<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>AI on Arem</title>
        <link>https://www.arem.blog/en/tags/ai/</link>
        <description>Recent content in AI on Arem</description>
        <generator>Hugo -- gohugo.io</generator>
        <language>en</language>
        <lastBuildDate>Sat, 02 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://www.arem.blog/en/tags/ai/index.xml" rel="self" type="application/rss+xml" /><item>
            <title>Coherence is the scarce good</title>
            <link>https://www.arem.blog/en/post/coherence-the-scarce-good/</link>
            <pubDate>Sat, 02 May 2026 00:00:00 +0000</pubDate>
            <guid>https://www.arem.blog/en/post/coherence-the-scarce-good/</guid>
            <description>&lt;img src=&#34;https://www.arem.blog/&#34; alt=&#34;Featured image of post Coherence is the scarce good&#34; /&gt;&lt;p&gt;On April 18, 2026, an attacker drained 116,500 rsETH from the cross-chain bridge of &lt;a class=&#34;link&#34; href=&#34;https://kelpdao.xyz/&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;&#xA;    &gt;Kelp DAO&lt;/a&gt;. Roughly $292 million.&lt;/p&gt;&#xA;&lt;p&gt;Not because of a bug. Because of a decision that stayed invisible.&lt;/p&gt;&#xA;&lt;p&gt;Kelp had chosen a 1-of-1 DVN configuration, a single verifier, &lt;a class=&#34;link&#34; href=&#34;https://layerzero.network/blog/kelpdao-incident-statement&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;&#xA;    &gt;against the explicit recommendations&lt;/a&gt; of its own infrastructure provider. That choice never made it into a proposal, a public debate, or any record before the incident happened.&lt;/p&gt;&#xA;&lt;p&gt;Two days later, &lt;a class=&#34;link&#34; href=&#34;https://www.coindesk.com/tech/2026/04/22/inside-the-usd71-million-freeze-on-arbitrum-that-has-the-crypto-world-questioning-what-decentralization-really-means&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;&#xA;    &gt;Arbitrum&amp;rsquo;s Security Council froze $71 million&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;The debate started immediately. On one side, those who saw this as proof that nothing in crypto is truly decentralized. On the other, those who saw an emergency intervention against a state-level actor as not just legitimate but necessary.&lt;/p&gt;&#xA;&lt;p&gt;Both positions are coherent. Both miss the point.&lt;/p&gt;&#xA;&lt;p&gt;Because what happened here doesn&amp;rsquo;t begin with the hack. It doesn&amp;rsquo;t begin with the freeze either.&lt;/p&gt;&#xA;&lt;p&gt;It begins at the moment a structuring decision can be made without ever being seen.&lt;/p&gt;&#xA;&#xA;    &lt;blockquote&gt;&#xA;        &lt;p&gt;&lt;em&gt;&lt;strong&gt;DeFi doesn&amp;rsquo;t break because of bad code.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;em&gt;&lt;strong&gt;It breaks because some decisions stay invisible until it&amp;rsquo;s too late.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&#xA;    &lt;/blockquote&gt;&#xA;&lt;p&gt;And as long as those decisions stay invisible, every crisis will keep pushing the ecosystem toward an impossible choice between emergency centralization and principled inaction.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;what-becomes-scarce&#34;&gt;What becomes scarce&#xA;&lt;/h2&gt;&lt;p&gt;Decentralized organizations have solved two major problems. They aggregate capital with unprecedented efficiency. They aggregate preferences through sophisticated voting mechanisms.&lt;/p&gt;&#xA;&lt;p&gt;But they have built almost nothing for a third aggregation, even though it may be the most decisive: the aggregation of intelligent work over time.&lt;/p&gt;&#xA;&lt;p&gt;That work exists everywhere. It takes the form of research, discussions, technical trade-offs, disagreements, intuitions. It flows through multiple channels and then disappears. Each new session starts where the previous one left off, with no usable trace in between.&lt;/p&gt;&#xA;&lt;p&gt;Intelligence gets produced. It doesn&amp;rsquo;t accumulate.&lt;/p&gt;&#xA;&lt;p&gt;This flaw stayed invisible for a long time, for a simple reason: intelligence used to be scarce.&lt;/p&gt;&#xA;&lt;p&gt;It isn&amp;rsquo;t anymore.&lt;/p&gt;&#xA;&lt;p&gt;AI has tipped intelligence into abundance. What&amp;rsquo;s now in short supply isn&amp;rsquo;t analysis or code. It&amp;rsquo;s the capacity to hold together what&amp;rsquo;s already been produced.&lt;/p&gt;&#xA;&#xA;    &lt;blockquote&gt;&#xA;        &lt;p&gt;&lt;em&gt;&lt;strong&gt;Intelligence is becoming abundant. Coherence is the bottleneck.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&#xA;    &lt;/blockquote&gt;&#xA;&lt;p&gt;This shows up in different but converging diagnoses. &lt;a class=&#34;link&#34; href=&#34;https://blog.aragon.org/&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;&#xA;    &gt;Aragon&lt;/a&gt; observes that &lt;a class=&#34;link&#34; href=&#34;https://blog.aragon.org/beyond-proposals-pt-i-automation-and-the-art-of-not-governing/&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;&#xA;    &gt;the volume of decisions grows faster than available attention&lt;/a&gt;. &lt;a class=&#34;link&#34; href=&#34;https://x.com/twynexyz/status/2047302119737196838&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;&#xA;    &gt;Twyne&lt;/a&gt; points at the absence of cumulative memory and continuity in the work of agents.&lt;/p&gt;&#xA;&lt;p&gt;Three observations. One shared limit.&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Coordination distributes tasks. It doesn&amp;rsquo;t produce continuity.&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;p&gt;And in that gap, something deeper is shifting. If a structuring decision can be made without being visible, without being documented, without being challengeable, then the system that contains it is not decentralized in any strong sense.&lt;/p&gt;&#xA;&#xA;    &lt;blockquote&gt;&#xA;        &lt;p&gt;&lt;em&gt;&lt;strong&gt;We didn&amp;rsquo;t decentralize power. We decentralized its interface.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&#xA;    &lt;/blockquote&gt;&#xA;&lt;p&gt;This shift produces very concrete effects. It favors those who control the context, those who hold informal memory, those who can act without making their decisions legible.&lt;/p&gt;&#xA;&lt;p&gt;Kelp is not an anomaly.&lt;/p&gt;&#xA;&lt;p&gt;It&amp;rsquo;s a system revealing how it actually worked, at the moment it failed.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;aragon-the-art-of-not-governing&#34;&gt;Aragon, the art of not governing&#xA;&lt;/h2&gt;&lt;p&gt;In this landscape, Aragon offers one of the most advanced architectures.&lt;/p&gt;&#xA;&lt;p&gt;Their starting point is clear: onchain governance frameworks, in their current form, have not given organizations a reliable way to act with precision. Their answer is to shift the central primitive. The proposal is no longer what structures the system. The permission is.&lt;/p&gt;&#xA;&lt;p&gt;With &lt;a class=&#34;link&#34; href=&#34;https://blog.aragon.org/the-future-of-governance-is-modular-2/&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;&#xA;    &gt;OSx&lt;/a&gt;, governance becomes an architecture of rights. Capabilities are defined explicitly, then distributed and recombined through modules.&lt;/p&gt;&#xA;&lt;p&gt;The decisive step comes with the notion of &lt;em&gt;policy&lt;/em&gt;. Proposals are reserved for genuinely new decisions. Everything else, recurring payments, predictable allocations, repeatable configurations, is codified as executable rules.&lt;/p&gt;&#xA;&lt;p&gt;Evan Aronson&amp;rsquo;s formula puts it precisely: &lt;em&gt;&amp;ldquo;Policy design is an art of not governing.&amp;rdquo;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;This isn&amp;rsquo;t about reducing governance. It&amp;rsquo;s about relocating it. A decision is no longer a one-off event. It becomes a rule that&amp;rsquo;s both binding and executable, with no need for ongoing intervention. I&amp;rsquo;ve worked through this intuition philosophically in &lt;a class=&#34;link&#34; href=&#34;https://arem.blog/en/post/le-doux-pouvoir/&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;&#xA;    &gt;an earlier piece on gentle power&lt;/a&gt;; Aronson gives it its technical form.&lt;/p&gt;&#xA;&lt;p&gt;With &lt;a class=&#34;link&#34; href=&#34;https://blog.aragon.org/introducing-linked-accounts/&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;&#xA;    &gt;&lt;em&gt;Linked Accounts&lt;/em&gt;&lt;/a&gt;, Aragon pushes the logic further by making the purpose of fund flows explicit. Organizational structure stops being implicit. It becomes legible inside the system itself.&lt;/p&gt;&#xA;&lt;p&gt;This work is substantial. It introduces a kind of legibility that was missing.&lt;/p&gt;&#xA;&lt;p&gt;But that legibility operates in a deterministic frame. It assumes the relevant actions can be anticipated, that rules can be defined in advance, that behaviors can be bounded.&lt;/p&gt;&#xA;&lt;p&gt;Anything that escapes that frame stays out of view. Upstream technical trade-offs, informal decisions, the ongoing production of meaning, anything that doesn&amp;rsquo;t stabilize into a rule remains invisible.&lt;/p&gt;&#xA;&#xA;    &lt;blockquote&gt;&#xA;        &lt;p&gt;&lt;em&gt;&lt;strong&gt;Aragon makes decisions executable. It does not make their formation visible.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&#xA;    &lt;/blockquote&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;twyne-root-archetype-the-grammar-of-agents&#34;&gt;Twyne root-archetype, the grammar of agents&#xA;&lt;/h2&gt;&lt;p&gt;This is where &lt;em&gt;root-archetype&lt;/em&gt; steps in, the agent governance layer Twyne uses internally and has released under an open license.&lt;/p&gt;&#xA;&lt;p&gt;With &lt;a class=&#34;link&#34; href=&#34;https://github.com/0xTwyne/root-archetype&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;&#xA;    &gt;&lt;em&gt;root-archetype&lt;/em&gt;&lt;/a&gt;, the move is to introduce, on top of application code, a layer that produces nothing directly but defines the conditions of production themselves. Roles, memory, handoff protocols, shared constraints. Everything that gives shape to continuity in collaborative work.&lt;/p&gt;&#xA;&lt;p&gt;The gesture is simple. Its effects run deep.&lt;/p&gt;&#xA;&lt;p&gt;A session no longer starts from scratch. Context carries over. Knowledge stops evaporating between contributions.&lt;/p&gt;&#xA;&#xA;    &lt;blockquote&gt;&#xA;        &lt;p&gt;&lt;em&gt;&lt;strong&gt;Intelligence starts to compose itself.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&#xA;    &lt;/blockquote&gt;&#xA;&lt;p&gt;Released under an open license, this model is meant to become a primitive. It offers a minimal grammar from which an ecosystem can structure itself.&lt;/p&gt;&#xA;&lt;p&gt;The symmetry with Aragon is clear. Aragon codifies decision on the capital side. Twyne root-archetype codifies the grammar of work on the agent side. One structures what gets decided, the other structures what makes decision possible.&lt;/p&gt;&#xA;&lt;p&gt;But neither of them makes visible how those two dimensions interact.&lt;/p&gt;&#xA;&lt;p&gt;Twyne itself, the credit-delegation primitive the team is building, illustrates precisely why this layer is missing. The safety of a credit primitive depends on upstream decisions: parameter choices, oracle picks, verifier setups. Exactly the kind of decisions that, when they stay invisible, become tomorrow&amp;rsquo;s exit conditions. What happened at Kelp is of that exact nature, which is what makes the legibility question anything but theoretical.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;the-missing-layer&#34;&gt;The missing layer&#xA;&lt;/h2&gt;&lt;p&gt;This is where the problem becomes legible.&lt;/p&gt;&#xA;&lt;p&gt;Neither Aragon nor Twyne root-archetype makes visible how decision, capital, and production hold together over time.&lt;/p&gt;&#xA;&lt;p&gt;That invisibility is exactly what made Kelp possible.&lt;/p&gt;&#xA;&lt;p&gt;What&amp;rsquo;s missing isn&amp;rsquo;t another tool. It&amp;rsquo;s a layer.&lt;/p&gt;&#xA;&lt;p&gt;A system that makes structuring decisions visible before they produce irreversible effects.&lt;/p&gt;&#xA;&lt;p&gt;We can name it plainly: an &lt;em&gt;Organizational Observability Layer&lt;/em&gt;.&lt;/p&gt;&#xA;&lt;p&gt;A layer of this kind doesn&amp;rsquo;t just trace outputs. It represents how an organization actually functions. It connects actors, human and agent, with their tasks, their dependencies, their decision points. It holds the memory of choices, alternatives, disagreements. It formalizes handoffs. It exposes constraints. It sustains a &lt;a class=&#34;link&#34; href=&#34;https://arem.blog/en/post/transversal-watchfulness/&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;&#xA;    &gt;transversal watchfulness&lt;/a&gt;.&lt;/p&gt;&#xA;&#xA;    &lt;blockquote&gt;&#xA;        &lt;p&gt;&lt;em&gt;&lt;strong&gt;Making the actual functioning of a system visible is becoming a strategic capability.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&#xA;    &lt;/blockquote&gt;&#xA;&lt;p&gt;Today, contributing too often means just adding work. In an organization with such a layer, &lt;strong&gt;contributing means modifying a shared state.&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;p&gt;It&amp;rsquo;s what turns a succession of initiatives into a cumulative process.&lt;/p&gt;&#xA;&lt;p&gt;It also clarifies a distinction that often gets blurred. Coordination answers &lt;em&gt;who does what&lt;/em&gt;. Coherence answers a more demanding question: &lt;strong&gt;does the system, as a whole, still make sense?&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;p&gt;Current tools improve the first. The second still has to be built.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;the-false-alternative&#34;&gt;The false alternative&#xA;&lt;/h2&gt;&lt;p&gt;The debate that opened after the Arbitrum freeze reveals exactly where we are.&lt;/p&gt;&#xA;&lt;p&gt;Should we intervene or not? Should we accept emergency centralization, or hold strict fidelity to principle?&lt;/p&gt;&#xA;&lt;p&gt;The questions are legitimate. They just arrive too late.&lt;/p&gt;&#xA;&lt;p&gt;They assume the incident has happened and that we now have to pick between two flawed options. They never ask what made the incident possible in the first place.&lt;/p&gt;&#xA;&lt;p&gt;Had Kelp&amp;rsquo;s DVN configuration been visible, documented, challengeable before it shipped, the choice could have been different. Or owned. Or constrained.&lt;/p&gt;&#xA;&lt;p&gt;In any of those cases, it would have lived in a shared space.&lt;/p&gt;&#xA;&#xA;    &lt;blockquote&gt;&#xA;        &lt;p&gt;&lt;em&gt;&lt;strong&gt;Every incident of this kind is a failure of visibility before it is a failure of security.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&#xA;    &lt;/blockquote&gt;&#xA;&lt;p&gt;Recognizing this doesn&amp;rsquo;t remove the risk. It moves the ground on which the risk has to be addressed.&lt;/p&gt;&#xA;&lt;p&gt;Decentralization no longer plays out solely in the ability to react. It plays out in the ability to make decisions visible before they become irreversible.&lt;/p&gt;&#xA;&lt;p&gt;That&amp;rsquo;s a third path. Not a compromise. A reframing.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;the-natural-slope&#34;&gt;The natural slope&#xA;&lt;/h2&gt;&lt;p&gt;Building such a layer comes with real tensions.&lt;/p&gt;&#xA;&lt;p&gt;Over-formalization can rigidify the system. A too-clean representation can hide misalignment, unless it makes explicit room for dissent.&lt;/p&gt;&#xA;&lt;p&gt;But the deeper risk lies elsewhere.&lt;/p&gt;&#xA;&lt;p&gt;Any layer of legibility creates an asymmetry. Whoever sees more than others has an advantage. Without an explicit mechanism, that asymmetry drifts toward capture: by a central team, by a vendor, by an external actor.&lt;/p&gt;&#xA;&#xA;    &lt;blockquote&gt;&#xA;        &lt;p&gt;&lt;em&gt;&lt;strong&gt;What isn&amp;rsquo;t held as a commons becomes a point of control.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&#xA;    &lt;/blockquote&gt;&#xA;&lt;p&gt;Holding a coherence layer as shared infrastructure is the only regime that doesn&amp;rsquo;t take care of itself. Every other regime emerges without effort.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;a-political-stake&#34;&gt;A political stake&#xA;&lt;/h2&gt;&lt;p&gt;&lt;strong&gt;Coherence is not a technical problem. It is a political choice.&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;p&gt;It determines who can see, who can understand, who can challenge. Today, those dimensions stay largely implicit, and therefore default-controlled by whoever already occupies a central position.&lt;/p&gt;&#xA;&lt;p&gt;This is a call on our vigilance, in the same direction I proposed in &lt;a class=&#34;link&#34; href=&#34;https://arem.blog/en/post/public-grammar-of-risk/&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;&#xA;    &gt;a public grammar of risk&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;Engaging with a protocol shouldn&amp;rsquo;t be limited to assessing its code, its tokenomics, or its formal governance. It should include a simpler, more demanding question: &lt;em&gt;how are structuring decisions made visible?&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;That is the dimension Kelp lacked. And it is the dimension that will determine how robust the systems to come actually turn out to be.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;to-close&#34;&gt;To close&#xA;&lt;/h2&gt;&lt;p&gt;Aragon and Twyne root-archetype have laid down essential bricks.&lt;/p&gt;&#xA;&lt;p&gt;One on decision and capital.&lt;/p&gt;&#xA;&lt;p&gt;The other on production and memory.&lt;/p&gt;&#xA;&lt;p&gt;But the layer that would let those two articulate is still to be built.&lt;/p&gt;&#xA;&lt;p&gt;Without it, every crisis will keep forcing a choice between centralization and powerlessness.&lt;/p&gt;&#xA;&lt;p&gt;With it, structuring decisions become visible before they become irreversible.&lt;/p&gt;&#xA;&#xA;    &lt;blockquote&gt;&#xA;        &lt;p&gt;&lt;em&gt;&lt;strong&gt;We haven&amp;rsquo;t failed to build decentralized systems.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;em&gt;&lt;strong&gt;We have failed to make them legible.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&#xA;    &lt;/blockquote&gt;&#xA;&lt;p&gt;That legibility, that coherence, is what is now genuinely at stake. And what remains to be invented.&lt;/p&gt;&#xA;</description>
        </item><item>
            <title>3. DeFi as a Laboratory of Delegation</title>
            <link>https://www.arem.blog/en/post/defi-as-a-laboratory-of-delegation/</link>
            <pubDate>Mon, 13 Apr 2026 13:00:00 +0000</pubDate>
            <guid>https://www.arem.blog/en/post/defi-as-a-laboratory-of-delegation/</guid>
            <description>&lt;img src=&#34;https://www.arem.blog/&#34; alt=&#34;Featured image of post 3. DeFi as a Laboratory of Delegation&#34; /&gt;&lt;p&gt;&lt;em&gt;Series opening: &lt;a class=&#34;link&#34; href=&#34;https://www.arem.blog/en/post/self-custody-but-how-far/&#34; &gt;Self-Custody, But How Far?&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;in-defi-an-idea-quickly-turns-into-a-permission-a-risk-rule-or-a-signature&#34;&gt;In DeFi, an idea quickly turns into a permission, a risk rule, or a signature.&#xA;&lt;/h2&gt;&lt;p&gt;That is what gives DeFi its head start.&lt;/p&gt;&#xA;&lt;p&gt;In many digital environments, ambiguity can last a long time. Actions remain diffuse, consequences are spread out, mistakes can be patched over. In DeFi, much less so. The distance between a market read, a recommendation, a click, an approval, and an execution is short.&lt;/p&gt;&#xA;&lt;p&gt;A dashboard is not just an interface. It can shape how risk is seen. A wrapper is not just a service. It can reframe what counts as safe. An agent is not just an assistant. It can monitor, propose, prepare, trigger, or — within certain bounds — act.&lt;/p&gt;&#xA;&lt;p&gt;That is why DeFi sees earlier than most sectors what delegation becomes once it stops being an abstract convenience and takes the form of real permissions.&lt;/p&gt;&#xA;&lt;h2 id=&#34;the-protocol-no-longer-sums-up-the-system&#34;&gt;The protocol no longer sums up the system&#xA;&lt;/h2&gt;&lt;p&gt;We still talk too easily about “protocol risk,” as if the protocol alone were enough to describe the object.&lt;/p&gt;&#xA;&lt;p&gt;It no longer is.&lt;/p&gt;&#xA;&lt;p&gt;Between the user and the protocol there now sits an entire software environment: specialized interfaces, dashboards, wrappers, copilots, treasury tools, research layers, monitoring tools, coordination services, and in some cases already execution agents.&lt;/p&gt;&#xA;&lt;p&gt;The point is not to cast suspicion over every one of these objects. The point is to see that they redraw the map of trust. Even when the base protocol is solid, the surrounding environment can become the main place where the problem reappears: what we see, what we understand, what we think we understand, and what we are being nudged to do.&lt;/p&gt;&#xA;&lt;h2 id=&#34;what-ai-changes-materially&#34;&gt;What AI changes materially&#xA;&lt;/h2&gt;&lt;p&gt;This is not just a conceptual shift. It is a material one.&lt;/p&gt;&#xA;&lt;p&gt;AI dramatically lowers the cost of producing software layers around protocols: dashboards, assistants, wrappers, analysis tools, micro-services, orchestration layers. Builders ship faster, test faster, iterate faster. In many cases, that is genuinely good news.&lt;/p&gt;&#xA;&lt;p&gt;But the cost of verification, qualification, and prudent integration does not fall at the same pace.&lt;/p&gt;&#xA;&lt;p&gt;So the issue is not that tools are being built with the help of AI. The issue begins when the cost of producing a service falls much faster than the cost of understanding it, reviewing it, and integrating it well.&lt;/p&gt;&#xA;&lt;p&gt;At that point we do not just have more software.&#xA;We have more surfaces of trust to evaluate.&lt;/p&gt;&#xA;&lt;h2 id=&#34;vibe-coding-not-a-scandal-a-reveal&#34;&gt;Vibe coding: not a scandal, a reveal&#xA;&lt;/h2&gt;&lt;p&gt;The term is often used too loosely. It is better handled with care.&lt;/p&gt;&#xA;&lt;p&gt;Not every AI-assisted build is vibe coding in the strong sense. Not every tool built quickly is unserious. And it would be absurd to accuse any specific dashboard, service, or project without evidence.&lt;/p&gt;&#xA;&lt;p&gt;What the phenomenon does reveal is more structural: an environment in which access layers, analysis layers, orientation layers, and sometimes already execution layers can be produced very quickly — an environment in which apparent fluidity can improve faster than the community’s capacity to judge what has actually been reviewed, understood, bounded, and owned.&lt;/p&gt;&#xA;&lt;p&gt;The issue is not the builder’s moral failure.&#xA;The issue is the acceleration of the context in which the user has to exercise judgment.&lt;/p&gt;&#xA;&lt;h2 id=&#34;two-protocols-that-make-the-problem-legible&#34;&gt;Two protocols that make the problem legible&#xA;&lt;/h2&gt;&lt;p&gt;&lt;a class=&#34;link&#34; href=&#34;https://league.money/&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;&#xA;    &gt;Money League&lt;/a&gt; and &lt;a class=&#34;link&#34; href=&#34;https://polarisfinance.io/&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;&#xA;    &gt;Polaris&lt;/a&gt; are not used here as two more protocols to “watch,” nor as stabilized objects.&lt;/p&gt;&#xA;&lt;p&gt;In both cases, these are still developing systems whose public shape can evolve. They are therefore being treated with caution, on the basis of their current presentation, as provisional figures rather than fixed models. Polaris in particular may well end up confronting the question of an agentic layer more explicitly than it does today.&lt;/p&gt;&#xA;&lt;p&gt;These two cases matter because they make the same problem legible in sharply different ways.&lt;/p&gt;&#xA;&lt;p&gt;Money League presents itself as a permissionless infrastructure for launching and coordinating decentralized stablecoins, with a modular architecture, shared incentives, and above all an explicit thesis about &lt;em&gt;agentic money&lt;/em&gt;: prediction markets inside the monetary loop, proof of agent competence, agents as stabilizers, and the horizon of an inter-agent economy settled in fully onchain assets.&lt;/p&gt;&#xA;&lt;p&gt;Polaris, by contrast, presents itself as an onchain, immutable, trustless stablecoin operating system centered on a tightly bounded monetary core, internal yield mechanisms, and a modular extension logic.&lt;/p&gt;&#xA;&lt;p&gt;The value of the comparison lies in that gap. Money League helps us think about how far agentivity can climb into monetary infrastructure. Polaris reminds us that before any system becomes more powerful, someone still has to decide what must remain bounded, legible, and politically bearable.&lt;/p&gt;&#xA;&lt;h2 id=&#34;money-league-pushing-the-agentic-horizon-further&#34;&gt;Money League: pushing the agentic horizon further&#xA;&lt;/h2&gt;&lt;p&gt;Money League matters because it pushes a hypothesis many still prefer to keep at the edge: the agentic layer can rise all the way into money itself.&lt;/p&gt;&#xA;&lt;p&gt;In its public imaginary, agents do not stay at the margins. They enter the loops of stabilization, forecasting, coordination, and management. Its strength is that it makes this horizon visible without hesitation. Its limit, for our purposes, is that it says more about the sovereignty of the system than about the practical sovereignty of the person doing the delegating.&lt;/p&gt;&#xA;&lt;h2 id=&#34;polaris-returning-to-the-question-of-constitution&#34;&gt;Polaris: returning to the question of constitution&#xA;&lt;/h2&gt;&lt;p&gt;Polaris is, in that sense, a useful counterpoint.&lt;/p&gt;&#xA;&lt;p&gt;Its public interest does not begin with spectacular agentivity, but with a more constitutional architecture: an immutable core, limited stewardship, and a small number of adjustable parameters constrained inside coded bounds.&lt;/p&gt;&#xA;&lt;p&gt;Its strength is to remind us that a system does not become more legitimate simply because it automates more. It becomes more intelligible when it knows how to distinguish what must be delegated, what can be adjusted, and what has to be withdrawn from ordinary variation.&lt;/p&gt;&#xA;&lt;h2 id=&#34;what-they-show-together&#34;&gt;What they show together&#xA;&lt;/h2&gt;&lt;p&gt;Taken together, these two cases make a tension visible that DeFi will meet more and more often: how far should agentivity be allowed to rise, and at what point should the constitution of the system be reinforced instead?&lt;/p&gt;&#xA;&lt;p&gt;This is no longer just a UX question.&#xA;It is monetary, institutional, and operational.&lt;/p&gt;&#xA;&lt;h2 id=&#34;morin-no-local-limit-abolishes-the-systemic-problem&#34;&gt;Morin: no local limit abolishes the systemic problem&#xA;&lt;/h2&gt;&lt;p&gt;This is where Morin helps us avoid two symmetrical naïvetés.&lt;/p&gt;&#xA;&lt;p&gt;The first would be to believe that more design, more limitations, and more explicit permissions are enough to solve the issue.&lt;/p&gt;&#xA;&lt;p&gt;The second would be to conclude, conversely, that the mere presence of another layer makes everything suspect.&lt;/p&gt;&#xA;&lt;p&gt;Morin forces us to hold two truths together.&lt;/p&gt;&#xA;&lt;p&gt;Yes, we need limits.&#xA;Yes, we need bounded permissions.&#xA;Yes, we need legible architectures.&lt;/p&gt;&#xA;&lt;p&gt;But no local bound, no elegant module, no isolated proof of integrity abolishes the ecology of action. A system can be well designed at the local level and still produce unexpected systemic effects: mimetic behavior, routines of overconfidence, new dependencies, procyclical coordination, misread incentives, collective blind spots.&lt;/p&gt;&#xA;&lt;p&gt;So the question is not only: was the action authorized?&#xA;It is also: &lt;strong&gt;what does the multiplication of these actions produce inside an environment populated by tools, dashboards, agents, and users who are not all seeing the same world?&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;verifiability-a-valuable-aid-not-a-substitute-for-judgment&#34;&gt;Verifiability: a valuable aid, not a substitute for judgment&#xA;&lt;/h2&gt;&lt;p&gt;It is perfectly natural that calls for &lt;em&gt;sovereign AI&lt;/em&gt; and &lt;em&gt;verifiable AI&lt;/em&gt; resonate in web3. They speak a familiar language: control, integrity, proofs, the reduction of blind trust.&lt;/p&gt;&#xA;&lt;p&gt;That direction matters. It can make certain delegations more legible, more attestable, more contained.&lt;/p&gt;&#xA;&lt;p&gt;But the hierarchy of problems has to remain intact.&lt;/p&gt;&#xA;&lt;p&gt;Verifiability does not replace common sense. It does not decide for us what should have been delegated in the first place. It does not guarantee that systemic effects will be desirable.&lt;/p&gt;&#xA;&lt;p&gt;Proofs, logs, limits, action policies, and cryptographic primitives can improve the integrity of certain operations. They do not relieve us of defining the mandate, accepting the limits, or answering for the uses.&lt;/p&gt;&#xA;&lt;style&gt;&#xA;.arem-card{background:var(--card-bg,#f2f3f5);border-radius:14px;padding:30px 26px 22px;font-family:inherit;width:100%;margin:28px 0 22px;border:1px solid var(--card-border,rgba(0,0,0,.08))}&#xA;.arem-card-title{font-size:1.1em;font-weight:700;color:var(--card-text,#1a2332);letter-spacing:-.01em;line-height:1.2;margin-bottom:6px}&#xA;.arem-card-sub{font-size:.95em;color:var(--card-muted,#556070);line-height:1.5;margin-bottom:18px}&#xA;.arem-card-sep{height:1px;background:var(--card-sep,rgba(0,0,0,.1));margin-bottom:18px}&#xA;.arem-card-list{display:flex;flex-direction:column;gap:10px}&#xA;.arem-card-item{padding:12px 16px;border-radius:10px;background:var(--card-item-bg,#ffffff);border:1px solid var(--card-border,rgba(0,0,0,.08))}&#xA;.arem-card-item-title{font-size:.95em;font-weight:700;color:var(--card-text,#1a2332);margin-bottom:5px}&#xA;.arem-card-item-text{font-size:.95em;line-height:1.6;color:var(--card-muted,#556070)}&#xA;html[data-scheme=&#34;dark&#34;] .arem-card{--card-bg:#141c23;--card-border:rgba(255,255,255,.06);--card-text:#e8f0f8;--card-muted:#7a9ab0;--card-sep:rgba(255,255,255,.08);--card-item-bg:#0f1419}&#xA;&lt;/style&gt;&#xA;&lt;div class=&#34;arem-card&#34;&gt;&#xA;  &lt;div class=&#34;arem-card-title&#34;&gt;Control, integrity, measure&lt;/div&gt;&#xA;  &lt;div class=&#34;arem-card-sub&#34;&gt;What is rising in web3 is not illegitimate. The point is to keep the order of problems clear.&lt;/div&gt;&#xA;  &lt;div class=&#34;arem-card-sep&#34;&gt;&lt;/div&gt;&#xA;  &lt;div class=&#34;arem-card-list&#34;&gt;&#xA;    &lt;div class=&#34;arem-card-item&#34;&gt;&#xA;      &lt;div class=&#34;arem-card-item-title&#34;&gt;Sovereign AI&lt;/div&gt;&#xA;      &lt;div class=&#34;arem-card-item-text&#34;&gt;Addresses the question of control: where the system runs, who depends on whom, what data leaves the perimeter, and which permissions are actually in play.&lt;/div&gt;&#xA;    &lt;/div&gt;&#xA;    &lt;div class=&#34;arem-card-item&#34;&gt;&#xA;      &lt;div class=&#34;arem-card-item-title&#34;&gt;Verifiable AI&lt;/div&gt;&#xA;      &lt;div class=&#34;arem-card-item-text&#34;&gt;Addresses the question of integrity: what can be attested, reviewed, proved, or reconstructed.&lt;/div&gt;&#xA;    &lt;/div&gt;&#xA;    &lt;div class=&#34;arem-card-item&#34;&gt;&#xA;      &lt;div class=&#34;arem-card-item-title&#34;&gt;But measure remains decisive&lt;/div&gt;&#xA;      &lt;div class=&#34;arem-card-item-text&#34;&gt;Neither of these directions removes the need to answer the harder question: what should be delegated, within which limits, and with what possibility of taking back control? Mathematics and cryptography can make certain operations more attestable; they cannot replace judgment, responsibility, or the ecology of action.&lt;/div&gt;&#xA;    &lt;/div&gt;&#xA;  &lt;/div&gt;&#xA;&lt;/div&gt;&#xA;&lt;div class=&#34;arem-card&#34;&gt;&#xA;  &lt;div class=&#34;arem-card-title&#34;&gt;A minimal grid for evaluating an assisted or agentic DeFi tool&lt;/div&gt;&#xA;  &lt;div class=&#34;arem-card-sub&#34;&gt;Before using a dashboard, wrapper, copilot, agent, or third-party service, it is worth running it through a simple filter.&lt;/div&gt;&#xA;  &lt;div class=&#34;arem-card-sep&#34;&gt;&lt;/div&gt;&#xA;  &lt;div class=&#34;arem-card-list&#34;&gt;&#xA;    &lt;div class=&#34;arem-card-item&#34;&gt;&#xA;      &lt;div class=&#34;arem-card-item-title&#34;&gt;1. What kind of thing is it?&lt;/div&gt;&#xA;      &lt;div class=&#34;arem-card-item-text&#34;&gt;A protocol, an interface, a third-party tool, an agent, or simply a visualization layer?&lt;/div&gt;&#xA;    &lt;/div&gt;&#xA;    &lt;div class=&#34;arem-card-item&#34;&gt;&#xA;      &lt;div class=&#34;arem-card-item-title&#34;&gt;2. How far does it intervene?&lt;/div&gt;&#xA;      &lt;div class=&#34;arem-card-item-text&#34;&gt;Does it inform, recommend, prepare an action, or actually act?&lt;/div&gt;&#xA;    &lt;/div&gt;&#xA;    &lt;div class=&#34;arem-card-item&#34;&gt;&#xA;      &lt;div class=&#34;arem-card-item-title&#34;&gt;3. What permissions does it require?&lt;/div&gt;&#xA;      &lt;div class=&#34;arem-card-item-text&#34;&gt;Does it touch a wallet, messages, private data, automations, onchain execution, or external calls?&lt;/div&gt;&#xA;    &lt;/div&gt;&#xA;    &lt;div class=&#34;arem-card-item&#34;&gt;&#xA;      &lt;div class=&#34;arem-card-item-title&#34;&gt;4. What bounds are explicit?&lt;/div&gt;&#xA;      &lt;div class=&#34;arem-card-item-text&#34;&gt;Amounts, action types, confirmations, delays, allowlists, sandboxing, functional scope?&lt;/div&gt;&#xA;    &lt;/div&gt;&#xA;    &lt;div class=&#34;arem-card-item&#34;&gt;&#xA;      &lt;div class=&#34;arem-card-item-title&#34;&gt;5. What is actually verifiable?&lt;/div&gt;&#xA;      &lt;div class=&#34;arem-card-item-text&#34;&gt;What can be reviewed, understood, audited, or reconstructed?&lt;/div&gt;&#xA;    &lt;/div&gt;&#xA;    &lt;div class=&#34;arem-card-item&#34;&gt;&#xA;      &lt;div class=&#34;arem-card-item-title&#34;&gt;6. Is it reversible?&lt;/div&gt;&#xA;      &lt;div class=&#34;arem-card-item-text&#34;&gt;Can you cut the tool off without losing access to the protocol, to the underlying risk, or to your essential capacity to act?&lt;/div&gt;&#xA;    &lt;/div&gt;&#xA;    &lt;div class=&#34;arem-card-item&#34;&gt;&#xA;      &lt;div class=&#34;arem-card-item-title&#34;&gt;7. Who is responsible for what?&lt;/div&gt;&#xA;      &lt;div class=&#34;arem-card-item-text&#34;&gt;The protocol, the builder, the operator, the user? If the answer is blurry, so is the trust model.&lt;/div&gt;&#xA;    &lt;/div&gt;&#xA;  &lt;/div&gt;&#xA;&lt;/div&gt;&#xA;&lt;h2 id=&#34;what-this-series-was-trying-to-show&#34;&gt;What this series was trying to show&#xA;&lt;/h2&gt;&lt;p&gt;The argument can be stated simply.&lt;/p&gt;&#xA;&lt;p&gt;Crypto learned how to defend assets against capture. It is now discovering that it must learn to defend, with the same rigor, attention, judgment, organization, and the capacity to act.&lt;/p&gt;&#xA;&lt;p&gt;The problem will be solved neither by nostalgia nor by acceleration for its own sake.&lt;/p&gt;&#xA;&lt;p&gt;It calls for more legible protocols, better-bounded tools, less magical architectures, more responsible builders, and users less inclined to confuse new power with quiet abdication.&lt;/p&gt;&#xA;&lt;p&gt;It also asks for something harder: the willingness to accept that no local proof, no elegant automation, no isolated instance of cryptographic integrity can ever fully replace wisdom about systemic effects.&lt;/p&gt;&#xA;&lt;p&gt;That is where the most serious continuation of crypto’s promise may now lie.&lt;/p&gt;&#xA;&lt;p&gt;Not only in protecting what we own.&#xA;But in learning not to surrender too quickly what still allows us to act.&lt;/p&gt;&#xA;</description>
        </item><item>
            <title>2. Delegate Without Handing Yourself Over</title>
            <link>https://www.arem.blog/en/post/delegate-without-handing-yourself-over/</link>
            <pubDate>Mon, 13 Apr 2026 12:00:00 +0000</pubDate>
            <guid>https://www.arem.blog/en/post/delegate-without-handing-yourself-over/</guid>
            <description>&lt;img src=&#34;https://www.arem.blog/&#34; alt=&#34;Featured image of post 2. Delegate Without Handing Yourself Over&#34; /&gt;&lt;p&gt;&lt;em&gt;Series opening: &lt;a class=&#34;link&#34; href=&#34;https://www.arem.blog/en/post/self-custody-but-how-far/&#34; &gt;Self-Custody, But How Far?&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;the-problem-is-no-longer-whether-to-use-ai-the-problem-is-how-far-to-let-it-in&#34;&gt;The problem is no longer whether to use AI. The problem is how far to let it in.&#xA;&lt;/h2&gt;&lt;p&gt;Too much of the AI debate hardens into a lazy binary. On one side: acceleration without brakes — wire everything up, automate everything, move faster. On the other: principled distance — keep away, distrust everything, and congratulate yourself for your supposedly clearer austerity.&lt;/p&gt;&#xA;&lt;p&gt;Neither posture survives ordinary life for very long.&lt;/p&gt;&#xA;&lt;p&gt;The serious question is harder: &lt;strong&gt;what kinds of delegation can we accept without losing command of our own practice?&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;p&gt;Web3 readers already have one useful instinct. They learned in other domains that performance alone does not make a system legitimate. You still have to ask who controls what, within which limits, and under what conditions of reversibility.&lt;/p&gt;&#xA;&lt;p&gt;Applied to AI, that instinct now has to become a discipline.&lt;/p&gt;&#xA;&lt;h2 id=&#34;assistance-delegation-abandonment&#34;&gt;Assistance, delegation, abandonment&#xA;&lt;/h2&gt;&lt;p&gt;The first task is to separate what the moment keeps trying to blur.&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Assistance&lt;/strong&gt; is the simplest case. The tool helps, suggests, reformulates, accelerates. It expands our capacity to act without displacing the center of decision.&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Delegation&lt;/strong&gt; begins when the tool no longer just helps. It preserves context, reorders, filters, prepares, monitors, preselects, or triggers certain operations within a defined perimeter.&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Abandonment&lt;/strong&gt; begins when delegation becomes too broad, too opaque, or too comfortable to remain genuinely governed. The system still appears to serve us, but it becomes increasingly hard to explain what exactly it is doing, why we trust it, and what it would take to take back control.&lt;/p&gt;&#xA;&lt;p&gt;These are not the same thing.&#xA;And yet many current uses slide from the first into the second, and sometimes into the third, without ever naming the shift.&lt;/p&gt;&#xA;&lt;h2 id=&#34;the-real-test-is-ease&#34;&gt;The real test is ease&#xA;&lt;/h2&gt;&lt;p&gt;The problem of delegation does not show up first in extreme cases. It shows up in easy ones.&lt;/p&gt;&#xA;&lt;p&gt;The decisive moment is not usually when a system suggests some absurd transaction. It is when, day after day, it becomes normal for it to read for us, sort for us, reconnect for us, monitor for us, and prepare work before we even arrive.&lt;/p&gt;&#xA;&lt;p&gt;Here again Morin helps. The danger is not only spectacular error; it is dependence quietly formed in the continuity of service. We then begin to mistake an increase in power for a thinning of presence.&lt;/p&gt;&#xA;&lt;p&gt;What threatens autonomy is not always hostility.&#xA;Often it is softness.&lt;/p&gt;&#xA;&lt;h2 id=&#34;where-individual-responsibility-begins&#34;&gt;Where individual responsibility begins&#xA;&lt;/h2&gt;&lt;p&gt;This needs to be said plainly.&lt;/p&gt;&#xA;&lt;p&gt;Protocols, builders, and tool providers have duties of clarity, boundary-setting, and prudent design. But they cannot carry the whole burden of educating users or operators determined to delegate everything without discernment.&lt;/p&gt;&#xA;&lt;p&gt;There is, therefore, an irreducible form of individual responsibility that has to be recovered.&lt;/p&gt;&#xA;&lt;p&gt;Vitalik Buterin offers one of the clearest practical expressions of this concern when he argues for a local-first, compartmentalized, tightly bounded LLM setup. The value of that setup is not that it provides a universal template. Its value is that it makes one thing unmistakable: as AI becomes an ordinary environment for action, the decisive question is no longer just model capability, but the limits we are willing — or unwilling — to place around delegation.&lt;/p&gt;&#xA;&lt;p&gt;That does not mean becoming paranoid. It does not mean retreating into some heroic austerity. It means asking, with a little firmness: &lt;strong&gt;what am I actually trying to gain, and what am I unwilling to lose in the process?&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;p&gt;The question is harder than it sounds. Most of us want the same things: more speed, more clarity, less friction, less fatigue, more continuity. The trouble is that these gains have a cost — and the cost is not always paid in data. Sometimes it is paid in habits of dependence.&lt;/p&gt;&#xA;&lt;style&gt;&#xA;.arem-card{background:var(--card-bg,#f2f3f5);border-radius:14px;padding:30px 26px 22px;font-family:inherit;width:100%;margin:28px 0 22px;border:1px solid var(--card-border,rgba(0,0,0,.08))}&#xA;.arem-card-title{font-size:1.1em;font-weight:700;color:var(--card-text,#1a2332);letter-spacing:-.01em;line-height:1.2;margin-bottom:6px}&#xA;.arem-card-sub{font-size:.95em;color:var(--card-muted,#556070);line-height:1.5;margin-bottom:18px}&#xA;.arem-card-sep{height:1px;background:var(--card-sep,rgba(0,0,0,.1));margin-bottom:18px}&#xA;.arem-card-list{display:flex;flex-direction:column;gap:10px}&#xA;.arem-card-item{padding:12px 16px;border-radius:10px;background:var(--card-item-bg,#ffffff);border:1px solid var(--card-border,rgba(0,0,0,.08))}&#xA;.arem-card-item-title{font-size:.95em;font-weight:700;color:var(--card-text,#1a2332);margin-bottom:5px}&#xA;.arem-card-item-text{font-size:.95em;line-height:1.6;color:var(--card-muted,#556070)}&#xA;html[data-scheme=&#34;dark&#34;] .arem-card{--card-bg:#141c23;--card-border:rgba(255,255,255,.06);--card-text:#e8f0f8;--card-muted:#7a9ab0;--card-sep:rgba(255,255,255,.08);--card-item-bg:#0f1419}&#xA;&lt;/style&gt;&#xA;&lt;div class=&#34;arem-card&#34;&gt;&#xA;  &lt;div class=&#34;arem-card-title&#34;&gt;A minimal discipline of delegation&lt;/div&gt;&#xA;  &lt;div class=&#34;arem-card-sub&#34;&gt;There is no perfect stack. There is, however, a minimal discipline simple enough to use without turning into a purity program.&lt;/div&gt;&#xA;  &lt;div class=&#34;arem-card-sep&#34;&gt;&lt;/div&gt;&#xA;  &lt;div class=&#34;arem-card-list&#34;&gt;&#xA;    &lt;div class=&#34;arem-card-item&#34;&gt;&#xA;      &lt;div class=&#34;arem-card-item-title&#34;&gt;1. Keep the core of judgment in your own hands&lt;/div&gt;&#xA;      &lt;div class=&#34;arem-card-item-text&#34;&gt;Exploration, mapping, summarizing, and comparison can all be assisted. But the moment a reading turns into an actual judgment should remain visible. If you no longer know where help ends and pre-decision begins, you have already delegated too much.&lt;/div&gt;&#xA;    &lt;/div&gt;&#xA;    &lt;div class=&#34;arem-card-item&#34;&gt;&#xA;      &lt;div class=&#34;arem-card-item-title&#34;&gt;2. Bound action before you expand assistance&lt;/div&gt;&#xA;      &lt;div class=&#34;arem-card-item-text&#34;&gt;The danger is not that a system is intelligent. It is that it is intelligent and deeply connected. A text assistant does not carry the same risk profile as a tool wired into messaging, sensitive documents, automation, a wallet, or execution rights. The wider the access, the sharper the boundaries need to be.&lt;/div&gt;&#xA;    &lt;/div&gt;&#xA;    &lt;div class=&#34;arem-card-item&#34;&gt;&#xA;      &lt;div class=&#34;arem-card-item-title&#34;&gt;3. Prefer legible layers to magical ones&lt;/div&gt;&#xA;      &lt;div class=&#34;arem-card-item-text&#34;&gt;A good tool is not just one that works. It is one whose role can be described simply. If it takes five explanations to understand what it sees, what it keeps, what it prepares, what it can trigger, and what stops it, the delegation is already too opaque.&lt;/div&gt;&#xA;    &lt;/div&gt;&#xA;    &lt;div class=&#34;arem-card-item&#34;&gt;&#xA;      &lt;div class=&#34;arem-card-item-title&#34;&gt;4. Treat comfort as a warning sign&lt;/div&gt;&#xA;      &lt;div class=&#34;arem-card-item-text&#34;&gt;Comfort is a real benefit. It is also often the moment when vigilance starts to drop. A mature AI practice does not reject ease; it refuses to become hypnotized by it.&lt;/div&gt;&#xA;    &lt;/div&gt;&#xA;    &lt;div class=&#34;arem-card-item&#34;&gt;&#xA;      &lt;div class=&#34;arem-card-item-title&#34;&gt;5. Build the way back before you need it&lt;/div&gt;&#xA;      &lt;div class=&#34;arem-card-item-text&#34;&gt;Healthy delegation has to remain reversible. If you cannot unplug a tool without losing the intelligibility of your practice, access to essential information, or the ability to act without it, then the tool is already taking up too much ground.&lt;/div&gt;&#xA;    &lt;/div&gt;&#xA;  &lt;/div&gt;&#xA;&lt;/div&gt;&#xA;&lt;div class=&#34;arem-card&#34;&gt;&#xA;  &lt;div class=&#34;arem-card-title&#34;&gt;A workflow more useful than an ideal stack&lt;/div&gt;&#xA;  &lt;div class=&#34;arem-card-sub&#34;&gt;For many everyday uses, a clean discipline of delegation already changes a great deal.&lt;/div&gt;&#xA;  &lt;div class=&#34;arem-card-sep&#34;&gt;&lt;/div&gt;&#xA;  &lt;div class=&#34;arem-card-list&#34;&gt;&#xA;    &lt;div class=&#34;arem-card-item&#34;&gt;&#xA;      &lt;div class=&#34;arem-card-item-title&#34;&gt;Keep in your own hands&lt;/div&gt;&#xA;      &lt;div class=&#34;arem-card-item-text&#34;&gt;Decisive interpretation, capital allocation, reputationally sensitive choices, and any access involving keys, secrets, or wide permission scopes.&lt;/div&gt;&#xA;    &lt;/div&gt;&#xA;    &lt;div class=&#34;arem-card-item&#34;&gt;&#xA;      &lt;div class=&#34;arem-card-item-title&#34;&gt;Safe to assist&lt;/div&gt;&#xA;      &lt;div class=&#34;arem-card-item-text&#34;&gt;Exploratory research, topic mapping, summarization, reformulation, comparison, and note structuring.&lt;/div&gt;&#xA;    &lt;/div&gt;&#xA;    &lt;div class=&#34;arem-card-item&#34;&gt;&#xA;      &lt;div class=&#34;arem-card-item-title&#34;&gt;Delegate only inside a bounded perimeter&lt;/div&gt;&#xA;      &lt;div class=&#34;arem-card-item-text&#34;&gt;Monitoring, draft preparation, classification, low-consequence automations, and narrow coordination tasks.&lt;/div&gt;&#xA;    &lt;/div&gt;&#xA;    &lt;div class=&#34;arem-card-item&#34;&gt;&#xA;      &lt;div class=&#34;arem-card-item-title&#34;&gt;Never delegate without explicit friction&lt;/div&gt;&#xA;      &lt;div class=&#34;arem-card-item-text&#34;&gt;Signatures, fund movements, external messages, irreversible actions, and any modification of critical permissions or system parameters.&lt;/div&gt;&#xA;    &lt;/div&gt;&#xA;  &lt;/div&gt;&#xA;&lt;/div&gt;&#xA;&lt;h2 id=&#34;what-this-second-piece-was-trying-to-make-practical&#34;&gt;What this second piece was trying to make practical&#xA;&lt;/h2&gt;&lt;p&gt;We are not going to get through this moment by pure refusal.&#xA;Nor will we get through it by delighted surrender.&lt;/p&gt;&#xA;&lt;p&gt;What we need is something else: a way of living with AI without handing over, in a single motion, the very faculties it makes harder to notice.&lt;/p&gt;&#xA;&lt;p&gt;That calls for less purity than poise.&#xA;Less grand moralizing than an art of limits.&lt;/p&gt;&#xA;&lt;p&gt;The third piece moves the question onto its sharpest testing ground: DeFi, where every delegation eventually takes the form of a permission, a bound, a risk, or an architecture.&lt;/p&gt;&#xA;</description>
        </item><item>
            <title>1. The Next Frontier of Self-Custody</title>
            <link>https://www.arem.blog/en/post/the-next-frontier-of-self-custody/</link>
            <pubDate>Mon, 13 Apr 2026 11:00:00 +0000</pubDate>
            <guid>https://www.arem.blog/en/post/the-next-frontier-of-self-custody/</guid>
            <description>&lt;img src=&#34;https://www.arem.blog/&#34; alt=&#34;Featured image of post 1. The Next Frontier of Self-Custody&#34; /&gt;&lt;p&gt;&lt;em&gt;Series opening: &lt;a class=&#34;link&#34; href=&#34;https://www.arem.blog/en/post/self-custody-but-how-far/&#34; &gt;Self-Custody, But How Far?&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;we-learned-not-to-leave-our-assets-with-custodians-we-have-not-yet-learned-not-to-hand-our-judgment-too-quickly-to-new-intermediaries&#34;&gt;We learned not to leave our assets with custodians. We have not yet learned not to hand our judgment too quickly to new intermediaries.&#xA;&lt;/h2&gt;&lt;p&gt;Crypto began with an intuition that looked technical at first and turned out to be much larger: wherever an intermediary can be removed from the equation, it is usually better to learn how to live without it.&lt;/p&gt;&#xA;&lt;p&gt;From that intuition came wallets, habits, slogans, and forms of caution. &lt;em&gt;Not your keys, not your coins&lt;/em&gt; did more than teach a generation of users to distinguish convenience from control. It changed the way they moved through the digital world.&lt;/p&gt;&#xA;&lt;p&gt;What has not happened yet is the extension of that discipline to our own faculty for judgment.&lt;/p&gt;&#xA;&lt;p&gt;We know how to ask where the funds are, who controls permissions, where the points of capture lie. We are far less used to asking where the model runs, what data it sees, how much of our work it absorbs, what it prepares on our behalf, what it saves us from doing, and what kind of dependence takes shape as it becomes hard to do without.&lt;/p&gt;&#xA;&lt;p&gt;The center of gravity has moved. For years we talked about empires of data. We now have to talk about empires of delegation.&lt;/p&gt;&#xA;&lt;h2 id=&#34;what-has-actually-changed&#34;&gt;What has actually changed&#xA;&lt;/h2&gt;&lt;p&gt;Web2 mostly captured traces: our clicks, our preferences, our social graphs, our attention.&lt;/p&gt;&#xA;&lt;p&gt;This moment adds a more intimate layer. AI enters our notes, archives, queries, reading habits, summaries, work routines, information triage, draft formulations, preparatory judgments, and in some cases already parts of action itself.&lt;/p&gt;&#xA;&lt;p&gt;It is no longer just a tool. It becomes an environment — sometimes a work environment, sometimes a mental one.&lt;/p&gt;&#xA;&lt;p&gt;And once a tool becomes an environment, the question changes. The point is no longer just whether it is useful. The point is what it reorganizes in us: how we read, rank, remember, anticipate, and decide.&lt;/p&gt;&#xA;&lt;p&gt;For a web3 reader, that shift is decisive. Trust minimization no longer concerns only assets, contracts, or execution rails. It reaches something harder to preserve: discernment.&lt;/p&gt;&#xA;&lt;h2 id=&#34;a-deeply-crypto-contradiction&#34;&gt;A deeply crypto contradiction&#xA;&lt;/h2&gt;&lt;p&gt;This is not really about hypocrisy. The problem is more uncomfortable than that — and more revealing.&lt;/p&gt;&#xA;&lt;p&gt;Crypto has always been drawn to tools that produce an edge: more speed, more clarity, more informational asymmetry, more capacity to explore, compare, and execute. It makes perfect sense that the space would be among the first to embrace persistent copilots, augmented workflows, agentic layers, and systems that preserve context while compressing time.&lt;/p&gt;&#xA;&lt;p&gt;So the contradiction is not moral. It is structural.&lt;/p&gt;&#xA;&lt;p&gt;Two legitimate demands are colliding. On the one hand: do not depend on a trusted intermediary. On the other: gain speed, clarity, and processing power through systems that keep getting stronger.&lt;/p&gt;&#xA;&lt;p&gt;The first built a culture.&#xA;The second is beginning to rearrange its habits.&lt;/p&gt;&#xA;&lt;p&gt;No slogan will resolve that tension for us.&lt;/p&gt;&#xA;&lt;h2 id=&#34;the-age-of-setups&#34;&gt;The age of setups&#xA;&lt;/h2&gt;&lt;p&gt;That is why the current fascination with AI setups deserves to be taken seriously.&lt;/p&gt;&#xA;&lt;p&gt;One builder runs Claude through Telegram. Another has agents pass task state through &lt;code&gt;.md&lt;/code&gt; files. A third organizes memory in Obsidian, plugs in search tools, ties the whole thing into coding or research workflows, and starts the day with the sense that the machine has already been working through the night.&lt;/p&gt;&#xA;&lt;p&gt;None of this is scandalous in itself. But all of it says something precise about the present.&lt;/p&gt;&#xA;&lt;p&gt;We are no longer looking only for answers.&#xA;We are looking for continuity.&lt;/p&gt;&#xA;&lt;p&gt;We want systems that preserve context, reconnect scattered fragments, surface what must not be forgotten, reorder notes, watch what needs watching, prepare the ground, and make us feel that part of the work has already been done before we even sit down.&lt;/p&gt;&#xA;&lt;p&gt;That promise is powerful.&#xA;It is also exactly where sovereignty has to be rethought.&lt;/p&gt;&#xA;&lt;p&gt;The question is no longer only whether a tool is spying on us. We also have to ask what it is taking over inside our relation to the world: memory, monitoring, pre-sorting, classification, recombination, the first movement of discernment. These operations look secondary — until we realize they already shaped a decisive part of the way we act.&lt;/p&gt;&#xA;&lt;h2 id=&#34;morin-or-the-useful-bad-news&#34;&gt;Morin, or the useful bad news&#xA;&lt;/h2&gt;&lt;p&gt;This is where Edgar Morin becomes newly useful.&lt;/p&gt;&#xA;&lt;p&gt;Morin forces us to think together what we would rather keep apart: autonomy and dependence, local power and systemic effects, service rendered and gradual dispossession. Applied to AI, the lesson is severe but clarifying: a tool of augmentation can become an infrastructure of relinquishment without ever ceasing, locally, to be useful.&lt;/p&gt;&#xA;&lt;p&gt;The danger does not necessarily arrive as a visible catastrophe.&#xA;More often it settles in under the appearance of comfort.&lt;/p&gt;&#xA;&lt;p&gt;You notice quickly when you left your funds with a dubious custodian.&#xA;You notice later when you have outsourced too much of your reading, your memory, your sense-making, or the preparation of your decisions.&lt;/p&gt;&#xA;&lt;p&gt;Cognitive dependence rarely looks like coercion.&#xA;More often it looks like help that has become second nature.&lt;/p&gt;&#xA;&lt;h2 id=&#34;the-issue-is-not-only-the-models-it-is-also-the-surrounding-software&#34;&gt;The issue is not only the models. It is also the surrounding software.&#xA;&lt;/h2&gt;&lt;p&gt;The problem cannot be reduced to frontier models, major labs, or the opposition between local and cloud.&lt;/p&gt;&#xA;&lt;p&gt;It also concerns the environment AI is helping to proliferate around protocols: dashboards, wrappers, research tools, specialized assistants, monitoring layers, coordination services, micro-products built quickly — sometimes carefully reviewed and robust, sometimes not.&lt;/p&gt;&#xA;&lt;p&gt;We need to be precise here.&#xA;Using AI to build software is not, in itself, a problem. Not every AI-assisted build is vibe coding in the strong sense.&lt;/p&gt;&#xA;&lt;p&gt;The issue begins elsewhere: when the cost of producing a service falls much faster than the cost of reviewing it, understanding it, and qualifying it.&lt;/p&gt;&#xA;&lt;p&gt;At that point we do not just have more tools.&#xA;We have more surfaces of trust to evaluate.&lt;/p&gt;&#xA;&lt;p&gt;And in web3, where a dashboard, an interface, or a copilot can shape a risk reading, an allocation, a signature, or an execution path, that shift matters a great deal.&lt;/p&gt;&#xA;&lt;h2 id=&#34;what-this-first-piece-wanted-to-make-visible&#34;&gt;What this first piece wanted to make visible&#xA;&lt;/h2&gt;&lt;p&gt;The question, then, is not whether AI is compatible with web3 culture.&#xA;It already is — almost too well.&lt;/p&gt;&#xA;&lt;p&gt;The real question is more awkward: can crypto extend to cognition, organization, and action the same demands for sovereignty it learned to formulate for assets?&lt;/p&gt;&#xA;&lt;p&gt;We now know where the fault line runs.&#xA;A culture of self-custody that never asks what it is handing over to cognitive intermediaries may end up missing the most important stage of its own development.&lt;/p&gt;&#xA;&lt;p&gt;The next piece starts from there: how to recover a discipline of delegation firm enough to matter and simple enough to use.&lt;/p&gt;&#xA;</description>
        </item><item>
            <title>Intro: Self-Custody, But How Far?</title>
            <link>https://www.arem.blog/en/post/self-custody-but-how-far/</link>
            <pubDate>Mon, 13 Apr 2026 10:00:00 +0000</pubDate>
            <guid>https://www.arem.blog/en/post/self-custody-but-how-far/</guid>
            <description>&lt;img src=&#34;https://www.arem.blog/&#34; alt=&#34;Featured image of post Intro: Self-Custody, But How Far?&#34; /&gt;&lt;p&gt;&lt;em&gt;Crypto taught itself not to leave assets in someone else’s hands. The next question is whether it can bring that same discipline to judgment, organization, and eventually to action itself.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;why-this-series&#34;&gt;Why this series&#xA;&lt;/h2&gt;&lt;p&gt;Crypto proved something essential long before most of the digital world was ready to hear it: when you can remove an opaque intermediary, you usually should.&lt;/p&gt;&#xA;&lt;p&gt;That instinct gave us wallets, habits, slogans, and architectures. Over time it gave us something larger than tooling: a culture. Self-custody. Trust minimization. Resistance to capture. An insistence on clear permissions and visible points of control.&lt;/p&gt;&#xA;&lt;p&gt;And yet something is shifting as AI becomes ordinary.&lt;/p&gt;&#xA;&lt;p&gt;The same circles that learned to distrust intermediaries around assets are now increasingly willing to hand over their notes, reading habits, research workflows, contextual memory, preparatory judgments — and soon parts of their ability to act — to systems they do not fully understand and do not really control.&lt;/p&gt;&#xA;&lt;p&gt;So the problem is no longer just data.&#xA;It is delegation.&lt;/p&gt;&#xA;&lt;p&gt;That is the real turn. Crypto already knows how to ask the right questions when money is involved: who controls what, who holds the keys, where the capture points sit, which trust assumptions are being accepted.&lt;/p&gt;&#xA;&lt;p&gt;What remains uncertain is whether that rigor can be extended to thought, to organization, and to the conduct of action.&lt;/p&gt;&#xA;&lt;h2 id=&#34;what-these-essays-are-after&#34;&gt;What these essays are after&#xA;&lt;/h2&gt;&lt;p&gt;We learned self-custody for assets.&lt;/p&gt;&#xA;&lt;p&gt;We still have to learn it for judgment.&lt;/p&gt;&#xA;&lt;p&gt;That is the thread running through these three pieces.&lt;/p&gt;&#xA;&lt;p&gt;The first names the contradiction: we are not only living in the aftermath of Web2 and its empires of data. We are moving into a world where empires of delegation are beginning to take shape.&lt;/p&gt;&#xA;&lt;p&gt;The second tries to recover a workable discipline. AI is no longer just an answer engine. It is becoming a work environment, a contextual memory, an organizational layer, and in some cases already a preparation for action.&lt;/p&gt;&#xA;&lt;p&gt;The third explains why DeFi is one of the first places where this question can no longer be postponed. Sooner or later, every delegation shows up as a permission, a limit, a risk, or an architecture.&lt;/p&gt;&#xA;&lt;p&gt;Edgar Morin is the quiet philosophical thread behind the series. Not as borrowed authority, but as a way of reading the moment: hold together autonomy and dependence, local power and systemic effects, genuine service and gradual dispossession. In other words, learn how to think in a complex environment without pretending that a local fix will settle the whole matter.&lt;/p&gt;&#xA;&lt;h2 id=&#34;what-this-series-does-not-promise&#34;&gt;What this series does not promise&#xA;&lt;/h2&gt;&lt;p&gt;Not a universal stack.&#xA;Not a new form of digital purity.&#xA;Not a lazy indictment of AI.&lt;/p&gt;&#xA;&lt;p&gt;It aims at something more useful: a way of telling apart what can be delegated, what should remain under direct control, and what we should now demand from the tools we let into our practice.&lt;/p&gt;&#xA;&lt;h2 id=&#34;the-three-pieces&#34;&gt;The three pieces&#xA;&lt;/h2&gt;&lt;h3 id=&#34;1-the-next-frontier-of-self-custody&#34;&gt;1. &lt;a class=&#34;link&#34; href=&#34;https://www.arem.blog/en/post/the-next-frontier-of-self-custody/&#34; &gt;The Next Frontier of Self-Custody&lt;/a&gt;&#xA;&lt;/h3&gt;&lt;p&gt;The diagnosis: what AI is actually changing inside a culture that thought it already knew what digital sovereignty meant.&lt;/p&gt;&#xA;&lt;h3 id=&#34;2-delegate-without-handing-yourself-over&#34;&gt;2. &lt;a class=&#34;link&#34; href=&#34;https://www.arem.blog/en/post/delegate-without-handing-yourself-over/&#34; &gt;Delegate Without Handing Yourself Over&lt;/a&gt;&#xA;&lt;/h3&gt;&lt;p&gt;The practical and philosophical core of the series: how to distinguish assistance from delegation, and delegation from abandonment — then recover a discipline strict enough to matter and simple enough to live with.&lt;/p&gt;&#xA;&lt;h3 id=&#34;3-defi-as-a-laboratory-of-delegation&#34;&gt;3. &lt;a class=&#34;link&#34; href=&#34;https://www.arem.blog/en/post/defi-as-a-laboratory-of-delegation/&#34; &gt;DeFi as a Laboratory of Delegation&lt;/a&gt;&#xA;&lt;/h3&gt;&lt;p&gt;The proving ground: dashboards, wrappers, agents, vibe coding — and then two contrasting cases, Money League and Polaris, that make the problem impossible to miss.&lt;/p&gt;&#xA;</description>
        </item></channel>
</rss>
