<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Vordan: The Accountability Report]]></title><description><![CDATA[Weekly deep analysis of the accountability gap between advancing technical capability and the institutions meant to govern it. Published every Sunday. One topic, explored fully, with implications for practitioners operating inside the gap.]]></description><link>https://vordan.substack.com/s/the-accountability-report</link><image><url>https://substackcdn.com/image/fetch/$s_!oN-L!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66e58882-615e-467c-adf7-13aeae28d426_400x400.png</url><title>Vordan: The Accountability Report</title><link>https://vordan.substack.com/s/the-accountability-report</link></image><generator>Substack</generator><lastBuildDate>Mon, 11 May 2026 04:02:12 GMT</lastBuildDate><atom:link href="https://vordan.substack.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Vordan]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[vordan@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[vordan@substack.com]]></itunes:email><itunes:name><![CDATA[Dominick Costa]]></itunes:name></itunes:owner><itunes:author><![CDATA[Dominick Costa]]></itunes:author><googleplay:owner><![CDATA[vordan@substack.com]]></googleplay:owner><googleplay:email><![CDATA[vordan@substack.com]]></googleplay:email><googleplay:author><![CDATA[Dominick Costa]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Proton's Promise Doesn't Scale]]></title><description><![CDATA[What happens when a privacy institution scales faster than its accountability architecture.]]></description><link>https://vordan.substack.com/p/protons-promise-doesnt-scale</link><guid isPermaLink="false">https://vordan.substack.com/p/protons-promise-doesnt-scale</guid><dc:creator><![CDATA[Dominick Costa]]></dc:creator><pubDate>Sun, 03 May 2026 13:02:01 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!g0kV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f234607-ed84-451b-9aea-1ecd0189b3f0_2500x1000.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!g0kV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f234607-ed84-451b-9aea-1ecd0189b3f0_2500x1000.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!g0kV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f234607-ed84-451b-9aea-1ecd0189b3f0_2500x1000.png 424w, https://substackcdn.com/image/fetch/$s_!g0kV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f234607-ed84-451b-9aea-1ecd0189b3f0_2500x1000.png 848w, https://substackcdn.com/image/fetch/$s_!g0kV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f234607-ed84-451b-9aea-1ecd0189b3f0_2500x1000.png 1272w, https://substackcdn.com/image/fetch/$s_!g0kV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f234607-ed84-451b-9aea-1ecd0189b3f0_2500x1000.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!g0kV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f234607-ed84-451b-9aea-1ecd0189b3f0_2500x1000.png" width="1456" height="582" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3f234607-ed84-451b-9aea-1ecd0189b3f0_2500x1000.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:582,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:103231,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://vordan.substack.com/i/196253212?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f234607-ed84-451b-9aea-1ecd0189b3f0_2500x1000.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!g0kV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f234607-ed84-451b-9aea-1ecd0189b3f0_2500x1000.png 424w, https://substackcdn.com/image/fetch/$s_!g0kV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f234607-ed84-451b-9aea-1ecd0189b3f0_2500x1000.png 848w, https://substackcdn.com/image/fetch/$s_!g0kV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f234607-ed84-451b-9aea-1ecd0189b3f0_2500x1000.png 1272w, https://substackcdn.com/image/fetch/$s_!g0kV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f234607-ed84-451b-9aea-1ecd0189b3f0_2500x1000.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I use Proton. Proton Mail, Proton VPN, the whole stack. I chose it for the same reason most practitioners do. The architecture is real, the encryption works, and the Swiss jurisdiction felt like a meaningful layer of protection over the alternative. I&#8217;m not writing this piece because Proton is dishonest. I&#8217;m writing it because Proton is probably the most credible privacy infrastructure company in the world, and even here, the accountability gap is structural, visible, and widening.</p><p>That&#8217;s worth understanding before you trust it with something that matters.</p><div><hr></div><p><strong>The Promise</strong></p><p>Proton launched in 2014 out of CERN. The founding premise was straightforward: end-to-end encrypted email, no access to message content, Swiss jurisdiction, and a no-logs posture that meant even a valid legal order couldn&#8217;t produce what wasn&#8217;t there.</p><p>For years that premise held in the public imagination. The brand became synonymous with privacy infrastructure. Journalists used it. Dissidents used it. Activists coordinating on the ground in politically hostile environments used it. The promise wasn&#8217;t just marketing. It was the reason the product existed.</p><p>The architecture backing that promise is genuinely strong. Proton cannot read your emails. That is not marketing copy. It is a technical reality enforced by the encryption. No legal order changes that.</p><p>But encryption is not the whole promise. And the architecture is not the whole institution.</p><div><hr></div><p><strong>Three Cases</strong></p><p>In September 2021, French police were investigating a group of climate activists occupying buildings near Place Sainte-Marthe in Paris. They routed a request through Europol to Swiss authorities, who issued a legally binding order to Proton. Proton handed over the IP address and device fingerprint of the account holder. The encryption held. The email contents were never accessible. But the activist was identified and arrested.</p><p>Proton&#8217;s website at the time said: &#8220;By default, we do not keep any IP logs which can be linked to your anonymous email account.&#8221; Within days of the story breaking, that language was quietly removed. The privacy policy was updated to clarify that Swiss law could compel IP logging under criminal investigation. The response was a communications update, not a structural one.</p><p>In May 2024, Proton handed over a recovery email address to Spanish authorities investigating a Catalan independence activist connected to the Democratic Tsunami movement. The request came through Swiss legal channels as part of a terrorism investigation. Again, the encryption held. Again, the metadata was sufficient. The activist was identified.</p><p>In early 2025, court documents revealed a third case. The FBI, working through Swiss authorities via a Mutual Legal Assistance Treaty, obtained subscriber information from a Proton Mail account connected to the Stop Cop City movement in Atlanta. That information was a bank card identifier, a single piece of financial metadata, sufficient to match the account to a real name. The FBI used the identification to plan an airport detention. No charges were filed. A Georgia judge later threw out all related RICO charges against 61 defendants.</p><p>Three cases. Three different countries. Three different legal routes into the same institution. Each time, the encryption held. Each time, the metadata didn&#8217;t.</p><div><hr></div><p><strong>The Numbers Behind the Pattern</strong></p><p>Proton publishes a transparency report. That matters and deserves credit. But the numbers inside it tell a story Proton hasn&#8217;t told directly.</p><p>In 2021, the year the French activist case became public, Proton contested 21.2% of legal orders it received. The scrutiny was high, the reputational stakes were visible, and the institution pushed back on roughly one in five requests.</p><p>By 2024, the contest rate had fallen to 5.9%. Order volume had nearly doubled. From 2017 through 2025, Proton received 45,667 legal orders and complied with 40,389 of them.</p><p>The institution got quieter about resistance as it got bigger. That is not an accusation of bad faith. It is a structural observation. As Proton scaled to 100 million users across Mail, VPN, Drive, Pass, Calendar, and Wallet, the surface area of metadata it holds expanded significantly. More products. More payment data. More recovery addresses. More device fingerprints. More points of legal exposure. The compliance architecture stayed the same.</p><p>One data point makes the structural argument more precisely than any other. Proton VPN, the same company, denied 100% of legal orders every single year from 2020 through 2025. Not because Proton VPN is more committed to privacy than Proton Mail. Because the architecture makes compliance impossible. Proton VPN maintains no logs. There is nothing to hand over. The architecture closed the gap before the legal order arrived.</p><p>Proton Mail&#8217;s architecture did not make that same choice.</p><div><hr></div><p><strong>What the Gap Actually Is</strong></p><p>This is not a story about Proton breaking its promise. The encryption promise was kept every time. The emails were never readable. The architecture performed exactly as designed.</p><p>The gap is between two different things that the brand collapsed into one: the architectural promise and the institutional promise.</p><p>The architectural promise is technical. It is verifiable. It has been independently confirmed. Proton cannot read your emails. That is true.</p><p>The institutional promise is organizational. It lives in compliance decision frameworks, in legal resistance thresholds, in what metadata gets retained and under what conditions, in how payment processing integrates with account identity, in how the contest rate is determined when an order arrives. None of that is in the encryption. All of it is invisible to the user until a court order makes it visible.</p><p>The people most reliant on Proton&#8217;s promise, journalists, dissidents, activists operating in politically hostile environments, are the least positioned to discover where the institutional promise ends and the architectural promise begins. They chose Proton because they believed the brand. The brand implied a unity that the institution never formally established.</p><p>That is the accountability gap.</p><div><hr></div><p><strong>What Accountable by Design Looks Like</strong></p><p>The Vordan Accountability Framework measures accountability posture across six components: Origin, Voice, Traceability, Timing, Response, and Transparency. A score of 100 means the gap is closed. Here is what Proton looks like at 100.</p><p>Origin. Every compliance decision has a documented decision owner and a published legal resistance threshold. The framework for determining when to contest an order, and when not to, exists in writing before the order arrives, not assembled case by case under legal pressure.</p><p>Voice. Users with high-risk threat models have a functional path to understand what Proton can and cannot protect them against before they rely on the service. That path is not buried in a threat model page three clicks from the homepage. It is part of onboarding for any account that fits the activist, journalist, or dissident profile.</p><p>Traceability. A published legal resistance log. Not aggregate statistics. A documented record of the threshold applied to each category of request, the reasoning behind contest and compliance decisions, and what changed structurally after each public case.</p><p>Timing. The institutional promise is defined before a legal order forces its definition. The 2021 privacy policy update happened after the activist was arrested. At 100, that clarification exists on day one of the product, not day one of the crisis.</p><p>Response. When a gap is identified, the correction is structural. The response to each of the three cases described above was a communications update. At 100, the response to the 2021 case produces a published resistance framework, a redesigned metadata retention policy, and a documented decision on what payment data is retained and why. Not a revised homepage.</p><p>Transparency. The brand promise matches the actual capability. &#8220;We do not keep IP logs&#8221; is replaced, before any court order, with a plain-language threat model that tells a journalist or activist exactly what Proton can protect them against, what it cannot, and under what conditions each applies. The architecture and the institution are described separately, honestly, and visibly.</p><p>At 100, the user who needs Proton most understands its limits before their life depends on not knowing them.</p><div><hr></div><p><strong>The Doctrine</strong></p><p>Proton did not fail because its encryption broke. It failed, three times, in three countries, across a decade of growth, because the accountability architecture was never built to match the promise the brand was making.</p><p>The encryption was Accountable by Design. The institution was not.</p><p>That distinction is not unique to Proton. It is the defining accountability gap of privacy infrastructure at scale. The architecture gets the investment, the audit, the public verification. The institutional layer, the compliance decisions, the metadata retention choices, the legal resistance posture, operates largely in the dark until a court order or a news story turns the light on.</p><p>Proton VPN proves the alternative is possible. Zero compliance, not because of ideology, but because the architecture made compliance impossible. That was a design decision. It was made before the legal order arrived.</p><p>That is what Accountable by Design means. Not a better response when the gap becomes visible. Architecture that closes the gap before anyone has to find it.</p><div><hr></div><p><em>Vordan covers the accountability gap between advancing technical capability and the institutions meant to govern it. The Accountability Report publishes every Sunday. The Gap Alert publishes when the intelligence warrants it.</em></p><p><em>If this piece was useful, forward it to someone who needs to understand the difference between an architectural promise and an institutional one.</em></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://vordan.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Vordan! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[When the Agent Acts, Who Answers?]]></title><description><![CDATA[The response layer just went machine speed. The accountability layer did not.]]></description><link>https://vordan.substack.com/p/when-the-agent-acts-who-answers</link><guid isPermaLink="false">https://vordan.substack.com/p/when-the-agent-acts-who-answers</guid><dc:creator><![CDATA[Dominick Costa]]></dc:creator><pubDate>Sun, 26 Apr 2026 13:03:40 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!C6gL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1f26e8b-5238-4b61-b803-7434a7e5e1d6_3446x1369.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!C6gL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1f26e8b-5238-4b61-b803-7434a7e5e1d6_3446x1369.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!C6gL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1f26e8b-5238-4b61-b803-7434a7e5e1d6_3446x1369.png 424w, https://substackcdn.com/image/fetch/$s_!C6gL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1f26e8b-5238-4b61-b803-7434a7e5e1d6_3446x1369.png 848w, https://substackcdn.com/image/fetch/$s_!C6gL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1f26e8b-5238-4b61-b803-7434a7e5e1d6_3446x1369.png 1272w, https://substackcdn.com/image/fetch/$s_!C6gL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1f26e8b-5238-4b61-b803-7434a7e5e1d6_3446x1369.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!C6gL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1f26e8b-5238-4b61-b803-7434a7e5e1d6_3446x1369.png" width="1456" height="578" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c1f26e8b-5238-4b61-b803-7434a7e5e1d6_3446x1369.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:578,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:218906,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://vordan.substack.com/i/195420527?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1f26e8b-5238-4b61-b803-7434a7e5e1d6_3446x1369.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!C6gL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1f26e8b-5238-4b61-b803-7434a7e5e1d6_3446x1369.png 424w, https://substackcdn.com/image/fetch/$s_!C6gL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1f26e8b-5238-4b61-b803-7434a7e5e1d6_3446x1369.png 848w, https://substackcdn.com/image/fetch/$s_!C6gL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1f26e8b-5238-4b61-b803-7434a7e5e1d6_3446x1369.png 1272w, https://substackcdn.com/image/fetch/$s_!C6gL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1f26e8b-5238-4b61-b803-7434a7e5e1d6_3446x1369.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Something changed this week and most of the people it will affect have not noticed yet.</p><p>Google announced that autonomous AI agents can now detect threats, hunt attackers, and execute security responses without waiting for a human to approve the action. The Triage and Investigation agent processed five million alerts last year. A thirty-minute manual analysis now takes sixty seconds. Three more agents are coming for threat hunting, detection engineering, and contextual enrichment.</p><p>The direction is not subtle. Human-in-the-loop defense is becoming human-aware defense. The agent acts. The human learns about it afterward.</p><p>This is the right response to a real problem. Mandiant&#8217;s M-Trends 2026 report showed that threat actors now hand off access from an initial breach to a secondary attacker in 22 seconds. Three years ago that took eight hours. At 22 seconds, waiting for a human to review an alert and approve a response is not a philosophy. It is a losing position.</p><p>So the agents make sense. That part is not the problem.</p><p>The problem starts the moment the agent acts.</p><div><hr></div><p>Picture the scenario. An autonomous response agent on your network detects anomalous behavior, evaluates context, and executes a block. The threat is neutralized. Logs are generated. The agent moves to the next alert.</p><p>Three weeks later a regulator submits a request. They want the decision trail for that block. Who authorized it. What logic drove it. What information the system had at the time. What alternatives were considered and why they were not selected. Whether the action was proportionate to the threat. Whether it complied with relevant data handling obligations.</p><p>The agent cannot answer those questions. It executed a function. It does not carry accountability for the outcome.</p><p>Your team has the logs. But logs are not answers. Logs are raw material. Someone has to convert that raw material into an accountable explanation that holds up under scrutiny from a party that does not have to accept your interpretation of what happened. That someone is a human being inside your organization. And right now, in most organizations deploying agentic defense, that human being has not been identified, empowered, or given the tools to do that job.</p><p>That is the gap nobody announced at Google Cloud Next.</p><div><hr></div><p>The natural response to this problem, and you will hear it more as agentic defense scales, is to use AI to audit AI. Run an agent over the decision logs. Generate an explanation. Automate the accountability record the way you automated the response.</p><p>It sounds elegant. It does not work. Not because the technology cannot produce a document. Because a document is not accountability.</p><p>Accountability requires someone who can be questioned, who can be held to a standard, and who can be sanctioned if the standard was not met. A machine-generated explanation of a machine-made decision satisfies none of those requirements. A regulator who understands what they are looking at will see the generated explanation for what it is. A record of what happened, produced by the same system whose behavior is under review, with no independent human judgment applied to it.</p><p>More fundamentally, if the decision happened too fast for human review, it also happened too fast for human accountability. Those are not two different problems. They are the same problem arriving at different times. The agent closes the speed gap. The accountability gap widens in its wake.</p><p>No framework published today answers this. Not NIST. Not ISO 42001. Not the EU AI Act. Not anything announced this week. They were not written for a world where the decision was made in milliseconds and the accountability question arrives weeks later from a party with legal authority to demand an answer.</p><p>That is not a criticism. It is a statement about where we are. The capability arrived. The governance is still in transit.</p><div><hr></div><p>Here is the part that does not get said enough. The organizations deploying agentic defense are not making a reckless decision. They are making a rational one inside a system that has not yet built the infrastructure to support it.</p><p>The vendors built the response layer. Nobody built the accountability layer. That is not a failure of individual judgment. It is a structural condition. The tool arrived. The governance architecture that should exist alongside it has not been designed yet, let alone deployed.</p><p>What that architecture looks like is the question Vordan is here to work out. But its absence has a specific shape that is worth naming right now because understanding the shape of what is missing is the first step toward building it.</p><p>When an organization deploys an autonomous agent without accountability infrastructure it is not just missing a policy. It is missing six specific things simultaneously and each one compounds the others.</p><p>It is missing the record of where the decision came from. Who defined the agent&#8217;s criteria, when, under what authority, and against what standard. Not the vendor&#8217;s default settings. A deliberate organizational decision with a named owner and a documented rationale.</p><p>It is missing the input of the people closest to the risk before that decision was made. The practitioners who know what the agent will touch, what a false positive costs operationally, and what the downstream consequences of an automated block look like at three in the morning. Those people were almost certainly not in the room when the deployment scope was defined.</p><p>It is missing a trail that an outsider can follow. Logs that require an insider to interpret are not a trail. They are a liability dressed as documentation. The organizations that will fare best when the accountability question arrives are the ones that built their records for the party asking, not the party answering.</p><p>It is missing concurrent thinking. The accountability questions that feel urgent after an incident were answerable before deployment. They just were not asked. Not because the people involved were careless. Because the system they were operating inside gave them no structure for asking them at the right time.</p><p>It is missing a response architecture. When the agent does something unexpected, what happens next. Not in the vendor&#8217;s incident workflow. In the organization&#8217;s own process. With a human owner. With a timeline. With a record that demonstrates the correction actually happened.</p><p>And it is missing visibility for the practitioners working alongside these agents every day. The engineers and analysts who interact with the outputs of autonomous decisions and have no clear path to raise a concern, no confidence that the concern will reach someone with authority to act on it, and no understanding of the accountability structure they are operating inside.</p><p>None of those gaps exist because organizations are negligent. They exist because the industry built the response layer first and assumed the accountability layer would follow. It has not followed. It has not even started.</p><div><hr></div><p>The visibility layer is being built. The response layer is getting faster. The accountability structure underneath both of them is the work the industry has not started and that no product announcement this week replaced.</p><p>At 22 seconds, the agent acts before you can stop it. The question that follows it moves at a different speed entirely. It arrives weeks later, from a party with the authority to demand an answer, in language the agent was never designed to speak.</p><p>Nobody has built the infrastructure to answer that question at scale yet. That is not a vendor failure or a practitioner failure. It is the accountability gap doing what it always does. The tool arrived before the rule. The only difference this time is that the tool is making decisions faster than any human ever has, and the rule has never been further behind.</p><p>That is the gap this publication exists to close.</p><div><hr></div><p><em>Vordan publishes every Sunday. If someone in your network is the person in the room asking the accountability questions before the memo arrives, forward this to them.</em></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://vordan.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Vordan! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[The Tool Always Arrives Before the Rule]]></title><description><![CDATA[Why the accountability gap keeps widening, and what practitioners can actually do about it.]]></description><link>https://vordan.substack.com/p/the-tool-always-arrives-before-the</link><guid isPermaLink="false">https://vordan.substack.com/p/the-tool-always-arrives-before-the</guid><dc:creator><![CDATA[Dominick Costa]]></dc:creator><pubDate>Sun, 19 Apr 2026 14:07:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!oN-L!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66e58882-615e-467c-adf7-13aeae28d426_400x400.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>Why does this keep happening?</strong></p><p>You already know the answer. You&#8217;ve watched it happen enough times to have a name for the feeling, even if you don&#8217;t have a name for the pattern.</p><p>A new tool arrives. It moves fast. Someone in leadership approves it, or doesn&#8217;t disapprove it fast enough, which amounts to the same thing. Six months later you&#8217;re sitting in a meeting trying to explain a problem that was visible from the beginning to people who are only now willing to see it.</p><p>This is not bad luck. It is not a failure of individual judgment. It is a structural condition with a name: the accountability gap.</p><p>The tool always arrives before the rule.</p><p><strong>The AI governance problem you&#8217;re already inside</strong></p><p>Right now, somewhere in your organization, an AI tool is running in production with no governance framework attached to it. Not because nobody cared. Because the vendor moved faster than the policy team, and the policy team moved faster than the compliance framework, and the compliance framework was written for a world where AI was a research concept rather than a feature in your project management software.</p><p>According to IBM&#8217;s 2025 Cost of a Data Breach Report, 97 percent of surveyed organizations lacked controls governing internal AI use. 63 percent had no AI governance policy at all. These are not small organizations with limited resources. These are enterprises that have passed audits, satisfied regulators, and checked every box on their compliance checklist.</p><p>The checklist didn&#8217;t have a box for this. It rarely does.</p><p><strong>The problem you don&#8217;t know you have yet</strong></p><p>Here is something most practitioners are not tracking: your encryption is on a clock.</p><p>Quantum computers capable of breaking current asymmetric cryptography are not science fiction. NIST finalized its first post-quantum cryptographic standards in 2024. Gartner projects that by 2029, most conventional asymmetric cryptography will be unsafe to use. The migration window is known. The timeline is public. The work required is significant and cannot be done in a quarter.</p><p>Most organizations have not started.</p><p>Not because the threat isn&#8217;t real. Because it hasn&#8217;t triggered a compliance requirement yet. Because the rule hasn&#8217;t caught up with the capability. Because the institution is optimizing for what it has to do today, not what it needs to have done before the window closes.</p><p>This is the accountability gap in its most dangerous form. Not a breach that already happened. A breach that is being scheduled, years in advance, by inaction.</p><p><strong>Why the audit won&#8217;t save you</strong></p><p>Both of these problems share a common root. It is the same root that produces what practitioners call compliance theater: the gap between passing an audit and actually being secure.</p><p>An audit is a point-in-time snapshot. It measures whether your controls satisfied a framework written in the past for threats that existed at the time of writing. It says nothing about the AI tool your dev team started using last quarter. It says nothing about your post-quantum readiness. It says nothing about the governance gap that is widening right now, in real time, between what your technology stack can do and what your institutional structures are equipped to govern.</p><p>The organization that passes its SOC 2 and deploys AI tools without governance frameworks is not being reckless. It is being rational within a broken incentive structure. The audit rewards what it measures. It does not measure what it cannot see.</p><p>This is the pattern. Not a technology story. Not a compliance story. A timing story. About what happens in the gap between what a tool can do and what the rule says to do with it.</p><p><strong>What this means for practitioners</strong></p><p>You are operating inside this gap every day. The question is not whether the gap exists. The question is what you do while the institution catches up.</p><p>That is what Vordan is here to work out. Not from above the gap, not from the policy layer, not from the vendor layer. From inside it, where the decisions actually get made and the consequences actually land.</p><p>The tool always arrives before the rule. The practitioners who understand that pattern are the ones who stop being surprised by what happens next.</p><p>That is where we start.</p><div><hr></div><p><em>Vordan publishes weekly. If someone in your network is the person in the room who sees what&#8217;s coming before the memo arrives, forward this to them.</em></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://vordan.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Vordan! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>