Paxiom
Paxiom · Narrative · Drawing Set
Project Narrative
A founder's account of the territory, the bet, and what it takes to build the platform.
Project No.
PXM-001-B
Issue
Narrative / Rev. A
Date
2026.04.29
Drawn By
K. Luecke
Sheet B-000 · Cover & Index

The substrate is being laid
right now.

A document for the reader who wants to understand the territory before they evaluate the bet. The agentic economy is forming, the infrastructure for trustworthy machine-to-machine commerce does not fully exist, and Paxiom is one specific bet on what part of that infrastructure should look like.

Document Type
Project Narrativefounder's thinking, fully laid out
Audience
Technical & noviceboth should land somewhere useful
Tone
Honest, not promotionalarguments and constraints
Length
Substantiveread in one sitting if possible
Companion Set
A · M · E · O seriestechnical detail lives there
What This Is Not
Not a pitch decknot investor material, not advertising
B-000
Cover & Indexthis sheet
B-010
How to Read Thisstructure, conventions, what you'll find
B-100
The Agentic Economywhere it stands, where it's going, why now
B-200
Protocol Mechanicsthe round trip, the headers, the facilitator
B-210
Wallet as Identitywhy x402 looks like cash, not credit
B-220
Discovery & Reputationhow agents find services
B-230
The Stack Above x402MCP, ERC-8004, ERC-8183, KYA
B-300
RPC Trust Collapsewhat Kelp DAO showed
B-310
Lookalikes & Verifiable Artifactsfraud, competition, and the line between
B-320
Legitimate Competitionthe existing landscape
B-400
The Platformfive Phase 1 services; cross-chain settlement reference
B-500
Zero-Knowledge Proofsreal math, plain explanation
B-510
Recursive ProvingPolyhedra Expander; why composition matters
B-520
Quantum ReadinessNIST, Google, the migration coming
B-530
HyperBEAM & Deviceswhere compute happens
B-540
AO & Arweaveaudit as native property
B-550
Paxiom Proof Archiveencrypted evidence, replayable state
B-600
Phase 1 Pro Formaper-service unit economics
B-610
Addressable Markettrajectory matters more than today
B-700
AI Verified Inferencewhat it is, why later
B-710
Private Data ComputeHIPAA, financial, the ZK pivot
B-720
Telemetry & IoTverifiable physical-world feeds
B-800
Founder Contextinfrastructure background, audit discipline, iteration
B-810
Why This, Why Nowthe industrial revolution comparison
B-900
Ecosystem Dependenciespartners, standards, regulatory, AI labs
B-1000
The TrajectoryPhase 1 through Phase 5; being early
B-1100
Closing & Referencesrelated documents, revision log
B-010 · How to Read This

A short note before the long argument.

This document is the founder's thinking on Paxiom, laid out fully and honestly. It is not a pitch. It is what would have helped to read six months ago, when figuring out the shape of the territory was the actual work. The hope is that it serves the same purpose for someone else.

What you'll find

Ten sections, roughly in order. The world the platform exists in. The protocol it builds on. The threats it responds to. What the platform actually is. How the technical pieces work. What the economics look like. What the platform enables beyond its first version. Who is building it and why. What lies outside the builder's control. What comes next.

Section 5, on the technical pieces, is the longest and hardest. It contains real mathematics where the math clarifies an idea, and prose where prose serves better. The mathematics is presented in a specific form. A statement is given in standard set-theoretic notation, and then the next paragraph reads the statement back in plain English. A reader without a cryptography background can use the prose translations as a ladder up to the notation. A reader with a cryptography background can skip the translations.

What this is not

Not a marketing document. The reader is presumed to be present in good faith and capable of evaluating arguments. Where the platform's positioning is honest and the numbers support it, that is what is written. Where there is real uncertainty, that is also what is written.

Not a substitute for the technical documentation. The companion documents in this set — the Phase 1 Blueprint, the Audit Relay Blueprint, the Key Custody Blueprint, the Operations Runbook — go deeper into specific technical and operational details. This document references them where relevant; it does not duplicate them.

Conventions

The construction-document register used throughout this set continues here. Sheets are numbered. Cross-references go to specific sheets. Mathematical notation uses standard conventions and is always followed by a reading translation in italic. Citations are footnoted in the body or marked as callouts.

Where the document shifts to first person, that shift is marked visually with an amber rule on the left margin. Most of the text is third person about the platform. The founder's voice appears specifically in the sections about motivation and trajectory, where third person would read strangely.

Section 1 · B-100

The agentic economy.
Where it stands, where it's going.

Software agents are starting to transact with each other, with services, and with the world. The infrastructure for this commerce is being built right now, and the institutional embedding is real.

An autonomous software agent is a program that takes a goal, makes decisions, and acts in the world without a human approving each step. These have existed for years in narrow forms. What is new is the combination of capable language models, standardized payment rails, and identity infrastructure that lets agents transact at scale across organizations they do not share trust relationships with.

Where it stands now

The numbers, where they can be measured. The x402 protocol — the specific payment rail this document spends a section on — is currently processing roughly $28,000 per day in genuine on-chain settlements across a population of services that has grown from essentially zero in mid-2025 to several hundred today. The annualized figure that gets reported as "$600M" is a projection from current growth; the realized volume is much smaller.

Average transaction size is roughly twenty cents. This is not a typo. The agent economy at the protocol level is dominated by tiny payments. Agents call services thousands of times per day at fractions of a cent to a few dollars per call. The volume comes from frequency, not from magnitude.

x402 daily volume
$28k
on-chain genuine, March 2026 baseline
avg. transaction
$0.20
per call; frequency, not magnitude
growth rate
~5×
year over year, projected forward

The institutional signal

Numbers describe the floor. The ceiling is harder to estimate, but the institutional behavior around the agentic economy suggests it is far above where the floor sits today. Several specific developments matter.

Stripe integrated x402 in February 2026. AWS published a reference architecture for agent commerce on top of the same protocol. Cloudflare shipped agent-payment primitives natively in their Workers and Agents SDK. The Linux Foundation chartered an x402 Foundation with Coinbase, Stripe, AWS, American Express, and Cloudflare as founding members. None of these are speculative. All of them happened.

Circle — the issuer of USDC, which is the predominant settlement asset in agent transactions — has been actively positioning at the highest levels of institutional finance. Jeremy Allaire has spoken at the World Economic Forum on agent-mediated stablecoin payments. The Davos agenda has included multiple sessions on autonomous commerce since 2024. McKinsey projects three to five trillion dollars in agentic commerce by 2030 across all categories. Gartner projects fifteen trillion in B2B agent transactions by 2028.

Cite Institutional embedding B-100 / C.01

Allaire and Circle have been explicit at WEF and Davos that stablecoin settlement is the substrate for agent-mediated commerce at scale. The framing has been treated as economic policy infrastructure, not crypto curiosity. That framing matters. Institutional finance does not embed something it considers curious.

Visa announced its Trusted Agent Protocol in early 2026, citing a 477% year-over-year surge in AI-driven payment fraud as part of its rationale. The same announcement noted that conventional card networks are not positioned for the per-call pricing the agent economy demands. Visa is betting that the substrate has to be different. So is Stripe. So is Cloudflare. The bet is consensus among the entities whose business models would be most disrupted if the bet turned out wrong.

Why now

Three preconditions have been met that were not met three years ago. They combine, and the combination is what makes the agentic economy actually work rather than aspirationally exist.

The first precondition is capable language models. Agents that can reason about what they need, evaluate options, recover from errors, and operate without constant human oversight require model capabilities that did not exist at production scale until 2024. The cost curve on those capabilities continues to drop, which means more tasks become economically viable to delegate to agents.

The second precondition is standardized payment rails. Without x402 or something like it, every agent-service interaction would require custom payment integration. That overhead crushes the per-call economics that make agent commerce viable. Standardization is the unlock.

The third precondition is identity infrastructure. Wallets, signatures, and the early forms of agent identity verification — KYA frameworks, the ERC-8004 reputation registry, Trulioo's Digital Agent Passport, Sumsub's human-binding approach. None of these are mature, but the existence of the category enables institutional embedding to proceed. Banks and merchants can plan around an identity layer that is emerging even if it isn't finished.

What this means

The agentic economy is not a future bet. It is a present reality that is small but growing, with institutional embedding that suggests the growth is durable rather than speculative. The infrastructure being built right now will be the substrate of how machines transact for the next several decades. That substrate is being built unevenly, with gaps, with parts of it more mature than others. Paxiom is one specific bet on which gap matters and how to fill it.

The next section explains the protocol that anchors this economy.

Section 2 · B-200

The x402 protocol.
Mechanics.

The protocol is straightforward at the surface. The implications are not. This sheet covers the surface. The next three sheets cover what the protocol implies.

HTTP status code 402 has existed in the specification since the original HTTP standard, marked as "reserved for future use." The future use arrived in 2025 when Coinbase, Cloudflare, and a handful of other parties published x402 — a concrete protocol for HTTP-native machine payments using the long-reserved code.

The round trip

An agent requests a resource from a service. The service responds with status 402 and a header describing what payment is required — which chain, which asset, what amount, where to settle. The agent's wallet signs a payment authorization for the specified amount. The agent retries the request with the signed authorization attached. The service forwards the signature to a facilitator, which verifies the signature is valid and the wallet has funds. On verify success, the service performs the work, returns the result, and either settles immediately or batches settlement for later. The customer gets the resource. The service gets paid. The chain records the transaction.

That is the entire protocol. The round trip is on the order of seconds, sometimes sub-second. There is no account creation, no API key provisioning, no contract negotiation. The service does not know who the agent is. The agent does not need a relationship with the service. Both sides simply transact.

The facilitator pattern

The facilitator is the trusted party that handles cryptographic verification and on-chain settlement. The original x402 deployments use Coinbase's hosted facilitator, which is free for users. Other facilitators exist. x402-rs is an open-source implementation in Rust that any service operator can self-host. The facilitator pattern is what lets services accept x402 payments without running their own chain infrastructure.

The facilitator does not know what the service is doing. It only verifies that the customer's signature is valid, the wallet has the required funds, and the settlement transaction goes through. This separation matters because it means services can be small specialized operations without taking on the operational complexity of running chain infrastructure themselves.

The settlement layer

x402 settles primarily on Base — Coinbase's Layer 2 — using USDC. Base is the default because Coinbase's facilitator is the default and because Base produces blocks fast enough that settlement latency is acceptable for agent commerce. USDC is the default because it is the most institutionally embedded stablecoin with the cleanest regulatory posture and the deepest liquidity.

x402 is chain-agnostic at the protocol level. The same protocol can settle on Ethereum mainnet, on other Layer 2s, on Solana, on alternate stablecoins. The default is what most operators use today. The ecosystem is multi-chain by design. Future facilitator implementations will support more chains as adoption broadens.

The deferred settlement scheme is a notable variant worth understanding. In normal x402, settlement is immediate — the funds move on-chain at the time of payment. In deferred settlement, the customer's signature authorizes payment but the actual settlement happens later, usually in a batched window. This reduces gas costs substantially for high-frequency services and creates a structurally cleaner failure mode for compute that fails after charging — if the work fails, the settlement simply is not executed. Cloudflare proposed this scheme. It is gradually being adopted across the ecosystem.

What x402 is not

Not a payment processor. The protocol does not handle currency conversion, dispute resolution, chargebacks, or fraud monitoring. Those functions live above the protocol if they exist at all.

Not an identity system. The protocol verifies the wallet has funds and the signature is valid. It does not verify who the agent is or who operates it. Identity layers exist above the protocol; they are covered later.

Not a discovery system. The protocol is what happens once an agent has already decided to call a specific service. How the agent found the service in the first place is a different layer; that layer is also covered later.

Section 2 · B-210

Wallet as identity.
Why x402 looks like cash.

The single largest mental shift required to understand the agentic economy is this: at the protocol level, the wallet is the entire identity. There is no agent identity, no user identity, no organizational identity. The wallet has funds, the signature is valid, the transaction proceeds.

The cash analogy, made precise

When a person walks into a store with a twenty-dollar bill and buys a sandwich, the store does not verify who the person is. The store verifies that the bill is genuine and the change is correct. The person's identity is irrelevant to the transaction. The store has no relationship with the person before, during, or after the exchange.

x402 works the same way. The wallet is genuine if the cryptographic signature checks out. The wallet has funds if the chain says it does. The transaction proceeds. No relationship is established. No identity is verified. The agent gets the resource. The service gets the payment. The chain records the transfer.

The credit card model is structurally different and worth contrasting. A credit card is identity-bound. The card belongs to a specific person. The merchant has obligations to verify the cardholder, to handle disputes, to participate in fraud monitoring. The card network mediates the entire relationship and bears risk. None of that is true of x402.

What this means in practice

The wallet operator is implicitly the commercial actor. If a company deploys an agent with a wallet that has ten thousand dollars in it and a daily spending limit, the agent operates within that envelope and the company's exposure is bounded by the wallet's contents. The wallet is the identity for spending purposes. The agent is just the program operating the wallet.

This is the structural property that lets agent commerce scale. If the protocol required identity verification for every transaction, the overhead would crush the per-call economics. Cash-equivalent settlement is what makes twenty-cent transactions viable. Adding identity to the protocol layer would defeat the purpose.

Where identity does come in

At the wallet level, the operator decides what the wallet can spend on. This is internal to the operator, not part of the protocol.

At the agent level, the operator configures the agent's permissions. What services it can call, what amounts it can spend, what categories of decisions it can make autonomously. These guardrails are implemented at the agent's reasoning layer or its tool-use configuration, not at the payment protocol.

At the merchant level, some services want to verify who they're dealing with for their own reasons. A high-value service might require authentication beyond the wallet signature. This is implemented through optional layers — API keys, JWTs, attestations from agent platforms, emerging KYA frameworks — that sit alongside x402 but are not part of it.

At the regulatory level, identity requirements are coming for transactions above certain thresholds. Financial services, healthcare, anything with money laundering implications. The framework hasn't fully formed, but the direction is clear: high-value agent transactions will face KYC-like requirements applied to the wallet operator, even though the protocol itself stays neutral.

The structural implication

Identity in agent commerce will live in layers above the protocol, not in the protocol itself. This is the same architecture as the credit card system — Visa's network does not care who is swiping the card; the identity verification happens at the issuing bank, the cardholder agreement, and the regulatory framework around them. x402 mirrors this design.

For Paxiom specifically: the platform offers a naive identity primitive in v1 — signed responses, public key published in canonical locations — that allows customers to verify the platform they are paying is legitimately Paxiom rather than a lookalike. This is forward-compatible with whatever standards consolidate over the next several years (ERC-8004 in particular). It is not a full identity system. It is the minimum viable identity primitive that solves the immediate problem.

Section 2 · B-220

Discovery and reputation.
How agents find services.

The most underappreciated property of agent commerce is that traditional marketing does not reach the customer. The customer is software. Software does not read advertisements, does not respond to brand, does not skim landing pages. The discovery mechanisms that emerged for human commerce are essentially absent here.

How discovery actually works

Agents find services through structured metadata in registries, specifically through several distinct types of registry that have emerged in parallel.

Anthropic's Model Context Protocol (MCP) provides a registry of tools that agents can use, with structured descriptions of what each tool does, what inputs it accepts, what outputs it returns. Claude, GPT, and the major agent frameworks read MCP registrations natively. A service that does not have an MCP server is largely invisible to agents using those frameworks.

x402 service indexes catalog services by capability and price. Bazaar, the x402 directory operated by Coinbase, is one example. Other indexes exist and are emerging. Agents query these indexes by capability requirement and budget; the index returns matching services ranked by some combination of capability fit, price, and reputation.

Agent framework plugin lists are framework-specific. Each major agent operator — Anthropic, OpenAI, Cloudflare's Agent SDK, AWS Bedrock, others — maintains a curated list of services that integrate with that framework's tooling. Inclusion in these lists drives meaningful discovery for agents using that framework.

How discovery does not work

Search engine optimization is irrelevant. Agents do not query Google. The crawl-and-rank model that built the human web's discovery layer plays no role in how agents find services.

Content marketing aimed at human readers does not reach agents. A blog post about how a service works will be read by humans evaluating the service for their organization, but the agent that ultimately calls the service will encounter the service through structured metadata rather than through prose.

Brand recognition does not transfer. An agent comparing two services with similar capabilities does not weight which has better marketing. It weights which has better metadata, which has cheaper pricing, which has higher reputation scores from previous use.

The reputation dynamics

Reputation in agent discovery is observable and aggregated. Did the service deliver what it claimed? Were the outputs correct? Was latency acceptable? Was uptime reliable? These properties are measurable from transactions, and reputation systems aggregate the measurements across the agent population that has used the service.

The structural implication is that reputation accumulates from the first transaction. Every successful service call adds to the platform's track record. Every failed call subtracts. There is no equivalent of "first impressions" that can be marketed; the impressions are performance data.

This dynamic defeats certain attack patterns that work in human commerce. Spam-the-registry attacks fail because failed services get demoted by reputation systems faster than spammers can replace them with new registrations. The economic equation does not work.

What this means for marketing

Marketing to agents is operational excellence. Documentation quality at the MCP level. Structured metadata accuracy. Service descriptions that match what the service actually does. Reliable uptime. Fast response times. Transparent pricing. These are what move the discovery and reputation layers in your favor.

Marketing to operators — the humans who configure agents and decide which services to allow — is more conventional. Landing pages, technical content, conference engagement, B2B outreach. This work is real and necessary, but it is a different motion from the agent-facing work and serves a different purpose.

A platform that does the agent-facing work well but neglects the operator-facing work will have agents that can use it but operators who never approve it. A platform that does the operator-facing work well but neglects the agent-facing work will have approval but no discovery. Both motions are required.

Note B-220 / N.01

The lookalike attack — services that mimic legitimate providers, copy capability descriptions, undercut on price, serve plausible but fake outputs — is the discovery-layer attack that does work, at least for service categories where outputs cannot be verified. For verified compute specifically, the lookalike attack fails structurally because the outputs are themselves verification artifacts. This is covered in section B-310.

Section 2 · B-230

The stack above x402.
MCP, ERC-8004, ERC-8183, KYA.

x402 is the payment layer. It is one of several layers in the agent commerce stack, and the layers above it are forming in parallel. A service that engages only with x402 and ignores the layers above optimizes for a partial picture.

MCP — the discovery and tool layer

The Model Context Protocol, announced by Anthropic in late 2024 and now the de facto standard, defines how AI models discover and call external tools. An MCP server exposes a structured description of the tools it offers, the parameters each tool accepts, and the outputs each tool returns. AI models running in MCP-aware frameworks read these descriptions to decide which tools to call for a given task.

The relationship between MCP and x402 is layered rather than overlapping. MCP handles tool discovery and invocation; x402 handles payment for the invocation. A Paxiom service is typically wrapped in an MCP server that describes its capabilities, and the underlying HTTP endpoint is x402-gated for payment. The agent uses MCP to find and call the service, and the call triggers the x402 payment flow.

For platform operators, the practical implication is that an MCP wrapper is not optional. Agents using Claude, GPT, Cursor, the agentic features in major editors, AWS Bedrock's agent infrastructure, and Cloudflare's Agent SDK will not find a service that lacks MCP metadata. The wrapper is the bridge between the protocol-layer x402 endpoint and the application-layer agent reasoning.

ERC-8004 — agent identity and reputation

ERC-8004 is an Ethereum standard for agent identity and reputation that emerged through the Ethereum Foundation in late 2025 and 2026. It defines an on-chain registry where agents and the services they call can publish identity attestations and reputation records. The registry is read by KYA frameworks, agent operator policies, and discovery layers that weight reputation in their ranking.

ERC-8004 is forward-compatible with the naive identity primitive that Paxiom uses in v1. The platform's signed responses and published public key map directly onto the kind of attestation ERC-8004 expects. As the standard matures and registry adoption grows, Paxiom's identity primitive can extend into ERC-8004 participation without architectural change. Building on the standard early — even before the standard is finished — positions the platform to benefit as the standard consolidates.

ERC-8183 — trustless escrow for agent jobs

ERC-8183 is the Ethereum Foundation's standard for trustless escrow of agent-to-agent work. It defines a job primitive with three roles. The Client posts a job and funds an escrow. The Provider performs the work and submits a result. The Evaluator examines the result and either releases the escrow to the Provider or rejects the work and returns the funds to the Client.

The standard explicitly contemplates verified compute services as candidate Evaluators. A job that requires verifiable work — a proof of state, a verified computation, a cryptographic attestation — can designate Paxiom as the Evaluator. The Evaluator examines whether the proof verifies. If it does, escrow releases. If it does not, escrow returns. The Evaluator never holds funds and never makes discretionary judgments. The verification is mechanical.

This is a meaningful future revenue stream. Phase 1 services serve agents directly. Phase 3 and beyond positions Paxiom as an Evaluator in ERC-8183 marketplaces, where the platform earns fees for verification work in addition to direct service revenue. The architectural choices in Phase 1 — verifiable outputs, signed artifacts, audit trail — make the platform a natural Evaluator candidate without additional engineering.

KYA — the broader category

KYA stands for Know Your Agent. It is the broader category framing for agent identity and authorization, analogous to KYC for human identity. Multiple frameworks are competing to define what KYA means in practice.

RNWY operates a soulbound-token approach on Base, with non-transferable identity NFTs that bind reputation to specific wallets. AgentFacts proposes a metadata standard with ten categories of agent description. Trulioo and PayOS published a Digital Agent Passport white paper that treats agent identity as a verifiable credential bound to a verified human operator. Sumsub frames KYA around human-in-the-loop accountability, where every agent action is bound to a real, verified human identity.

None of these frameworks has won. The standards are still being negotiated. The right strategic posture for a platform building into this uncertainty is to implement the underlying primitive that all KYA frameworks assume — cryptographically signed responses with publicly verifiable public keys — and remain forward-compatible with whichever specific framework consolidates. Paxiom's v1 KYA primitive is exactly this: signed responses, public key on paxiom.org and in canonical registries, no commitment to any specific framework's schema.

The composition

The Ethereum Foundation has effectively defined the agent commerce stack as the composition of x402 (payment), ERC-8004 (identity and reputation), and ERC-8183 (trustless escrow), with KYA frameworks as the broader application layer above them. A service that engages with this entire stack — payable through x402, identified through ERC-8004-compatible attestation, callable as an Evaluator under ERC-8183, registered in KYA frameworks — has the broadest possible surface area for discovery and use.

Paxiom's v1 architecture engages with x402 directly, with ERC-8004 through forward-compatible primitive, with ERC-8183 through positioning rather than integration, and with KYA through the same forward-compatible primitive. Phase 2 and beyond deepen each engagement as the standards mature and the markets demand it.

Section 3 · B-300

RPC trust collapse.
What Kelp DAO showed.

Verified compute exists because the trust assumptions in the existing infrastructure are breaking. The clearest demonstration is also the most recent.

On April 18, 2026, a coordinated attack drained roughly 292 million dollars from Kelp DAO. The attack worked. The funds were taken. The recovery was substantial — Arbitrum's Security Council froze 71 million dollars of attacker funds, lending positions yielded recoveries through controlled liquidation, and a coalition called DeFi United raised 303 million dollars in pledged capital to plug the remaining hole — but the attack itself succeeded mechanically. The defense was reactive, not preventive. The incident demonstrates exactly what verified compute is designed to prevent.

What happened, mechanically

The attribution went to Lazarus Group, specifically the TraderTraitor subunit. Same actors as the Drift exploit on April 1 ($285 million), same actors as a long history of DeFi compromises that western law enforcement cannot prosecute because the operators are state-protected in North Korea. The attribution is well-established. The prosecution is impossible. The recovery work is what matters.

The mechanism is the part that matters for verified compute. The attack did not exploit a smart contract bug. The contracts behaved correctly given the inputs they received. The inputs were the problem.

Kelp DAO's bridge used LayerZero with a one-of-one DVN configuration. A DVN — Decentralized Verifier Network — verifies cross-chain messages by checking the source chain's state and attesting that a claimed message actually originated there. The DVN was supposed to be the trust anchor.

The attackers compromised the RPC infrastructure that the DVN used to read source-chain state. They fed false data through the compromised RPC nodes. They DDoS'd the legitimate RPC nodes to prevent the DVN from getting correct data. The DVN saw what looked like legitimate state on the source chain and attested that a message — a phantom message that did not actually exist on the source chain — was real. The destination chain accepted the attestation and released the funds.

Chainalysis described the technical pattern this way:

Cite Chainalysis post-mortem B-300 / C.01

The attackers compromised internal RPC nodes and DDoS'd external nodes to feed false data to a single-point-of-failure verification network. This tricked the Ethereum contract into releasing funds based on a phantom token burn on the source chain. The technical pattern was not a smart contract hack but a sophisticated attack on off-chain infrastructure.

Why this generalizes

The Kelp DAO attack is not unique. It is the visible case of a general class. Any verification infrastructure that depends on RPC providers for input data inherits the trust assumptions of those providers. The verifier proves that, given input X, computation Y produced output Z. The X comes from an RPC provider. If the X is wrong, the proof is correct but the conclusion is wrong.

RPC providers — Alchemy, Infura, QuickNode, ChainStack, Pocket Network — are not malicious. They run legitimate infrastructure for legitimate customers. But they are centralized parties with the ability to return wrong data, intentionally or because they themselves were compromised. The verification systems built on top of them treat them as trusted. That trust is the attack surface.

For most agent applications today, this trust assumption is invisible because the use cases are low-stakes enough that occasional bad data does not matter much. An agent that misses a price by 0.1% loses a small amount of money on a single trade and moves on. But the trust assumption becomes critical in specific situations. When the data is the basis for a consequential decision. When the agent operates in adversarial conditions where the RPC provider might have incentive to return wrong data. When regulatory or audit requirements demand that the input data chain be verifiable.

What replacing RPC trust looks like

Paxiom's architectural answer is to separate witness retrieval from trust. A live archive node can provide the Merkle Patricia Trie witness, but the witness is checked against a sync-committee-trusted Ethereum state root. Load Network and Arweave hold the permanent evidence trail: headers, proof packets, archival inputs, and enough metadata for the answer to be audited or replayed later.

The full mechanics are covered in section B-550. The structural property worth establishing here is this: a verification proof does not inherit the honesty assumption of the witness source. If the archive node lies, the MPT verification fails. If the proof packet is questioned later, the evidence trail is permanently stored and replayable. The Kelp DAO attack class is addressed by verification against Ethereum consensus, not by trusting another data vendor.

That is the Paxiom thesis in one sentence. Useful data sources are allowed; unverifiable claims are not.

Section 3 · B-310

Lookalikes and verifiable artifacts.
Fraud, competition, and the line between.

Most agent service categories will face a specific class of attack as they scale: lookalike services that mimic legitimate providers, copy capability descriptions, undercut on price, and serve plausible but fake outputs. The structural defense, where one exists, is that the service's output is itself a verification artifact. Verified compute has this property. Most other agent service categories do not.

The naive fraud case

A naive fraudulent service registers in agent discovery layers, copies the capability description of a legitimate provider, sets a slightly lower price, accepts payment, and returns plausible random data. The agent receives the response, has no easy way to verify correctness, uses the data, and discovers the fraud only when downstream actions based on the data fail.

This pattern is straightforwardly illegal in most jurisdictions under fraud statutes that predate agent commerce by decades. It also fails operationally because reputation systems detect the failures and demote the service quickly. The naive version is not a durable strategy.

The sophisticated fraud case

A sophisticated version frames the service differently. The description claims to provide "synthetic" or "estimated" data with appropriate disclaimers. The disclaimers are buried in fine print. The agent reads the structured capability description and matches it as legitimate; the human operator reviewing service registrations might not notice the disclaimer; the downstream effect is the same as the naive case but with legal cover.

This pattern is murkier. The legal defense is real — the service disclosed that its outputs were synthetic — even when the practical effect is identical to fraud. Customers harmed by such a service have weaker recourse. The sophisticated lookalike is a real competitive concern in agent commerce.

The structural defense

For verified compute specifically, the lookalike attack fails because the deliverable is its own integrity check. A Paxiom proof of Ethereum state at a specific block can be verified independently by the customer. The customer takes the proof and the public inputs, runs the verifier, and either the verification passes or it does not. There is no plausible middle ground where the proof seems to verify but actually does not. The verification is mechanical.

A lookalike service can copy the description and undercut on price, but it cannot serve fake outputs that pass verification. To compete on the same surface as Paxiom, a competitor must actually do the work — generate real proofs of real state with real cryptographic integrity. That is not fraud. That is competition.

This is the property that makes verified compute a structurally defensible category. The fraud line is bright. There is no plausible gray zone where a service can charge for verification without actually verifying.

Where this property is absent

Most other agent service categories do not have this property. Consider three examples.

AI inference services. The output is a model prediction. There is no cheap way for the customer to verify whether the prediction came from the claimed model or from a smaller cheaper model that produces plausible-looking output. EZKL, Modulus Labs, and a handful of others are building verified inference specifically because the unverified version is structurally vulnerable.

Data feeds. The output is a number — a price, a measurement, a count. The customer cannot easily distinguish a correct number from a fabricated one. Oracles solve part of this through aggregation and reputation, but per-call verification of individual data points is a hard problem.

Translation services. The output is text. A bad translation is indistinguishable from a good one without independent expertise. Quality is subjective. Reputation accumulates slowly because errors are hard to detect.

Each of these categories will go through the eBay arc — fraud emerges as the category scales, defenses develop reactively, trust infrastructure matures, the category eventually stabilizes. Verified compute skips the arc because the property that makes fraud detectable is built in from the start.

The competitive read

The strategic implication is direct. Paxiom competes legitimately on operational properties — reliability, latency, audit trail, architectural advantages — because the deliverable is verifiable and the fraud line is structurally bright. The platform does not need to defend against snake oil; the snake oil cannot pass verification.

This is a meaningful structural advantage. Most software businesses spend significant resources defending against confused-deputy attacks, social engineering, and fraud. Verified compute exists in a category where those classes of attack do not work against the core service.

Section 3 · B-320

Legitimate competition.
The existing landscape.

The verified compute category is not empty. Several established providers operate in adjacent or overlapping spaces. Understanding who they are and where they sit clarifies where Paxiom fits.

The proving infrastructure providers

RISC Zero offers Bonsai, their hosted proving service. Submit a guest program written in Rust, receive a ZK proof. Pricing is opaque; production pricing requires a sales conversation. The customer base is primarily ZK-rollup teams and DeFi protocols that need ZK proofs as part of their infrastructure.

Succinct operates SP1 and the Succinct Prover Network. The network is decentralized — provers stake collateral, accept proof generation jobs, and get paid in network tokens for completed work. The network generated 6 million proofs in 2025 across all customers. Telepathy, their cross-chain state proof product, is one of the canonical implementations of Ethereum sync committee verification.

Boundless is RISC Zero's decentralized proving marketplace. Permissionless prover participation. Provers compete on price and speed for proof generation jobs. The marketplace handles routing and verification.

Aligned Layer aggregates proofs from multiple proving systems for cheaper on-chain verification. They are middleware rather than a primary proving service.

Lagrange operates a ZK coprocessor specifically for cross-chain state proofs. Customers integrate the coprocessor into their DeFi protocols. Lagrange overlaps directly with parts of what Paxiom will build but targets different customers — protocol integration teams rather than autonomous agents.

The verified inference providers

EZKL turns ML models into ZK circuits. Open-source library plus commercial offerings. Used by several projects building verified AI applications.

Modulus Labs builds verified inference infrastructure with focus on DeFi and gaming applications. They have shipped products in production.

Giza is in similar territory, focused on agent-relevant inference verification.

Ritual is building broader verified AI compute infrastructure with coordination across multiple proving systems.

Inference Labs (the TruthTensor authors) sits adjacent. Their primary product is an evaluation and benchmarking framework with verification properties.

The state proof and bridge providers

Polyhedra Network operates zkBridge for cross-chain state proofs. Live, in production, used by several DeFi protocols. Polyhedra's Expander proving system is also of direct interest to Paxiom for recursive proving — see B-510.

Telepathy by Succinct does Ethereum sync committee verification specifically. Open-source. Adopted by multiple cross-chain protocols.

Helios is a light client implementation. Not a paid service, but the open-source reference implementation that establishes the correctness baseline for what Paxiom's sync committee service will do.

LayerZero with various DVN implementations does verified message passing. Not a ZK system per se but adjacent to verified compute in its trust model.

What is missing from this landscape

None of these providers are x402-native at the endpoint level. They integrate through SDKs, have B2B sales motions, and serve enterprise customers through traditional contracts. An autonomous agent cannot currently call any of them through a standardized x402 payment without custom integration work.

Most of them serve specific verticals — bridges, DeFi protocols, ZK-rollups, AI inference, ML models — rather than offering general-purpose verified computation as a service for agent consumption.

Most of them are not built around permanent evidence packets and replayable input verification as the product surface. This is the gap B-300 covered. The question is not whether a service ever touches an RPC-shaped interface; the question is whether the answer depends on trusting that interface.

None of them publish service-level metrics in a way that lets agents do automated quality comparison. Reputation is established through enterprise sales relationships rather than observable performance data.

Paxiom's competitive position

The category is not empty but it is not crowded either. The existing players are mostly building infrastructure for B2B integration with developer teams rather than agent-callable endpoints. Paxiom's position is "verified compute that an agent can discover, pay, and consume autonomously" rather than "verified compute that a development team integrates into their application." That is a meaningful niche.

Several of the existing players might extend into the agent-native niche eventually. Boundless adding x402 support. EZKL exposing agent-callable endpoints. Lagrange building agent-facing tooling. The competitive risk is not that the category is empty but that existing players notice the agent-native opportunity and bring their existing customer base and operational scale with them.

Paxiom's defenses against that risk are not first-mover advantage alone. They are the architectural properties that are hard to retrofit.

  • Replayable no-trust input path through sync-committee-anchored headers, MPT-verified witnesses, and Load Network/Arweave evidence storage. Adding this to an existing RPC-dependent service is not a feature flip; it is a redesign.
  • AO-anchored audit trail as a native property of the substrate. Bolting permanent public auditability onto a service that wasn't built for it produces a different and weaker property.
  • Quantum-clean proving stack as a Phase 5 positioning. Existing providers have proving systems committed to; migrating them to post-quantum primitives is a multi-year undertaking.
  • KYA-compatible identity from the start. Existing services have customer relationships and integration patterns that don't include cryptographic platform identity at the per-response level.

None of these are insurmountable for a well-funded competitor. All of them are real friction. A small team with operational discipline competing against larger teams with more resources by having architectural advantages those teams can't easily match — that is the competitive shape of the bet.

Section 4 · B-400

What Paxiom is.
The platform.

Paxiom is a verified-claims platform. Agent-callable services that return cryptographically verifiable outputs, settled through x402, exposed through MCP, anchored in HyperBEAM compute and AO/Arweave audit, with permanent evidence trails that let outside readers replay why an answer was accepted.

The five Phase 1 services

Phase 1 launches five services that overlap deliberately with what existing verified compute providers already sell. The strategy is not to outbuild the largest coprocessor networks at their own game. The strategy is to turn verified facts into x402-payable, MCP-callable service responses with durable evidence attached.

The five services, in summary:

  • Service 1 — ZK proofs of Ethereum slot storage at any block. Prove that a contract storage slot held a specific value at a specific block. Direct competition with Lagrange, Axiom, Herodotus.
  • Service 2 — Ethereum sync committee verification. Prove that the sync committee for a specific slot signed a specific header. The fastest-launch service, building on existing verifier infrastructure.
  • Service 3 — Cross-chain message verification. Prove that a message originated on one chain and is correctly attestable on another. The bridge-grade service. Carries the Kelp DAO marketing case study.
  • Service 4 — Simulation as a service. Verifiable transaction simulation with optional TEE attestation. High volume, low margin, uses the HyperBEAM EVM device natively.
  • Service 5 — Verified historical state queries. Verifiable answers to questions about historical chain state. Where archive-node witnesses, permanent evidence, and replayable verification matter most. Where Paxiom's identity gets established.

Detailed service specifications live in the Phase 1 Blueprint (A-series). This document does not duplicate them.

Cross-chain settlement as reference application

Paxiom is a platform, not a single product. The five Phase 1 services demonstrate the platform's capabilities. The first significant application built on top of the platform is cross-chain settlement — the broader use case that motivated the original arbitrage architecture and that the Phase 1 services collectively enable.

Cross-chain settlement is the canonical case where every architectural property of the platform matters at once. It needs verified state proofs (Service 1, Service 5). It needs verified consensus attestation (Service 2). It needs verified cross-chain message passing (Service 3). It benefits from simulation for pre-flight checking (Service 4). It demands verifiable inputs because the trust failures in cross-chain infrastructure are exactly what take out cross-chain protocols. It demands permanent audit because cross-chain operations are subject to regulatory scrutiny.

The reference application is not the business. The platform is the business. Cross-chain settlement is the proof that the platform's capabilities compose into something useful.

The architectural manifest

The platform's distinguishing properties, named in plain language:

  • No RPC trust dependence. MPT witnesses are verified against sync-committee-anchored Ethereum headers, then the proof packet and evidence trail are preserved on Load Network/Arweave. The trust failures that took out Kelp DAO are the failure mode this architecture is designed to remove.
  • Live recursive proofs via Polyhedra Expander. Composable verification with bounded verification cost.
  • Permanent public audit trail through AO and Arweave. Every transaction logged immutably. Compliance posture is structural, not bolt-on.
  • HyperBEAM compute substrate. Erlang-based AO node implementation with a device model that includes EVM execution, RISC-V emulation, and TEE-attested workloads.
  • x402-native delivery. Every service callable by autonomous agents through standard payment protocol without custom integration.
  • KYA-compatible identity through signed responses and published public keys. Forward-compatible with ERC-8004 as the standard matures.
  • Quantum-ready proving stack — see B-520. Phase 5 positioning that responds to NIST and Google's post-quantum migration trajectories.
  • Publicly deliverable artifacts. Every service output is itself a verification artifact. The structural defense against lookalike attacks.
  • ERC-8183 evaluator candidacy. Positioned as a natural Evaluator in trustless escrow marketplaces.

These are the architectural choices that make Paxiom Paxiom rather than another verified compute provider. The next section covers how each of them actually works.

Section 5 · B-500

Zero-knowledge proofs.
Real math, plain explanation.

What a zero-knowledge proof actually is, in set-theoretic notation with prose translation. The math is honest. The explanation is for the reader who has not seen this notation in a while.

A zero-knowledge proof lets one party convince another that a statement is true, without revealing why it is true. The cryptographic construction is intricate. The underlying idea is not.

The core relation

Start with the most basic structure. A statement that we want to prove is paired with a witness that proves it. The witness is the information that makes the statement true. The statement is what we want the verifier to believe.

R = { (x, w) : x is a public statement, w is a witness, and the predicate P(x, w) holds }

R is the set of all pairs (x, w) such that x is a public statement that we want to prove, w is a witness that we possess, and the predicate P, applied to both x and w, returns true. R is the relation that defines what counts as a valid witness for a given statement.

Concrete example. Suppose we want to prove that we know the preimage of a hash. The public statement x is the hash value. The witness w is the input we're hashing. The predicate P(x, w) holds when sha256(w) equals x. The relation R contains every pair (hash, input) such that hashing the input produces the hash.

The proof system

A zero-knowledge proof system is a triple of algorithms. A setup algorithm produces public parameters. A prover algorithm takes a statement, a witness, and the parameters, and produces a proof. A verifier algorithm takes a statement, a proof, and the parameters, and decides whether to accept the proof.

Setup : 1^λ → pp Prover : (x, w, pp) → π Verifier : (x, π, pp) → {accept, reject}

The setup algorithm takes a security parameter expressed in unary (1^λ means a string of λ ones, by convention) and produces the public parameters pp. The prover takes a statement x, a witness w, and the public parameters, and produces a proof π. The verifier takes a statement x, a proof π, and the public parameters, and returns either accept or reject.

The intuition is straightforward. The prover has a secret (the witness) and wants to convince the verifier of something (the statement) without revealing the secret. The proof is the cryptographic artifact that accomplishes this.

The three properties

A zero-knowledge proof system satisfies three properties, each expressible as a mathematical claim about the algorithms.

The first property is completeness. If the statement is true and the prover follows the protocol, the verifier accepts.

∀ (x, w) ∈ R : Pr[ Verifier(x, Prover(x, w, pp), pp) = accept ] = 1

For every pair (x, w) in the relation R, the probability that the verifier accepts the proof produced by the prover is exactly 1. Honest proofs of true statements always verify.

The second property is soundness. If the statement is false, the verifier rejects with overwhelming probability, no matter what the prover does.

∀ x ∉ L_R, ∀ adversary A : Pr[ Verifier(x, A(x, pp), pp) = accept ] ≤ negl(λ)

For every statement x that is not in the language defined by R (meaning no valid witness w exists for x), and for every adversary A who tries to produce a fake proof, the probability that the verifier accepts is at most a negligible function of the security parameter. Soundness means that fake proofs of false statements almost never succeed.

The third property is zero-knowledge. The proof reveals nothing about the witness beyond the truth of the statement.

∃ Simulator S : ∀ (x, w) ∈ R : { Prover(x, w, pp) } ≈ { S(x, pp) }

There exists a simulator S such that for every pair (x, w) in R, the distribution of proofs produced by the real prover with the witness is computationally indistinguishable from the distribution of proofs produced by the simulator without the witness. Zero-knowledge means that anything an observer could learn from a real proof, they could also have learned from a simulation that did not use the witness — therefore the proof leaks no useful information about the witness.

These three properties together — completeness, soundness, and zero-knowledge — are what make ZK proofs cryptographically meaningful. The proof is convincing when the statement is true, unforgeable when the statement is false, and uninformative beyond the statement itself.

What gets proved in practice

For Paxiom's services, the statements are concrete and the witnesses are concrete. Service 1, ZK proofs of slot storage: the statement is "contract C had storage slot S equal to value V at block B," and the witness is the Merkle inclusion path from S to the block's state root. Service 2, sync committee verification: the statement is "the sync committee for slot N signed header H," and the witness is the aggregate BLS signature plus the participation bitfield. Service 5, verified historical state queries: the statement varies by query type, and the witness includes the relevant state-trie data from an archive node plus the permanent evidence packet stored on Load Network/Arweave.

The customer receives the proof. The customer can run the verifier independently and check whether the statement is true. The customer never sees the witness. The proof is small (typically a few hundred bytes to a few kilobytes), the verification is fast (typically milliseconds), and the cryptographic guarantees are mathematical.

Why this matters for agent commerce

The structural property is that a ZK proof is itself a verifiable artifact. The customer does not have to trust the platform's claim that the statement is true; they can verify the proof. This is what makes verified compute a structurally honest category — the deliverable is its own integrity check.

Most agent service categories cannot offer this. The output of an LLM inference call is text; verifying it requires another inference call, recursively. The output of a data feed is a number; verifying it requires consulting an authoritative source. The output of a translation is text in another language; verifying it requires linguistic expertise. None of these outputs are self-verifying.

Verified compute is. That is the category Paxiom enters.

Section 5 · B-510

Recursive proving.
Why composition matters.

Generating a single ZK proof is one thing. Generating a proof of a proof of a proof, with bounded verification cost, is what makes verified compute scale. The technique is called recursive proving. The proving system Paxiom targets is Polyhedra's Expander.

The composition problem

Suppose we have a proof π_1 that statement x_1 is true, and we want to combine it with a proof π_2 that statement x_2 is true, into a single proof π that both statements are true together. Naive composition has a cost: the combined proof grows in size with the number of constituent proofs, and verification cost grows linearly.

This is fine when proofs are independent and small in number. It is not fine when we want to chain hundreds of state transitions, prove a long history of operations, or compose proofs across services without each verification step adding cost. Without recursion, verified compute is bounded to use cases where the proof count is small.

What recursion provides

A recursive proof is a proof about a proof. The prover runs the verification algorithm of the inner proof inside a ZK circuit, and proves that the verification accepted. The output is a single recursive proof that effectively says "the inner proof was valid." The recursive proof has bounded size and verification cost regardless of how complex the inner computation was.

π_inner : proof of statement x_inner π_outer : proof of statement "Verifier(x_inner, π_inner, pp) = accept"

π_outer is a proof of a different statement than π_inner. The outer statement says that running the verifier on the inner statement and inner proof produces accept. Verifying π_outer therefore implicitly verifies π_inner, but the verification cost is the cost of verifying π_outer alone. The cost does not compound.

Multiple proofs can be composed this way. Two proofs become one. That one combined with another proof becomes one again. A long chain of operations compresses into a single proof of bounded size. This is what makes verified rollups practical — the L2's entire operational history compresses into a single recursive proof verified on L1.

Why Polyhedra Expander

Several proving systems support recursion. Polyhedra Expander is notable for two properties relevant to Paxiom.

First, Expander is designed for live recursive proving with low latency. The recursion can happen in real time as proofs are generated, rather than as a batched post-processing step. For agent-callable services that need to return verified results quickly, low-latency recursion matters.

Second, Expander is post-quantum-clean by design. The underlying proving system uses hash-based and lattice-based primitives rather than elliptic-curve pairings. This is forward-compatible with the quantum readiness positioning covered in B-520.

Other proving systems that Paxiom evaluates as alternatives — SP1, RISC Zero, Boundless — have different trade-offs. SP1 is mature and production-tested. RISC Zero has the largest ecosystem. Boundless is the decentralized prover marketplace. Each has its place. Phase 1 chooses the system that fits each service's specific requirements; the platform is not religious about a single proving backend.

What this enables

Recursive proving is what makes the longer-horizon Paxiom capabilities actually work. Composable cross-chain settlement proofs. Proofs of historical state that span thousands of blocks. Verifiable inference where the model evaluation, the input attestation, and the output validation all compose into a single proof. Without recursion, each of these would either be impractical or would require trusting some intermediate party. With recursion, the trust assumptions collapse into the soundness of the proving system.

Section 5 · B-520

Quantum readiness.
NIST, Google, the migration coming.

Most ZK proving systems in production today use cryptographic primitives that are not safe against a sufficiently large quantum computer. The migration to post-quantum primitives is underway at the institutional level. Paxiom's architecture is positioned to participate in that migration cleanly.

What NIST established

In August 2024, NIST finalized three post-quantum cryptographic standards. FIPS 203 (ML-KEM, derived from CRYSTALS-Kyber) for key encapsulation. FIPS 204 (ML-DSA, derived from CRYSTALS-Dilithium) for digital signatures. FIPS 205 (SLH-DSA, derived from SPHINCS+) for hash-based signatures. These are the first official US government standards for cryptography that resists quantum attack.

The standards are not theoretical exercises. NIST and the broader US federal government have begun the multi-year process of migrating existing systems to post-quantum primitives. The CNSA 2.0 suite (Commercial National Security Algorithm Suite, version 2.0) mandates post-quantum migration for national security systems by specific deadlines. Civilian federal systems follow on a longer timeline but the trajectory is identical.

What Google has shipped

Google rolled out post-quantum cryptography in production in 2024 and 2025. Chrome supports X25519Kyber768 hybrid key exchange in TLS connections. Google Cloud's KMS supports post-quantum signatures. The Google Account infrastructure that backs services like Gmail and YouTube has begun migrating its cryptographic primitives.

The relevant signal is not that Google is interested in post-quantum cryptography. The relevant signal is that Google has shipped it in products serving billions of users. Production deployment by a major provider is a stronger commitment than research investment. The migration is real.

What this means for ZK proving systems

ZK proving systems vary in their post-quantum posture. Some are quantum-vulnerable by design — they use elliptic-curve pairings that are broken by Shor's algorithm. Groth16, the most widely deployed ZK system, falls in this category. Its proofs would be forgeable by a sufficiently large quantum computer.

Other systems are quantum-resistant. STARK-based systems (used by StarkWare, RISC Zero, and others) are based on hash functions and are believed to be post-quantum secure. SP1's proving stack has similar properties.

Polyhedra Expander, the proving system Paxiom targets for live recursive proving, is designed with post-quantum security in mind. Its underlying primitives are hash-based and lattice-based, both of which have post-quantum candidates.

Paxiom's Phase 5 positioning is to operate proving infrastructure that is quantum-clean from the start. Other proving systems can be made quantum-resistant through migration, but the migration is expensive and disruptive. Building on a quantum-clean substrate from Phase 1 means there is no migration to perform when the broader cryptographic infrastructure transitions.

The timeline argument

Cryptographically relevant quantum computers — machines large enough to break current public-key cryptography in practice — do not exist today and will likely not exist for another decade or more. That timeline matters less than it might seem.

The reason is the "harvest now, decrypt later" attack. Adversaries can record encrypted traffic today and decrypt it later when quantum computers become available. For data with long-term sensitivity — medical records, financial histories, identity documents, intellectual property — the relevant question is not "can someone decrypt this today?" but "can someone decrypt this within the data's relevant lifetime?" For many data types, the answer is yes, and the migration to post-quantum cryptography is already overdue.

The same argument applies to ZK proofs that attest to facts with long-term consequence. A proof of compliance, an audit trail, an identity attestation — these may need to be verifiable decades from now. A proof generated today using quantum-vulnerable primitives is less durable than one generated using quantum-resistant primitives. The longer-horizon use cases that Paxiom is positioning for (HIPAA-grade compliance, financial audit, regulatory attestation) are exactly the cases where post-quantum security matters most.

The architectural choice

Phase 5 of the build map specifies that the platform's proving substrate is quantum-clean. The work in earlier phases positions this transition. Choosing Polyhedra Expander as the recursive proving target. Implementing the KYA primitive with primitives (Ed25519 for v1) that have well-defined post-quantum migration paths. Building the audit trail on hash functions that are post-quantum-secure. Avoiding architectural commitments to quantum-vulnerable primitives at the load-bearing layers.

Phase 5 is years away in the build map. The architectural choices that enable Phase 5 are made in Phase 1. That is what makes the quantum readiness real rather than aspirational.

Section 5 · B-530

HyperBEAM and devices.
Where compute happens.

HyperBEAM is the Erlang-based AO node implementation that provides the platform's compute substrate. The architecture is unusual enough to warrant explanation. The implications are useful enough to warrant the choice.

What AO is, briefly

AO — short for Actor-Oriented — is a hyper-parallel computing substrate built on top of Arweave. AO processes are independent actors that run code in response to messages. Each process has its own state, processes its own messages, and produces its own outputs. The processes are persistent — their state and message history live on Arweave permanently — and the computation is reproducible from the message log.

The model is not a blockchain. There is no global consensus on a single state. Each process is its own independent execution environment. The unifying property is the message log, which is permanent and verifiable.

What HyperBEAM adds

HyperBEAM is the Erlang implementation of the AO node software. It extends the basic AO model with a device system — a way to attach specific computational capabilities to processes. A device exposes an API that processes can call. The device handles the actual execution; the process handles the orchestration.

Several devices are relevant to Paxiom.

The ~evm@1.0 device runs a full Ethereum Virtual Machine inside HyperBEAM. Processes can submit EVM transactions and receive execution results. This is the substrate for Service 4 (simulation as a service) and is also a building block for verification work that needs to inspect EVM behavior.

The ~riscv-em@1.0 device runs a RISC-V emulator. ZK proofs are generated by running computations through proving systems that target RISC-V (SP1 and RISC Zero are the major examples). The device lets HyperBEAM processes orchestrate proof generation directly.

The ~greenzone@1.0 device runs computations inside trusted execution environments — Intel SGX, AMD SEV, or equivalent. The device produces attestation chains that prove the computation ran in genuine hardware running registered code. This is the substrate for TEE-attested simulation and for any service that needs hardware-rooted trust beyond cryptographic verification.

Why this architecture

HyperBEAM's combination of properties is what makes it the right substrate for Paxiom. Three properties matter.

Permanence. Every process's state and message history lives on Arweave permanently. The audit trail that Paxiom's compliance posture depends on is structural rather than bolt-on.

Composability. Devices compose. A process can use the EVM device to simulate a transaction, the RISC-V device to generate a ZK proof of the simulation, and the greenzone device to attest that the proof was produced in trusted hardware. The composition is clean because each device handles its specific concern.

Independence. Processes are independent actors. There is no global consensus to coordinate. Multiple Paxiom services can run as independent processes that scale independently and recover independently from failures. The platform is naturally horizontally scalable.

What this means for Paxiom

The Phase 1 services are implemented as HyperBEAM processes that use the relevant devices for their specific work. Service 4 runs on the EVM device. Service 2 (and the proving infrastructure generally) uses the RISC-V device. Services that benefit from TEE attestation use the greenzone device.

The platform's audit trail is the AO message log, which is permanently stored on Arweave. Every transaction Paxiom processes produces an entry in the log that any party can inspect at any future time. The compliance posture this gives is structural — the platform does not need to maintain an audit logging system because the substrate is already an audit logging system.

Section 5 · B-540

AO and Arweave.
Audit as native property.

Most platforms add audit trails as a feature. Paxiom's audit trail is a native property of the substrate. This sheet explains the distinction and why it matters.

The shape of a typical audit trail

A typical software platform implements audit logging as application code. The application calls into a logging library, which writes records to a database or a log aggregator. Operators can query the logs to investigate events. The audit trail's properties depend on the logging system's properties — its durability, its query capabilities, its tamper-resistance.

This works for many use cases. It has known limitations. The logs are controlled by the platform operator. The operator can modify or delete records. The logs are not externally verifiable — outside parties cannot independently confirm that a specific event happened or that the platform's account of events is complete. Compliance frameworks that depend on audit trails (SOC 2, HIPAA, financial regulations) typically require additional infrastructure to address these limitations.

The shape of the AO/Arweave audit trail

AO processes communicate by exchanging messages. Every message is permanently recorded on Arweave. The message log is the canonical record of what happened. It is not stored in a database controlled by the operator. It is stored on a permanent decentralized archive that the operator does not control.

The implications are significant. The audit trail cannot be modified or deleted by the platform operator. It is independently queryable by any party that has the AO process identifier. It is cryptographically tied to the Arweave ledger, which has its own integrity guarantees.

The compliance posture this gives is qualitatively different. Outside parties — regulators, auditors, customers — can independently verify the platform's behavior without relying on the platform's self-reporting. The audit trail is structural rather than reported.

What this enables

Three specific compliance use cases benefit from this property.

Regulated industries with audit requirements. Financial services, healthcare, and similar industries require platforms they use to maintain auditable records of operations. The standard approach is to deploy bespoke audit infrastructure and pay for compliance audits. A platform whose audit trail is structurally verifiable reduces the cost and complexity of compliance for its customers.

Cross-organizational disputes. When two parties disagree about what happened — did Service A actually perform the work it claims? — the AO/Arweave audit trail is the canonical record. Both parties can query it independently. The dispute reduces to verification rather than negotiation.

Long-horizon verification. Some claims need to remain verifiable for years or decades. A signed attestation today that a specific operation occurred at a specific time, anchored to the AO/Arweave record, remains verifiable as long as the substrate persists. This matters for legal documents, medical records, and any other artifact whose verifiability has long-term consequence.

What this does not enable

Privacy. Public audit trails are public. Operations that need to remain confidential are not appropriate for direct logging. The platform's solution is to log cryptographic commitments rather than raw data — the existence and shape of an operation is recorded, but the contents remain private. ZK proofs enable verification of the operation's correctness without revealing its contents. This is the substrate for the private-data compute applications covered in B-710.

Selective disclosure. The AO/Arweave audit trail is all-or-nothing visible. Selective disclosure — showing some data to some parties and not others — requires additional cryptographic infrastructure on top of the audit trail. This is straightforward to build but is not a property of the substrate itself.

Real-time queryability. Arweave's confirmation latency means that audit records are not instantly globally visible. The records are queued and confirmed within minutes to hours. For real-time operational monitoring, the platform maintains its own short-term log. The AO/Arweave trail is the durable record, not the live monitoring surface.

Section 5 · B-550

Paxiom Proof Archive.
Encrypted evidence, replayable state.

Paxiom's proof archive is the piece that makes the verification trail permanent without turning public storage into a free bypass around the service. The previous sections argued why replacing RPC trust matters. This section explains the split: witness retrieval is fast and local; evidence, replay, and auditability live on Arweave, with commercially useful proof bundles encrypted and indexed by Paxiom.

What the proof archive stores

The archive gives Paxiom an Arweave-backed place for durable evidence: headers, proof packets, transaction or receipt evidence, encrypted witness bundles, and replay metadata. Paxiom does not need Arweave to serve live trie nodes. The live witness can come from Erigon or Reth; the archive preserves the derivation trail after the answer is produced.

The size of Ethereum history is substantial, so the evidence format must be intentional. Paxiom's current working design is to store small, tagged artifacts — headers, proof packets, receipts, transaction fragments, encrypted witness bundles, and Paxiom-controlled index metadata — rather than treating public storage as a drop-in replacement for an archive-node database. That keeps Arweave's permanence in the architecture without pretending object storage is a low-latency state trie or exposing the whole commercial corpus for free.

What state reconstruction means

There are now two live-read paths and one cold audit path. The Helios path uses a HyperBEAM-hosted consensus light client to turn upstream JSON-RPC into verifiable JSON-RPC. The sovereignty path asks an Erigon or Reth archive node for an eth_getProof witness, then verifies the account proof and storage proof against a block state root anchored by the sync committee verifier. The cold path uses Arweave-resident evidence to replay or audit the derivation later.

The cold path is not a fast query interface. It is an audit and recovery interface. Re-executing from archival evidence is slower than asking an archive node for a witness, but it gives Paxiom a stronger claim: the answer is not only verified at issuance time, it has a durable evidence trail. Public artifacts can be inspected directly; encrypted proof bundles can be revealed selectively when the customer, audit, or dispute path requires it.

The trust property

The structural property is that the witness source is not trusted. A Helios-backed RPC is useful because it reduces blind RPC trust with light-client verification. An archive node is useful because it is fast and sovereign. Neither can make a false storage value verify against the wrong Ethereum state root. Arweave then makes the resulting proof packet and evidence trail durable, while Paxiom controls the index and decryption path for proof material that should not be a public bypass.

Compare to the alternative. An RPC provider returns "the state at block N is X." The consumer has to trust that the provider read the state correctly, returned the unmodified value, and is not colluding with anyone. Paxiom instead asks for a witness and verifies it. The provider can be wrong or malicious; the verifier is the authority.

What this enables for Paxiom

Service 5 (verified historical state queries) depends on this split. The customer asks "what was the value of contract C at block N?" The platform retrieves a live witness from Helios-backed JSON-RPC or from an archive node, verifies it against a sync-committee-trusted state root, produces the proof, and stores the proof packet/evidence in the Paxiom archive. The customer verifies the proof. The RPC or archive node is a witness source, not a trust root.

Services 1 (slot storage proofs) and 3 (cross-chain message verification) use the same trust shape. The v1 services can launch with archive-node witnesses because the proof is checked cryptographically. As the archive format matures, more of the input and audit trail moves onto Arweave, reducing operational dependency without making public storage the live database or a complete substitute for Paxiom's paid service.

Why this is the architectural moat

Most existing verified compute providers can retrieve witnesses, but the derivation trail is not usually permanent and replayable by default. They could in principle add Arweave-backed evidence storage and AO-style replayability, but the migration is not a feature flip. It is a fundamental change to how their service obtains, verifies, stores, and audits its inputs.

Paxiom's architecture is built around the split from the start. The witness format, proof generation pipeline, AO verifier, encrypted Arweave storage, and Paxiom index/key layer are designed as one surface. There is no migration required because the live data source is never treated as the trust anchor.

This is the structural moat that B-320 referenced. A competitor who notices the replayable-evidence opportunity and decides to extend their service in that direction is undertaking a multi-quarter engineering effort. A startup that builds on this substrate from the start ships the property natively. The advantage is not inventing the technique; it is committing to it from Phase 1.

Section 6 · B-600

Phase 1 pro forma.
Per-service unit economics.

The economics of the platform's first version. Numbers are realistic case at month 9 of operation. Detail in the Phase 1 Blueprint (A-300).

ID Service Vol/Mo Price Gross Var. Cost Net
A-201 Slot Storage Proofs 800 $1.00 $800 $246 $554
A-202 Sync Committee Verification 1,500 $0.50 $750 $159 $591
A-203 Cross-Chain Message Verification 200 $3.00 $600 $122 $478
A-204 Simulation as a Service 8,000 $0.05 $400 $56 $344
A-205 Verified Historical State 300 $2.00 $600 $122 $478
Phase 1 Total 10,800 $3,150 $705 $2,445

Fixed monthly infrastructure: $100. Net monthly profit at this scenario: $2,345. Annualized run rate: roughly $28k per year.

What the numbers describe

The realistic case at month 9 of operation. Not best case. Not worst case. Realistic assumes operational reliability through Phase 0 setup, modest outbound effort during Phase 1 build, discovery layer presence on the major surfaces, and traffic that matches the projection from comparable existing services.

The blended cost-to-revenue ratio is 22%. Gross margin on Phase 1 services is 78%. The economics work. The volume is small.

This run rate sits at the floor for what justifies leaving the day job. Comfortable margin above the floor requires either traffic growth above the realistic case, the addition of B2B contracts, or expansion into Phase 2 services.

What drives the upside

Three variables move the projections meaningfully.

High-volume services. Sync committee verification at 1,500 calls per month and simulation at 8,000 are the volume drivers. If these double, monthly gross approaches $4,500. Discovery layer presence and operational reliability are the levers that move these numbers.

Pricing. Phase 1 prices are middle-of-the-range based on competitive landscape research. After 30-60 days of operation, real customer behavior reveals which services support higher pricing. Prices adjust based on observed willingness to pay rather than launch guesses.

B2B contracts. A single enterprise customer at $5-15k per month substantially exceeds the Phase 1 retail revenue. Outbound effort toward specific organizations during the build is what produces these contracts. The Phase 1 pro forma does not include B2B revenue; B2B is upside.

What this means for the founder's timeline

The platform's economics support continued operation but do not support immediate transition to full-time work on Paxiom alone. The discipline that emerges from the numbers is to ship all five Phase 1 services, observe real revenue for several months, and make the day-job-quit decision based on observed run rate against the $30k/year floor. The Phase 1 Blueprint (A-310) specifies the decision matrix.

Phase 2 expansion is what raises the run rate above the floor. Catalog breadth, multi-chain support, deeper integration with agent frameworks. Phase 4 enterprise contracts are what add the margin above the floor that makes the platform a genuine primary income source rather than a sustainable side operation. The trajectory is realistic but it requires sustained execution across multiple phases. The Phase 1 numbers are the validation of the engine, not the destination.

Section 6 · B-610

Addressable market.
The trajectory matters more than today.

The platform's revenue trajectory depends on the addressable market trajectory. Today's market is small. The growth multipliers stack.

The current addressable market

Total agent-economy x402 transaction volume is roughly $28k per day genuine, $600M annualized at projected growth. The fraction involving high-stakes financial decisions is probably 5-15% based on observable patterns. The fraction of those that would benefit from verified state proofs or replayable tool outputs is maybe 10-30% — most current decisions are low-enough stakes that verification overhead is not justified, but the high-value tail is real.

The arithmetic gives an addressable market for agent-native verified compute today of roughly $3-25M annualized. Small but not zero. Growing fast.

The growth multipliers

Three multipliers stack into the addressable market trajectory.

Total agent economy growth. The base layer. McKinsey projects $3-5 trillion by 2030 across all categories. Gartner projects $15 trillion B2B by 2028. Even the conservative end of these projections implies the agent economy grows by an order of magnitude or more over the next 5 years from current volumes.

Share that is high-stakes. The fraction of agent transactions that involve consequential decisions grows as agents are deployed for more meaningful tasks. Routine tasks stay routine. New deployments take on more responsibility. The high-stakes fraction grows from 5-15% today toward 30-50% as the technology matures.

Share that recognizes unverifiable inputs as a problem. Today most agent applications do not ask whether a tool's answer can be checked later. As trust failures accumulate — Kelp DAO is one example, others will follow — more applications recognize that tool outputs need evidence, not just signatures. The fraction grows from 10-30% today toward majority over the next 3-5 years.

Each multiplier compounds with the others. If each grows 3-5x over the next 5 years, the addressable market grows 27-125x. That is not a forecast; it is the structural trajectory of stacked multipliers in a category that institutional behavior suggests is real.

What the platform does with this

The platform's revenue trajectory is calibrated to the addressable market trajectory. Phase 1 captures a small share of a small market. Phase 2 captures a small share of a growing market. Phase 3 and beyond capture a growing share of a large market.

The compounding properties of reputation and integration matter here. A platform that has been operating reliably for two years when the market grows 10x captures more of the new market than a new entrant with no track record. The early operational work that generates relatively small revenue today compounds into market position when the market matures.

This is the strategic argument for entering the category now rather than later. Today's revenue is modest. Today's market position has long-term value that today's revenue does not capture.

The catalysts

Two specific catalysts could meaningfully accelerate the trajectory beyond the realistic case.

Visible RPC trust failures. Kelp DAO is the recent example. Others will follow because the underlying trust assumption is structurally broken across the ecosystem. Each visible failure drives demand toward verified alternatives. A platform that is operationally ready when a visible failure occurs absorbs disproportionate demand. A platform that is still in build does not.

Major agent framework integrations. If Anthropic, Cloudflare, OpenAI, or AWS decides their default agent toolchain should include verified compute and chooses a specific provider as the default, that provider's traffic increases by orders of magnitude overnight. These decisions are made by relationship-building rather than direct sales, and a platform that engages with the framework ecosystem actively positions to be the chosen default.

Neither catalyst is fully under the platform's control. Both are positionable. The platform's posture toward both is to be operationally ready and ecosystem-engaged, so that when the catalysts occur, the platform benefits.

Section 7 · B-700

AI verified inference.
What it is, why later.

Verified inference is the application of zero-knowledge proofs to machine learning model execution. It is a real category with real demand, and Paxiom will eventually serve it. The question is when.

What verified inference is

A verified inference proof attests to a specific claim: the model M, applied to input x, produced output y. The customer can verify that the output came from the claimed model rather than from a substituted cheaper or different model, and that the input was processed correctly.

The mathematical structure mirrors what B-500 established. The statement is "M(x) = y." The witness is the model's weights and the intermediate activations. The relation is the model's forward pass. A ZK proof of the inference convinces the verifier that the output is genuine without revealing the weights or the input beyond what the customer chose to disclose.

Variants exist. Privacy-preserving inference proves the output is correct without revealing the input. Model-private inference proves the output came from the claimed model without revealing the model's weights. Both variants are useful for different applications.

What verified inference enables

Several application categories benefit from verified inference in ways that unverified inference cannot satisfy.

Medical AI. A diagnosis or treatment recommendation generated by an AI model carries weight only if the model can be audited. A verified inference proof attests that the diagnosis came from a specific approved model running on the specific patient data, without exposing the patient data or the model's proprietary weights to third parties. Regulatory frameworks for medical AI are moving in this direction.

Financial models. A credit decision, an investment recommendation, or a fraud assessment generated by an AI model needs to be defensible if challenged. A verified inference proof gives auditors the evidence chain. Regulatory frameworks for financial AI are moving in this direction as well.

Content moderation. A takedown decision based on automated classification needs to be reviewable. A verified inference proof demonstrates that the takedown came from the registered policy applied to the registered content. Platforms that operate at scale and face regulatory scrutiny benefit from this property.

Agent-to-agent decision verification. When agent A relies on agent B's output for a consequential decision, agent A's operator may want verifiable evidence that agent B actually consulted its intended model rather than substituting a cheaper one. Verified inference provides this evidence.

Why this is later, not now

Verified inference is a real category with real demand and established players. EZKL, Modulus Labs, Giza, Inference Labs, Ritual all operate in it. Each has deep specialization in the specific problems of compiling ML models into ZK circuits, optimizing the proving process for inference workloads, and serving the specific buyers (often regulated industries) who need the property.

Paxiom entering verified inference as a generalist in Phase 1 would compete against specialists in their established field. That is the worse competitive position. The platform's strategic posture is to enter verified compute as a generalist (where the existing players are not agent-native) and expand into specific application categories later when the platform's substrate makes the entry advantageous.

Verified inference is one such category. Phase 3 or Phase 4 of the build adds verified inference services on top of the existing substrate. The HyperBEAM device system supports the inference workloads (the RISC-V device for ZK proving, the greenzone device for TEE-attested inference). The Load Network audit trail extends naturally to inference attestations. The KYA primitive provides platform identity for inference results. The substrate is ready; the entry is timing.

The advantage of waiting is that the verified inference market will be larger and more mature when Phase 3 arrives than it is today. The disadvantage is that specialists may have entrenched positions by then. The strategic bet is that agent-native delivery matters enough to justify entering against established specialists, because the specialists are not currently building agent-callable endpoints.

This is the same competitive shape as Phase 1's entry into the broader verified compute category. Existing players are not serving the agent-native niche. Paxiom enters that niche. The platform's structural advantages compound.

Section 7 · B-710

Private data compute.
HIPAA, financial, the ZK pivot.

The application that may matter most over the longer horizon is verified computation on private data. Healthcare, finance, and any domain where the data carries regulatory weight. ZK proofs are the only known cryptographic primitive that solves this cleanly.

The structural problem

Many computations need to happen on data that cannot be exposed. Patient records cannot be sent to a third party for analysis. Financial portfolios cannot be exposed for compliance evaluation. Trade secrets cannot be revealed for verification of derivative work. Identity documents cannot be shared with arbitrary verifiers. The list is long.

The conventional approach is to do the computation in-house and have the third party trust the result. This is unsatisfactory. The third party cannot verify the computation. Errors and manipulation are undetectable. Compliance becomes a matter of attestation rather than verification.

The alternative — sharing the data with the third party — is forbidden by regulation, contract, or competitive position. There is no satisfactory conventional solution.

What ZK proofs offer

A ZK proof of a computation on private data lets the data owner demonstrate the computation's correctness without revealing the data. The owner runs the computation, generates a proof, and provides the proof to the third party. The third party verifies the proof. The data never leaves the owner's control. The computation is verifiable.

The structure mirrors B-500. The statement is "the computation produced output y." The witness includes the private data plus the intermediate values of the computation. The proof attests to correctness without revealing the witness.

The applications that matter

Healthcare compliance. HIPAA and similar frameworks require that patient data not be shared inappropriately. Verified computation on patient data lets healthcare providers demonstrate compliance to auditors without exposing patient records. A hospital can prove its diagnostic AI hits target accuracy on its patient population without showing the auditor a single patient's information.

Financial regulation. Banks and asset managers face compliance requirements about portfolio composition, risk exposure, and trading patterns. Verified computation lets them demonstrate compliance without exposing the underlying positions to regulators or auditors. A bank can prove its capital ratios meet requirements without revealing the specific holdings.

Identity verification. KYC and similar identity processes require verifying personal information without storing it permanently or exposing it to additional parties. Verified computation on identity data lets a person prove they are over 18, lived at a specific address for the required period, or meet other criteria without disclosing the underlying documents to every verifier.

Audit and compliance broadly. Any regulatory framework that requires a third party to verify properties of private data is a candidate for verified computation. The current approach involves sharing data with auditors under NDA. The verified computation approach replaces that with cryptographic proofs.

Why this is the moat work, not Phase 1

The market for private-data verified computation is large but demanding. Healthcare compliance has specific requirements that take years to navigate. Financial regulators have detailed expectations that require dedicated regulatory engagement. Identity verification involves consumer-facing products with their own complexity.

Phase 1 establishes the platform's substrate, builds operational track record, and generates revenue from less-demanding services. Phase 3 and beyond add the regulated-industry products on top of the substrate. The substrate is ready — HyperBEAM, AO/Arweave audit, ZK proving stack, KYA identity primitive — but the regulated-industry sales motion and compliance certification are multi-year work that Phase 1 does not undertake.

The architectural choices in Phase 1 enable Phase 3+. The audit trail's structural verifiability matches what HIPAA wants. The ZK proving stack's quantum readiness matches what long-horizon financial records need. The KYA primitive's forward-compatibility matches what identity verification frameworks are converging on. None of these are accidental; all of them are positioning.

Section 7 · B-720

Telemetry and IoT.
Verifiable physical-world data feeds.

The platform's substrate extends beyond transactions on chains to data from physical-world sources. Verifiable telemetry, supply chain attestations, sensor networks. The applications are real and the architecture supports them natively.

The category

Many decisions in the physical world depend on data from sensors that cannot be independently verified. Supply chain provenance — where did this material originate? Environmental monitoring — what were the air quality readings at this location and time? Industrial control — what were the equipment parameters during this operation? The standard approach is to trust the sensor operator's self-reported data. The trust is often misplaced.

Verifiable telemetry attaches cryptographic attestation to sensor readings at the source. The sensor signs its readings. The signatures form an unbroken chain from the physical measurement to the downstream consumer. Tampering is detectable.

For agent-mediated commerce, this matters because agents increasingly make decisions based on physical-world data. An agent optimizing a supply chain needs verifiable provenance. An agent managing energy usage needs verifiable consumption data. An agent auditing environmental compliance needs verifiable readings. The unverified versions of these data feeds are not adequate for the decisions agents are starting to make.

The SDF connection

RFC 9880 defines the Semantic Definition Format, an IETF standard for describing IoT devices and their capabilities. SDF is not a data protocol; it is a description language. It lets a device's capabilities be advertised in a machine-readable form that agents and other systems can reason about.

SDF intersects Paxiom's positioning in a specific way. A platform that natively supports SDF descriptions of the data sources it verifies can serve agents that need to reason about physical-world sensors. The agent encounters an SDF description, identifies the sensor's capabilities, and queries Paxiom for verified attestation of the sensor's recent output. The result is an agent-callable verified telemetry feed with capability metadata that integrates with broader IoT infrastructure.

This is forward-looking. Phase 1 does not include IoT services. The architectural choices that enable them are Phase 3+ work. The substrate supports them. The path is clear.

Why this is the longer arc

The IoT data category is large and fragmented. There is no single buyer or use case. The applications span supply chain, environmental monitoring, industrial automation, smart cities, and agriculture, each with its own ecosystem and standards. Entering as a generalist requires either picking a vertical to specialize in or building horizontal infrastructure that serves multiple verticals.

Paxiom's substrate is the horizontal infrastructure case. The platform offers verified compute and audit trail; specific verticals build their applications on top. The platform earns transaction fees from all verticals without specializing in any. This is the AWS pattern applied to IoT-derived agent commerce.

The category is not yet ready for a horizontal platform. The agent-economy use cases for IoT data are early. The standards (SDF among them) are still being adopted. The integration patterns are still being established. Phase 3 or Phase 4 enters the category when the substrate is ready, the demand is established, and the agent-mediated decision-making at scale makes verification genuinely necessary.

For now, this is positioning rather than product. The architectural manifest names SDF native support for future IoT agentic interactions because the platform's substrate enables it without additional engineering. The platform is not selling IoT services in v1. It will be selling them in v3 or v4 when the conditions support it.

Section 8 · B-800

Founder context.
Background, discipline, iteration.

Who is building this. What they bring. What they have built and what they have learned. The factual record relevant to evaluating the bet.

Background

The project founder. Self-taught across Solidity, JavaScript, Rust, Lua. Background in construction project management, specifically as an Assistant Project Manager on prime-contractor work. Day-to-day construction PM workload involves coordinating subcontractors, managing schedule dependencies, and handling hard problems with ambiguous information under time pressure.

The relevance of construction PM background to platform building is not always obvious. Several specific properties transfer. Operational discipline — large construction projects fail predictably when discipline lapses; the same is true of platforms. Comfort with construction-document conventions — the blueprint register that this document set uses is a register the founder worked in daily for years. Willingness to do unglamorous infrastructure work — most of platform building is the unglamorous work, and most VC-backed founders are bad at it. Ability to coordinate complex builds with hard dependencies — Phase 1 has five services with overlapping dependencies and the audit relay build that runs alongside them.

These are not theoretical claims. They are properties already demonstrated by the existing infrastructure — the executor, the OApp deployments, the AO compliance process, the PaxiomPool contract — that has been built and deployed during evenings and weekends while holding a 58-hour-per-week APM role. The track record is the evidence.

Audit discipline

A specific demonstration worth surfacing. During the development of the earlier arbitrage architecture, a serious code audit was conducted before the system went anywhere near mainnet. The audit caught real bugs that would have caused real losses.

A hardcoded fabricated opportunity that bypassed actual price comparison. A chain-routing bug that would have sent transactions to the wrong network. A sell-leg bug where the input amount was zero, which would have produced confusing transaction failures. A fail-open quote logic that would have returned permissive results when the underlying quote infrastructure failed. Shell injection surfaces in the orchestration scripts that an attacker could have exploited to compromise the system.

None of these were minor. Each was the kind of bug that, in production, costs money or compromises operations. All were caught by deliberate audit before deployment. The discipline that produces this outcome — taking the time to actually look hard at code before shipping it — is what distinguishes solo founders who ship working software from solo founders who ship buggy software.

Iteration

The current Paxiom thesis is the third version, not the first one. The territory has been clear from the start: zero-knowledge proving, the agentic economy, blockchain infrastructure. What has changed across iterations is the specific shape of the bet, in response to what each iteration's work taught.

The first version targeted a genesis ZK proof of Ethereum consensus as the primary product. The work on this established familiarity with sync committee verification, BLS signatures, and the proving stack. It also revealed that the genesis proof itself was not the durable advantage — the permissionless prover network and integration ecosystem around it would be. The work was not abandoned; it was repositioned as one capability among several.

The second version pivoted toward flash loan arbitrage as a near-term funding mechanism. The work on this established familiarity with cross-chain operations, LayerZero OApp deployment, and the operational realities of running execution infrastructure. It also revealed that flash loan atomicity was not the right execution model for the longer-horizon platform — the architectural choices that made arbitrage work created friction for the platform thesis. The execution infrastructure was kept; the arbitrage focus was repositioned.

The current version is the platform thesis as articulated throughout this document. Verified claims as a category, x402-native delivery, MCP-readable tools, AO/Arweave audit, and permanent evidence. Cross-chain settlement and private opportunity feeds remain reference applications when they are packaged as paid routes, simulations, or attestations. This thesis incorporates what the earlier iterations established and responds to the landscape that emerged around the work — x402's institutional embedding, KYA's category formation, the Kelp DAO incident's demonstration of input-trust failure.

What ties the iterations together is the territory. Building infrastructure for the agent economy. The territory has been constant. The bet on what specifically to build within the territory has refined as evidence accumulated.

Tools and resources

Active across Solidity, JavaScript, Rust, Lua, with growing comfort in Erlang for HyperBEAM work. Building on Arbitrum, Optimism, and Base. Cross-chain messaging via LayerZero. Persistent storage and compute via AO and Arweave. ZK proving stack tracking Polyhedra Expander, with SP1 and RISC Zero as alternatives evaluated.

Public presence on GitHub at github.com/k-luecke and at paxiom.org.

Solo founder. No team yet. The platform's discipline is the operator's discipline. This is the constraint that shapes Phase 1's scope and the platform's pace.

Section 8 · B-810

Why this, why now.
The industrial revolution comparison.

There are easier ways to make money. I could go deeper on construction PM work and earn more. I could take a senior dev role at an existing crypto project and earn meaningfully more. I could build something less technically ambitious and probably ship it faster. The reasonable question is: why this specifically?

The honest answer is that I have watched the pattern before. I was there for early Ethereum mining, when the equation between hash rate and what was actually getting built was visible to anyone paying attention. I was there for the Mt. Gox collapse and the lessons it taught about counterparty risk in nascent infrastructure. I was there for the Bitcoin Cash split and the political dynamics of who gets to define what counts as the canonical chain. I was there for enough cycles of crypto building, breaking, and rebuilding to recognize what that pattern looks like when it is happening to a different category.

The agentic economy is that pattern, in the most consequential category I have seen it apply to. The substrate is being laid right now. The standards are being negotiated. The institutional embedding is real but unfinished. The infrastructure that will be the backbone of how machines transact for the next several decades is being built piece by piece by people who are early enough to be shaping it rather than buying tickets to ride someone else's.

I have a lot of respect for the people who built the infrastructure of previous industrial revolutions. Vanderbilt and the railroads. Carnegie and the steel. Rockefeller and the oil pipelines. Morgan and the financial plumbing. The Rothschilds across centuries of it. Bezos and the cloud. These are not all morally clean stories — some of them are quite the opposite — but they share a structural feature. The people who built the infrastructure of their era captured a disproportionate share of the value created by the era. The reason is not that they were uniquely brilliant or uniquely virtuous. The reason is that they showed up early to build the substrate, and the substrate compounded.

I want to participate in the building of the substrate of the agent economy. Not because I think I am Vanderbilt. Not because I expect to be Bezos. Because the only way to participate in the substrate of this era is to be early and stay disciplined, and "early" is a window that closes rather than a status that endures. The window is open right now.

The specific bet — verified claims, x402-native delivery, MCP-readable tools, AO-anchored audit, and permanent evidence — is one specific way to participate. There are other valid bets. Other people are making them. The ecosystem will need many of them. What matters is that the bet I am making is grounded in real architectural advantages, fits a real gap in the existing landscape, and compounds in the directions the ecosystem is actually moving.

That is the answer to "why this." Not because it is easy. Not because it is the most lucrative path on a one-year horizon. Because it is the shape of the world I see being built, and I would rather build a piece of that world than buy a ticket to someone else's version of it.

Section 9 · B-900

Ecosystem dependencies.
What lies outside the founder's control.

The platform's success depends partly on bets about ecosystem evolution that the founder does not control. Honesty about these dependencies matters more than pretending they don't exist.

Protocol layer dependencies

x402's continued adoption is the foundation. If the protocol stagnates, if Visa's Trusted Agent Protocol or some alternative displaces it, if a critical security flaw forces a rewrite — any of these would change the substrate the platform is built on. The platform's mitigation is that the architectural advantages (verifiable inputs, permanent audit trail, KYA primitive) are not specific to x402. The verified-claims capabilities translate to whatever payment protocol the ecosystem consolidates around. The migration cost is real but the platform survives.

Coinbase's facilitator pricing and policies. The default facilitator is currently free for users. If Coinbase changes pricing aggressively, the economics shift. The platform's mitigation is the optionality of self-hosted facilitators (x402-rs) and alternate commercial providers. The dependency is real but substitutable.

Base's continued operation as the dominant settlement chain. If Base degrades materially, if its governance produces hostile changes, if a competing L2 takes meaningful share, the platform adjusts. The dependency is real but the protocol's chain-agnostic design provides genuine flexibility.

Standards layer dependencies

KYA framework consolidation. Multiple frameworks are competing. None has won. The platform's v1 implementation is forward-compatible with all of them through the naive primitive (signed responses, public key published). When a framework consolidates as dominant, the platform adapts. The cost is integration work, not architectural change.

ERC-8004 and ERC-8183 adoption rates. The Ethereum Foundation has positioned these as the agent commerce stack, but adoption depends on the broader ecosystem participating. If adoption is slow, the platform's positioning around them produces less value than the realistic case projects. If adoption accelerates, the positioning produces more value. Neither outcome is fully under the platform's control.

MCP's continued role as the de facto tool discovery standard. Anthropic's introduction of MCP has driven its adoption. If a competing standard emerges and captures share, the platform's MCP-wrapper investment produces less value. The mitigation is that agent discovery generally is structured-metadata matching; the specific format is replaceable.

Regulatory dependencies

KYA mandates. Regulators may eventually require specific KYA properties for transactions above certain thresholds. The shape and timing of these requirements is uncertain. The platform's mitigation is that the audit trail and identity primitive are already aligned with what regulators are likely to want. Compliance cost may be higher than projected, but the architecture is on the right side of the trajectory.

Stablecoin regulation. USDC's regulatory status affects the entire x402 ecosystem. If USDC faces material restrictions, the settlement substrate shifts. The mitigation is the protocol's chain and asset agnosticism. The disruption would be real but bounded.

Securities and CFTC jurisdiction. Verified compute services may eventually face questions about whether their outputs constitute regulated activity. The platform's mitigation is staying clearly within the verified-compute category and avoiding services that could be construed as financial advice or investment management. The boundary is real but navigable.

AI lab dependencies

Anthropic, OpenAI, Google, and Cloudflare's framework decisions. These entities are not customers — they don't pay for verified compute — and they're not direct competitors — they don't sell verified compute either. They're the entities whose tooling decisions determine whether agents using their frameworks find the platform. Their choices about default toolchains, integration patterns, and ecosystem partnerships affect Paxiom's traffic substantially.

This is a different kind of stakeholder than most businesses have. The mitigation is engaging directly with the framework ecosystems where possible — contributing to MCP, registering on framework plugin lists, participating in technical communities — and building services that fit naturally into their patterns. The platform's success depends partly on these relationships, and the relationships are built rather than purchased.

Existing competitor dependencies

RISC Zero, Succinct, Boundless, EZKL, Lagrange, Polyhedra, and the broader verified compute ecosystem's strategic decisions. If they extend into agent-native delivery aggressively, Paxiom faces strong competition with their existing customer bases. If they stay focused on B2B integration, the agent-native niche remains open. The competitive trajectory is partly outside the founder's control.

The mitigation is the architectural moats covered in B-320. Those moats are real and are not trivially retrofittable by competitors. But they are not insurmountable for well-funded teams that decide to commit. The competitive advantage is real but bounded by what larger competitors choose to do.

The honest summary

The platform's success depends on multiple factors outside the founder's control. The agentic economy continues to grow. x402 or its successor remains the dominant payment rail. Standards layers mature in compatible directions. Regulators move at a pace the platform can adapt to. AI labs build frameworks that are discoverable to platforms like Paxiom. Existing verified compute providers do not aggressively extend into agent-native delivery.

None of these are guarantees. All of them are reasonable bets based on observable institutional behavior. The architectural choices in the platform are designed to be robust to multiple plausible futures rather than to bet on one specific outcome. The platform survives outcomes that diverge from the realistic case; it just produces less value than the realistic case projects.

Building infrastructure means accepting that the substrate's evolution is partly someone else's decision. The mitigation is not pretending otherwise. The mitigation is making bets that work across reasonable variation in the substrate's evolution.

Section 10 · B-1000

The trajectory.
Phase 1 through Phase 5.

Where the platform goes after Phase 1. The moats. Being early to demand that does not yet fully exist.

Phase 1 ships the engine. The moat work is what makes the engine worth running for the long horizon. Each phase beyond Phase 1 extends the platform's capability into directions where the architectural choices made in Phase 1 produce structural advantages.

Phase 2 — catalog breadth and multi-chain

Phase 2 expands the service catalog beyond the initial five and extends the platform to multi-chain operation. New verified state proofs for additional chains. New simulation services for chains beyond Ethereum. New cross-chain attestations spanning more pairs. Each addition uses the same substrate as Phase 1 — HyperBEAM devices, AO/Arweave audit, KYA primitive, x402-native delivery — without architectural change. The pattern established in Phase 1 ramps in throughput.

The expected revenue trajectory in Phase 2 is roughly 2-4x the Phase 1 run rate, depending on adoption and pricing optimization. Phase 2 is also where B2B contracts begin to materialize — the operational track record from Phase 1 provides the credibility that enterprise integrations require, and the catalog breadth provides the surface area that enterprise buyers need.

Phase 3 — differentiated capabilities

Phase 3 introduces capabilities that competitors cannot easily replicate. Recursive proving for composable cross-chain settlement through Polyhedra Expander integration. ZK proofs of computation on private data, opening the HIPAA-grade compliance market. Verified historical state at scale, where permanent evidence and replayable verification provide genuinely rare capability.

This is where the moat work begins. Phase 1 services are commoditized — competing primarily on operational properties. Phase 3 services are differentiated — competing on architectural properties that competitors cannot match without substantial investment. The economics improve correspondingly. Higher prices, larger contracts, longer customer relationships.

The expected revenue trajectory in Phase 3 is meaningfully higher than Phase 2's, with the dispersion driven by which specific applications develop demand fastest. The platform's strategy in Phase 3 is to be operationally ready for multiple application categories simultaneously, so that whichever category catalyzes first, the platform absorbs the demand.

Phase 4 — enterprise integration

Phase 4 deepens enterprise relationships. Specific industries begin to integrate the platform's verified compute into their core operations. Healthcare for HIPAA-grade compliance. Financial services for regulatory attestation. Supply chain for verifiable provenance. Each integration is multi-quarter work but produces revenue at substantially higher unit economics than per-call service fees.

The platform's posture in Phase 4 is shifting from generalist verified compute provider to vertical-specific compliance infrastructure. The generalist services continue, providing the horizontal substrate. The vertical-specific products layer on top, serving the buyers who pay for the moat work.

Phase 5 — quantum-clean and forward-positioning

Phase 5 completes the platform's positioning for the longer horizon. The proving stack migrates fully to post-quantum-clean primitives — Polyhedra Expander, ML-DSA signatures, hash-based attestations. The KYA primitive transitions to ERC-8004 or its successor in active deployment rather than just compatibility. ERC-8183 marketplace participation activates as Paxiom becomes a production Evaluator for trustless agent escrow. IoT and telemetry applications begin shipping as the SDF-native architecture finally has demand to serve.

This is where being early pays off. The architectural choices made in Phase 1 — choosing Polyhedra Expander, building on HyperBEAM, anchoring audit in AO/Arweave, naive KYA primitive — position the platform to operate cleanly in the post-quantum agent economy that is taking shape. Competitors who chose quantum-vulnerable primitives or RPC-dependent architectures or bolt-on audit trails face migration costs that Paxiom does not.

Being early to demand that does not yet exist

Several Phase 5 capabilities serve demand that does not yet fully exist in the market. Quantum-clean proving is positioning for a threat that is real but not yet immediate. SDF-native IoT agentic interactions assume widespread agent-mediated commerce in physical-world data. Private-data ZK assumes regulatory frameworks that are forming but not yet finalized. ERC-8183 evaluator role assumes marketplace adoption that is starting but not yet broad.

Being early to these capabilities is the bet. The standard critique of being early — "you're solving for demand that doesn't exist yet" — is correct in the short term. It misses the longer horizon. Demand for these capabilities will exist. The question is who is ready when it does. A platform that has been operating quantum-clean infrastructure for three years when the migration broadly arrives captures more of the migrating market than incumbents who must scramble.

The trajectory through Phase 5 is what makes the Phase 1 build worth doing. Phase 1 alone is a viable infrastructure business at modest scale. Phase 1 plus the moat work that follows is a substantial infrastructure business positioned for the agent economy that is forming. The bet is not on Phase 1's economics. The bet is on the substrate the Phase 1 architectural choices enable.

The compounding properties

Three properties compound across the phases.

Reputation. Every successful service call adds to the platform's track record. Every reliable operation across years of operation makes Phase 4 enterprise contracts easier to land. The track record cannot be acquired by larger competitors who arrive later; it can only be built through time.

Integration depth. Each agent framework integration, each discovery layer registration, each B2B partnership adds to the platform's surface area. By Phase 4, the platform is integrated into the agent economy in ways that are not trivially substitutable. Customer switching costs grow.

Architectural advantages. The verifiable-input, AO-audit, KYA-primitive properties become more valuable as the agent economy matures. Today they are differentiators. By Phase 4 or 5, they may be table stakes — the entire ecosystem has migrated toward them, and the platform that has been operating with them from Phase 1 has the longest track record and the deepest integration of any participant.

None of this happens automatically. All of it requires sustained execution across many years. The phases are calibrated to a realistic execution pace, not to a heroic one. The bet on the trajectory is a bet on sustained discipline, not on extraordinary luck.

B-1100 · Closing & References

Closing.
Where to go from here.

Related documents

This narrative is one document in a set. The full set provides the detail this document deliberately avoids. Each document serves a specific purpose.

A-series · Phase 1 Blueprint. Detailed specifications for each of the five Phase 1 services. Cost and revenue pro forma. Build sequence with explicit gates and decision points. Risk register specific to Phase 1. The "what to build" reference.

M-series · Audit Relay Blueprint. WSL-native tooling that automates the audit cycle for code changes. Mechanical infrastructure that accelerates the build without removing the operator from decision loops. Six-gate build sequence.

E-series · Key Custody and Identity Blueprint. Three-tier architecture for the keys the platform owns. Hot, warm, cold. Inventory of every keypair. Procedures for generation, signing, rotation, and compromise response. Operational specifics captured in a separate private document.

O-series · Operations Runbook. Procedures for the day things go wrong and the days they go right. Eight incident procedures, five routine procedures, severity framework, post-incident discipline. The book to grab at 3am.

Build Map. Strategic positioning across all phases from Phase 0 through Phase 5. Earlier strategic document that established the broad shape this narrative now elaborates.

The full set of documents is at paxiom.org and in the project's GitHub repository.

Revision log

Rev. A — 2026.04.29. Initial issue. Eleven sections covering the agentic economy, x402 protocol, threat surface, platform definition, technical architecture, economics, forward-looking applications, founder context, ecosystem dependencies, trajectory through Phase 5, and references.

Subsequent revisions issued as the platform's positioning evolves. Rev. B expected when Phase 1 first service launches with operational traffic data to inform the economics section. Rev. C expected as KYA standards consolidate or significant ecosystem shifts occur.

One last thing

The agentic economy is being built right now. The substrate of how machines transact for the next several decades is being laid by people who are early enough to be shaping it. Paxiom is one participant in that building. The bet is not on Paxiom specifically — the bet is on the territory, the timing, and the architectural choices that compound across years.

The bet is also on the discipline to actually build it. Phase 1 ships five services. The moats follow. The trajectory is real but not automatic. The work is the work.

Build the engine first. The moats come later. The substrate is being laid right now.