Skip to content

Commit da25719

Browse files
committed
wip: wedges
1 parent cb9fa69 commit da25719

File tree

1 file changed

+32
-2
lines changed

1 file changed

+32
-2
lines changed

docs/reference/wedges/README.md

Lines changed: 32 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,17 @@
22

33
Trust Graphs
44

5+
Multiplayer Utility - the layer 5 software-system.
6+
7+
> The Artifact is Everything: The core gap in the market is not another dashboard or security agent. The gap is the lack of signed, time-anchored, portable, and settlement-grade receipts. Your competitors are building USB agents, but they are still thinking in terms of "logs," not "evidence." This is your key differentiator.
8+
> The Wedge is Real and It's Top-Down: Your initial intuition was right, but your time at SEMICON and analyzing the OT landscape has confirmed a critical detail: the adoption of "Receipt Rails" in high-value industrial sectors will be driven top-down by compliance and standards, not bottom-up by individual developers. The key is to align with emerging standards like ISA/IEC 62443 and SEMI E187/E188 and sell to the Tier-1 fabs, OSATs, and utilities who are forced to comply. The "singleplayer utility" is selling them a tool that makes this compliance auditable and less painful.
9+
10+
11+
512
- Blockchain Wallet Reputation
613
- Email Sender Reputation
714
- Sayari Supply Chain Trust
15+
- DevOps Authority Tracing
816

917
- Energy DR/curtailment
1018
- Verifier: utility/auditor/insurer
@@ -26,12 +34,34 @@ Trust Graphs
2634
- Verifier: finance/audit/ERP; sustainability reporting
2735
- Value: RMA state-machine “receipts rail” → refunds/chargebacks clarity, refurb analytics
2836
- T1R: 4–8 weeks (one brand + 3PL)
29-
- Internal compliance (Fair Work–style dispute trail)
37+
- Internal HR compliance (Fair Work–style dispute trail)
3038
- Verifier: regulator/tribunal; corporate audit
31-
- Value: standardized settlement-grade artifacts → faster resolution
39+
- Value: standardized settlement-grade artifacts for legal discovery → faster resolution -> prevents "lack of documentation" - because process is admin-heavy
3240
- T1R: 4–6 weeks (one HR/legal team)
3341

42+
---
43+
44+
DevOps authority tracking - this is like SSO (and that user onramp/offramp) extended to the entire devops enterprise resources
45+
46+
I need a way to "write down" or audit log a change to authority.
47+
48+
I just changed my GitHub CI/CD NIXPKGS_PRIVATE_PAT to a new one.
49+
50+
Why?
51+
52+
Because after offboarding an employee, it turns out that while she was responsible for setting up infrastructure, she had injected her own PAT there. And it worke while her account was active.
53+
54+
After offboarding her accounts, the CI/CD failed. It failed (late) rather than (early) because we don't early warning that a particular token that is used somewhere is now invalid because of a state change somewhere else (this the action at a distance problem, or cache-coherency/state-sync/foreign-key integrity problem applied to configuration/and secrets).
3455

56+
To fix this, I generated a new token - but I had to:
3557

58+
1. Figure why it was failing?
59+
2. Trace to the root cause that was due to an invalid token.
60+
3. Backtrack through business-tacit-knowledge realising that she was responsible for this technology domain, and therefore maybe it was her token.
61+
4. Figure out how to "recreate" this token - because it's not 100% clear what exactly this token was capable of.
62+
5. Inferring from the name, it's a token designed to access only a single repository with read-only permissions of the contents.
63+
6. Therefore, replacing it with a token that has that exact authority - but under a new more durable principal rather than any single user's account.
64+
7. But now we have a repeat problem. The point problem is fixed, but a long term problem remains. There is no audit log, and this problem can happen again. The token will expire eventually and we will have this problem again.
3665

66+
An audit log is not enough. I could write it into a log. But it's not composable, not automated, not open. It's not "connected" the Source of Authority, the User of Authority and Target of Authority.
3767

0 commit comments

Comments
 (0)