<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Anton Minin Baranovskii</title>
    <description>The latest articles on Forem by Anton Minin Baranovskii (@antonmb).</description>
    <link>https://forem.com/antonmb</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3667847%2F353d882d-822e-4a24-9a4d-6e0f9812a760.png</url>
      <title>Forem: Anton Minin Baranovskii</title>
      <link>https://forem.com/antonmb</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/antonmb"/>
    <language>en</language>
    <item>
      <title>Writing in the Age of AI: A Personal Essay</title>
      <dc:creator>Anton Minin Baranovskii</dc:creator>
      <pubDate>Wed, 29 Apr 2026 16:42:36 +0000</pubDate>
      <link>https://forem.com/antonmb/writing-in-the-age-of-ai-a-personal-essay-49i0</link>
      <guid>https://forem.com/antonmb/writing-in-the-age-of-ai-a-personal-essay-49i0</guid>
      <description>&lt;h1&gt;
  
  
  Writing Means Researching
&lt;/h1&gt;

&lt;p&gt;For as long as I can remember, I have always wanted to write.&lt;/p&gt;

&lt;p&gt;Not just to put words into texts, but to share thoughts, reflect, analyze, and try to get to the essence of things. I have always been interested in not stopping at the first explanation, but going a little deeper. Looking at why something works exactly the way it does. Why people make certain decisions. Why some ideas seem obvious, while others only open up after a long inner journey.&lt;/p&gt;

&lt;p&gt;At some point, I realized something interesting for myself: getting to the essence in a final sense is probably impossible.&lt;/p&gt;

&lt;p&gt;At first, this does not sound very optimistic. As if you are moving toward some point, and then you realize that there will most likely be no final point. There is only movement and process. There are new questions, new connections, new doubts, and new levels of understanding.&lt;/p&gt;

&lt;p&gt;I felt very sharply how small my knowledge is against the background of the enormous world. How much exists around me. How many topics, systems, people, and fields I know too little about. Even in the competencies I have, there is always another level and another depth.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;I felt like a grain of sand in a huge world.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;But later, this feeling became alive and inspiring for me. There was a kind of honesty in it. If it is impossible to know everything, then you can continue researching. If it is impossible to put a final point, then the path itself becomes more important.&lt;/p&gt;

&lt;p&gt;After reading Nassim Taleb, this feeling became even clearer for me. His thoughts on uncertainty, randomness, the fragility of knowledge, and the limits of human forecasting helped me accept one simple thing more calmly: the world is much more complex than our explanations. We often want to see a clear system of causes and effects, but reality is wider. It contains a lot of the unknown, a lot of the random, and a lot of what cannot be calculated in advance.&lt;/p&gt;

&lt;p&gt;And this does not make research meaningless. On the contrary, for me it makes it even more interesting.&lt;/p&gt;

&lt;p&gt;Because then the answer is not the only thing that matters. The way of thinking matters. Honesty with yourself matters. The ability to doubt, check, return to your conclusions, and admit that you may have missed something matters.&lt;/p&gt;

&lt;p&gt;Over time, I realized that research is what I truly want to do. Yes, in some sense it is strange to search for the essence while understanding that there may be no final essence. But for me, this is exactly where the beauty is.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;The beauty is in the process.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;In the moment when scattered thoughts suddenly form a chain. When facts, observations, doubts, and personal experience connect, and you begin to see the structure. When something complex suddenly becomes simple. So simple and obvious that you get goosebumps.&lt;/p&gt;

&lt;p&gt;For me, this is one of the strongest feelings.&lt;/p&gt;

&lt;p&gt;Perhaps this is close to the state of flow described by Mihaly Csikszentmihalyi. When you are fully immersed in the process, lose the sense of outside noise, and remain alone with the thought, the task, and the movement forward.&lt;/p&gt;

&lt;h2&gt;
  
  
  Writing in the age of AI
&lt;/h2&gt;

&lt;p&gt;At the same time, for a long time I could not write the way I wanted to.&lt;/p&gt;

&lt;p&gt;I am not the most patient person. It is difficult for me to hold my attention on one text for a long time. I often switch between things. Thoughts come quickly, but turning them into a coherent article has always been difficult.&lt;/p&gt;

&lt;p&gt;And this is where the age of artificial intelligence changed a lot for me.&lt;/p&gt;

&lt;p&gt;Today, there is a tool that helps work with thought differently. For me, GPT has become more than a text assistant. It has become a conversation partner. An editor. An opponent. Sometimes a mirror in which I can see my own thought from the outside.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;I asked it myself to criticize me harshly.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Because at some point I realized: the goal is more important than the ego. If I really want to research a topic, I do not need confirmation that I am right. I need my thought to be tested. I need questions. I need objections. I need weak spots that I may not have noticed myself.&lt;/p&gt;

&lt;p&gt;AI helps me analyze, argue with myself, search for arguments, see gaps, and formulate thoughts more clearly. At the same time, it can also make mistakes. And this is an important part of the process.&lt;/p&gt;

&lt;p&gt;Every chat says that AI can make mistakes. And this is true. But AI is not the only one that can make mistakes. I can make mistakes too, especially when I start believing too quickly in the coherence of my own thought.&lt;/p&gt;

&lt;p&gt;That is why a conversation with AI does not replace thinking for me. Rather, it helps keep thinking in shape.&lt;/p&gt;

&lt;h2&gt;
  
  
  How my articles come into being
&lt;/h2&gt;

&lt;p&gt;You ask a question. You receive an answer. You do not agree immediately. You check. You doubt. You compare. You return to the original idea. Sometimes you realize that the thought was weak. Sometimes, on the contrary, you see that there is something important in it, it just has not yet been formulated precisely enough.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;This is how my articles gradually come into being.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;First, an inner thought appears. Often raw, emotional, and unformed. I dictate it as it is. Then I begin to discuss it. I receive criticism. I check facts. I clarify the idea. I remove what is unnecessary. Sometimes I completely change direction. Sometimes I realize that I need to dive deeper into the topic before writing further.&lt;/p&gt;

&lt;p&gt;Only after that does the text appear.&lt;/p&gt;

&lt;h2&gt;
  
  
  Writing as research
&lt;/h2&gt;

&lt;p&gt;For me, writing is increasingly becoming a form of research. To write an honest text, you need to walk the path inside the topic yourself. You need to face your own lack of knowledge. You need to let the thought mature. You need to be ready for the fact that a good comment or honest criticism can change your position.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;I write not because I have final answers.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;I write because I am interested in thinking out loud. I am interested in researching. I am interested in sharing how a thought appears, develops, and changes. I am interested in finding people who also care not only about the conclusion, but about the path toward it.&lt;/p&gt;

&lt;p&gt;Comments, feedback, and criticism truly matter to me. Because often it is precisely in conversation that the next step opens up. Sometimes one precise question helps you see more than several hours of thinking alone.&lt;/p&gt;

&lt;p&gt;Perhaps that is why I like writing so much.&lt;/p&gt;

&lt;p&gt;It is a way to stay in the process. A way to think more attentively. A way to share what feels important right now. And a way to keep searching, even while understanding that there may be no final point.&lt;/p&gt;

&lt;p&gt;Thank you for reading to the end.&lt;/p&gt;

</description>
      <category>ai</category>
      <category>personalessay</category>
      <category>criticalthinking</category>
      <category>writing</category>
    </item>
    <item>
      <title>I am currently open to new opportunities and collaboration</title>
      <dc:creator>Anton Minin Baranovskii</dc:creator>
      <pubDate>Tue, 28 Apr 2026 21:55:35 +0000</pubDate>
      <link>https://forem.com/antonmb/i-am-currently-open-to-new-opportunities-and-collaboration-576a</link>
      <guid>https://forem.com/antonmb/i-am-currently-open-to-new-opportunities-and-collaboration-576a</guid>
      <description>&lt;div class="ltag__link--embedded"&gt;
  &lt;div class="crayons-story "&gt;
  &lt;a href="https://dev.to/antonmb/open-to-work-and-collaboration-3l23" class="crayons-story__hidden-navigation-link"&gt;Open to Work and Collaboration&lt;/a&gt;


  &lt;div class="crayons-story__body crayons-story__body-full_post"&gt;
    &lt;div class="crayons-story__top"&gt;
      &lt;div class="crayons-story__meta"&gt;
        &lt;div class="crayons-story__author-pic"&gt;

          &lt;a href="/antonmb" class="crayons-avatar  crayons-avatar--l  "&gt;
            &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3667847%2F353d882d-822e-4a24-9a4d-6e0f9812a760.png" alt="antonmb profile" class="crayons-avatar__image" width="657" height="753"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
          &lt;div&gt;
            &lt;a href="/antonmb" class="crayons-story__secondary fw-medium m:hidden"&gt;
              Anton Minin Baranovskii
            &lt;/a&gt;
            &lt;div class="profile-preview-card relative mb-4 s:mb-0 fw-medium hidden m:inline-block"&gt;
              
                Anton Minin Baranovskii
                
              
              &lt;div id="story-author-preview-content-3559918" class="profile-preview-card__content crayons-dropdown branded-7 p-4 pt-0"&gt;
                &lt;div class="gap-4 grid"&gt;
                  &lt;div class="-mt-4"&gt;
                    &lt;a href="/antonmb" class="flex"&gt;
                      &lt;span class="crayons-avatar crayons-avatar--xl mr-2 shrink-0"&gt;
                        &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3667847%2F353d882d-822e-4a24-9a4d-6e0f9812a760.png" class="crayons-avatar__image" alt="" width="657" height="753"&gt;
                      &lt;/span&gt;
                      &lt;span class="crayons-link crayons-subtitle-2 mt-5"&gt;Anton Minin Baranovskii&lt;/span&gt;
                    &lt;/a&gt;
                  &lt;/div&gt;
                  &lt;div class="print-hidden"&gt;
                    
                      Follow
                    
                  &lt;/div&gt;
                  &lt;div class="author-preview-metadata-container"&gt;&lt;/div&gt;
                &lt;/div&gt;
              &lt;/div&gt;
            &lt;/div&gt;

          &lt;/div&gt;
          &lt;a href="https://dev.to/antonmb/open-to-work-and-collaboration-3l23" class="crayons-story__tertiary fs-xs"&gt;&lt;time&gt;Apr 28&lt;/time&gt;&lt;span class="time-ago-indicator-initial-placeholder"&gt;&lt;/span&gt;&lt;/a&gt;
        &lt;/div&gt;
      &lt;/div&gt;

    &lt;/div&gt;

    &lt;div class="crayons-story__indention"&gt;
      &lt;h2 class="crayons-story__title crayons-story__title-full_post"&gt;
        &lt;a href="https://dev.to/antonmb/open-to-work-and-collaboration-3l23" id="article-link-3559918"&gt;
          Open to Work and Collaboration
        &lt;/a&gt;
      &lt;/h2&gt;
        &lt;div class="crayons-story__tags"&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/career"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;career&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/webdev"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;webdev&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/softwareengineering"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;softwareengineering&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/programming"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;programming&lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="crayons-story__bottom"&gt;
        &lt;div class="crayons-story__details"&gt;
            &lt;a href="https://dev.to/antonmb/open-to-work-and-collaboration-3l23#comments" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left flex items-center"&gt;
              Comments


              &lt;span class="hidden s:inline"&gt;Add Comment&lt;/span&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div class="crayons-story__save"&gt;
          &lt;small class="crayons-story__tertiary fs-xs mr-2"&gt;
            1 min read
          &lt;/small&gt;
            
              &lt;span class="bm-initial"&gt;
                

              &lt;/span&gt;
              &lt;span class="bm-success"&gt;
                

              &lt;/span&gt;
            
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

&lt;/div&gt;


</description>
    </item>
    <item>
      <title>Open to Work and Collaboration</title>
      <dc:creator>Anton Minin Baranovskii</dc:creator>
      <pubDate>Tue, 28 Apr 2026 03:10:37 +0000</pubDate>
      <link>https://forem.com/antonmb/open-to-work-and-collaboration-3l23</link>
      <guid>https://forem.com/antonmb/open-to-work-and-collaboration-3l23</guid>
      <description>&lt;p&gt;Over the past years, I worked at Yandex and Sber, contributing to large scale production systems used by millions.&lt;/p&gt;

&lt;p&gt;More recently, I independently built Toqen.app, an authentication infrastructure project developed from the ground up, including:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;System architecture&lt;/li&gt;
&lt;li&gt;Backend&lt;/li&gt;
&lt;li&gt;Frontend&lt;/li&gt;
&lt;li&gt;Mobile applications&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This project became strong proof of my ability to build complex products from zero, learn new domains quickly, and deliver technically challenging systems independently.&lt;/p&gt;

&lt;p&gt;I am currently open to new opportunities and considering:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Full time roles&lt;/li&gt;
&lt;li&gt;Contract work&lt;/li&gt;
&lt;li&gt;Project based collaboration&lt;/li&gt;
&lt;li&gt;Early stage startup opportunities&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;My strongest areas include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Frontend and Full Stack Engineering&lt;/li&gt;
&lt;li&gt;System Architecture and Technical Leadership&lt;/li&gt;
&lt;li&gt;Complex Product and Platform Development&lt;/li&gt;
&lt;li&gt;Building Products at Any Stage, from MVP to Mature Systems&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you are building something and need an experienced engineer, I would be glad to connect.&lt;/p&gt;

&lt;p&gt;CV / Portfolio: &lt;a href="https://www.antonmb.com" rel="noopener noreferrer"&gt;https://www.antonmb.com&lt;/a&gt;&lt;/p&gt;

</description>
      <category>career</category>
      <category>webdev</category>
      <category>softwareengineering</category>
      <category>programming</category>
    </item>
    <item>
      <title>OpenAI’s Superintelligence Vision and the Need for Access First Infrastructure</title>
      <dc:creator>Anton Minin Baranovskii</dc:creator>
      <pubDate>Mon, 27 Apr 2026 19:50:33 +0000</pubDate>
      <link>https://forem.com/antonmb/openais-superintelligence-vision-and-the-need-for-access-first-infrastructure-54oh</link>
      <guid>https://forem.com/antonmb/openais-superintelligence-vision-and-the-need-for-access-first-infrastructure-54oh</guid>
      <description>&lt;p&gt;OpenAI recently published its view on preparing society and institutions for the transition toward superintelligence. In the technical part of that discussion, several themes stand out clearly: AI trust stack, control of agent actions, verifiable operations, post deployment safety, auditability, accountability, and governance for agentic systems.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://openai.com/ru-RU/index/industrial-policy-for-the-intelligence-age/" rel="noopener noreferrer"&gt;OpenAI: Industrial Policy for the Intelligence Age&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;These themes point to an architectural problem that will become increasingly important as AI systems move from answering questions to performing actions.&lt;/p&gt;

&lt;p&gt;When AI systems become agents, the security question changes.&lt;/p&gt;

&lt;p&gt;It is no longer enough to ask only who initiated a process. Systems also need to know what action is being requested, under which conditions, for how long, with which limits, and how this action can be verified later.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;This is where access control becomes a primary architectural layer.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  From authentication events to action level control
&lt;/h2&gt;

&lt;p&gt;Traditional authentication systems are usually designed around a subject: a user, an account, an organization, a device, or a service identity.&lt;/p&gt;

&lt;p&gt;That model remains important.&lt;/p&gt;

&lt;p&gt;However, agentic systems introduce a second layer of complexity. A human, an AI agent, a robot, a service, or another automated process may request access to perform a specific operation in a specific context.&lt;/p&gt;

&lt;p&gt;In this environment, the most important security object is often the action itself.&lt;/p&gt;

&lt;p&gt;For example:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;An agent wants to call an API.&lt;/li&gt;
&lt;li&gt;A robot wants to execute a physical operation.&lt;/li&gt;
&lt;li&gt;A system wants to delegate a task to another system.&lt;/li&gt;
&lt;li&gt;A human wants to authorize an AI agent to act within defined limits.&lt;/li&gt;
&lt;li&gt;A workflow needs temporary access to data, tools, or infrastructure.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Each of these cases requires more than a static permission. It requires a controlled access event with a clear scope, lifetime, verification mechanism, and audit trail.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why this matters for AI trust stack
&lt;/h2&gt;

&lt;p&gt;OpenAI’s AI trust stack direction describes the need for systems that help people trust and verify AI systems, the content they produce, and the actions they take. This includes verifiable signatures, provenance, privacy preserving logs, investigation mechanisms, delegation, monitoring, and escalation.&lt;/p&gt;

&lt;p&gt;These are access layer problems.&lt;/p&gt;

&lt;p&gt;A practical trust stack for agentic systems needs to answer several questions at runtime:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Who or what requested the action?&lt;/li&gt;
&lt;li&gt;Which entity was allowed to perform it?&lt;/li&gt;
&lt;li&gt;Was the authorization valid at execution time?&lt;/li&gt;
&lt;li&gt;Was the action inside the allowed scope?&lt;/li&gt;
&lt;li&gt;Can the event be verified later?&lt;/li&gt;
&lt;li&gt;Can access be limited, expired, or revoked?&lt;/li&gt;
&lt;li&gt;Can this be done with minimal data collection?&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;This is the space where access first infrastructure becomes relevant.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  Access first as an architectural model
&lt;/h2&gt;

&lt;p&gt;The access first model treats access as a first class object.&lt;/p&gt;

&lt;p&gt;In this model, an authorization event can be represented as a cryptographically verifiable object with defined parameters:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;entity identifier&lt;/li&gt;
&lt;li&gt;requested action&lt;/li&gt;
&lt;li&gt;scope&lt;/li&gt;
&lt;li&gt;context&lt;/li&gt;
&lt;li&gt;expiration&lt;/li&gt;
&lt;li&gt;usage limits&lt;/li&gt;
&lt;li&gt;signature&lt;/li&gt;
&lt;li&gt;audit metadata&lt;/li&gt;
&lt;li&gt;revocation status&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The system does not need to turn every interaction into a broad identity profile. It can focus on the specific right to perform a specific operation under specific conditions.&lt;/p&gt;

&lt;p&gt;This is especially important for AI agents and robotic systems, where the core question is practical and operational:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;What is this entity allowed to do right now?&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  Where Toqen.app fits
&lt;/h2&gt;

&lt;p&gt;Toqen.app is being developed as access first authentication infrastructure.&lt;/p&gt;

&lt;p&gt;The current core is focused on issuing and controlling access. The same direction can be extended toward agentic systems, where access events become the main control unit for interactions between humans, agents, services, and automated systems.&lt;/p&gt;

&lt;p&gt;The relevant parts of the Toqen approach are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Access is treated as a separate verifiable event.&lt;/li&gt;
&lt;li&gt;Access can be bound to an entity, such as a human, agent, system, service, or robot, through a key based model.&lt;/li&gt;
&lt;li&gt;An operation can be confirmed, limited, expired, or revoked at execution time.&lt;/li&gt;
&lt;li&gt;Audit data can be minimal and focused on verifiable events.&lt;/li&gt;
&lt;li&gt;The model can support human to agent and agent to agent interactions.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This does not require replacing existing identity systems. It can work as an additional access layer for action level authorization.&lt;/p&gt;

&lt;h2&gt;
  
  
  Distributed agents and blockchain based coordination
&lt;/h2&gt;

&lt;p&gt;Some agentic systems will operate across independent participants.&lt;/p&gt;

&lt;p&gt;This is especially relevant for industrial automation, robotics, logistics, manufacturing, and multi organization AI workflows. In such environments, multiple systems may need to agree on access events without relying on a single internal database controlled by one party.&lt;/p&gt;

&lt;p&gt;A blockchain or distributed ledger layer can be useful in specific cases as a synchronization and immutability mechanism for access events.&lt;/p&gt;

&lt;p&gt;In this model:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Toqen manages access issuance and action level control.&lt;/li&gt;
&lt;li&gt;A distributed ledger records selected access events, state changes, or revocation signals.&lt;/li&gt;
&lt;li&gt;Independent participants can verify the state of permissions.&lt;/li&gt;
&lt;li&gt;The system can preserve a shared record without exposing unnecessary private data.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is not required for every scenario. For many applications, a conventional audit log is enough. But in distributed industrial and multi party environments, blockchain can provide a useful coordination layer.&lt;/p&gt;

&lt;h2&gt;
  
  
  The practical direction
&lt;/h2&gt;

&lt;p&gt;The practical engineering direction is clear:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AI agents need controlled access to tools, data, APIs, and physical systems.&lt;/li&gt;
&lt;li&gt;Those permissions need to be scoped, temporary, verifiable, and revocable.&lt;/li&gt;
&lt;li&gt;Critical operations need runtime control.&lt;/li&gt;
&lt;li&gt;Post deployment safety requires action level visibility.&lt;/li&gt;
&lt;li&gt;Audit and accountability require verifiable chains of events.&lt;/li&gt;
&lt;li&gt;Access first infrastructure is one possible way to build this layer.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The main shift is simple:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;As AI systems become more autonomous, access control must move closer to the action itself.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;OpenAI’s discussion of superintelligence highlights a broader infrastructure need: systems that can verify, limit, monitor, and audit the actions of AI agents after deployment.&lt;/p&gt;

&lt;p&gt;This is a concrete engineering problem.&lt;/p&gt;

&lt;p&gt;Access first infrastructure addresses that problem by treating access as a controllable, verifiable, time bound, and action level object.&lt;/p&gt;

&lt;p&gt;For AI agents, robotic systems, and distributed workflows, this model can become an important part of the future AI trust stack.&lt;/p&gt;

&lt;p&gt;Toqen.app is being built in this direction: access first authentication infrastructure for systems where secure, real time authorization becomes a core part of the architecture.&lt;/p&gt;

&lt;h2&gt;
  
  
  Sources
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://openai.com/ru-RU/index/industrial-policy-for-the-intelligence-age/" rel="noopener noreferrer"&gt;OpenAI: Industrial Policy for the Intelligence Age&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://openai.com/index/accelerating-the-next-phase-ai/" rel="noopener noreferrer"&gt;OpenAI: Accelerating the Next Phase of AI&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>ai</category>
      <category>authentication</category>
      <category>cybersecurity</category>
      <category>agents</category>
    </item>
    <item>
      <title>The Age of Trust, Part 2: The Global Network</title>
      <dc:creator>Anton Minin Baranovskii</dc:creator>
      <pubDate>Mon, 27 Apr 2026 18:01:43 +0000</pubDate>
      <link>https://forem.com/antonmb/the-age-of-trust-part-2-the-global-network-27o6</link>
      <guid>https://forem.com/antonmb/the-age-of-trust-part-2-the-global-network-27o6</guid>
      <description>&lt;p&gt;In the first part, I wrote about a simple shift: in the AI era, knowledge is no longer the main scarce resource.&lt;/p&gt;

&lt;p&gt;When information becomes available almost instantly, the real value moves toward problem solving, judgment, responsibility, and trust.&lt;/p&gt;

&lt;p&gt;This second part is about a broader idea I have been thinking about: a global trusted-contact network for finding people, specialists, and companies through real trust paths.&lt;/p&gt;

&lt;p&gt;Not just who is visible online, but who can actually be trusted in a specific context.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Problem with Finding People Today
&lt;/h2&gt;

&lt;p&gt;Finding the right person has become easier on the surface and harder in practice.&lt;/p&gt;

&lt;p&gt;We have search engines, professional networks, social platforms, marketplaces, communities, chats, and recommendation feeds. It seems like everyone is reachable.&lt;/p&gt;

&lt;p&gt;But when the decision really matters, visibility is not enough.&lt;/p&gt;

&lt;p&gt;Who can be trusted as a specialist?&lt;/p&gt;

&lt;p&gt;Who is reliable as a partner?&lt;/p&gt;

&lt;p&gt;Who can be safely introduced to someone?&lt;/p&gt;

&lt;p&gt;Who has real experience in a specific context?&lt;/p&gt;

&lt;p&gt;Who should receive access, attention, money, or responsibility?&lt;/p&gt;

&lt;p&gt;These questions are rarely answered by public profiles alone.&lt;/p&gt;

&lt;h2&gt;
  
  
  Public Signals Are Not Enough
&lt;/h2&gt;

&lt;p&gt;The internet mostly evaluates people through public signals.&lt;/p&gt;

&lt;p&gt;Followers.&lt;/p&gt;

&lt;p&gt;Likes.&lt;/p&gt;

&lt;p&gt;Reviews.&lt;/p&gt;

&lt;p&gt;Ratings.&lt;/p&gt;

&lt;p&gt;Badges.&lt;/p&gt;

&lt;p&gt;Comments.&lt;/p&gt;

&lt;p&gt;Public recommendations.&lt;/p&gt;

&lt;p&gt;These signals can be useful, but they are too shallow for many important decisions.&lt;/p&gt;

&lt;p&gt;Reviews can be manipulated. Ratings often miss context. Social profiles show packaging more than real interaction history. Public recommendations may reflect politeness, marketing, or social pressure.&lt;/p&gt;

&lt;p&gt;Real trust usually lives somewhere else.&lt;/p&gt;

&lt;p&gt;In private conversations, personal networks, previous work, shared experience, and quiet recommendations.&lt;/p&gt;

&lt;h2&gt;
  
  
  Real Recommendations Are Fragmented
&lt;/h2&gt;

&lt;p&gt;The strongest recommendations are often not public.&lt;/p&gt;

&lt;p&gt;They are scattered across private chats, calls, introductions, small communities, old projects, and personal memory.&lt;/p&gt;

&lt;p&gt;When someone needs a reliable specialist, investor, founder, lawyer, designer, developer, consultant, or local contact, the process usually starts with a simple message.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Do you know someone reliable for this?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This works, but it works slowly, randomly, and only inside the networks that are immediately visible to us.&lt;/p&gt;

&lt;p&gt;A lot of valuable trust already exists. It is just not structured.&lt;/p&gt;

&lt;h2&gt;
  
  
  A Global Trusted-Contact Network
&lt;/h2&gt;

&lt;p&gt;The idea is a global trusted-contact network for finding people, specialists, and companies through private trust paths.&lt;/p&gt;

&lt;p&gt;A person could add a rough location, areas of expertise, short profile information, and the kinds of contexts where they are open to interaction.&lt;/p&gt;

&lt;p&gt;Other people could create or remove private trust connections with that person in specific contexts.&lt;/p&gt;

&lt;p&gt;I trust this person as a frontend engineer.&lt;/p&gt;

&lt;p&gt;I can recommend this person as a designer.&lt;/p&gt;

&lt;p&gt;I know this person as a reliable local contact.&lt;/p&gt;

&lt;p&gt;I can confirm this person’s experience with fundraising.&lt;/p&gt;

&lt;p&gt;I would route a security-related request through this person.&lt;/p&gt;

&lt;p&gt;The result is not a public popularity score. It is a private network of contextual trust.&lt;/p&gt;

&lt;h2&gt;
  
  
  Private Trust Paths
&lt;/h2&gt;

&lt;p&gt;The most important part of this idea is not the profile. It is the path.&lt;/p&gt;

&lt;p&gt;When someone needs to reach a specialist, partner, investor, company, or local contact, the system would not only show public search results. It would help route the request through a private chain of trusted people.&lt;/p&gt;

&lt;p&gt;The full chain would not be exposed.&lt;/p&gt;

&lt;p&gt;Each person in the path can approve the request.&lt;/p&gt;

&lt;p&gt;Each person can stop the request.&lt;/p&gt;

&lt;p&gt;The requester does not see the full chain.&lt;/p&gt;

&lt;p&gt;If the request stops, the requester does not see where it stopped.&lt;/p&gt;

&lt;p&gt;The target person receives only the request that passed through the trusted path.&lt;/p&gt;

&lt;p&gt;This keeps the process human, private, and respectful.&lt;/p&gt;

&lt;h2&gt;
  
  
  A Simple Example
&lt;/h2&gt;

&lt;p&gt;Imagine I need a reliable tax specialist in another country.&lt;/p&gt;

&lt;p&gt;I can search online and find dozens of profiles. Some have reviews. Some have polished websites. Some have strong public content.&lt;/p&gt;

&lt;p&gt;But the real question is different.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Who can confirm that this person is reliable for my specific situation?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In a trusted-contact network, I could see that there is a private trust path to a specialist.&lt;/p&gt;

&lt;p&gt;Maybe I do not know the specialist directly. But someone I trust knows someone who worked with them. The system can route the request step by step without revealing the entire network.&lt;/p&gt;

&lt;p&gt;If people along the path approve the request, the contact can happen. If someone decides it is not appropriate, the request simply stops.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why the Network Must Be Private
&lt;/h2&gt;

&lt;p&gt;A trust network becomes dangerous if it turns into a public map of personal relationships.&lt;/p&gt;

&lt;p&gt;Public relationship graphs can create pressure, manipulation, unwanted exposure, social debt, and uncomfortable expectations.&lt;/p&gt;

&lt;p&gt;That is why privacy is not an extra feature. It is part of the core design.&lt;/p&gt;

&lt;p&gt;The full chain should not be visible.&lt;/p&gt;

&lt;p&gt;Private connections should remain private.&lt;/p&gt;

&lt;p&gt;People should be able to stop requests quietly.&lt;/p&gt;

&lt;p&gt;Rejections should not become public signals.&lt;/p&gt;

&lt;p&gt;The system should reveal only what is needed for the next step.&lt;/p&gt;

&lt;p&gt;The goal is to make discovery more honest and safer, not more socially aggressive.&lt;/p&gt;

&lt;h2&gt;
  
  
  Controlled Disclosure
&lt;/h2&gt;

&lt;p&gt;The network should work through controlled disclosure.&lt;/p&gt;

&lt;p&gt;A person should not need to reveal their full network, full history, full identity, or every reason behind a decision.&lt;/p&gt;

&lt;p&gt;The system should provide only the minimum necessary signal for a specific action.&lt;/p&gt;

&lt;p&gt;There is a trusted path.&lt;/p&gt;

&lt;p&gt;The request can be passed forward.&lt;/p&gt;

&lt;p&gt;The context is relevant.&lt;/p&gt;

&lt;p&gt;The person is reachable through trusted connections.&lt;/p&gt;

&lt;p&gt;The request was accepted or stopped.&lt;/p&gt;

&lt;p&gt;This is the same principle that I see as important in access systems: disclose only what is necessary for the action being performed.&lt;/p&gt;

&lt;h2&gt;
  
  
  This Is Not a Rating System
&lt;/h2&gt;

&lt;p&gt;A global trusted-contact network should not reduce people to universal scores.&lt;/p&gt;

&lt;p&gt;Trust is too contextual for that.&lt;/p&gt;

&lt;p&gt;Someone may be excellent in one role and unsuitable for another. Reliable in one context and unknown in another. Strong in one country, industry, or type of work, and still unverified elsewhere.&lt;/p&gt;

&lt;p&gt;The system should not answer the question “Is this person good?”&lt;/p&gt;

&lt;p&gt;It should help answer: who can confirm this person for this specific request?&lt;/p&gt;

&lt;h2&gt;
  
  
  Where This Could Be Useful
&lt;/h2&gt;

&lt;p&gt;This kind of network could be useful in many areas where trust matters more than visibility.&lt;/p&gt;

&lt;p&gt;Hiring specialists.&lt;/p&gt;

&lt;p&gt;Finding contractors.&lt;/p&gt;

&lt;p&gt;International relocation.&lt;/p&gt;

&lt;p&gt;Local services.&lt;/p&gt;

&lt;p&gt;Investment and fundraising.&lt;/p&gt;

&lt;p&gt;B2B partnerships.&lt;/p&gt;

&lt;p&gt;Legal, tax, and financial introductions.&lt;/p&gt;

&lt;p&gt;Professional communities.&lt;/p&gt;

&lt;p&gt;Founder and investor discovery.&lt;/p&gt;

&lt;p&gt;Private clubs and expert groups.&lt;/p&gt;

&lt;p&gt;Human-to-agent and agent-to-agent access flows.&lt;/p&gt;

&lt;p&gt;In each of these areas, the problem is not only finding someone. The harder problem is understanding whether interaction is appropriate and safe.&lt;/p&gt;

&lt;h2&gt;
  
  
  How This Connects to Toqen.app
&lt;/h2&gt;

&lt;p&gt;I am building Toqen.app as access-first authentication infrastructure designed for secure, real-time authorization.&lt;/p&gt;

&lt;p&gt;Toqen.app solves a specific access problem: how to authorize a person quickly, securely, and with the minimum necessary amount of data.&lt;/p&gt;

&lt;p&gt;A user opens a website, scans a QR code in the mobile app, confirms the request, and the service receives a verifiable authorization event.&lt;/p&gt;

&lt;p&gt;The trusted-contact network is a broader idea, but it follows a similar principle.&lt;/p&gt;

&lt;p&gt;For a specific action, the system should ask for and reveal only what is truly necessary.&lt;/p&gt;

&lt;p&gt;Access and trust are different problems, but they are connected by the same direction: more precise digital interactions with less unnecessary exposure.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Global Network
&lt;/h2&gt;

&lt;p&gt;The global network I imagine is not a public social graph and not a popularity contest.&lt;/p&gt;

&lt;p&gt;It is a private infrastructure layer for routing trust: from one person to another, from one company to another, from one context to another.&lt;/p&gt;

&lt;p&gt;The internet has already made people searchable.&lt;/p&gt;

&lt;p&gt;The next step is making trusted interaction easier, safer, and more precise.&lt;/p&gt;

&lt;p&gt;That is the direction I see behind The Age of Trust.&lt;/p&gt;

</description>
      <category>ai</category>
      <category>innovation</category>
      <category>cybersecurity</category>
      <category>webdev</category>
    </item>
    <item>
      <title>Why access-first auth matters?</title>
      <dc:creator>Anton Minin Baranovskii</dc:creator>
      <pubDate>Fri, 24 Apr 2026 11:01:05 +0000</pubDate>
      <link>https://forem.com/antonmb/why-access-first-auth-matters-pm5</link>
      <guid>https://forem.com/antonmb/why-access-first-auth-matters-pm5</guid>
      <description>&lt;p&gt;In this article, I briefly explain why Toqen.app is built around an access-first authentication infrastructure.&lt;/p&gt;

&lt;h2&gt;
  
  
  1. Where fast access matters
&lt;/h2&gt;

&lt;p&gt;There are scenarios where filling out forms gets in the way:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;one-time website visits
&lt;/li&gt;
&lt;li&gt;Smart TVs
&lt;/li&gt;
&lt;li&gt;events and webinars
&lt;/li&gt;
&lt;li&gt;admin panels and systems where ownership must be confirmed frequently
&lt;/li&gt;
&lt;li&gt;systems where services, agents, or bots interact with each other
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In these cases, email and passwords slow things down and increase risk.&lt;/p&gt;

&lt;p&gt;Toqen.app provides access instantly through confirmation, without entering unnecessary data.&lt;/p&gt;

&lt;h2&gt;
  
  
  2. Access without unnecessary data
&lt;/h2&gt;

&lt;p&gt;Instead of creating and managing accounts:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;open the website
&lt;/li&gt;
&lt;li&gt;scan a QR code
&lt;/li&gt;
&lt;li&gt;confirm access
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Access is confirmed at the moment of request, not stored in advance.&lt;/p&gt;

&lt;p&gt;It does not matter where you are or what device you use everything happens in just a few steps.&lt;/p&gt;

&lt;h2&gt;
  
  
  3. Access control at the moment of use
&lt;/h2&gt;

&lt;p&gt;With Toqen.app, every access can be:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;confirmed
&lt;/li&gt;
&lt;li&gt;restricted
&lt;/li&gt;
&lt;li&gt;revoked
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This gives control not only at login, but during actual usage.&lt;/p&gt;

&lt;h2&gt;
  
  
  4. Simple and predictable security
&lt;/h2&gt;

&lt;p&gt;Most authentication issues come from human error:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;forgotten passwords
&lt;/li&gt;
&lt;li&gt;password reuse
&lt;/li&gt;
&lt;li&gt;phishing
&lt;/li&gt;
&lt;li&gt;input mistakes
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;With Toqen.app:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;no passwords to enter
&lt;/li&gt;
&lt;li&gt;no unnecessary steps
&lt;/li&gt;
&lt;li&gt;every access is confirmed on your device
&lt;/li&gt;
&lt;li&gt;device-bound cryptographic keys are used
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This reduces mistakes and makes the process predictable.&lt;/p&gt;

&lt;p&gt;Even in stressful situations, there is only one action confirm access.&lt;/p&gt;

&lt;p&gt;It follows modern approaches similar to WebAuth, with a more straightforward user experience.&lt;/p&gt;

&lt;h2&gt;
  
  
  5. Less data, lower risk
&lt;/h2&gt;

&lt;p&gt;Traditional systems store:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;emails
&lt;/li&gt;
&lt;li&gt;passwords
&lt;/li&gt;
&lt;li&gt;tokens
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;With Toqen.app:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;only data required for access is used
&lt;/li&gt;
&lt;li&gt;no unnecessary personal information is stored
&lt;/li&gt;
&lt;li&gt;each access request is single-use
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This reduces the impact of mistakes and data leaks.&lt;/p&gt;

&lt;h2&gt;
  
  
  6. Simple and fast integration
&lt;/h2&gt;

&lt;p&gt;For developers, speed of integration matters as much as security.&lt;/p&gt;

&lt;p&gt;Toqen.app:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;does not require complex setup
&lt;/li&gt;
&lt;li&gt;does not require identity-centric user profiles
&lt;/li&gt;
&lt;li&gt;allows collecting data required by business logic
&lt;/li&gt;
&lt;li&gt;integrates as an access layer on top of existing systems
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This makes it possible to introduce secure access without redesigning the architecture.&lt;/p&gt;

&lt;h2&gt;
  
  
  Summary
&lt;/h2&gt;

&lt;p&gt;Toqen.app is an approach where:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;access is confirmed in real time
&lt;/li&gt;
&lt;li&gt;unnecessary data is not required
&lt;/li&gt;
&lt;li&gt;users stay in control
&lt;/li&gt;
&lt;li&gt;the system remains simple and clear
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You do not remember access you confirm it when you need it.&lt;/p&gt;

&lt;h2&gt;
  
  
  P.S.
&lt;/h2&gt;

&lt;p&gt;The app is available on the App Store. Closed testing on Google Play is ongoing message me if you want to try it.&lt;/p&gt;

&lt;p&gt;The client app is open source, so you can review how access confirmation works and what data is actually used: &lt;a href="https://github.com/toqenapp/mobile-react-native" rel="noopener noreferrer"&gt;https://github.com/toqenapp/mobile-react-native&lt;/a&gt;&lt;/p&gt;

</description>
      <category>opensource</category>
      <category>authentication</category>
      <category>cybersecurity</category>
      <category>architecture</category>
    </item>
    <item>
      <title>Forgot your password again? QR Man is here to help.</title>
      <dc:creator>Anton Minin Baranovskii</dc:creator>
      <pubDate>Wed, 22 Apr 2026 13:14:31 +0000</pubDate>
      <link>https://forem.com/antonmb/forgot-your-password-again-qr-man-is-here-to-help-3pbi</link>
      <guid>https://forem.com/antonmb/forgot-your-password-again-qr-man-is-here-to-help-3pbi</guid>
      <description>&lt;p&gt;&lt;strong&gt;Friend:&lt;/strong&gt; "So, what’s this Toqen.app thing anyway? Just another password manager? I have everything saved in my browser, I’m good."&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Me:&lt;/strong&gt; "That’s the thing - it’s not. Browsers remember your passwords. Toqen.app makes them unnecessary."&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Friend:&lt;/strong&gt; "What do you mean 'unnecessary'? How am I supposed to log in? Magic?"&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Me:&lt;/strong&gt; "Think of it this way: a standard login is like a door with a cheap lock. Anyone with a copy of the key-your password-can walk right in. Toqen.app turns your smartphone into a universal digital key. You don’t have to type anything. You just walk up to the 'door' (open the website), scan a QR code, and your phone tells the site: 'Everything’s good, this is the owner, let him in.'"&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Friend:&lt;/strong&gt; "Wait, so I don’t have to remember anything? That sounds like a security nightmare. Okay, what if I’m sitting in a cafe and someone else tries to log in using my name from the other side of the world?"&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Me:&lt;/strong&gt; "That’s the main 'wow' effect. An attacker gets nowhere because there are no reusable credentials on the server. Unlike a password, which can be stolen and used again, the server only holds your public key. To log in, your phone creates a unique device signature for that specific moment. The server only verifies the signature - it never sees or stores your actual 'secret.' Even if someone intercepted the data, they couldn't use it to log in later. Your 'master key' stays physically on your phone and nowhere else."&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Friend:&lt;/strong&gt; "Right, but what if I lose my phone? Or worse, what if it gets stolen?"&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Me:&lt;/strong&gt; "That’s the key part. It’s like the keys to a modern car: no one else can even start the 'engine' without your specific biometrics. If you lose it, you restore access via a backup. It’s stored in an encrypted format that is mathematically impractical to crack without your master key. Meanwhile, your lost device remains useless to an intruder because it's protected by multiple layers of hardware-level security."&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Friend:&lt;/strong&gt; "So... it’s basically like FaceID for the entire internet?"&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Me:&lt;/strong&gt; "Exactly. It makes your digital life seamless. You move through websites like you’re walking through your own home, where all the doors open automatically as you approach. No stress, just access."&lt;/p&gt;

</description>
      <category>security</category>
      <category>passwordless</category>
      <category>authentication</category>
      <category>webdev</category>
    </item>
    <item>
      <title>Toqen.app Mobile is Now Open Source</title>
      <dc:creator>Anton Minin Baranovskii</dc:creator>
      <pubDate>Wed, 22 Apr 2026 03:29:35 +0000</pubDate>
      <link>https://forem.com/antonmb/toqenapp-mobile-is-now-open-source-4o78</link>
      <guid>https://forem.com/antonmb/toqenapp-mobile-is-now-open-source-4o78</guid>
      <description>&lt;p&gt;I have made the Toqen.app mobile application publicly available.&lt;/p&gt;

&lt;p&gt;This is a deliberate decision to move toward transparency and independent technical review.&lt;/p&gt;

&lt;p&gt;The mobile client is the part of the system that users directly interact with during authorization.&lt;br&gt;&lt;br&gt;
It is now open for inspection so anyone can verify how access is processed on the device.&lt;/p&gt;




&lt;h2&gt;
  
  
  What is Toqen
&lt;/h2&gt;

&lt;p&gt;Toqen is an access-first authentication infrastructure designed for secure, real-time authorization.&lt;/p&gt;

&lt;p&gt;Each access request is:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;created in real time
&lt;/li&gt;
&lt;li&gt;explicitly approved by the user
&lt;/li&gt;
&lt;li&gt;cryptographically signed by the device
&lt;/li&gt;
&lt;li&gt;verified by the backend
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The mobile app acts as a secure execution layer for these decisions.&lt;/p&gt;




&lt;h2&gt;
  
  
  What the open source mobile app actually does
&lt;/h2&gt;

&lt;p&gt;The mobile client has a very narrow and well-defined responsibility:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;scan or receive an access request
&lt;/li&gt;
&lt;li&gt;fetch request context from the backend
&lt;/li&gt;
&lt;li&gt;show the user what is being requested
&lt;/li&gt;
&lt;li&gt;collect explicit approval or denial
&lt;/li&gt;
&lt;li&gt;sign a short-lived challenge using a device key
&lt;/li&gt;
&lt;li&gt;send the signed result back for verification
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The app does not grant access on its own.&lt;br&gt;&lt;br&gt;
All final decisions are verified by the server.&lt;/p&gt;




&lt;h2&gt;
  
  
  What data the app collects
&lt;/h2&gt;

&lt;p&gt;This is the key point.&lt;/p&gt;

&lt;p&gt;You can verify it directly in the code.&lt;/p&gt;

&lt;p&gt;The mobile app stores only what is strictly required to perform cryptographic authorization:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;device_private_key&lt;/code&gt; (generated on device, never leaves it)
&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;device_id&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;app_instance_id&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;That is the full set of stored sensitive data.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;There is no storage of:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;passwords
&lt;/li&gt;
&lt;li&gt;session tokens
&lt;/li&gt;
&lt;li&gt;refresh tokens
&lt;/li&gt;
&lt;li&gt;reusable credentials
&lt;/li&gt;
&lt;li&gt;backend secrets
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Sensitive data is stored using OS-level secure storage (Keychain / Keystore).&lt;/p&gt;




&lt;h2&gt;
  
  
  What is NOT inside the system
&lt;/h2&gt;

&lt;p&gt;Toqen is built around strict data minimization.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;QR codes do not contain secrets
&lt;/li&gt;
&lt;li&gt;authorization requests are short-lived
&lt;/li&gt;
&lt;li&gt;requests are single-use
&lt;/li&gt;
&lt;li&gt;no reusable tokens exist in the flow
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Even if a QR code is intercepted, it cannot be used to gain access.&lt;/p&gt;

&lt;p&gt;Authorization always requires:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;user confirmation
&lt;/li&gt;
&lt;li&gt;device signature
&lt;/li&gt;
&lt;li&gt;backend verification
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  How authorization actually works
&lt;/h2&gt;

&lt;p&gt;All flows follow the same pattern:&lt;br&gt;
request → context → user decision → signature → verification → result&lt;/p&gt;

&lt;p&gt;This guarantees:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;no silent approvals
&lt;/li&gt;
&lt;li&gt;no implicit trust
&lt;/li&gt;
&lt;li&gt;no background authorization
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Every access is intentional and verifiable.&lt;/p&gt;




&lt;h2&gt;
  
  
  Security model (short version)
&lt;/h2&gt;

&lt;p&gt;The system assumes a hostile environment:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;network is untrusted
&lt;/li&gt;
&lt;li&gt;QR codes can be intercepted
&lt;/li&gt;
&lt;li&gt;requests can be replayed
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Security is achieved through:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;device-bound cryptographic keys
&lt;/li&gt;
&lt;li&gt;challenge-response authorization
&lt;/li&gt;
&lt;li&gt;short-lived requests
&lt;/li&gt;
&lt;li&gt;server-side verification
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Private keys never leave the device.&lt;br&gt;&lt;br&gt;
The backend never has access to them.&lt;/p&gt;




&lt;h2&gt;
  
  
  Why only the mobile app is open
&lt;/h2&gt;

&lt;p&gt;The mobile client is the most critical part to verify from a trust perspective.&lt;/p&gt;

&lt;p&gt;By open-sourcing it, I allow:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;independent security review
&lt;/li&gt;
&lt;li&gt;verification of data handling
&lt;/li&gt;
&lt;li&gt;inspection of cryptographic flows
&lt;/li&gt;
&lt;li&gt;validation of what is and is not collected
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The backend remains closed, but its behavior is fully defined through:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;API contracts
&lt;/li&gt;
&lt;li&gt;documented flows
&lt;/li&gt;
&lt;li&gt;security model
&lt;/li&gt;
&lt;li&gt;threat model
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This keeps the system verifiable without exposing operational infrastructure.&lt;/p&gt;




&lt;h2&gt;
  
  
  Build transparency
&lt;/h2&gt;

&lt;p&gt;The build and release process is also documented.&lt;/p&gt;

&lt;p&gt;Each build includes:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;version
&lt;/li&gt;
&lt;li&gt;commit hash
&lt;/li&gt;
&lt;li&gt;tag
&lt;/li&gt;
&lt;li&gt;CI reference
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This allows anyone to trace how a distributed app was produced.&lt;/p&gt;




&lt;h2&gt;
  
  
  What this means
&lt;/h2&gt;

&lt;p&gt;You do not have to rely on claims.&lt;/p&gt;

&lt;p&gt;You can:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;inspect the code
&lt;/li&gt;
&lt;li&gt;verify storage behavior
&lt;/li&gt;
&lt;li&gt;review cryptographic operations
&lt;/li&gt;
&lt;li&gt;confirm data handling
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The mobile app is fully transparent by design.&lt;/p&gt;




&lt;h2&gt;
  
  
  Repository
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://github.com/toqenapp/mobile-react-native" rel="noopener noreferrer"&gt;https://github.com/toqenapp/mobile-react-native&lt;/a&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  Product access:
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;iOS (App Store): search for “toqen.app”&lt;/li&gt;
&lt;li&gt;Android (closed testing): &lt;a href="https://forms.gle/f9FcbHyHJiajmFWV7" rel="noopener noreferrer"&gt;https://forms.gle/f9FcbHyHJiajmFWV7&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Typical use cases include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;SaaS platforms&lt;/li&gt;
&lt;li&gt;gated digital content&lt;/li&gt;
&lt;li&gt;memberships&lt;/li&gt;
&lt;li&gt;online education environments&lt;/li&gt;
&lt;li&gt;event access systems&lt;/li&gt;
&lt;li&gt;other products requiring time-bound and policy-defined authorization&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;Building continues.&lt;/p&gt;

</description>
      <category>opensource</category>
      <category>authentication</category>
      <category>infosec</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>The Paradox: The More Secure the Product, the Less People Trust It</title>
      <dc:creator>Anton Minin Baranovskii</dc:creator>
      <pubDate>Tue, 14 Apr 2026 00:45:51 +0000</pubDate>
      <link>https://forem.com/antonmb/the-paradox-the-more-secure-the-product-the-less-people-trust-it-acb</link>
      <guid>https://forem.com/antonmb/the-paradox-the-more-secure-the-product-the-less-people-trust-it-acb</guid>
      <description>&lt;p&gt;Over the past few days, early feedback on the Toqen mobile app has been coming in.&lt;/p&gt;

&lt;p&gt;The reaction was not what you might expect.&lt;/p&gt;

&lt;p&gt;Not curiosity.&lt;br&gt;&lt;br&gt;
Not technical questions.&lt;br&gt;&lt;br&gt;
But hesitation.&lt;/p&gt;

&lt;p&gt;People are reluctant to install it.&lt;/p&gt;




&lt;h2&gt;
  
  
  First reaction defines everything
&lt;/h2&gt;

&lt;p&gt;The moment a product is perceived as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;a password manager
&lt;/li&gt;
&lt;li&gt;a security tool
&lt;/li&gt;
&lt;li&gt;something that controls access
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;it is immediately placed into a high-risk mental category.&lt;/p&gt;

&lt;p&gt;From there, the default response is simple:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“Better not touch it.”&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;This happens before any technical understanding.&lt;/p&gt;




&lt;h2&gt;
  
  
  Architecture is invisible
&lt;/h2&gt;

&lt;p&gt;This is where things become interesting.&lt;/p&gt;

&lt;p&gt;Toqen is designed around a few strict principles:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;minimal data involvement
&lt;/li&gt;
&lt;li&gt;device-first trust model
&lt;/li&gt;
&lt;li&gt;no reliance on centralized sensitive storage
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;At a system level, this means:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;cryptographic keys are generated on the device
&lt;/li&gt;
&lt;li&gt;secrets are not transmitted or stored centrally
&lt;/li&gt;
&lt;li&gt;access is verified through signed challenges
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;But none of this is visible to the user.&lt;/p&gt;

&lt;p&gt;Architecture does not communicate itself.&lt;/p&gt;




&lt;h2&gt;
  
  
  Meanwhile, in other products
&lt;/h2&gt;

&lt;p&gt;Users regularly:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;share personal data
&lt;/li&gt;
&lt;li&gt;allow tracking
&lt;/li&gt;
&lt;li&gt;grant broad permissions
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;in applications that are perceived as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;social
&lt;/li&gt;
&lt;li&gt;entertainment
&lt;/li&gt;
&lt;li&gt;“harmless”
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Even when those systems process significantly more data.&lt;/p&gt;




&lt;h2&gt;
  
  
  The asymmetry
&lt;/h2&gt;

&lt;p&gt;This leads to a consistent pattern:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;systems designed to &lt;strong&gt;protect&lt;/strong&gt; are treated with suspicion
&lt;/li&gt;
&lt;li&gt;systems that &lt;strong&gt;collect data&lt;/strong&gt; are treated with trust
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Not because of their architecture.&lt;/p&gt;

&lt;p&gt;But because of how they are perceived.&lt;/p&gt;




&lt;h2&gt;
  
  
  Trust is not a technical property
&lt;/h2&gt;

&lt;p&gt;Security does not automatically produce trust.&lt;/p&gt;

&lt;p&gt;Correct architecture does not automatically produce trust.&lt;/p&gt;

&lt;p&gt;Trust depends on:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;perception
&lt;/li&gt;
&lt;li&gt;clarity
&lt;/li&gt;
&lt;li&gt;predictability
&lt;/li&gt;
&lt;li&gt;ability to verify
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Without these, even a strong system remains opaque.&lt;/p&gt;




&lt;h2&gt;
  
  
  What actually helps
&lt;/h2&gt;

&lt;p&gt;If trust cannot be assumed, it must be built differently.&lt;/p&gt;

&lt;p&gt;Not through statements.&lt;/p&gt;

&lt;p&gt;Through &lt;strong&gt;verifiability&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;One practical step is making the system inspectable.&lt;/p&gt;

&lt;p&gt;The Toqen mobile app is being prepared for open source release.&lt;/p&gt;

&lt;p&gt;This allows anyone to:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;review how the system works
&lt;/li&gt;
&lt;li&gt;understand data flows
&lt;/li&gt;
&lt;li&gt;validate design decisions
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Simplified flow (high level)
&lt;/h2&gt;

&lt;p&gt;The authentication model is based on a challenge-response approach:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;A login request is created (QR contains a temporary challenge)
&lt;/li&gt;
&lt;li&gt;The device scans the QR
&lt;/li&gt;
&lt;li&gt;The challenge is signed using a device private key
&lt;/li&gt;
&lt;li&gt;The server verifies the signature using the stored public key
&lt;/li&gt;
&lt;li&gt;Access is granted
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Key properties:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;no reusable tokens
&lt;/li&gt;
&lt;li&gt;no shared secrets in transit
&lt;/li&gt;
&lt;li&gt;short-lived challenges
&lt;/li&gt;
&lt;li&gt;device-bound authorization
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Core principle
&lt;/h2&gt;

&lt;p&gt;Data is involved only within the scope required to complete an access operation.&lt;/p&gt;

&lt;p&gt;Critical elements:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;are generated on the device
&lt;/li&gt;
&lt;li&gt;remain on the device
&lt;/li&gt;
&lt;li&gt;are never exposed in raw form
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The server operates only as a verifier.&lt;/p&gt;




&lt;h2&gt;
  
  
  Better to see than to hear
&lt;/h2&gt;

&lt;p&gt;There is a simple idea:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“Better to see once than hear a hundred times.”&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Trust improves when systems can be explored directly.&lt;/p&gt;

&lt;p&gt;The app is currently:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;in testing on Google Play &lt;em&gt;(access available on request)&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;available in release form on the App Store
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Search: &lt;strong&gt;toqen.app&lt;/strong&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  Final thought
&lt;/h2&gt;

&lt;p&gt;Security alone is not enough.&lt;/p&gt;

&lt;p&gt;If a system is not understandable, it will not be trusted.&lt;/p&gt;

&lt;p&gt;The direction forward is clear:&lt;/p&gt;

&lt;p&gt;build systems that are not only secure,&lt;br&gt;&lt;br&gt;
but also &lt;strong&gt;transparent, inspectable, and predictable&lt;/strong&gt;.&lt;/p&gt;

</description>
      <category>security</category>
      <category>authentication</category>
      <category>cryptography</category>
      <category>opensource</category>
    </item>
    <item>
      <title>Access-First Authentication with QR + Device Signatures</title>
      <dc:creator>Anton Minin Baranovskii</dc:creator>
      <pubDate>Mon, 13 Apr 2026 10:36:29 +0000</pubDate>
      <link>https://forem.com/antonmb/access-first-authentication-with-qr-device-signatures-20f0</link>
      <guid>https://forem.com/antonmb/access-first-authentication-with-qr-device-signatures-20f0</guid>
      <description>&lt;p&gt;Toqen.app is now live on the App Store.&lt;/p&gt;

&lt;p&gt;This is an attempt to rethink authentication from an access-first perspective: instead of managing identities and credentials, focus on granting access in real time, per request.&lt;/p&gt;




&lt;h2&gt;
  
  
  Why rethink authentication
&lt;/h2&gt;

&lt;p&gt;Most systems still rely on reusable credentials:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;passwords&lt;/li&gt;
&lt;li&gt;session tokens&lt;/li&gt;
&lt;li&gt;API keys&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These introduce predictable problems:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;credential leaks&lt;/li&gt;
&lt;li&gt;replay attacks&lt;/li&gt;
&lt;li&gt;uncontrolled sharing&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Even with MFA, the core model remains static.&lt;/p&gt;




&lt;h2&gt;
  
  
  Core idea
&lt;/h2&gt;

&lt;p&gt;Each access request should be:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;short-lived&lt;/li&gt;
&lt;li&gt;single-use&lt;/li&gt;
&lt;li&gt;bound to a device&lt;/li&gt;
&lt;li&gt;cryptographically verifiable&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Instead of storing secrets, the system verifies a signed challenge.&lt;/p&gt;




&lt;h2&gt;
  
  
  Flow
&lt;/h2&gt;

&lt;p&gt;User opens login page&lt;br&gt;
↓&lt;br&gt;
Server generates request&lt;br&gt;
↓&lt;br&gt;
QR code is displayed&lt;br&gt;
↓&lt;br&gt;
Mobile app scans QR&lt;br&gt;
↓&lt;br&gt;
User confirms access&lt;br&gt;
↓&lt;br&gt;
Device signs challenge&lt;br&gt;
↓&lt;br&gt;
Server verifies signature&lt;br&gt;
↓&lt;br&gt;
Access granted&lt;/p&gt;




&lt;h2&gt;
  
  
  QR format
&lt;/h2&gt;

&lt;p&gt;QR does not contain secrets.&lt;/p&gt;

&lt;p&gt;Example:&lt;/p&gt;

&lt;p&gt;toqen://auth?request_id=91f2d&amp;amp;challenge=8fa92c1a&amp;amp;expires=1710000000&lt;/p&gt;

&lt;p&gt;Properties:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;expires in 30–60 seconds&lt;/li&gt;
&lt;li&gt;single-use&lt;/li&gt;
&lt;li&gt;cannot be replayed&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Device model
&lt;/h2&gt;

&lt;p&gt;On first launch:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;device generates key pair&lt;/li&gt;
&lt;li&gt;private key → stored in secure storage&lt;/li&gt;
&lt;li&gt;public key → registered on server&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Signing:&lt;/p&gt;

&lt;p&gt;signature = sign(challenge, device_private_key)&lt;/p&gt;

&lt;p&gt;Verification:&lt;/p&gt;

&lt;p&gt;verify(signature, device_public_key)&lt;/p&gt;




&lt;h2&gt;
  
  
  Security properties
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;no reusable credentials&lt;/li&gt;
&lt;li&gt;no secrets in QR&lt;/li&gt;
&lt;li&gt;replay protection via TTL + single-use&lt;/li&gt;
&lt;li&gt;device-bound authorization&lt;/li&gt;
&lt;li&gt;server stores only public keys&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Vault model
&lt;/h2&gt;

&lt;p&gt;Sensitive data is encrypted client-side:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;encrypted_vault&lt;/li&gt;
&lt;li&gt;AES-256-GCM&lt;/li&gt;
&lt;li&gt;vault_key stored in secure storage&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Server never has decryption capability.&lt;/p&gt;




&lt;h2&gt;
  
  
  Where this fits
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;admin access&lt;/li&gt;
&lt;li&gt;internal tools&lt;/li&gt;
&lt;li&gt;high-risk operations&lt;/li&gt;
&lt;li&gt;temporary access flows&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Current status
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;iOS app is live on the App Store&lt;/li&gt;
&lt;li&gt;Android version is in testing&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Open for feedback
&lt;/h2&gt;

&lt;p&gt;If you are working on authentication, security, or access control systems — feedback is welcome.&lt;/p&gt;

&lt;p&gt;Contact: &lt;a href="https://www.toqen.app/about#contacts" rel="noopener noreferrer"&gt;https://www.toqen.app/about#contacts&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Android early access: &lt;a href="https://forms.gle/f9FcbHyHJiajmFWV7" rel="noopener noreferrer"&gt;https://forms.gle/f9FcbHyHJiajmFWV7&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;Building continues.&lt;/p&gt;

</description>
      <category>ux</category>
      <category>mobile</category>
      <category>authentication</category>
      <category>privacy</category>
    </item>
    <item>
      <title>Access without passwords — short demo</title>
      <dc:creator>Anton Minin Baranovskii</dc:creator>
      <pubDate>Wed, 08 Apr 2026 06:15:55 +0000</pubDate>
      <link>https://forem.com/antonmb/access-without-passwords-short-demo-19i5</link>
      <guid>https://forem.com/antonmb/access-without-passwords-short-demo-19i5</guid>
      <description></description>
      <category>authentication</category>
      <category>innovation</category>
      <category>access</category>
      <category>ux</category>
    </item>
    <item>
      <title>Toqen.app mobile testing is now live on iOS</title>
      <dc:creator>Anton Minin Baranovskii</dc:creator>
      <pubDate>Tue, 07 Apr 2026 17:18:34 +0000</pubDate>
      <link>https://forem.com/antonmb/toqenapp-mobile-testing-is-now-live-on-ios-5h05</link>
      <guid>https://forem.com/antonmb/toqenapp-mobile-testing-is-now-live-on-ios-5h05</guid>
      <description>&lt;p&gt;I am glad to share that Toqen.app mobile testing is now live on iOS.&lt;/p&gt;

&lt;p&gt;If you would like to try how access-first authentication works in real usage before the official release, please fill out a short form and we will open access (link below).&lt;/p&gt;

&lt;p&gt;For Android users, testing is already ongoing on Google Play.&lt;/p&gt;

&lt;p&gt;Two scenarios are currently available:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Sign in via the mobile app — open the “Services” tab, tap “Sign in”, and you are you are instantly signed in in the browser &lt;/li&gt;
&lt;li&gt;Sign in via QR — open Toqen.app or Litseller.com on your desktop, scan the QR code or enter the OTP in the app, and confirm access&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The idea is simple: access is confirmed at the moment of login. No separation between sign up and login. The session is created securely and has a limited lifetime.&lt;/p&gt;

&lt;p&gt;👉Join: &lt;a href="https://forms.gle/5LhYEyj87aNLuKpN9" rel="noopener noreferrer"&gt;https://forms.gle/5LhYEyj87aNLuKpN9&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;👉Honest feedback is highly appreciated: &lt;a href="https://forms.gle/S7mmzji5ftGKZZys9" rel="noopener noreferrer"&gt;https://forms.gle/S7mmzji5ftGKZZys9&lt;/a&gt;&lt;/p&gt;

</description>
      <category>authentication</category>
      <category>ios</category>
      <category>android</category>
      <category>security</category>
    </item>
  </channel>
</rss>
