The Hardware Truth Landscape — Pirates, Traders, and Anchors
Authors/Creators
Description
The transition of artificial intelligence from a generative curiosity to an agentic workforce has precipitated a fundamental crisis in digital governance. This paper argues that the prevailing "Software Governance" paradigm—which relies on system prompts and application-layer logic—is insufficient for securing high-stakes autonomous agents.
To this end, we analyze the "Hardware Renaissance" of 2026, a shift characterized by the rapid migration of agentic infrastructure toward Trusted Execution Environments (TEEs). While the underlying silicon—ranging from Intel SGX/TDX and NVIDIA H100 to IBM Z—is often shared across the industry, the architectural frameworks built atop these foundations are designed to solve radically different problems.
Consequently, this taxonomic survey examines five distinct architectural archetypes: The Privacy Box (Oasis Network), The Pirate Ship (Phala Network), The Dark Pool (Flashbots SUAVE), The IP Vault (Super Protocol), and The Governance Anchor (The Citadel Protocol). We provide a detailed technical breakdown of their respective attestation flows, memory isolation mechanisms, and key management strategies. Ultimately, we conclude that while decentralized frameworks optimize for privacy or censorship resistance, the "Governance Anchor" model establishes the requisite standard for enterprise compliance (ISO 42001).
Files
The Hardware Truth Landscape - Theo Ezell.pdf
Files
(267.9 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:3bfb50937fd087c72f3e00a8bbc75c6a
|
267.9 kB | Preview Download |
Additional details
Related works
- Cites
- Preprint: 10.5281/zenodo.18472859 (DOI)
References
- Ezell, T. (2025). "Anchoring Agentic AI Governance to a Hardware Root of Trust." WebMethodMan.com. https://www.webmethodman.com/p/anchoring-agentic-ai-governance-to-a-hardware-root-of-trust
- Oasis Network. (2025). "ROFL: Unlocking Secure Off-Chain Computation with Oasis Network." Oasis Protocol Foundation. https://dev.to/caerlower/rofl-unlocking-secure-off-chain-computation-with-oasis-network-3ien
- Oasis Network. (2025). "Inside ROFL: A Deep Technical Dive into Oasis Protocol's Runtime Offchain Logic Framework." Oasis Protocol Foundation. https://medium.com/@caerlower/inside-rofl-a-deep-technical-dive-into-oasis-protocols-runtime-offchain-logic-framework-330c9c97559e
- Phala Network. (2025). "Build Trustworthy Fintech AI Agents With TEE." Phala Blog. https://phala.com/posts/Build-Trustworthy-Fintech-AI-Agents-With-TEE
- Phala Network. (2025). "Detailed Analysis of Phala Cloud's Decentralized Root of Trust, KMS Protocol, and ZKP Enhancement." Phala Blog. https://phala.com/posts/detailed-analysis-of-phala-clouds-decentralized-root-of-trust-kms-protocol-and-zkp-enhancement
- Flashbots. (2025). "SUAVE Kettle Architecture Technical Specification." Flashbots Github. https://github.com/flashbots/suave-specs/blob/main/specs/rigil/kettle.md
- Flashbots. (2024). "Demystifying Remote Attestation by Taking it On-Chain." Flashbots Collective. https://collective.flashbots.net/t/demystifying-remote-attestation-by-taking-it-on-chain/2629
- Super Protocol. (2024). "Exploring the Case of Super Protocol with Self-Sovereign AI and NVIDIA Confidential Computing." NVIDIA Developer Blog. https://developer.nvidia.com/blog/exploring-the-case-of-super-protocol-with-self-sovereign-ai-and-nvidia-confidential-computing/
- NVIDIA. (2023). "Confidential Computing on H100 GPUs for Secure and Trustworthy AI." NVIDIA Technical Blog. https://developer.nvidia.com/blog/confidential-computing-on-h100-gpus-for-secure-and-trustworthy-ai/
- Dusk Network. (2023). "Citadel: Self-Sovereign Identities on Dusk Network." arXiv. https://arxiv.org/abs/2301.09378
- IBM. (2024). "IBM Secure Execution for Linux." IBM Documentation. https://www.ibm.com/docs/en/linux-on-systems?topic=management-secure-execution
- Ezell, T. (2026). "The Citadel Protocol: A Reference Architecture for Hardware-Enforced Agentic Governance." Zenodo. https://doi.org/10.5281/zenodo.18472859