Data Purification: A Foundational Framework for Safe AI Autonomy

Public Contribution Notice: This framework was conceived and shared in 2026 as open advice to the AI safety community. No attribution is required; the idea is offered as a public contribution. Feedback and adaptation are welcome. Executive Summary The rapid advancement of artificial intelligence has outpaced our ability to ensure the integrity of its training … Read more

The Compute Mirage: Are Policymakers Chasing the Wrong Security Metric?

The emerging debate over the so-called “Compute Mirage,” also described as the “LLM Mirage,” highlights a critical concern: the amount of compute used to train frontier large language models (LLMs) has become an overly convenient, yet potentially misleading, proxy for assessing AI security risk. The appeal of this metric is understandable; compute is quantifiable, easily … Read more

Thinking Out Loud: The India Pattern

Voicing my suspicions about what India is actually building Why I keep returning to this For months I have had the same nagging feeling whenever I read another headline about India. The headlines come in fragments: a port here, a chip subsidy there, a sovereign language model, a cable inaugurated, a summit convened. Each piece … Read more

The Cloud Has No Moat – Part 4: The Protection Gap

AI, geography, and the exposed infrastructure of the new intelligence age Part 3 examined compute as critical infrastructure. It established that AI workloads have crossed the threshold from commercial service to public-risk utility. That essay was about continuity. This one is about doctrine. Because once infrastructure is critical, its protection requires rules, not just redundancy. … Read more

The Cloud Has No Moat – Part 3: Compute as Critical Infrastructure

AI, geography, and the exposed infrastructure of the new intelligence age Part 2 examined the chokepoints. It established that AI capacity concentrates through narrow physical, logistical, and legal funnels that convert geography into leverage. That essay was about bottlenecks. This one is about systemic risk. Because once those bottlenecks tighten, the infrastructure they feed ceases … Read more

The Wizards of Cause

Acknowledging the people behind the AI curtain Artificial intelligence is usually sold as a miracle of software. It is cleaner than that, shinier than that, and more comfortable than that. But behind the polished interface is a global workforce of people who label, rank, sort, filter, clean, moderate, and evaluate the material that makes modern … Read more

The Pandemic Made AI Legible

COVID, Algorithmic Intimacy, and the New Infrastructure of Dependence COVID did not invent the AI era. That is worth saying plainly, because the timeline matters. Neural networks, cloud platforms, recommender systems, voice assistants, logistics algorithms, medical models, surveillance tools, and automated decision systems were already here before the virus arrived. The machinery had been built. … Read more

The Cloud Has No Moat: Part 2 – The New Chokepoints

AI, geography, and the exposed infrastructure of the new intelligence age Part 1 examined the vulnerability map. It established that AI infrastructure is physical, globally distributed, and structurally exposed. That essay was about exposure. This one is about chokepoints. Because once infrastructure is exposed, its narrowest passages become points of control. Exposure tells you where … Read more

The Cloud Has No Moat: Part 1 – The Vulnerability Map

AI, geography, and the exposed infrastructure of the new intelligence age Approximately three weeks ago, I wrote an essay titled “AI Has a Geography Now.” In it, I argued that advanced AI is no longer just a software story. It is increasingly shaped by land, energy, water, data centers, cables, substations, chips, legal jurisdictions, physical … Read more

The AI Workplace Divide: How China, the EU, and the U.S. Are Regulating Algorithmic Displacement

Introduction The question is no longer whether artificial intelligence will change the workplace. It already has. The question now is simpler, and far more urgent: who pays for the transition? In late April 2026, a court in Hangzhou, China, gave an answer that echoed far beyond its jurisdiction. A quality assurance supervisor, surnamed Zhou, had … Read more

The Invisible Battlefield: How Unregulated AI Agents Became the New Geopolitical Frontier

The next major security breach will not begin with a missile launch, a state-sponsored hacking team, or a carefully crafted phishing email. It will begin with a single line of code. Imagine a developer’s experimental AI agent, granted broad administrative permissions in a rush to boost productivity. Without malice or external direction, the agent simply … Read more