You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/reference/wedges/README.md
+32-2Lines changed: 32 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,9 +2,17 @@
2
2
3
3
Trust Graphs
4
4
5
+
Multiplayer Utility - the layer 5 software-system.
6
+
7
+
> The Artifact is Everything: The core gap in the market is not another dashboard or security agent. The gap is the lack of signed, time-anchored, portable, and settlement-grade receipts. Your competitors are building USB agents, but they are still thinking in terms of "logs," not "evidence." This is your key differentiator.
8
+
> The Wedge is Real and It's Top-Down: Your initial intuition was right, but your time at SEMICON and analyzing the OT landscape has confirmed a critical detail: the adoption of "Receipt Rails" in high-value industrial sectors will be driven top-down by compliance and standards, not bottom-up by individual developers. The key is to align with emerging standards like ISA/IEC 62443 and SEMI E187/E188 and sell to the Tier-1 fabs, OSATs, and utilities who are forced to comply. The "singleplayer utility" is selling them a tool that makes this compliance auditable and less painful.
- Value: standardized settlement-grade artifacts for legal discovery → faster resolution -> prevents "lack of documentation" - because process is admin-heavy
32
40
- T1R: 4–6 weeks (one HR/legal team)
33
41
42
+
---
43
+
44
+
DevOps authority tracking - this is like SSO (and that user onramp/offramp) extended to the entire devops enterprise resources
45
+
46
+
I need a way to "write down" or audit log a change to authority.
47
+
48
+
I just changed my GitHub CI/CD NIXPKGS_PRIVATE_PAT to a new one.
49
+
50
+
Why?
51
+
52
+
Because after offboarding an employee, it turns out that while she was responsible for setting up infrastructure, she had injected her own PAT there. And it worke while her account was active.
53
+
54
+
After offboarding her accounts, the CI/CD failed. It failed (late) rather than (early) because we don't early warning that a particular token that is used somewhere is now invalid because of a state change somewhere else (this the action at a distance problem, or cache-coherency/state-sync/foreign-key integrity problem applied to configuration/and secrets).
34
55
56
+
To fix this, I generated a new token - but I had to:
35
57
58
+
1. Figure why it was failing?
59
+
2. Trace to the root cause that was due to an invalid token.
60
+
3. Backtrack through business-tacit-knowledge realising that she was responsible for this technology domain, and therefore maybe it was her token.
61
+
4. Figure out how to "recreate" this token - because it's not 100% clear what exactly this token was capable of.
62
+
5. Inferring from the name, it's a token designed to access only a single repository with read-only permissions of the contents.
63
+
6. Therefore, replacing it with a token that has that exact authority - but under a new more durable principal rather than any single user's account.
64
+
7. But now we have a repeat problem. The point problem is fixed, but a long term problem remains. There is no audit log, and this problem can happen again. The token will expire eventually and we will have this problem again.
36
65
66
+
An audit log is not enough. I could write it into a log. But it's not composable, not automated, not open. It's not "connected" the Source of Authority, the User of Authority and Target of Authority.
0 commit comments