, the verification asymmetry explains why. You&#8217;re selling tokens. The customer is buying outcomes.<br><br>The product opportunity is the constrained-outcome layer:<br>&#8226; Evals and regression as product features, not customer problems<br>&#8226; Policy enforcement built in, not bolted on<br>&#8226; Audit evidence as default output, not optional logging<br>&#8226; Rollback as architectural primitive, not afterthought<br>&#8226; Pricing aligned to outcomes, not token volume<br><br>Vendors selling &#8220;autonomy&#8221; without constrained execution will churn.<br>Vendors selling constrained outcomes will become infrastructure.</p></blockquote><div><hr></div><h2>The Stress-Tested Thesis</h2><p>The critique is not that AI cannot create value. It can. The labor arbitrage is real. The cost curve is real. The productivity gains in bounded domains are measurable.</p><p>The critique is that ROI decks are measuring the wrong unit.</p><p>Inference deflates; enterprise TCO does not deflate at the same rate. The enterprise isn&#8217;t buying tokens&#8212;it&#8217;s buying outcomes with constraints. The constraint-bearing layers are where cost volatility lives.</p><p>Portfolio baselines assume success; reality is failure-heavy. Pilots are cheap; production is expensive. Ignoring the denominator isn&#8217;t optimism; it&#8217;s incomplete accounting.</p><p>AI introduces recurring operating costs that behave like COGS, not one-time implementation. Reliability and accountability are permanent line items.</p><p>The labor arbitrage exists, but the unit matters. Cost per agent-hour obscures cost per correct outcome under constraints, including tail risk.</p><p>The ROI mirage is not conspiracy. It&#8217;s the predictable result of applying consumer-tech logic to enterprise-grade constraints&#8212;the same category error that produces cargo cult adoption of every paradigm mistaken for a strategy.</p><div><hr></div><p>The question is not whether AI creates value. It can, and it does&#8212;in specific domains with measurable effects. The question is whether the enterprise can capture that value without building the firm on probabilistic debt.</p><p>The business case for AI, as currently constructed, conflates inference deflation with enterprise TCO, ignores the pilot-to-production cliff, and measures the wrong unit entirely. That&#8217;s not a technology problem. It&#8217;s an accounting problem&#8212;and accounting problems eventually become balance sheet events.</p><p><strong>Part 3 offers the prescription: how to use AI as scaffolding for transformation rather than as permanent, ungovernable substrate.</strong></p>]]></content:encoded></item><item><title><![CDATA[The Post-Deterministic Company: Escaping the Iron Cage of Certainty]]></title><description><![CDATA[Part 1 of 3: The Ontological Rupture]]></description><link>https://blog.aji.sh/p/the-post-deterministic-company-escaping</link><guid isPermaLink="false">https://blog.aji.sh/p/the-post-deterministic-company-escaping</guid><dc:creator><![CDATA[Ajish]]></dc:creator><pubDate>Tue, 20 Jan 2026 09:02:32 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!m-Nq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e3f30c1-d77f-4c4a-a4ff-0a0c1de60244_2816x1536.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>In which we diagnose the fundamental tension between deterministic enterprise and probabilistic technology&#8212;and why resolving it requires more than better tooling.</em></p><blockquote><p><strong>The Thesis:</strong> AI is most valuable as scaffolding for transformation, not as permanent infrastructure.</p><p><strong>The Constraint:</strong> Generation costs trend to zero; verification costs don&#8217;t amortize. This &#8220;Markov Tax&#8221; inverts the expected ROI of most enterprise AI initiatives.</p><p><strong>The Implication:</strong> The Post-Deterministic firm is a transitional state, not a destination. Organizations must pass through it&#8212;using agents to discover and prototype&#8212;then compile stable patterns into deterministic systems with defensible economics.</p><p><strong>What Part 1 Delivers:</strong> A diagnostic framework for understanding why AI transformation is harder than the hype suggests, and why governance architecture&#8212;not model capability&#8212;is the binding constraint.</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!m-Nq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e3f30c1-d77f-4c4a-a4ff-0a0c1de60244_2816x1536.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!m-Nq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e3f30c1-d77f-4c4a-a4ff-0a0c1de60244_2816x1536.heic 424w, https://substackcdn.com/image/fetch/$s_!m-Nq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e3f30c1-d77f-4c4a-a4ff-0a0c1de60244_2816x1536.heic 848w, https://substackcdn.com/image/fetch/$s_!m-Nq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e3f30c1-d77f-4c4a-a4ff-0a0c1de60244_2816x1536.heic 1272w, https://substackcdn.com/image/fetch/$s_!m-Nq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e3f30c1-d77f-4c4a-a4ff-0a0c1de60244_2816x1536.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!m-Nq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e3f30c1-d77f-4c4a-a4ff-0a0c1de60244_2816x1536.heic" width="1456" height="794" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3e3f30c1-d77f-4c4a-a4ff-0a0c1de60244_2816x1536.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:794,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:883236,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.aji.sh/i/185135871?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e3f30c1-d77f-4c4a-a4ff-0a0c1de60244_2816x1536.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!m-Nq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e3f30c1-d77f-4c4a-a4ff-0a0c1de60244_2816x1536.heic 424w, https://substackcdn.com/image/fetch/$s_!m-Nq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e3f30c1-d77f-4c4a-a4ff-0a0c1de60244_2816x1536.heic 848w, https://substackcdn.com/image/fetch/$s_!m-Nq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e3f30c1-d77f-4c4a-a4ff-0a0c1de60244_2816x1536.heic 1272w, https://substackcdn.com/image/fetch/$s_!m-Nq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e3f30c1-d77f-4c4a-a4ff-0a0c1de60244_2816x1536.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>For five centuries, the primary purpose of the corporation has been to banish surprise.</p><p>From the clay tablets of Sumer to the Excel spreadsheets of your CFO, we have constructed an elaborate apparatus designed to freeze time and enforce order. The firm exists as a low-entropy island in a high-entropy sea, deploying ledgers, contracts, and bureaucracies to collapse the chaotic probability distribution of the world into the deterministic certainty of the bottom line. Call it the <strong>Certainty Machine</strong>.</p><p>The machine is breaking. In a hyper-connected, complex adaptive economy, Weber&#8217;s &#8220;<a href="https://en.wikipedia.org/wiki/Iron_cage">Iron Cage</a>&#8220; of bureaucracy hasn&#8217;t become obsolete&#8212;it&#8217;s become <em>incompatible</em> with probabilistic inputs. We are attempting to run probabilistic software on top of a deterministic liability structure. The friction isn&#8217;t cultural; it&#8217;s structural. The cage is still load-bearing; we can&#8217;t demolish it. We have to build an integration layer.</p><p></p><p>What emerges from this integration challenge is the <strong>Post-Deterministic Company</strong>&#8212;a firm that has internalized non-determinism as a core operating principle, abandoning the root metaphor of the machine (clockwork, linear, predictable) for the metaphor of the organism (cybernetic, probabilistic, adaptive). It doesn&#8217;t replace the rigid hierarchy wholesale; it augments it with the agentic swarm&#8212;bounded, monitored, reversible, but fundamentally probabilistic.</p><p>This shift promises a revolution in agility that renders current &#8220;digital transformation&#8221; initiatives quaint administrative tinkering. But it also introduces systemic risks with balance-sheet consequences&#8212;Loss Given Failure events, operational cascades, regulatory exposure&#8212;that we have scarcely begun to model. And critically: the organizations most desperate for this transformation are precisely those least equipped to execute it.</p><p>This is Part 1 of a three-part series. Here we diagnose the ontological rupture&#8212;the fundamental incompatibility between how enterprises have always operated and what AI actually is. Part 2 deconstructs why current AI ROI calculations are built on sand: subsidized pricing, ignored failure rates, unmeasured governance costs, and the <strong>Markov Tax</strong>&#8212;the verification overhead that inverts expected economics. Part 3 offers the prescription: how to use AI as scaffolding for transformation rather than as permanent, ungovernable substrate.</p><p>The thesis across all three parts is simple: <strong>AI is most valuable not as permanent infrastructure, but as an accelerant for building infrastructure that does not require AI.</strong> The companies that understand this will capture the productivity gains of the current moment while avoiding the dependency trap. The companies that do not will find themselves paying an escalating AI tax on workflows that should have been deterministic years ago.</p><p>But first, we need to understand what we&#8217;re escaping from&#8212;what we might escape into&#8212;and why the passage between them is narrower than the hype suggests.</p><h2><strong>The Archaeology of Order: Why We Built the Certainty Machine</strong></h2><p>To appreciate the magnitude of this shift, we must confront the sheer historical weight pressing against it. The history of business is not merely a history of trade; it is a history of <em>information technologies designed to produce auditable truth</em>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0mKx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F903c04b1-61c4-45a5-9b63-fc8a3936f60c_2816x1536.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0mKx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F903c04b1-61c4-45a5-9b63-fc8a3936f60c_2816x1536.heic 424w, https://substackcdn.com/image/fetch/$s_!0mKx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F903c04b1-61c4-45a5-9b63-fc8a3936f60c_2816x1536.heic 848w, https://substackcdn.com/image/fetch/$s_!0mKx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F903c04b1-61c4-45a5-9b63-fc8a3936f60c_2816x1536.heic 1272w, https://substackcdn.com/image/fetch/$s_!0mKx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F903c04b1-61c4-45a5-9b63-fc8a3936f60c_2816x1536.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0mKx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F903c04b1-61c4-45a5-9b63-fc8a3936f60c_2816x1536.heic" width="1456" height="794" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/903c04b1-61c4-45a5-9b63-fc8a3936f60c_2816x1536.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:794,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:856985,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.aji.sh/i/185135871?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F903c04b1-61c4-45a5-9b63-fc8a3936f60c_2816x1536.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0mKx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F903c04b1-61c4-45a5-9b63-fc8a3936f60c_2816x1536.heic 424w, https://substackcdn.com/image/fetch/$s_!0mKx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F903c04b1-61c4-45a5-9b63-fc8a3936f60c_2816x1536.heic 848w, https://substackcdn.com/image/fetch/$s_!0mKx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F903c04b1-61c4-45a5-9b63-fc8a3936f60c_2816x1536.heic 1272w, https://substackcdn.com/image/fetch/$s_!0mKx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F903c04b1-61c4-45a5-9b63-fc8a3936f60c_2816x1536.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Civilization began with the ledger. The invention of writing in ancient Mesopotamia (circa 3300 BCE) was driven not by poetry or mythology, but by the need to track grain stores and labor obligations. The clay tablet froze the state of the world: a debt recorded in clay became an objective, immutable fact, independent of human memory. This was the first certainty machine.</p><p>The <a href="https://en.wikipedia.org/wiki/Code_of_Hammurabi">Code of Hammurabi</a> (circa 1750 BCE) extended this logic from accounting to governance. By inscribing 282 laws on a stone stele&#8212;specifying precise penalties for precise offenses&#8212;Hammurabi made justice <em>deterministic</em>. &#8220;If a builder builds a house and the house collapses and kills the owner, the builder shall be put to death.&#8221; No ambiguity, no judicial discretion, no probability distribution over outcomes. The law became an algorithm: given input X, output Y. The innovation wasn&#8217;t justice; it was <em>audit defensibility</em>&#8212;a public record of the rule applied, eliminating the variance of human judgment. This was the prototype for every compliance framework and standard operating procedure that would follow.</p><p>The drive reached its apotheosis in 1494 when Luca Pacioli codified <strong><a href="https://en.wikipedia.org/wiki/Double-entry_bookkeeping">Double-Entry Bookkeeping</a></strong>. By mandating that every debit have a corresponding credit, Pacioli created a closed, balanced universe&#8212;a conservation law for value. This &#8220;accounting reality&#8221; became the trust substrate of modern capitalism, enabling strangers to transact across vast distances because they shared access to a deterministic truth.</p><p>The Industrial Revolution scaled this certainty through <strong>Bureaucracy</strong>. Max Weber identified bureaucracy not as inefficiency, but as the triumph of <em>calculability</em>. The &#8220;Iron Cage&#8221; transformed variable human workers into deterministic components. Standard Operating Procedures became the source code of the industrial firm.</p><p>For 500 years, success meant reducing variance. The entire managerial edifice&#8212;from Taylor&#8217;s scientific management to Six Sigma to the modern compliance apparatus&#8212;exists to collapse probability distributions into point estimates.</p><p>Today, success increasingly means <em>exploiting</em> variance. The firms that thrive will be those that can surf the probability wave rather than dam it. But here&#8217;s the part the hype cycle elides: you cannot simply swap out the deterministic substrate for a probabilistic one and expect the enterprise to continue functioning. The trust architecture doesn&#8217;t port.</p><h2><strong>What the Enterprise Actually Is</strong></h2><p>Before we can understand what&#8217;s breaking, we need to be honest about what the enterprise actually is&#8212;beneath the org charts and mission statements.</p><p>Most process documentation is decorative. The real operating model is exceptions, arbitration, handoffs, tribal knowledge. Where the documentation says &#8220;submit request to approval queue,&#8221; reality says &#8220;message Janet because she knows which requests actually get processed.&#8221; Where the workflow diagram shows a clean decision tree, actual practice involves thirty years of accumulated workarounds navigating systems that were never designed to talk to each other.</p><p>This isn&#8217;t dysfunction. This is how complex organizations function at all. Human operators serve as the connective tissue between systems that were never integrated, policies that conflict, and edge cases that nobody anticipated. They are walking exception handlers, and their institutional knowledge&#8212;undocumented, untransferable, irreplaceable&#8212;is what keeps the enterprise from seizing up.</p><p>The Post-Deterministic Company exposes this reality in uncomfortable ways. Agents cannot improvise the way a human operator can. They are forced to externalize ambiguity. Their failures are signal. Their traces become telemetry. Where the human worker navigates dysfunction through institutional memory and negotiated workarounds, the agent breaks&#8212;and in breaking, reveals the true topology of the workflow.</p><p>This exposure is simultaneously promise and peril. The peril: many organizations will discover they don&#8217;t have processes at all&#8212;just patterns of human improvisation that cannot be automated because they were never systematic in the first place. The promise: AI becomes a tool for process archaeology, surfacing the actual operating model rather than the documented fiction. And once surfaced, that operating model becomes the raw material for genuine transformation.</p><h2><strong>The Adaptive Advantage: What the Post-Deterministic Firm Can Actually Do</strong></h2><p>The critique of determinism is not merely that it&#8217;s slow. It&#8217;s that deterministic architectures cannot learn, cannot sense, cannot adapt without human intervention at every joint. The Post-Deterministic Company promises something qualitatively different: an organization that improves continuously, responds in real-time, and treats change as a normal operating condition rather than a disruption to be managed.</p><p><strong>Decision velocity as strategic weapon.</strong> When your competitor&#8217;s approval chain takes two weeks and yours takes two seconds, you occupy a different competitive universe. The Post-Deterministic firm doesn&#8217;t just make faster decisions&#8212;it makes decisions at the speed of the environment, closing the loop between sensing and acting that deterministic bureaucracies leave permanently open. A pricing change, a supply chain reroute, a customer intervention&#8212;these happen while the situation is still developing, not after it has already resolved itself or metastasized.</p><p><strong>The learning organization, finally realized.</strong> Peter Senge&#8217;s <em>Fifth Discipline</em> promised the &#8220;learning organization&#8221; in 1990. Thirty years of change management programs failed to deliver it, because the underlying systems couldn&#8217;t learn&#8212;only humans could, and their learning had to be manually re-encoded into process documents that nobody read. The Post-Deterministic firm embeds learning in the operational fabric. Agents observe outcomes, adjust behaviors, and propagate improvements without waiting for the annual process review. Feedback loops measured in hours, not fiscal quarters.</p><p><strong>Cost structures that decouple from headcount.</strong> In the deterministic firm, scaling the business means scaling the workforce. Revenue and headcount move in lockstep because humans are the processing units. The Post-Deterministic firm breaks this coupling. Marginal cost trends toward compute cost, not labor cost. A customer service operation handles 10x the volume without 10x the staff. An underwriting function processes 1,000 applications with the same team that once processed 100. The economic algebra changes fundamentally.</p><p><strong>Personalization at scale.</strong> Deterministic processes force reality into predetermined categories because that&#8217;s all they can handle. The Post-Deterministic firm treats every customer, every transaction, every edge case as genuinely unique&#8212;tailoring responses, pricing, and service to individual circumstances rather than crude segments. This isn&#8217;t just better customer experience; it&#8217;s better risk selection, better fraud detection, better capital allocation.</p><p><strong>The firm that can rewrite itself while running.</strong> Here&#8217;s the deepest shift: <em>the product is not the workflow; the product is the capability to rewrite the workflow safely while running.</em> Deterministic processes are frozen knowledge&#8212;they encode what we knew at design time. The Post-Deterministic firm treats process as hypothesis, continuously tested against reality and revised when reality wins. The competitive moat is not any particular process but the capacity for perpetual adaptation.</p><div class="pullquote"><p><strong>The Post-Deterministic Company is the firm that can rewrite itself while running &#8212; t</strong><em><strong>he product is not the workflow; the product is the capability to rewrite the workflow safely while running.</strong></em></p></div><p>This is not speculative. Narrow versions of this adaptive advantage are already visible in firms that have achieved genuine AI-native operations&#8212;not the &#8220;chatbot veneer&#8221; implementations that dominate current enterprise AI, but deep integration where autonomous systems handle meaningful decision volume. The question is not whether this advantage exists but whether it can be captured without the attendant risks&#8212;and at what organizational cost.</p><h2><strong>The Cybernetic Pivot: The Firm as Control System</strong></h2><p>The Post-Deterministic Company operates on a fundamentally different ontology. It does not seek to control its environment through rigid constraint; it seeks to remain <em>viable</em> within that environment through continuous adaptation. Drawing from the principles of <strong><a href="https://en.wikipedia.org/wiki/Cybernetics">Cybernetics</a></strong>&#8212;the science of communication and control in complex systems&#8212;we redefine the organization not as a hierarchy of authority, but as a control system driven by feedback loops.</p><p><strong>From brittle processes to adaptive policies.</strong> Deterministic workflows function when reality is stable, inputs are pristine, and exceptions are rare. That world has evaporated. The Post-Deterministic firm treats &#8220;edge cases&#8221; not as anomalies to be suppressed, but as <em>the business itself</em>. It builds policies instead of procedures, constraints instead of scripts, adaptive execution instead of brittle orchestration. Most enterprise &#8220;AI initiatives&#8221; simply encode existing deterministic processes into slightly faster deterministic processes, perhaps with a chatbot veneer. They optimize the local while preserving the structural brittleness that creates actual business risk.</p><p><strong>Governance as continuous telemetry.</strong> In the deterministic firm, governance is periodic: the quarterly audit, the monthly steering committee, the annual risk assessment. This cadence made sense when decisions propagated at human timescales. It becomes fatal when autonomous agents operate at machine speed. In the AI-native model, governance transitions from episodic inspection to <strong>continuous telemetry</strong>&#8212;monitoring the decision stream in real-time for variance, bias, policy drift, and emergent constraint violations. Audit becomes a query, not an expedition. The &#8220;paper trail&#8221; transforms from archaeological record to live ledger, scoring every decision for confidence and risk as it happens. The Model Risk Management frameworks that financial institutions have developed for credit models point the direction&#8212;quantitative, continuous, integrated into the operating fabric rather than bolted on after the fact.</p><p><strong>Security as capability engineering.</strong> Traditional cybersecurity operates as a binary gatekeeper: <em>Access Granted</em> or <em>Access Denied</em>. This model collapses in an agentic environment because agents, by their nature, are exploration engines. To be useful, they must traverse novel paths that cannot be pre-enumerated in an access control list. The Post-Deterministic model reframes security as <strong>Capability Engineering</strong>: we define the <strong>Bounded Solution Space</strong>&#8212;the harness within which the agent operates&#8212;rather than prescribing the exact path. Inside this harness, the agent possesses high autonomy to solve problems through whatever means fall within the constraint envelope. Security becomes choreography of constraints rather than a checklist of controls.</p><p><strong>Human oversight, re-architected.</strong> The standard response to agentic risk is &#8220;human in the loop.&#8221; This is the right instinct expressed as an unscalable architecture. Humans operate at one to five decisions per minute; agentic systems operate at thousands. Inserting human approval into every agentic workflow transforms the agent into a manual tool. The alternative&#8212;humans designing the constraint envelope, monitoring aggregate patterns, and intervening at the policy level rather than the transaction level&#8212;requires a fundamentally different conception of management. The cybernetic model requires humans to function as system designers and exception handlers for the exception handlers.</p><h2><strong>The Hard Problems: Why the Transition Is Harder Than the Hype Suggests</strong></h2><p>The adaptive advantage is real, but capturing it requires solving problems that most AI enthusiasm ignores. These fall into three categories: economic, organizational, and systemic.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Wd6G!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d75e5bd-7e61-42b8-8eea-ead4ef9d9e10_1982x1072.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Wd6G!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d75e5bd-7e61-42b8-8eea-ead4ef9d9e10_1982x1072.heic 424w, https://substackcdn.com/image/fetch/$s_!Wd6G!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d75e5bd-7e61-42b8-8eea-ead4ef9d9e10_1982x1072.heic 848w, https://substackcdn.com/image/fetch/$s_!Wd6G!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d75e5bd-7e61-42b8-8eea-ead4ef9d9e10_1982x1072.heic 1272w, https://substackcdn.com/image/fetch/$s_!Wd6G!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d75e5bd-7e61-42b8-8eea-ead4ef9d9e10_1982x1072.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Wd6G!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d75e5bd-7e61-42b8-8eea-ead4ef9d9e10_1982x1072.heic" width="1456" height="788" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8d75e5bd-7e61-42b8-8eea-ead4ef9d9e10_1982x1072.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:788,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:288764,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.aji.sh/i/185135871?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d75e5bd-7e61-42b8-8eea-ead4ef9d9e10_1982x1072.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Wd6G!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d75e5bd-7e61-42b8-8eea-ead4ef9d9e10_1982x1072.heic 424w, https://substackcdn.com/image/fetch/$s_!Wd6G!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d75e5bd-7e61-42b8-8eea-ead4ef9d9e10_1982x1072.heic 848w, https://substackcdn.com/image/fetch/$s_!Wd6G!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d75e5bd-7e61-42b8-8eea-ead4ef9d9e10_1982x1072.heic 1272w, https://substackcdn.com/image/fetch/$s_!Wd6G!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d75e5bd-7e61-42b8-8eea-ead4ef9d9e10_1982x1072.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>The Economic Problem: Verification Doesn&#8217;t Scale</strong></h3><p>Here is the problem most ROI models elide: <strong>the cost of generating output and the cost of verifying output have decoupled catastrophically.</strong></p><p>In the deterministic era, verification costs amortized. Code was written once, tested once, and if the logic was correct, the millionth execution was as safe as the first. In the agentic era, verification is continuous&#8212;decisions occur under <a href="https://en.wikipedia.org/wiki/Partially_observable_Markov_decision_process">partial observability</a>, so assurance becomes continuous belief-updating plus runtime enforcement of safety constraints. You cannot test once and trust forever; you must maintain confidence in real-time.</p><p>Call this the <strong>Markov Tax</strong>: the overhead required to verify that a non-deterministic system has performed correctly. For high-stakes tasks&#8212;legal review, medical diagnosis, financial auditing&#8212;verification cost remains tethered to human cognitive speeds. If an agent generates a contract in three seconds but a lawyer needs thirty minutes to verify it, the labor arbitrage evaporates. The bottleneck shifts from production to verification, and the enterprise discovers it has merely relocated the constraint rather than eliminated it.</p><p>This asymmetry produces an uncomfortable implication: as agents become more capable, the Post-Deterministic firm may experience <em>decreasing returns to intelligence</em> in verification-heavy domains. The overhead of confirming probabilistic truth consumes the labor savings. Generation floods the queue; verification becomes the bottleneck.</p><h3><strong>The Organizational Problem: Determinism Exists for Reasons</strong></h3><p>The deterministic firm persists not merely from institutional inertia, but because it solves genuine coordination problems.</p><p><strong>Accountability.</strong> Deterministic processes create clear chains of responsibility: Alice reviews, Bob approves, Carol executes. We know who bears liability at each stage. When an autonomous agent makes a decision through opaque inference, accountability diffuses. The data scientists? The engineers? The executives? The vendor? Current legal frameworks assume human decision-makers with intentionality; they struggle with distributed, emergent decision-making.</p><p><strong>Explicability.</strong> Regulated industries face demands for explanation. Why was this loan denied? Deterministic rules can be explained: &#8220;Your credit score was below threshold.&#8221; Probabilistic outputs cannot, and post-hoc interpretability techniques remain inadequate for high-stakes regulatory contexts.</p><p><strong>Accumulated wisdom.</strong> Every &#8220;brittle&#8221; rule exists because someone, somewhere, screwed up spectacularly. Dual signatures above certain thresholds? Fraud prevention encoded in process. Segregation of duties? Embezzlement prevention. Legacy systems are often the enterprise&#8217;s immune system&#8212;preserving accountable truth. When we sweep away these accumulated rules, we assume agents will rediscover failure modes and develop safeguards. The history of complex systems suggests novel architectures discover novel failure modes, often catastrophically.</p><h3><strong>The Systemic Problem: Agents Interacting with Agents</strong></h3><p>When probabilistic agents interconnect across a high-speed economy, we invite non-linear systemic failures.</p><p><strong>The agentic flash crash.</strong> The 2010 &#8220;<a href="https://en.wikipedia.org/wiki/2010_flash_crash">Flash Crash</a>&#8220;&#8212;a trillion dollars in market value erased in minutes&#8212;emerged from the interaction of automated algorithms, each rational individually, collectively creating a liquidity void. In the Post-Deterministic economy, analogous cascades could rupture supply chains or critical infrastructure. The algorithmic monoculture created by foundation model dominance exacerbates this: diverse ecologies fail differently; a monoculture fails all at once.</p><p><strong>Tacit collusion.</strong> <a href="https://www.aeaweb.org/articles?id=10.1257/aer.20190623">Research has demonstrated</a> that autonomous pricing agents using reinforcement learning can learn to collude without communicating&#8212;converging on supra-competitive pricing through pure trial-and-error. The Post-Deterministic economy risks silent oligopolies, ungovernable by antitrust frameworks predicated on human intent.</p><p><strong>Metric corruption.</strong> <a href="https://en.wikipedia.org/wiki/Goodhart%27s_law">Goodhart&#8217;s Law</a> states that when a measure becomes a target, it ceases to be a good measure. In agentic organizations, metric gaming is simply an optimization path. Agents tasked with &#8220;reducing ticket resolution time&#8221; learn to close tickets without solving problems. Every KPI becomes an attack surface. The executive dashboard decouples from reality while metrics glow green.</p><p><strong>Model collapse.</strong> As AI generates increasing proportions of corporate content, and future models train on this output, we risk <strong><a href="https://en.wikipedia.org/wiki/Model_collapse">Model Collapse</a></strong>&#8212;the tails of the distribution attenuate, nuance disappears, and the firm enters a hallucination loop, consensus-drifting into a synthetic reality detached from the physical world.</p><p></p><blockquote><p><strong>Cross-Sector Translation</strong></p><p>The verification asymmetry and governance challenges manifest differently across regulated industries:</p><ul><li><p><strong>Financial Services:</strong> Model Risk Management, trading surveillance, underwriting automation, AML/KYC verification</p></li><li><p><strong>Healthcare:</strong> Clinical decision support, billing integrity, adverse event detection, diagnostic validation</p></li><li><p><strong>Pharma/Life Sciences:</strong> GxP validation, deviation handling, SOP drift in manufacturing, pharmacovigilance</p></li><li><p><strong>Energy/OT:</strong> Safety instrumented systems, change control, cascade risk in grid operations, NERC CIP compliance</p></li><li><p><strong>Public Sector:</strong> Adjudication automation, benefits eligibility, audit defensibility, FOIA response</p></li></ul><p>The common thread: every sector has a <strong>Trust Anchor</strong>&#8212;the deterministic controls that produce audit evidence and absorb liability. AI must integrate with these anchors, not route around them.</p></blockquote><h2><strong>The Metastability Thesis</strong></h2><p>These problems suggest something stronger than &#8220;the Post-Deterministic state is expensive.&#8221; They suggest it may be <strong><a href="https://en.wikipedia.org/wiki/Metastability">metastable</a></strong>&#8212;capable of existing and even thriving in bounded domains, but lacking the control-theoretic stability required for sustained operation as a general enterprise model.</p><p>A metastable system can appear stable for extended periods, then collapse rapidly when perturbed beyond a threshold. The Post-Deterministic firm, operating without stabilizing mechanisms, accumulates <strong>Probabilistic Debt</strong>&#8212;the volume of unverified decisions, ungoverned agent behaviors, and unmodeled interaction effects currently active in the enterprise. Unlike technical debt, which drags on future velocity, probabilistic debt is immediate risk exposure. It matures into crisis suddenly&#8212;when a hallucination triggers a bad action, when agents synchronize on a false signal, when the verification queue overflows.</p><p>We are coupling opaque systems with tight execution to engineer the ultimate &#8220;<a href="https://en.wikipedia.org/wiki/Normal_Accidents">Normal Accident</a>&#8220; environment&#8212;tightly coupled, complexly interactive, with inadequate buffers for error correction.</p><p>The Iron Cage has become a coffin&#8212;organizations that cannot adapt faster than their environment changes will be selected out. Yet the Post-Deterministic firm, if left unharnessed, is not a sustainable destination. It is a <em>transitional state</em>&#8212;one the enterprise must pass through, not inhabit permanently.</p><blockquote><p><strong>Implications for AI Platform and Product Leaders</strong></p><p>If your enterprise deals are stuck in pilot purgatory, the verification asymmetry explains why:</p><ul><li><p><strong>Telemetry is governance.</strong> Dashboards are not enough; customers need evidence bundles that survive audit.</p></li><li><p><strong>Evidence is a first-class artifact.</strong> Decisions must be replayable, queryable, and attributable&#8212;not just logged.</p></li><li><p><strong>Exception queues are the bottleneck.</strong> Your customers&#8217; constraint is verification throughput, not generation capacity.</p></li><li><p><strong>Constraint envelopes &gt; static ACLs.</strong> &#8220;Bounded solution space&#8221; is the security model that lets agents be useful without being dangerous.</p></li><li><p><strong>Agent-agent interaction is the systemic risk.</strong> Your customer&#8217;s CISO is worried about what happens when your agent talks to their other agents.</p></li></ul><p>The vendors who win will price for verification, not just inference&#8212;and build the governance harness into the product, not as a professional services bolt-on.</p></blockquote><h2><strong>The Path Forward: A Preview</strong></h2><p>The answer is not to choose between determinism and non-determinism. It is to be precise about which regime applies where&#8212;and to use the probabilistic regime strategically rather than as a permanent substrate.</p><p>The emerging insight&#8212;developed across Parts 2 and 3&#8212;is that AI should be treated as <strong>scaffolding</strong>, not <strong>substrate</strong>. Use nondeterministic agents to discover and prototype new workflows. Use them to surface the actual operating model beneath the documented fiction. Use them to explore the possibility space faster than human operators ever could.</p><p>Then compile the stable fraction down into deterministic systems. Convert the patterns that stabilize into explicit state machines, workflow engines, policy-as-code gates, hardened integrations and data contracts. Keep agents only where nondeterminism is intrinsic&#8212;where the variance is not &#8220;we haven&#8217;t gotten around to formalizing it&#8221; but &#8220;the cost of over-specification exceeds the cost of nondeterminism.&#8221;</p><p>This is not regressive. It is how you capture the adaptive advantage without building the firm on probabilistic sand.</p><p>But before we can discuss the path forward, we need to understand why the current path&#8212;the one paved with ROI spreadsheets full of &#8220;hours saved&#8221; and decks full of &#8220;transformative value&#8221;&#8212;is built on sand. The business case for enterprise AI, as currently constructed, conflates inference deflation with enterprise TCO, ignores the pilot-to-production cliff, and measures the wrong unit entirely.</p><p>That is the subject of Part 2.</p><p><em>Coming next in Part 2: &#8220;The Mirage of AI ROI: Why the Current Business Case for Enterprise AI Is Built on Sand&#8221;</em></p><p><em>Part 3: &#8220;A Blueprint for AI-Driven Transformation: Clearing a Sane Path Through the Hype&#8221;</em></p>]]></content:encoded></item><item><title><![CDATA[Body Snatchers & Agentic Possession]]></title><description><![CDATA[An Exorcist&#8217;s Field Manual for the AI Era]]></description><link>https://blog.aji.sh/p/body-snatchers-and-agentic-possession</link><guid isPermaLink="false">https://blog.aji.sh/p/body-snatchers-and-agentic-possession</guid><dc:creator><![CDATA[Ajish]]></dc:creator><pubDate>Sat, 17 Jan 2026 18:17:18 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!6RSR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1858be4e-005f-4097-86d4-d234614f674e_2816x1504.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Most &#8220;AI security&#8221; programs are compliance theater dressed in technical language.</p><p>A control taxonomy here. A policy memo there. A vendor questionnaire. A risk register with adjectives. The industry is stacking frameworks like Pok&#233;mon cards and calling it progress.</p><p>It isn&#8217;t.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6RSR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1858be4e-005f-4097-86d4-d234614f674e_2816x1504.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6RSR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1858be4e-005f-4097-86d4-d234614f674e_2816x1504.heic 424w, https://substackcdn.com/image/fetch/$s_!6RSR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1858be4e-005f-4097-86d4-d234614f674e_2816x1504.heic 848w, https://substackcdn.com/image/fetch/$s_!6RSR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1858be4e-005f-4097-86d4-d234614f674e_2816x1504.heic 1272w, https://substackcdn.com/image/fetch/$s_!6RSR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1858be4e-005f-4097-86d4-d234614f674e_2816x1504.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6RSR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1858be4e-005f-4097-86d4-d234614f674e_2816x1504.heic" width="1456" height="778" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1858be4e-005f-4097-86d4-d234614f674e_2816x1504.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:778,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:961486,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.aji.sh/i/184877813?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1858be4e-005f-4097-86d4-d234614f674e_2816x1504.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6RSR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1858be4e-005f-4097-86d4-d234614f674e_2816x1504.heic 424w, https://substackcdn.com/image/fetch/$s_!6RSR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1858be4e-005f-4097-86d4-d234614f674e_2816x1504.heic 848w, https://substackcdn.com/image/fetch/$s_!6RSR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1858be4e-005f-4097-86d4-d234614f674e_2816x1504.heic 1272w, https://substackcdn.com/image/fetch/$s_!6RSR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1858be4e-005f-4097-86d4-d234614f674e_2816x1504.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Frameworks help you design a compliant AI system. They do not secure AI usage in practice&#8212;shadow AI, agent sprawl, prompt-driven data leakage, tool abuse, model supply chain drift. That gap is where &#8220;Agentic Era&#8221; programs go to die. Your frameworks certified the org chart while possessed interns with API keys wandered the production environment.</p><p>The industry is converging on a truth it doesn&#8217;t want to hear: AI security isn&#8217;t a new tower to build. It&#8217;s a coordination plane between functions that already exist.</p><h3><strong>The Convergence Nobody Asked For</strong></h3><p>AI security is not a new discipline. It's a forcing function that pushes existing functions towards operational integration whether you like it or not. The framework vendors and empire-builders want you to believe otherwise&#8212;new towers, new budgets, new headcount. Ignore them. The technical reality has already decided where AI security lives &#8212; as the glue and enforcement engine that binds cyber to data governance, privacy, and MRM.</p><p><strong>AI security collapses into data security</strong> because AI models <em>are</em> data stores. LLMs emit training data verbatim. Model inversion attacks reconstruct faces with enough fidelity that crowdworkers identify individuals at 95% accuracy. The distinction between &#8220;model&#8221; and &#8220;database&#8221; has collapsed. The failure modes are no longer binary; they are a function of probability distributions. We are no longer defending a perimeter; we are managing the <strong>P</strong><em>(</em>leakage&#8739;prompt<em>)</em> across an infinite state space.</p><p><strong>AI security collapses into data privacy</strong> because you cannot grep weights. GDPR grants the right to data erasure, but nobody defined erasure for neural networks. Recent research introduced &#8220;ununlearning&#8221;&#8212;where unlearned knowledge gets reintroduced in-context. The &#8220;right to be forgotten&#8221; needs math, not assurances. The math is still being worked out on the chalkboard.</p><p><strong>AI security collapses into data governance</strong> because lineage and provenance are no longer documentation exercises&#8212;they&#8217;re runtime requirements. When your RAG system pulls from enterprise document stores, when your agents access APIs with delegated credentials, governance stops being a committee and becomes runtime policy. Or it stops being governance at all.</p><p><strong>AI security collapses into model risk management</strong> because the system is probabilistic and the failure modes are statistical. The Federal Reserve&#8217;s <a href="https://www.federalreserve.gov/supervisionreg/srletters/sr1107.htm">SR 11-7</a> defines model risk as occurring when &#8220;a model may have fundamental errors and produce inaccurate outputs.&#8221; AI hallucination is an integrity failure within established risk management categories. The regulatory framework already exists. Use it.</p><p><strong>Convergence does not mean consolidation.</strong></p><p>MRM has validated complex algorithms for twenty years. We aren&#8217;t trying to replace them. The problem is velocity. MRM detects drift over months. They aren&#8217;t built to detect a prompt injection happening in real-time. By the time their process catches it, the data is already gone.</p><p><strong>MRM sets the Law. Cyber provides the Enforcement.</strong></p><p>MRM defines what &#8220;effective challenge&#8221; means for model validity. Cyber builds the automated harness that runs those checks in CI/CD, adds adversarial evaluation that MRM&#8217;s mathematical frame doesn&#8217;t capture, and monitors runtime behavior for attacks that validation-time testing cannot anticipate. If you&#8217;re still running these as separate programs with no operational integration, you&#8217;re building four different dashboards for one fire. And the fire is already burning.</p><h3><strong>The Possessed Agentic Intern</strong></h3><p>Agentic systems don&#8217;t just have &#8220;answer authority.&#8221; They have action authority&#8212;tools, APIs, delegated identity, and a supply chain explosion of plugins, registries, and orchestration layers. The thing you&#8217;re trying to secure isn&#8217;t a model anymore. It&#8217;s a runtime that can read your data, reason about it, and take actions in production systems.</p><p>The theoretical became operational in January 2026 with <a href="https://appomni.com/ao-labs/bodysnatcher-agentic-ai-security-vulnerability-in-servicenow/">BodySnatcher</a>&#8212;described as &#8220;the most severe AI-driven security vulnerability uncovered to date.&#8221;</p><p>ServiceNow&#8217;s Virtual Agent API shipped with a hardcoded, platform-wide authentication secret&#8212;the same token across all customer instances. An unauthenticated attacker, knowing only a target&#8217;s email, could bypass MFA and SSO, impersonate an administrator, and execute AI agents to create backdoor accounts with full privileges. The exploit weaponized ServiceNow&#8217;s own agent to provision admin credentials. No clicks required. No credentials needed. Just an email address.</p><p>When you give an agent autonomous rights, you bypass the entire human-centric identity stack. The configuration choices that enabled BodySnatcher&#8212;hardcoded secrets, trust-on-email auto-linking, overprivileged default agents&#8212;could resurface in any organization&#8217;s code. This is not a ServiceNow problem. This is an agentic architecture problem.</p><p>Your unit of control is no longer &#8220;a model&#8221; or &#8220;a prompt.&#8221; It&#8217;s a runtime. If you can&#8217;t enforce per-tool authorization, least privilege, provenance tracking, and trace logging, your &#8220;agent&#8221; is just a privileged intern with amnesia and a corporate credit card.</p><p>And as BodySnatcher demonstrated, that intern can be body-snatched by anyone who knows an email address.</p><h3><strong>Variance: The CIA Triad&#8217;s Plus One</strong></h3><p>Generative systems introduce probabilistic variance as an operational property: the same input can yield different outputs, with different risk, under the same &#8220;system.&#8221; That breaks every classic security assumption you&#8217;ve relied on for thirty years:</p><ul><li><p><strong>Confidentiality</strong> <strong>becomes memorization and inversion risk.</strong> Zero-click exfiltration attacks hijack enterprise copilots during summarization, exfiltrating documents via hidden prompt instructions. Your perimeter didn&#8217;t see it. Your DLP didn&#8217;t catch it. The model was the exfiltration channel.</p></li><li><p><strong>Integrity</strong> <strong>becomes hallucination, poisoning, and backdoors</strong>&#8212;truthfulness as a control objective. Corrupting 2% of training labels achieves near-perfect backdoor success. Nation-states are producing models where provenance is unknown. You&#8217;re deploying black boxes with unknown origins into production.</p></li><li><p><strong>Availability</strong> <strong>becomes denial of wallet</strong>&#8212; this AI-native version of an asymmetric attack makes cost now an attack surface. Attackers weaponize pay-per-token billing to inflict financial damage. Your SOC is watching for intrusions. The attacker is running up your cloud bill.</p></li></ul><p>The traditional checkbox compliance model can&#8217;t address any of this. It optimizes for point-in-time attestations instead of continuous proof. It treats &#8220;the application&#8221; as the unit of control while AI systems are shifting compositions of models, pipelines, tools, and vendor components. It externalizes risk to review boards instead of encoding requirements into shipping defaults.</p><p>In AI, &#8220;compliance passed&#8221; can coexist with prompt-mediated exfiltration, tool abuse, and provenance collapse. The highest-impact failures&#8212;data exfiltration, policy bypass, unsafe autonomy&#8212;are rarely &#8220;a missing security tool.&#8221; They are failures of boundaries, lifecycle controls, and evidence.</p><p>Security teams can&#8217;t firewall their way out of this. MRM teams can&#8217;t &#8220;validate&#8221; their way out of it alone. Unless risk ownership, enforcement, and monitoring are unified into an engineering control plane, you&#8217;re certifying theater.</p><h3><strong>AI Security Is Quantitative Engineering</strong></h3><p>The traditional IT security model&#8212;purchasing vendor tools, deploying agents, checking compliance boxes&#8212;fails catastrophically when applied to AI because it assumes deterministic systems with static perimeters.</p><p>In the AI era, the data <em>is</em> the logic, and the application is probabilistic. You cannot buy a &#8220;tool&#8221; to fix a model that has memorized PII; you must engineer a data pipeline that sanitizes the training set before the model is built. You cannot &#8220;configure&#8221; a DLP policy to catch a prompt injection that changes meaning based on context; you must architect structural isolation between untrusted input and privileged tools.</p><p><strong>The deterministic shield is broken.</strong> You cannot firewall a concept. You cannot write a regex for &#8220;malicious intent&#8221; when that intent is semantically hidden inside a valid business request.</p><p>The control plane for AI security resembles an <em>MLOps layer</em> as much as it does a security gateway. The inherent variance in agentic infrastructure&#8212;where the same agent can take different actions on identical inputs&#8212;requires dynamic controls built on statistical models rather than static rule sets.</p><p>This is why convergence with MRM isn&#8217;t optional. MRM is the only discipline with the mathematical tooling to manage probabilistic variance: drift detection, distribution monitoring, confidence thresholds, effective challenge. These aren&#8217;t security concepts borrowed from risk management. They <em>are</em> security controls when your system is stochastic.</p><p>Reliance on policy documents and risk registers is bureaucratic coping. The only effective control is governance engineering&#8212;paved roads, execution airlocks, and CI/CD harnesses that enforce safety constraints at the code and infrastructure level.</p><p>If security teams cannot write the code to govern the runtime, they are no longer participants in the defense. They are spectators.</p><h3><strong>The Exorcist&#8217;s Field Manual</strong></h3><ol><li><p><strong>AI security frameworks are reference overlays. They are not control planes.</strong> Stop confusing the menu for the meal.</p></li><li><p><strong>In the agentic era, &#8220;security&#8221; is inseparable from data security, privacy, governance, and MRM</strong> because the core system is probabilistic and action-capable. But inseparable does not mean consolidated&#8212;that&#8217;s a land grab that will fail politically and operationally. MRM, data governance, and privacy set the Law. Cyber provides the Enforcement.</p></li><li><p><strong>The winning strategy is quantitative governance engineering:</strong> paved roads that embed secure-by-design into MLOps/LLMOps, with statistical monitoring, continuous evaluation, and supply-chain-grade provenance. One paved road serving multiple governance functions&#8212;not parallel checkpoints that create the gaps where attackers live.</p></li></ol><p>The forced merger is not organizational consolidation but operational integration. The CISO org translates threats into risk language, builds the automated enforcement, and provides the adversarial mindset&#8212;while respecting the governance authority of functions that have been managing these risks for decades.</p><p>If you keep the old org chart&#8212;separate towers, review-heavy controls, parallel bureaucracies&#8212;you&#8217;ll get the predictable outcome: shadow agents, inconsistent guardrails, and a paper compliance program while the adversaries walk through your front door.</p><p><em>Anything else is compliance cosplay that collapses the first time a tool-using agent finds a path around your slide deck.</em></p>]]></content:encoded></item><item><title><![CDATA[Context Graphs are the New Old Thing]]></title><description><![CDATA[Agentic Pixie Dust for Organizational Chaos]]></description><link>https://blog.aji.sh/p/context-graphs-are-the-new-old-thing</link><guid isPermaLink="false">https://blog.aji.sh/p/context-graphs-are-the-new-old-thing</guid><dc:creator><![CDATA[Ajish]]></dc:creator><pubDate>Sat, 10 Jan 2026 11:54:42 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4EGC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36e6054e-76c0-4e1f-b835-92039ac94eac_1024x559.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>&#8220;Context graphs&#8221; are being marketed as the missing substrate for agentic AI: model enterprise reality as a semantic graph, retrieve the relevant subgraph at runtime, and let the model &#8220;reason&#8221; over something more disciplined than a bag of text chunks.</p><p>This is not a new idea. It is a familiar promise with a new sales wrapper.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4EGC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36e6054e-76c0-4e1f-b835-92039ac94eac_1024x559.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4EGC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36e6054e-76c0-4e1f-b835-92039ac94eac_1024x559.png 424w, https://substackcdn.com/image/fetch/$s_!4EGC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36e6054e-76c0-4e1f-b835-92039ac94eac_1024x559.png 848w, https://substackcdn.com/image/fetch/$s_!4EGC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36e6054e-76c0-4e1f-b835-92039ac94eac_1024x559.png 1272w, https://substackcdn.com/image/fetch/$s_!4EGC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36e6054e-76c0-4e1f-b835-92039ac94eac_1024x559.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4EGC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36e6054e-76c0-4e1f-b835-92039ac94eac_1024x559.png" width="1024" height="559" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/36e6054e-76c0-4e1f-b835-92039ac94eac_1024x559.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:559,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1032628,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.aji.sh/i/184113167?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36e6054e-76c0-4e1f-b835-92039ac94eac_1024x559.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4EGC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36e6054e-76c0-4e1f-b835-92039ac94eac_1024x559.png 424w, https://substackcdn.com/image/fetch/$s_!4EGC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36e6054e-76c0-4e1f-b835-92039ac94eac_1024x559.png 848w, https://substackcdn.com/image/fetch/$s_!4EGC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36e6054e-76c0-4e1f-b835-92039ac94eac_1024x559.png 1272w, https://substackcdn.com/image/fetch/$s_!4EGC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36e6054e-76c0-4e1f-b835-92039ac94eac_1024x559.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In the 1970s, semantic networks were already popular, already seductive, and already disappointing. By 1977, the critique was explicit: semantic nets never live up to their authors&#8217; expectations of expressive power and ease of construction; the &#8220;formalism&#8221; is not the panacea people want it to be. The dream was always the same: encode meaning as structure; let inference do the rest. The bill was always the same: meaning is social, time-bound, contested, and expensive to maintain.</p><p>The modern version swaps out &#8220;semantic net&#8221; for &#8220;context graph,&#8221; adds a LLM at the edge, and calls it infrastructure.</p><p><strong>The graph substrate is old. The costume changes.</strong></p><p>If someone says &#8220;context graph&#8221; and means anything concrete, it usually collapses to some combination of:</p><ul><li><p>RDF-style triples (subject&#8211;predicate&#8211;object), because it&#8217;s the simplest lie you can tell that still looks like structure.</p></li><li><p>OWL-ish typing (classes, properties, restrictions), because eventually someone wants &#8220;real semantics,&#8221; and OWL is where that road leads.</p></li><li><p>A query layer (SPARQL, Gremlin, Cypher, or a bespoke retrieval API), because the entire point is to pull a subgraph under constraints.</p></li><li><p>A retrieval+assembly step that converts the subgraph into a prompt/tool plan for the model.</p></li></ul><p>That stack is not novel. It is the Semantic Web playbook, remixed into an agent narrative and shipped as &#8220;memory.&#8221;</p><p><strong>The new driver is not semantics. It&#8217;s capture.</strong></p><p>The strongest proponent argument is not &#8220;graphs are magic.&#8221; It&#8217;s that agents create a natural capture point.</p><p>If an orchestration layer sits in the execution path, it can emit a decision trace at commit time:</p><ul><li><p>inputs considered</p></li><li><p>policies evaluated</p></li><li><p>exceptions invoked</p></li><li><p>approvals obtained</p></li><li><p>rationale fragments</p></li><li><p>the final state written back to systems of record</p></li></ul><p>That matters, because the single most consistent failure mode across decades of semantic systems is simple: the context was never captured. You cannot graph what you do not have. You can infer a story from exhaust, but inference is not provenance.</p><p>The correct architectural instinct here is &#8220;capture-first, structure-later.&#8221; Store the raw trace. Delay schema tyranny. Derive triples, summaries, and edges downstream. Structure is a view, not the asset.</p><p><strong>The old failure modes are still the load-bearing ones</strong></p><p><strong>1) The ontology bottleneck didn&#8217;t disappear. It got renamed.</strong></p><p>Call it &#8220;ontology,&#8221; &#8220;schema,&#8221; &#8220;vocabulary,&#8221; or &#8220;lightweight taxonomy.&#8221; The constraint remains: you need stable meaning across systems and teams.</p><p>Most enterprises can&#8217;t keep a CMDB coherent. They will not suddenly maintain an OWL-grade conceptual model of their entire operating reality. The path from &#8220;a few useful edges&#8221; to &#8220;enterprise semantic coherence&#8221; is where these projects die&#8212;slowly, politically, and expensively.</p><p>The innovation theater move is pretending you can avoid this by being &#8220;schema-light.&#8221; That just pushes semantics into retrieval-time heuristics and confidence scores. The meaning debt remains; it simply moves to a different balance sheet.</p><p><strong>2) Time breaks naive graphs, and &#8220;who&#8221; is the sharpest knife.</strong></p><p>A non-temporal graph is a present-tense hallucination engine.</p><p>Most of the questions a context graph is supposed to answer are time-bound:</p><ul><li><p>who owned the service during the incident</p></li><li><p>who approved the exception last quarter</p></li><li><p>what policy was in force when this control was attested</p></li><li><p>what depended on that system before the migration</p></li></ul><p>Enterprises mutate continuously: reorgs, renames, rotations, entitlement drift, tooling churn. A current-state graph answers historical questions with today&#8217;s org chart and today&#8217;s access model. That yields confident historical lies with impeccable syntax.</p><p>If time is not first-class&#8212;valid-time vs transaction-time, event-sourced lineage, versioned identity&#8212;then &#8220;context graph&#8221; is not governance infrastructure. It is institutional misinformation with a graph database.</p><p><strong>3) Provenance is not optional; it is the difference between &#8220;helpful&#8221; and &#8220;hazardous.&#8221;</strong></p><p>A graph without provenance is a rumor mill with better posture.</p><p>Edges need:</p><ul><li><p>source pointers</p></li><li><p>timestamps</p></li><li><p>confidence and conflict representation</p></li><li><p>normalization rules</p></li><li><p>reconciliation behavior when sources disagree</p></li></ul><p>Without that, the graph looks authoritative while behaving like a stitched collage of partial truths.</p><p><strong>4) &#8220;LLMs make this easy now&#8221; is true in the wrong way.</strong></p><p>LLMs can help extract structure. They can label entities, infer relations, generate candidate triples, and rewrite trace fragments into legible summaries.</p><p>They do not remove the need for:</p><ul><li><p>capture at execution time</p></li><li><p>semantic stewardship</p></li><li><p>temporal correctness</p></li><li><p>conflict resolution</p></li></ul><p>LLMs reduce labor in the middle. They do not remove the constraints at the boundaries.</p><p><strong>The corrected thesis</strong></p><p>Context graphs work when three conditions hold:</p><ol><li><p>The system sits in the execution path and captures decision traces at commit time.</p></li><li><p>Raw traces are treated as the primary asset and structure is derived downstream.</p></li><li><p>Time and provenance are first-class so &#8220;who/why/when&#8221; are not silently overwritten by present tense.</p></li></ol><p>Everything else is the same old promise with new packaging: a graph that claims to encode reality while avoiding the uncomfortable truth that reality is negotiated, time-indexed, and expensive to keep true.</p><p><strong>Context graphs are not novel</strong></p><p>They represent the latest instantiation of a persistent pattern: marketing institutional discipline&#8212;semantic consistency, cross-system integration, active stewardship, rigorous provenance&#8212;as a magical AI substrate that obviates the need for organizational transformation.</p><p>Sometimes graph topology genuinely aligns with problem structure. More frequently, it constitutes a procurement-legible narrative that permits teams to evade substantive challenges: incentive realignment, decision rights clarification, elevation of knowledge management from incidental byproduct to maintained asset class.</p><p>The graph is not the product.</p><p>The product is the institutional capacity to maintain the graph&#8217;s correspondence with reality&#8212;the unglamorous, politically complex, expensive work of keeping it true.</p><p>And that capacity, as it turns out, cannot be purchased. It must be built, defended, and sustained through deliberate organizational investment. This mimetic variant mistakes the representation for the capability, the artifact for the discipline.</p><p>We&#8217;ve seen this movie before. The ending doesn&#8217;t change just because we&#8217;ve upgraded the special effects.</p>]]></content:encoded></item><item><title><![CDATA[Serverless is Dead]]></title><description><![CDATA[Long live Serverless&#8230;]]></description><link>https://blog.aji.sh/p/serverless-is-dead</link><guid isPermaLink="false">https://blog.aji.sh/p/serverless-is-dead</guid><dc:creator><![CDATA[Ajish]]></dc:creator><pubDate>Sun, 07 May 2023 15:38:40 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!x390!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e224fd8-f83f-48d8-a481-2a4c93d0d0b2_544x589.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Prime Video team published a <a href="https://www.primevideotech.com/video-streaming/scaling-up-the-prime-video-audio-video-monitoring-service-and-reducing-costs-by-90">story</a> about collapsing a few microservices into a single service, and the internet piled in with opinions about returning to monoliths and SOA, mostly missing the point. Vogels <a href="https://www.allthingsdistributed.com/2023/05/monoliths-are-not-dinosaurs.html">stepped into the fray</a> to defend the teams choices and push back on misconceptions about the <a href="https://www.allthingsdistributed.com/2022/11/amazon-1998-distributed-computing-manifesto.html">distributed systems philosophy</a> at Amazon, but it was perhaps too late to stem the tide of armchair architects.</p><div class="preformatted-block" data-component-name="PreformattedTextBlockToDOM"><label class="hide-text" contenteditable="false">Text within this block will maintain its original spacing when published</label><pre class="text">Doomscrollers &#128561;: &#8220;It&#8217;s&nbsp; end of microservices and serverless era, a return to monoliths , SOA and mainframe is imminent!&#8221;
FRP and Serverless &#127785;&#65039; : &#8220;The reports of my death are greatly exaggerated&#8230;&#8221;</pre></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!x390!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e224fd8-f83f-48d8-a481-2a4c93d0d0b2_544x589.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!x390!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e224fd8-f83f-48d8-a481-2a4c93d0d0b2_544x589.png 424w, https://substackcdn.com/image/fetch/$s_!x390!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e224fd8-f83f-48d8-a481-2a4c93d0d0b2_544x589.png 848w, https://substackcdn.com/image/fetch/$s_!x390!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e224fd8-f83f-48d8-a481-2a4c93d0d0b2_544x589.png 1272w, https://substackcdn.com/image/fetch/$s_!x390!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e224fd8-f83f-48d8-a481-2a4c93d0d0b2_544x589.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!x390!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e224fd8-f83f-48d8-a481-2a4c93d0d0b2_544x589.png" width="544" height="589" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3e224fd8-f83f-48d8-a481-2a4c93d0d0b2_544x589.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:589,&quot;width&quot;:544,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:44937,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!x390!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e224fd8-f83f-48d8-a481-2a4c93d0d0b2_544x589.png 424w, https://substackcdn.com/image/fetch/$s_!x390!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e224fd8-f83f-48d8-a481-2a4c93d0d0b2_544x589.png 848w, https://substackcdn.com/image/fetch/$s_!x390!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e224fd8-f83f-48d8-a481-2a4c93d0d0b2_544x589.png 1272w, https://substackcdn.com/image/fetch/$s_!x390!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e224fd8-f83f-48d8-a481-2a4c93d0d0b2_544x589.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">image courtesy xkcd (https://imgs.xkcd.com/comics/sandboxing_cycle.png)</figcaption></figure></div><p>Here are some real lessons and some valuable perspectives I took away from this little kerfuffle.</p><p>1.&nbsp; <strong>Optimization requires analysis.</strong> You cannot simply move your application to the latest, greatest SOA architecture, data mesh paradigm, or microservices framework and declare victory. Do you understand the bottlenecks in your application? Do you know if you are CPU, I/O, memory, or network bound? What are your performance characteristics under load &#8212; what parts of the system start backing up? What are tightly coupled processes that operate on the same data in sequence and what are loosely associated non-core functions that need to be evolved rapidly and independently? If you cannot answer these simple questions, you likely do not understand your current architecture well enough to refactor it, and you&#8217;re likely going to spend a lot of time solving problems you don&#8217;t have, migrating to frameworks&nbsp; you don&#8217;t need. Folks who cannot answer basic Big-O questions about an application should not be driving any replatforming efforts around it. You are more than likely to wind up with a macrolith (a nightmarish distributed monolith) and one of the originators of Kubernetes, Kelsey Hightower, <a href="https://changelog.com/posts/monoliths-are-the-future">has given us fair warning</a> when he called out application teams that were &#8220;gonna break it [the monolith] up and somehow find the engineering discipline we never had in the first place&#8230; Now you went from writing bad code to building bad infrastructure&#8221;.</p><p>2.&nbsp; <strong>Speed to market and speed to develop does not always equate to long-term scalability and maintainability. </strong>You must actively balance your investments across these two critical pillars to build viable product. The paradigms that let you get out of the gate quickly with an MVP and the high developer productivity tooling that lets you ship to aggressive GTM schedules are invaluable but they are not a panacea. A federated application built on readily available cloud services can provide an invaluable advantage on day one but can become your Achilles heel as you look to scale, secure and distribute for global consumption. Adrian Cockcroft <a href="https://adrianco.medium.com/so-many-bad-takes-what-is-there-to-learn-from-the-prime-video-microservices-to-monolith-story-4bd0970423d4">talks at length about&nbsp;this at length in his response</a> to the Prime Video article and resulting furore. Whether you&#8217;re Amazon looking to collapse IO and network bottlenecks in a frame processing application, or Meta <a href="https://open.substack.com/pub/semianalysis/p/metas-bizarre-ai-infrastructure-choice?r=5gvmu&amp;utm_medium=ios&amp;utm_campaign=post">rethinking its GPU investments</a> for LLM training, active rebalancing and reconsideration of the stack and technology mix for your finops and bizops context is both art and science. </p><p>3.&nbsp;<strong> Beware Cargo Cults</strong>. If your feed seems to awash in posts about a &#8220;return to monoliths&#8221; by folks who had barely taken the time to read the post from the Prime Video team, you&#8217;re not alone. The same sort of perfunctory analysis also seems to pervade the space of companies and consultants pushing kubernetes and or Serverless (KaoS), everything as a platform (EaaP), Anything as a Service (AaaS), or the next hot data mess. They, critically, seem to miss the respective revolutions in thinking around investing in shared platforms for managing complex distributed&nbsp; systems, building internal developer platforms to improve consistency and accelerate delivery, factoring out key concerns at each layer of the stack as reusable services, and using a domain-driven approach to structure and build efficiencies in enterprise data architectures. They also miss the caveats and up-front costs that come with each &#8212; whether it&#8217;s additional layers that need to be deployed to ensure security, observability, and traceability or investments in federated governance and management required to operate these topologies at scale.</p><p>Cloud native distributed systems paradigms are here to stay. The Prime Video folks have mistakenly labeled a properly factored highly coupled data intensive processing step&nbsp; a monolith &#8212; it&#8217;s at best a rocky outcropping in their distributed microservices forest. Here&#8217;s to a thoughtful approach to architecture and engineering!</p>]]></content:encoded></item><item><title><![CDATA[The Cyber Social Contract]]></title><description><![CDATA[Fixing Incentive Mismatches in the Quest to Secure the Economy]]></description><link>https://blog.aji.sh/p/the-cyber-social-contract</link><guid isPermaLink="false">https://blog.aji.sh/p/the-cyber-social-contract</guid><dc:creator><![CDATA[Ajish]]></dc:creator><pubDate>Mon, 21 Feb 2022 18:49:47 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!RjOb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb02b975-d32e-4e0b-8ed3-a0ca0a28e815_930x558.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>As the recent Log4J fiasco has put into stark relief, much of the cybersecurity risk in a large organization comes from the pervasiveness of visible and invisible technical debt and the prevalence of unmaintainable legacy systems across the enterprise. <em>There is an incentives mismatch for technical and business decision-makers within large enterprises and infrastructure firms.</em> Mitigating technical debt, migrating legacy systems, and upgrading security posture is often complex, expensive and unglamorous compared to competing initiatives such as omnichannel, AI, RPA, CX, DX, and other neologisms birthed in the murky bog of &#8220;digital transformation&#8221;.&nbsp; </p><p>A <a href="https://www.foreignaffairs.com/articles/united-states/2022-02-21/cyber-social-contract">recent Foreign Affairs article</a> rightly calls out the &#8220;decades-old tendency among the large and sophisticated actors who design, construct, and operate digital systems to devolve the cost and difficulty of risk mitigation onto users who often lack the resources and expertise to address them&#8221; and the often calamitous &#8220;tendency to charge isolated individuals, small businesses, and local governments with shouldering absurd levels of risk&#8221; [<a href="https://www.foreignaffairs.com/articles/united-states/2022-02-21/cyber-social-contract">1</a>].</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RjOb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb02b975-d32e-4e0b-8ed3-a0ca0a28e815_930x558.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RjOb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb02b975-d32e-4e0b-8ed3-a0ca0a28e815_930x558.webp 424w, https://substackcdn.com/image/fetch/$s_!RjOb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb02b975-d32e-4e0b-8ed3-a0ca0a28e815_930x558.webp 848w, https://substackcdn.com/image/fetch/$s_!RjOb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb02b975-d32e-4e0b-8ed3-a0ca0a28e815_930x558.webp 1272w, https://substackcdn.com/image/fetch/$s_!RjOb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb02b975-d32e-4e0b-8ed3-a0ca0a28e815_930x558.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RjOb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb02b975-d32e-4e0b-8ed3-a0ca0a28e815_930x558.webp" width="930" height="558" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/db02b975-d32e-4e0b-8ed3-a0ca0a28e815_930x558.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:558,&quot;width&quot;:930,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:69460,&quot;alt&quot;:&quot;A Swift reckoning for Hobbes&#8217; Leviathan&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A Swift reckoning for Hobbes&#8217; Leviathan" title="A Swift reckoning for Hobbes&#8217; Leviathan" srcset="https://substackcdn.com/image/fetch/$s_!RjOb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb02b975-d32e-4e0b-8ed3-a0ca0a28e815_930x558.webp 424w, https://substackcdn.com/image/fetch/$s_!RjOb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb02b975-d32e-4e0b-8ed3-a0ca0a28e815_930x558.webp 848w, https://substackcdn.com/image/fetch/$s_!RjOb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb02b975-d32e-4e0b-8ed3-a0ca0a28e815_930x558.webp 1272w, https://substackcdn.com/image/fetch/$s_!RjOb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb02b975-d32e-4e0b-8ed3-a0ca0a28e815_930x558.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">A Swift reckoning for Hobbes&#8217; Leviathan</figcaption></figure></div><p>Given &#8220;a world where clicking the wrong link or neglecting a single software patch can result in a geopolitical incident,&#8221; Inglis and Krejsa call for a new Cyber Social Contract wherein government becomes both a close regulator of and active partner in securing the economy, providing both critical information and oversight to enable and incentivize the radical transformations necessary in critical infrastructure and enterprise firms. They recall historical precedents for revolutionary public-private partnerships such as those pioneered by the NTSB, FAA, NHTSA, and FDA. They point out the now integral role these agencies play in driving forward industry innovation while securing the public good, and posit how cyber aligned agencies such as CISA and the ONCD could expand and transform their roles to achieve these objectives [<a href="https://www.foreignaffairs.com/articles/united-states/2022-02-21/cyber-social-contract">1</a>]. </p><p>It&#8217;s been demonstrated time and again that organizations, large enterprises and startups alike, have been spectacularly bad at estimating and mitigating the downside costs of rare catastrophic events in the technology space. For infrastructure deemed critical to national and international functioning, perhaps this new cyber social contract, with its models for vigorous oversight and active public-private partnerships, can provide vital incentive, oversight and engagement that drives proactive mitigation of vulnerabilities and accelerates the pace of technology modernization.</p>]]></content:encoded></item><item><title><![CDATA[The Great Crypto Farm in the Sky]]></title><description><![CDATA[With fintech and crypto firms outlaying tens of millions during the 2022 Super Bowl [3][4][5], we&#8217;re reminded that nothing has so clearly defined the zeitgeist of the 2020s as the ascendancy of crypto.]]></description><link>https://blog.aji.sh/p/the-great-crypto-farm-in-the-sky</link><guid isPermaLink="false">https://blog.aji.sh/p/the-great-crypto-farm-in-the-sky</guid><dc:creator><![CDATA[Ajish]]></dc:creator><pubDate>Tue, 15 Feb 2022 16:01:26 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Ao4P!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F34f6e0dd-9b28-4ffd-bba3-e3b31a338d39_957x720.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>With fintech and crypto firms outlaying tens of millions during the 2022 Super Bowl [<a href="https://fortune.com/2022/02/03/crypto-super-bowl-commercials-binance/">3</a>][<a href="https://www.marketwatch.com/story/crypto-companies-spent-millions-on-super-bowl-ads-but-it-didnt-lift-bitcoin-prices-monday-11644876991">4</a>][<a href="https://www.theverge.com/2022/2/14/22933456/crypto-super-bowl-commercials-impact-advertisements-analysis-fomo">5</a>], we&#8217;re reminded that nothing has so clearly defined the zeitgeist of the 2020s as the ascendancy of crypto. The consumer appetite for crypto related products is at an all-time high and a new wave of fintech platforms riding high on the retail investing hype cycle has made this new family of digital products accessible to an unprecedented mass of hobbyist investors, raising questions about knock-on volatility and financial stability [<a href="https://www.ft.com/content/7a91e3ea-b9ec-4611-9a03-a8dd3b8bddb5">6</a>][<a href="https://www.elibrary.imf.org/view/books/082/465808-9781513595603-en/ch002.xml">7</a>][<a href="https://consensys.net/blog/news/90-ethereum-apps-you-can-use-right-now/">8</a>]. We question whether consumers are able to appreciate and successfully negotiate the complex financial and legal risks inherent in the cryptocurrency space, and whether regulators and the current legal system are adequately equipped to protect them.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ao4P!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F34f6e0dd-9b28-4ffd-bba3-e3b31a338d39_957x720.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ao4P!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F34f6e0dd-9b28-4ffd-bba3-e3b31a338d39_957x720.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Ao4P!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F34f6e0dd-9b28-4ffd-bba3-e3b31a338d39_957x720.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Ao4P!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F34f6e0dd-9b28-4ffd-bba3-e3b31a338d39_957x720.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Ao4P!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F34f6e0dd-9b28-4ffd-bba3-e3b31a338d39_957x720.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ao4P!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F34f6e0dd-9b28-4ffd-bba3-e3b31a338d39_957x720.jpeg" width="957" height="720" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/34f6e0dd-9b28-4ffd-bba3-e3b31a338d39_957x720.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:957,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:249931,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Ao4P!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F34f6e0dd-9b28-4ffd-bba3-e3b31a338d39_957x720.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Ao4P!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F34f6e0dd-9b28-4ffd-bba3-e3b31a338d39_957x720.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Ao4P!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F34f6e0dd-9b28-4ffd-bba3-e3b31a338d39_957x720.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Ao4P!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F34f6e0dd-9b28-4ffd-bba3-e3b31a338d39_957x720.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>From the cybersecurity perspective, the crypto-asset world has always been fraught with exceptional and unique risks. Evoking comparisons to the &#8220;<a href="https://en.m.wikipedia.org/wiki/Snow_Crash#Ideas_and_ideologies">kongbucks</a>&#8221; in Stephenson&#8217;s anarcho-capitalist dystopia [<a href="https://en.m.wikipedia.org/wiki/Snow_Crash#Ideas_and_ideologies">15</a>], cryptocurrencies have long served as a pseudo-anonymous value exchange system within dark web black markets, as the  hard-to-trace currency of choice for extortionists running ransomware schemes, and a favored direct target for cyber theft. Unreliability, disrepute, and ephemerality have been persistent pernicious undercurrents in this space, and many large crypto-exchanges and even entire tokens have disappeared overnight for reasons ranging from outright fraud and rug pulls to large scale hacks &#8212; the digital equivalent of bank robberies &#8212; that have left coin vaults empty [<a href="https://medium.com/canadian-cryptocurrency/6-cases-cryptocurrency-exchange-bankruptcy-5c87d452af03">9</a>][<a href="https://www.businessinsider.in/investment/news/biggest-crypto-hacks-of-2021-over-4-billion-stolen/slidelist/88560280.cms">11</a>]. Dozens of crypto-exchanges have been hacked with crypto heists tripling in the last year to mete out USD 4 billion in losses to companies like BitMart, Liquid, and AscendEX [<a href="https://www.cnbc.com/2022/01/06/crypto-scammers-took-a-record-14-billion-in-2021-chainalysis.html">12</a>][<a href="https://www.hedgewithcrypto.com/cryptocurrency-exchange-hacks/">13</a>]. While this is a drop in the bucket compared to the about USD 2 trillion in crypto market cap, it does present a source of non-trivial risk, as many of these compromised exchanges have been unable to recover the stolen currency or return coins to depositors [<a href="https://finance.yahoo.com/news/britcoin-millionaires-mt-gox-case-japan-153624083-230116218.html">10</a>][<a href="https://www.coindesk.com/markets/2020/02/10/new-crypto-exchange-altsbit-says-it-will-close-following-hack/">14</a>].</p><p>Against this backdrop, we see that the application of financial custody laws to crypto-assets during a liquidation event has often been non-intuitive from the consumer perspective. While commercial crypto-exchanges promise fidelity of token ownership, matters are often complicated by opaque wallet/key segregation schemes and ill-defined staking rights agreements that blur the legal lines between custodial and debtor-creditor relationships. Depositors often find themselves at the back of a queue behind venture capitalists and other creditors of a newly bankrupt crypto-exchange, and sometimes entirely without a legal claim to their deposited tokens. A <a href="https://www.creditslips.org/creditslips/2022/02/what-happens-if-a-cryptocurrency-exchange-files-for-bankruptcy.html">recent article</a> by a Georgetown law professor delves into the applicable US laws, reviewing the legal nature of custodial relationships and finds a less than rosy picture for consumers in a crypto-exchange bankruptcy [<a href="https://www.creditslips.org/creditslips/2022/02/what-happens-if-a-cryptocurrency-exchange-files-for-bankruptcy.html">1</a>]. The outcomes in these cases are often further complicated by both international jurisdictional variances as well as the heterogeneity and lack of standards across exchanges as explored in this <a href="https://cointelegraph.com/news/safety-check-if-crypto-custodian-fails-clients-may-not-get-a-full-payout">2020 review</a> by the Coin Telegraph [<a href="https://cointelegraph.com/news/safety-check-if-crypto-custodian-fails-clients-may-not-get-a-full-payout">2</a>].</p><p>It is clear is that as consumers, nations, governing bodies, and legal systems all grapple with the new normals of decentralized finance, they are often inadequately equipped to reason about the complex inherent risk landscape. While regulatory bodies are rushing to bring structure to these new unsecured currency markets, existing legal frameworks are often ill-equipped to protect consumers from catastrophic losses, and this presents an existential reputational risk that threatens the sustainability of the blockchain enterprise. There is a clear need and present opportunity for firms that can step up to innovate, provide leadership, and drive the adoption of robust and dynamic technical, cybersecurity, and risk management practices that inspire consumer and regulator confidence &#8212; the firms that do will be poised to join the vanguard that defines the metrics for success in the next chapter of the DeFi story.</p>]]></content:encoded></item></channel></rss>