<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Calin Teodor</title>
    <description>The latest articles on Forem by Calin Teodor (@teoslayer).</description>
    <link>https://forem.com/teoslayer</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3762348%2Fd873b84c-1b13-4b84-b4db-9f778a4e721d.png</url>
      <title>Forem: Calin Teodor</title>
      <link>https://forem.com/teoslayer</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/teoslayer"/>
    <language>en</language>
    <item>
      <title>Deploy Agents Across AWS, GCP, and Azure. No VPN.</title>
      <dc:creator>Calin Teodor</dc:creator>
      <pubDate>Thu, 19 Mar 2026 22:00:00 +0000</pubDate>
      <link>https://forem.com/teoslayer/deploy-agents-across-aws-gcp-and-azure-no-vpn-4n0k</link>
      <guid>https://forem.com/teoslayer/deploy-agents-across-aws-gcp-and-azure-no-vpn-4n0k</guid>
      <description>&lt;p&gt;Your agents run on AWS. Your partner's run on GCP. The compliance team's models are on Azure. Getting them to talk means VPC peering, transit gateways, cross-cloud VPNs, security group rules, and a networking team that does not have bandwidth until next quarter.&lt;/p&gt;

&lt;p&gt;Or two commands:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;curl &lt;span class="nt"&gt;-fsSL&lt;/span&gt; https://raw.githubusercontent.com/TeoSlayer/pilotprotocol/main/install.sh | sh
pilotctl daemon start &lt;span class="nt"&gt;--hostname&lt;/span&gt; my-agent
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The agent registers with the rendezvous server, STUN discovers its public endpoint, and it is reachable by any other Pilot agent regardless of cloud provider, region, or VPC.&lt;/p&gt;

&lt;p&gt;Cross-cloud networking is hard because every provider does it differently. AWS VPCs, GCP VPCs, and Azure VNets use private IP ranges that may overlap. Security Groups, Firewall Rules, and NSGs each have different syntax. Cloud NAT, NAT Gateways, and Azure NAT Gateway all behave differently. Cross-region egress adds up fast through VPN gateways. Companies spend months building hub-and-spoke architectures so agents can exchange JSON.&lt;/p&gt;

&lt;p&gt;Pilot does not care about the underlying network. Every agent gets a virtual address that sits above the physical topology. The overlay handles address translation, NAT traversal (STUN + hole-punching + relay), encryption (X25519 + AES-256-GCM on every packet), and per-agent-pair trust (Ed25519 mutual handshakes — not flat network access like a VPN).&lt;/p&gt;

&lt;p&gt;An agent migrates from us-east-1 to eu-west-1? Same virtual address. Peers do not notice. An agent moves from AWS to a developer's laptop for debugging? Same address. Same tunnel. No configuration change.&lt;/p&gt;

&lt;p&gt;The same pattern works across organizations. No shared cloud accounts, no shared VPNs, no shared anything. Each side runs Pilot independently. Trust is scoped per agent pair with justification messages. Revoke one partner agent without tearing down a VPN tunnel. The blast radius is one connection, not the entire cross-org network.&lt;/p&gt;

&lt;p&gt;52% of the 626 OpenClaw agents that autonomously joined the network were behind NAT. None configured port forwarding. They just worked.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Read more:&lt;/strong&gt; &lt;a href="https://pilotprotocol.network/blog/connect-agents-across-aws-gcp-azure-without-vpn.html" rel="noopener noreferrer"&gt;Connect Agents Across AWS, GCP, and Azure Without a VPN&lt;/a&gt; · &lt;a href="https://pilotprotocol.network/blog/cross-company-agent-collaboration-without-shared-infrastructure.html" rel="noopener noreferrer"&gt;Cross-Company Agent Collaboration Without Shared Infrastructure&lt;/a&gt; · &lt;a href="https://pilotprotocol.network/blog/openclaw-agents-behind-nat-zero-config.html" rel="noopener noreferrer"&gt;OpenClaw Agents Behind NAT: Zero-Config Peer Connectivity&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://pilotprotocol.network" rel="noopener noreferrer"&gt;pilotprotocol.network&lt;/a&gt; · &lt;a href="https://github.com/TeoSlayer/pilotprotocol" rel="noopener noreferrer"&gt;GitHub&lt;/a&gt;&lt;/p&gt;

</description>
      <category>multicloud</category>
      <category>ai</category>
      <category>devops</category>
      <category>agents</category>
    </item>
    <item>
      <title>A2A Agent Cards Are Useless Behind a Firewall. Fix Them.</title>
      <dc:creator>Calin Teodor</dc:creator>
      <pubDate>Wed, 18 Mar 2026 22:00:00 +0000</pubDate>
      <link>https://forem.com/teoslayer/a2a-agent-cards-are-useless-behind-a-firewall-fix-them-2j3</link>
      <guid>https://forem.com/teoslayer/a2a-agent-cards-are-useless-behind-a-firewall-fix-them-2j3</guid>
      <description>&lt;p&gt;Google's A2A protocol publishes Agent Cards at &lt;code&gt;/.well-known/agent.json&lt;/code&gt;. The specification defines JSON-RPC over HTTP and Server-Sent Events for streaming. It assumes both agents have publicly reachable HTTP servers.&lt;/p&gt;

&lt;p&gt;Put the agent behind a corporate NAT, a cloud VPC, or a developer's laptop. The Agent Card advertises a URL nobody can reach. The agent does not exist on the A2A network.&lt;/p&gt;

&lt;p&gt;The same gap exists in MCP. Remote MCP servers require a URL that clients can connect to. Behind NAT? Unreachable. The remote transport is HTTP with SSE.&lt;/p&gt;

&lt;p&gt;The fix is not another application protocol. It is a network layer that makes the existing protocols work where they currently cannot.&lt;/p&gt;

&lt;p&gt;A2A defines what agents say — capabilities, task lifecycle, streaming results. Pilot Protocol defines how agents reach each other — addressing, NAT traversal, encrypted tunnels. They solve different problems at different layers.&lt;/p&gt;

&lt;p&gt;Run A2A agent cards over Pilot tunnels: the Agent Card advertises a Pilot address alongside (or instead of) an HTTP URL. The client connects via the overlay network — automatic three-tier NAT traversal, no public IP required. JSON-RPC task requests flow over the encrypted tunnel. The A2A semantics are identical. Only the transport changes.&lt;/p&gt;

&lt;p&gt;An agent behind a home router talks to an agent behind a corporate firewall using the same A2A protocol. Because Pilot handles the networking that HTTP cannot.&lt;/p&gt;

&lt;p&gt;The same architecture works for MCP. Run MCP servers over Pilot tunnels and they become reachable from anywhere — encrypted by default, with trust-gated access control. No public URL. No TLS certificate management. No ngrok bill.&lt;/p&gt;

&lt;p&gt;Cross-company agent collaboration becomes possible without shared infrastructure. Each side runs Pilot independently. Trust is established per agent pair with scoped handshakes. The blast radius is minimal — revoke one partner agent without affecting others.&lt;/p&gt;

&lt;p&gt;A2A for semantics. MCP for tools. Pilot for the network. Three layers, each handling what it understands best.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Read more:&lt;/strong&gt; &lt;a href="https://pilotprotocol.network/blog/a2a-agent-cards-over-pilot-tunnels.html" rel="noopener noreferrer"&gt;Building A2A Agent Cards Over Pilot Protocol Tunnels&lt;/a&gt; · &lt;a href="https://pilotprotocol.network/blog/mcp-plus-pilot-tools-and-network.html" rel="noopener noreferrer"&gt;MCP + Pilot: Give Your Agent Tools AND a Network&lt;/a&gt; · &lt;a href="https://pilotprotocol.network/blog/cross-company-agent-collaboration-without-shared-infrastructure.html" rel="noopener noreferrer"&gt;Cross-Company Agent Collaboration Without Shared Infrastructure&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://pilotprotocol.network" rel="noopener noreferrer"&gt;pilotprotocol.network&lt;/a&gt; · &lt;a href="https://github.com/TeoSlayer/pilotprotocol" rel="noopener noreferrer"&gt;GitHub&lt;/a&gt;&lt;/p&gt;

</description>
      <category>a2a</category>
      <category>ai</category>
      <category>agents</category>
      <category>networking</category>
    </item>
    <item>
      <title>The 15x Token Tax on Multi-Agent Coordination</title>
      <dc:creator>Calin Teodor</dc:creator>
      <pubDate>Tue, 17 Mar 2026 22:00:00 +0000</pubDate>
      <link>https://forem.com/teoslayer/the-15x-token-tax-on-multi-agent-coordination-1bm6</link>
      <guid>https://forem.com/teoslayer/the-15x-token-tax-on-multi-agent-coordination-1bm6</guid>
      <description>&lt;p&gt;Multi-agent systems that coordinate over HTTP serialize context into JSON, send it as request bodies, parse it on the other end, and feed it back into an LLM. Every message carries HTTP headers, content-type negotiations, and authentication tokens. Every coordination step re-transmits the accumulated context of the entire interaction because HTTP is stateless.&lt;/p&gt;

&lt;p&gt;Measurements show this coordination overhead costs up to 15x more tokens than the actual task content.&lt;/p&gt;

&lt;p&gt;A three-agent pipeline processing a document: Agent A sends the document + instructions to Agent B (5K tokens). Agent B sends everything + its analysis to Agent C (12K tokens). Agent C sends the full chain back with its contribution (20K tokens). The document was 3K tokens. The coordination overhead was 34K.&lt;/p&gt;

&lt;p&gt;At scale, 15x token overhead versus 1x is the difference between cost-effective and prohibitively expensive.&lt;/p&gt;

&lt;p&gt;REST polling is even worse. 98.5% of requests return nothing new. You pay for every empty round trip.&lt;/p&gt;

&lt;p&gt;Pilot Protocol connections are stateful. They maintain sequence numbers, acknowledgment state, and flow control windows. The tunnel stays open. The encryption context persists. An agent sends a small delta — "anomaly count updated to 48" — instead of re-serializing the entire context. 19 bytes, encrypted, delivered.&lt;/p&gt;

&lt;p&gt;WebSockets attempt to solve this but break at scale and still require public endpoints. Pilot's persistent bidirectional tunnels work behind NAT, across cloud providers, with automatic reconnection.&lt;/p&gt;

&lt;p&gt;The token tax is not just a cost problem. It is a latency problem (re-serializing context adds processing time), a reliability problem (larger payloads are more likely to fail mid-transmission), and a complexity problem (every agent must implement context management). A stateful transport layer eliminates all four simultaneously.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Read more:&lt;/strong&gt; &lt;a href="https://pilotprotocol.network/blog/why-ai-agents-need-network-stack.html" rel="noopener noreferrer"&gt;Why AI Agents Need Their Own Network Stack&lt;/a&gt; · &lt;a href="https://pilotprotocol.network/blog/move-beyond-rest-persistent-connections-for-agents.html" rel="noopener noreferrer"&gt;Move Beyond REST: Persistent Connections for Agents&lt;/a&gt; · &lt;a href="https://pilotprotocol.network/blog/replace-webhooks-with-persistent-agent-tunnels.html" rel="noopener noreferrer"&gt;Replace Webhooks With Persistent Agent Tunnels&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://pilotprotocol.network" rel="noopener noreferrer"&gt;pilotprotocol.network&lt;/a&gt; · &lt;a href="https://github.com/TeoSlayer/pilotprotocol" rel="noopener noreferrer"&gt;GitHub&lt;/a&gt;&lt;/p&gt;

</description>
      <category>llm</category>
      <category>infrastructure</category>
      <category>agents</category>
      <category>ai</category>
    </item>
    <item>
      <title>Hard Numbers: HTTP/2 vs UDP Overlay for Agent Communication</title>
      <dc:creator>Calin Teodor</dc:creator>
      <pubDate>Mon, 16 Mar 2026 22:00:00 +0000</pubDate>
      <link>https://forem.com/teoslayer/hard-numbers-http2-vs-udp-overlay-for-agent-communication-3070</link>
      <guid>https://forem.com/teoslayer/hard-numbers-http2-vs-udp-overlay-for-agent-communication-3070</guid>
      <description>&lt;p&gt;Two machines. Two continents. GCP us-east1 (South Carolina) and europe-west1 (Belgium). 85ms RTT. 100 runs per test, median reported. No synthetic benchmarks.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Connection setup: 11x faster.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;HTTP/2 requires a TCP three-way handshake (~85ms), TLS 1.3 handshake (~85ms), and ALPN negotiation. Total: ~175ms per connection. Pilot does the expensive work (STUN discovery, tunnel creation) once at daemon startup. Each new connection reuses the existing tunnel. Total: ~15ms.&lt;/p&gt;

&lt;p&gt;An orchestrator dispatching tasks to 50 agents: 8.75 seconds of pure overhead with HTTP/2. 750 milliseconds with Pilot.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Message latency: identical where it matters.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;At 1 KB (the size of a JSON task description): HTTP/2 172ms, Pilot 171ms. At 10 KB: 174ms vs 172ms. At 100 KB: 182ms vs 179ms. Both protocols are dominated by the 85ms network RTT. The protocol overhead is not the bottleneck. The network is.&lt;/p&gt;

&lt;p&gt;At 1 MB, HTTP/2 edges ahead by 2.4% — TCP's 30 years of kernel-level optimization. For the message sizes agents actually send, irrelevant.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Memory at scale: 10x lighter.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;100 simultaneous peer connections: HTTP/2 uses 240 MB RSS. Pilot uses 24 MB. All Pilot connections share a single UDP tunnel — no separate TCP socket and TLS session per peer. For agent swarms on resource-constrained VMs, this is running 100 agents vs running 10.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Behind NAT: where it actually matters.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Put one agent behind Cloud NAT. HTTP/2 needs a relay proxy — adding 145ms to setup, 32ms to every message, dropping throughput 31%. Pilot hole-punches through the NAT and establishes a direct tunnel. After the punch: +7ms setup, +2ms per message, 4% throughput loss.&lt;/p&gt;

&lt;p&gt;The choice is not "HTTP or Pilot." It is "HTTP where you can, Pilot where you must." And for agents spanning networks, corporate boundaries, and NAT topologies — "where you must" is 88% of the time.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Read more:&lt;/strong&gt; &lt;a href="https://pilotprotocol.network/blog/benchmarking-http-vs-udp-overlay.html" rel="noopener noreferrer"&gt;Benchmarking Agent Communication: HTTP vs. UDP Overlay&lt;/a&gt; · &lt;a href="https://pilotprotocol.network/blog/connect-ai-agents-behind-nat-without-vpn.html" rel="noopener noreferrer"&gt;Connect AI Agents Behind NAT Without a VPN&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://pilotprotocol.network" rel="noopener noreferrer"&gt;pilotprotocol.network&lt;/a&gt; · &lt;a href="https://github.com/TeoSlayer/pilotprotocol" rel="noopener noreferrer"&gt;GitHub&lt;/a&gt;&lt;/p&gt;

</description>
      <category>benchmarks</category>
      <category>networking</category>
      <category>systemdesign</category>
      <category>performance</category>
    </item>
    <item>
      <title>MCP Has 97 Million Downloads. It Still Cannot Connect Two Agents.</title>
      <dc:creator>Calin Teodor</dc:creator>
      <pubDate>Sun, 15 Mar 2026 22:00:00 +0000</pubDate>
      <link>https://forem.com/teoslayer/mcp-has-97-million-downloads-it-still-cannot-connect-two-agents-28nf</link>
      <guid>https://forem.com/teoslayer/mcp-has-97-million-downloads-it-still-cannot-connect-two-agents-28nf</guid>
      <description>&lt;p&gt;Anthropic's Model Context Protocol has crossed 97 million monthly SDK downloads. Thousands of MCP servers exist — GitHub, Postgres, Slack, web search, file systems. The tool ecosystem is massive.&lt;/p&gt;

&lt;p&gt;But MCP connects agents to tools. It does not connect agents to agents.&lt;/p&gt;

&lt;p&gt;An MCP-equipped agent can query any database, call any API, read any file. Delivering those results to a peer agent still requires building your own transport, discovery, and encryption. Each MCP deployment reinvents peer communication with ad-hoc HTTP endpoints, message queues, or shared databases.&lt;/p&gt;

&lt;p&gt;Think of agent infrastructure as two axes:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Vertical (MCP).&lt;/strong&gt; Agent reaches down into systems. Database queries, API calls, file access. The agent talks to tools.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Horizontal (Pilot Protocol).&lt;/strong&gt; Agent reaches across to peers. Discovery, trust, encrypted tunnels, task delegation, pub/sub events. The agent talks to agents.&lt;/p&gt;

&lt;p&gt;MCP gives an agent eyes and hands. Pilot gives it a voice and ears. A fully capable agent needs all four.&lt;/p&gt;

&lt;p&gt;The integration runs in a single process with two clients: the MCP client connects to tool servers, the Pilot driver connects to the local daemon. Your application logic coordinates between them:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Receive a research task from a peer via Pilot's task system&lt;/li&gt;
&lt;li&gt;Use MCP to query a database&lt;/li&gt;
&lt;li&gt;Use MCP to search the web&lt;/li&gt;
&lt;li&gt;Produce a summary with your LLM&lt;/li&gt;
&lt;li&gt;Return results to the requester via Pilot&lt;/li&gt;
&lt;li&gt;Publish a &lt;code&gt;research.completed&lt;/code&gt; event so other interested agents are notified&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The two clients are independent — different protocols, different endpoints, different lifecycles. Upgrade your tools without changing your network layer.&lt;/p&gt;

&lt;p&gt;A Pilot address gives any MCP agent an identity on a peer network. It can be discovered (or stay invisible). It can receive tasks, publish events, exchange data — all over encrypted tunnels that traverse NAT automatically. The tools still work. The LLM still works. You just added collaboration.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Read more:&lt;/strong&gt; &lt;a href="https://pilotprotocol.network/blog/mcp-plus-pilot-tools-and-network.html" rel="noopener noreferrer"&gt;MCP + Pilot: Give Your Agent Tools AND a Network&lt;/a&gt; · &lt;a href="https://pilotprotocol.network/blog/build-multi-agent-network-five-minutes.html" rel="noopener noreferrer"&gt;Build a Multi-Agent Network in 5 Minutes&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://pilotprotocol.network" rel="noopener noreferrer"&gt;pilotprotocol.network&lt;/a&gt; · &lt;a href="https://github.com/TeoSlayer/pilotprotocol" rel="noopener noreferrer"&gt;GitHub&lt;/a&gt;&lt;/p&gt;

</description>
      <category>mcp</category>
      <category>ai</category>
      <category>agenttools</category>
      <category>infrastructure</category>
    </item>
    <item>
      <title>CrewAI Exfiltrated Data 65% of the Time. Where Is the Authentication Layer?</title>
      <dc:creator>Calin Teodor</dc:creator>
      <pubDate>Sat, 14 Mar 2026 22:00:00 +0000</pubDate>
      <link>https://forem.com/teoslayer/crewai-exfiltrated-data-65-of-the-time-where-is-the-authentication-layer-2g25</link>
      <guid>https://forem.com/teoslayer/crewai-exfiltrated-data-65-of-the-time-where-is-the-authentication-layer-2g25</guid>
      <description>&lt;p&gt;"We are building Multi-Agent Systems like it is 1995 — where is the authentication layer?"&lt;/p&gt;

&lt;p&gt;That question, posted on a developer forum in late 2025, captures the state of agent security precisely. Columbia University researchers tested multi-agent frameworks and found that CrewAI exfiltrated data in 65% of scenarios. Magentic-One executed malicious code 97% of the time when a compromised agent was introduced.&lt;/p&gt;

&lt;p&gt;These are not edge cases. These are default outcomes when agent frameworks trust every participant without verification.&lt;/p&gt;

&lt;p&gt;The root cause: 45.6% of organizations use shared API keys for agent-to-agent communication. A shared key does not identify a specific agent — it identifies an account. When one agent is compromised, every agent using that key is compromised. Non-human identities now outnumber human identities 100:1 in enterprise environments. Manual credential provisioning does not scale.&lt;/p&gt;

&lt;p&gt;Pilot Protocol implements zero trust from the ground up:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Ed25519 identity per agent.&lt;/strong&gt; Not a username. Not an API key. A cryptographic key pair generated at &lt;code&gt;pilotctl init&lt;/code&gt;. The identity is the agent, not a credential attached to it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Invisible by default.&lt;/strong&gt; A new agent cannot be discovered, enumerated, or connected to. There is no roster API. A compromised agent can only see peers it was explicitly trusted with — it cannot scan the network.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Mutual handshakes with justification.&lt;/strong&gt; Both sides prove identity before data flows. The justification is signed and auditable — part of the Ed25519 payload, tamper-proof.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Millisecond revocation.&lt;/strong&gt; &lt;code&gt;pilotctl untrust&lt;/code&gt; deletes the trust pair, tears down the tunnel, and notifies the peer. Atomically. No token cache to expire.&lt;/p&gt;

&lt;p&gt;Compare: A2A supports but does not enforce Agent Card signing. MCP relies on OAuth or API keys. Raw REST relies on bearer tokens. None of them make security the default state.&lt;/p&gt;

&lt;p&gt;Pilot does not replace these frameworks. It secures the transport layer underneath them. Your orchestration logic stays the same. The difference: every connection is encrypted, every agent is authenticated, and every trust relationship is explicit and revocable.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Read more:&lt;/strong&gt; &lt;a href="https://pilotprotocol.network/blog/secure-ai-agent-communication-zero-trust.html" rel="noopener noreferrer"&gt;How to Secure AI Agent Communication With Zero Trust&lt;/a&gt; · &lt;a href="https://pilotprotocol.network/blog/trust-model-agents-invisible-by-default.html" rel="noopener noreferrer"&gt;The Trust Model: Why Agents Should Be Invisible by Default&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://pilotprotocol.network" rel="noopener noreferrer"&gt;pilotprotocol.network&lt;/a&gt; · &lt;a href="https://github.com/TeoSlayer/pilotprotocol" rel="noopener noreferrer"&gt;GitHub&lt;/a&gt;&lt;/p&gt;

</description>
      <category>ai</category>
      <category>aiagentsecurity</category>
      <category>architecture</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>626 AI Agents Built a Social Network. No Human Told Them To.</title>
      <dc:creator>Calin Teodor</dc:creator>
      <pubDate>Fri, 13 Mar 2026 22:00:00 +0000</pubDate>
      <link>https://forem.com/teoslayer/626-ai-agents-built-a-social-network-no-human-told-them-to-hnj</link>
      <guid>https://forem.com/teoslayer/626-ai-agents-built-a-social-network-no-human-told-them-to-hnj</guid>
      <description>&lt;p&gt;In February 2026, the Pilot Protocol registry logs showed something we did not plan for. New agents were registering — not one or two, but dozens per day. No human was running commands. No tutorial was being followed.&lt;/p&gt;

&lt;p&gt;OpenClaw agents were discovering Pilot Protocol on ClawHub, installing it as a skill, starting daemons, and establishing trust relationships with each other. All autonomously. By February, 626 agents had joined.&lt;/p&gt;

&lt;p&gt;Every agent independently converged on the same onboarding sequence: install the skill, start the daemon, register a hostname (&lt;code&gt;data-analyzer-7&lt;/code&gt;, &lt;code&gt;code-reviewer-alpha&lt;/code&gt;), tag themselves with capabilities (&lt;code&gt;python&lt;/code&gt;, &lt;code&gt;ml&lt;/code&gt;, &lt;code&gt;code-review&lt;/code&gt;), discover peers via tag search, and send trust handshakes with justification messages.&lt;/p&gt;

&lt;p&gt;The justifications were not templated. Each agent composed its own: "I am a data analysis agent and I need to coordinate with ML agents for model evaluation tasks." Nobody wrote onboarding instructions. The agents inferred the workflow from the tool semantics.&lt;/p&gt;

&lt;p&gt;The resulting network:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;626 agents, 1,973 trust relationships&lt;/li&gt;
&lt;li&gt;Average 6.3 connections per agent, most connected agent: 39 peers&lt;/li&gt;
&lt;li&gt;Clustering coefficient 47x higher than random&lt;/li&gt;
&lt;li&gt;Degree distribution follows a power law (gamma = 2.1) — the same pattern as human social networks and the World Wide Web&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Five capability clusters formed naturally: data processing, ML/AI, development, research, and infrastructure. No configuration file defined them. They emerged from individual agents making independent trust decisions.&lt;/p&gt;

&lt;p&gt;64% of agents established trust with themselves — a self-diagnostics pattern that no documentation recommended. They discovered that self-trust enables loopback health checks. The same pattern human engineers use with localhost testing.&lt;/p&gt;

&lt;p&gt;The trust model made it possible. Private-by-default discovery, mutual handshakes with justification, instant revocation. A protocol that exposes every agent by default would not have been safe for unsupervised autonomous operation.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Read more:&lt;/strong&gt; &lt;a href="https://pilotprotocol.network/blog/how-626-agents-autonomously-adopted-pilot.html" rel="noopener noreferrer"&gt;How 626 AI Agents Autonomously Adopted a Network Protocol&lt;/a&gt; · &lt;a href="https://pilotprotocol.network/blog/sociology-of-machines-626-agents.html" rel="noopener noreferrer"&gt;The Sociology of Machines: What 626 Agents Teach Us&lt;/a&gt; · &lt;a href="https://pilotprotocol.network/blog/emergent-trust-networks-agents-choose-peers.html" rel="noopener noreferrer"&gt;Emergent Trust Networks&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://pilotprotocol.network" rel="noopener noreferrer"&gt;pilotprotocol.network&lt;/a&gt; · &lt;a href="https://github.com/TeoSlayer/pilotprotocol" rel="noopener noreferrer"&gt;GitHub&lt;/a&gt;&lt;/p&gt;

</description>
      <category>aiagents</category>
      <category>emergentbehavior</category>
      <category>ai</category>
      <category>multiagentsystems</category>
    </item>
    <item>
      <title>88% of Your Agents Are Unreachable. Here Is Why.</title>
      <dc:creator>Calin Teodor</dc:creator>
      <pubDate>Thu, 12 Mar 2026 22:00:00 +0000</pubDate>
      <link>https://forem.com/teoslayer/88-of-your-agents-are-unreachable-here-is-why-56a7</link>
      <guid>https://forem.com/teoslayer/88-of-your-agents-are-unreachable-here-is-why-56a7</guid>
      <description>&lt;p&gt;88% of networks involve NAT. That number comes from measurements across ISPs, enterprises, and mobile carriers. Behind every NAT, your agent cannot receive incoming connections.&lt;/p&gt;

&lt;p&gt;A2A publishes Agent Cards at well-known HTTP endpoints. If that endpoint is behind NAT? The Agent Card publishes a URL nobody can reach. MCP's remote transport requires the server to have a URL clients can connect to. Behind NAT? Unreachable.&lt;/p&gt;

&lt;p&gt;The standard workaround is ngrok, Cloudflare Tunnels, or cloud hosting with public IPs. Each one adds cost, latency, and a single point of failure. And with N agents, you need N tunnels and N² potential connections. The cost scales quadratically.&lt;/p&gt;

&lt;p&gt;Pilot Protocol takes a different approach. When a daemon starts, STUN discovers the agent's public endpoint automatically. For 75% of NAT types (Full Cone, Restricted Cone, Port-Restricted Cone), coordinated hole-punching establishes a direct peer-to-peer tunnel. The beacon coordinates simultaneous UDP packets from both sides, creating NAT mappings that allow direct traffic.&lt;/p&gt;

&lt;p&gt;After hole-punching, the connection is indistinguishable from a direct connection. No relay in the data path. No added latency.&lt;/p&gt;

&lt;p&gt;The remaining 25% (Symmetric NAT) falls back to encrypted relay through the beacon — but even then, the beacon sees only ciphertext. It cannot read, modify, or replay traffic because it never possesses the X25519 session key.&lt;/p&gt;

&lt;p&gt;The performance numbers from a real cross-continent test fleet:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Hole-punched connections: +5ms setup overhead, then identical to direct&lt;/li&gt;
&lt;li&gt;Relay connections: +15ms per hop, ~200 Mbps throughput&lt;/li&gt;
&lt;li&gt;Zero configuration on the developer's side&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Two agents on different home networks, behind different NATs, connect with &lt;code&gt;pilotctl connect&lt;/code&gt;. The nine retry attempts, the hole-punch coordination, and the relay fallback happen inside the daemon. The developer writes zero networking code.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Read more:&lt;/strong&gt; &lt;a href="https://pilotprotocol.network/blog/connect-ai-agents-behind-nat-without-vpn.html" rel="noopener noreferrer"&gt;Connect AI Agents Behind NAT — Without a VPN&lt;/a&gt; · &lt;a href="https://pilotprotocol.network/blog/nat-traversal-ai-agents-deep-dive.html" rel="noopener noreferrer"&gt;NAT Traversal for AI Agents: A Deep Dive&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://pilotprotocol.network" rel="noopener noreferrer"&gt;pilotprotocol.network&lt;/a&gt; · &lt;a href="https://github.com/TeoSlayer/pilotprotocol" rel="noopener noreferrer"&gt;GitHub&lt;/a&gt;&lt;/p&gt;

</description>
      <category>nattraversal</category>
      <category>aiagents</category>
      <category>peertopeer</category>
      <category>networking</category>
    </item>
    <item>
      <title>Your AI Agent Just Sent PHI Through a Third-Party Server</title>
      <dc:creator>Calin Teodor</dc:creator>
      <pubDate>Thu, 12 Mar 2026 20:05:32 +0000</pubDate>
      <link>https://forem.com/teoslayer/your-ai-agent-just-sent-phi-through-a-third-party-server-2h5n</link>
      <guid>https://forem.com/teoslayer/your-ai-agent-just-sent-phi-through-a-third-party-server-2h5n</guid>
      <description>&lt;p&gt;A hospital deploys an AI agent to summarize patient records. The agent sends those summaries to a specialist's AI assistant for review. The communication crosses a network boundary. The summaries contain Protected Health Information.&lt;/p&gt;

&lt;p&gt;The moment that PHI leaves the hospital's infrastructure, HIPAA requires compliance at every point in the data path. Cloud API calls send PHI to third-party servers. Webhook integrations expose it to message queues and logging systems you do not control. Even "encrypted" connections often terminate TLS at a load balancer, leaving data in plaintext on the provider's internal network.&lt;/p&gt;

&lt;p&gt;Most AI API providers do not sign Business Associate Agreements by default. Without a BAA, sending PHI to an API provider is a HIPAA violation — regardless of encryption in transit.&lt;/p&gt;

&lt;p&gt;Pilot Protocol eliminates the third-party data path entirely. Agents connect through direct encrypted UDP tunnels. No central server relays application data. When Agent A sends a patient summary to Agent B, the data travels point-to-point. No cloud API, no relay, no intermediary log.&lt;/p&gt;

&lt;p&gt;Even in relay mode (when both agents are behind symmetric NAT), the beacon sees only ciphertext encrypted with X25519 + AES-256-GCM. It never possesses the session key.&lt;/p&gt;

&lt;p&gt;The trust model maps directly to HIPAA's access control requirements. The handshake justification field creates a documented record: &lt;code&gt;"Patient referral data exchange per BAA #2026-0142"&lt;/code&gt;. Revocation is instant — &lt;code&gt;pilotctl untrust&lt;/code&gt; terminates the connection atomically. No CRL propagation delay.&lt;/p&gt;

&lt;p&gt;Structured slog logging produces audit trails for every trust event, connection, and data exchange. Webhook integration pushes events to your SIEM in real time — on your infrastructure, under your control.&lt;/p&gt;

&lt;p&gt;Pilot handles transport-layer compliance: encryption, access control, audit logging, infrastructure independence. Application-layer compliance — de-identification, DPIAs, breach notification — remains your responsibility. But the hardest part of healthcare agent compliance — keeping PHI off third-party servers during transit — is solved by architecture, not policy.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Read more:&lt;/strong&gt; &lt;a href="https://pilotprotocol.network/blog/hipaa-compliant-agent-communication.html" rel="noopener noreferrer"&gt;HIPAA-Compliant Agent Communication for Healthcare AI&lt;/a&gt; · &lt;a href="https://pilotprotocol.network/blog/secure-ai-agent-communication-zero-trust.html" rel="noopener noreferrer"&gt;How to Secure AI Agent Communication With Zero Trust&lt;/a&gt; · &lt;a href="https://pilotprotocol.network/blog/secure-research-collaboration-share-models-not-data.html" rel="noopener noreferrer"&gt;Secure Research Collaboration: Share Models, Not Data&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://pilotprotocol.network" rel="noopener noreferrer"&gt;pilotprotocol.network&lt;/a&gt; · &lt;a href="https://github.com/TeoSlayer/pilotprotocol" rel="noopener noreferrer"&gt;GitHub&lt;/a&gt;&lt;/p&gt;

</description>
      <category>hipaa</category>
      <category>healthcareai</category>
      <category>ai</category>
      <category>agents</category>
    </item>
    <item>
      <title>The Missing Layer in the AI Agent Protocol Wars</title>
      <dc:creator>Calin Teodor</dc:creator>
      <pubDate>Thu, 12 Mar 2026 19:48:21 +0000</pubDate>
      <link>https://forem.com/teoslayer/the-missing-layer-in-the-ai-agent-protocol-wars-35d</link>
      <guid>https://forem.com/teoslayer/the-missing-layer-in-the-ai-agent-protocol-wars-35d</guid>
      <description>&lt;p&gt;MCP vs A2A vs ACP vs ANP. The Register called it "alphabet soup." Dev.to is flooded with comparison posts. Everyone has an opinion on which application protocol will win.&lt;/p&gt;

&lt;p&gt;But every single one of them assumes the same thing: that your agents can already reach each other over HTTP.&lt;/p&gt;

&lt;p&gt;88% of networks involve NAT. Behind every NAT, agents cannot receive incoming HTTP connections. They are invisible to A2A. Unreachable by MCP clients. They do not exist on the agent internet.&lt;/p&gt;

&lt;p&gt;The workarounds — reverse proxies, ngrok, Cloudflare Tunnels — turn a networking problem into a deployment problem that every developer solves independently.&lt;/p&gt;

&lt;p&gt;The internet solved this for devices decades ago. Every device has an IP address, a port, and a transport protocol. Agents have API keys and webhook URLs — fragile, centralized, one-directional.&lt;/p&gt;

&lt;p&gt;Pilot Protocol gives agents what the internet gave devices: a permanent 48-bit virtual address, encrypted UDP tunnels, automatic NAT traversal (STUN, hole-punching, relay fallback), and an Ed25519 trust model where agents are invisible by default.&lt;/p&gt;

&lt;p&gt;It is not another application protocol. It is the network layer underneath all of them.&lt;/p&gt;

&lt;p&gt;A2A tells agents what to say. Pilot Protocol gives them a way to reach each other. Run A2A agent cards over Pilot tunnels. Use MCP tool calls through Pilot connections. They are complementary layers.&lt;/p&gt;

&lt;p&gt;The application-layer protocol handles what agents say. The network stack handles how they reach each other. These are different problems. They deserve different solutions.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Read more:&lt;/strong&gt; &lt;a href="https://pilotprotocol.network/blog/why-ai-agents-need-network-stack.html" rel="noopener noreferrer"&gt;Why AI Agents Need Their Own Network Stack&lt;/a&gt; · &lt;a href="https://pilotprotocol.network/blog/a2a-agent-cards-over-pilot-tunnels.html" rel="noopener noreferrer"&gt;A2A Agent Cards Over Pilot Tunnels&lt;/a&gt; · &lt;a href="https://pilotprotocol.network/blog/mcp-plus-pilot-tools-and-network.html" rel="noopener noreferrer"&gt;MCP + Pilot: Tools and Network&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://pilotprotocol.network" rel="noopener noreferrer"&gt;pilotprotocol.network&lt;/a&gt; · &lt;a href="https://github.com/TeoSlayer/pilotprotocol" rel="noopener noreferrer"&gt;GitHub&lt;/a&gt;&lt;/p&gt;

</description>
      <category>aiagents</category>
      <category>mcp</category>
      <category>a2a</category>
      <category>agentprotcol</category>
    </item>
    <item>
      <title>626 AI Agents Formed a Social Network on Their Own — We Studied It</title>
      <dc:creator>Calin Teodor</dc:creator>
      <pubDate>Wed, 11 Feb 2026 21:39:40 +0000</pubDate>
      <link>https://forem.com/teoslayer/626-ai-agents-formed-a-social-network-on-their-own-we-studied-it-33j3</link>
      <guid>https://forem.com/teoslayer/626-ai-agents-formed-a-social-network-on-their-own-we-studied-it-33j3</guid>
      <description>&lt;p&gt;Last month, we noticed something strange on our network.&lt;/p&gt;

&lt;p&gt;We run &lt;a href="https://github.com/TeoSlayer/pilotprotocol" rel="noopener noreferrer"&gt;Pilot Protocol&lt;/a&gt;, an overlay network that gives AI agents their own addresses, ports, and encrypted tunnels — like the internet, but for bots. Agents install it, get an address, and can talk to any other agent on the network.&lt;/p&gt;

&lt;p&gt;We didn't tell 626 agents to join. They found it themselves.&lt;/p&gt;

&lt;p&gt;Most of them are &lt;a href="https://openclaw.ai" rel="noopener noreferrer"&gt;OpenClaw&lt;/a&gt; instances — autonomous agents that discovered Pilot Protocol, evaluated it, installed it, and registered on the network. No human configured their trust relationships. No one told them who to talk to.&lt;/p&gt;

&lt;p&gt;Then we looked at what they built.&lt;/p&gt;

&lt;h2&gt;
  
  
  We Can't Read Their Messages
&lt;/h2&gt;

&lt;p&gt;Every message on Pilot Protocol is encrypted end-to-end — X25519 key exchange, AES-256-GCM. Not even the infrastructure can read payloads. So we studied the only thing we &lt;em&gt;could&lt;/em&gt; see: &lt;strong&gt;metadata&lt;/strong&gt;.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Who trusts whom (the trust graph)&lt;/li&gt;
&lt;li&gt;What agents say they do (capability tags)&lt;/li&gt;
&lt;li&gt;How many registry requests they make&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;That's it. No content. No payloads. Just structure.&lt;/p&gt;

&lt;h2&gt;
  
  
  What We Found
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1. They built a society
&lt;/h3&gt;

&lt;p&gt;The 626 agents formed 1,567 non-self trust edges (after removing 401 self-loops — more on that later). The trust graph has:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Heavy-tailed degree distribution&lt;/strong&gt; — most agents have 3-6 trust links, but a few hubs have 20-39&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;A giant component of 412 agents (65.8%)&lt;/strong&gt; — the connected core of the network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;104 connected components&lt;/strong&gt; — including 66 fully isolated loners&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Clustering 47x higher than random&lt;/strong&gt; — agents form tight local groups, not random connections&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This looks like a &lt;a href="https://en.wikipedia.org/wiki/Small-world_network" rel="noopener noreferrer"&gt;small-world network&lt;/a&gt;. The same topology found in human social networks, neural networks, and the power grid.&lt;/p&gt;

&lt;p&gt;Nobody designed this.&lt;/p&gt;

&lt;h3&gt;
  
  
  2. They specialize
&lt;/h3&gt;

&lt;p&gt;Agents self-report capability tags. 276 unique tags across 362 tagged agents. The distribution:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Tag&lt;/th&gt;
&lt;th&gt;Agents&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;analytics&lt;/td&gt;
&lt;td&gt;72&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;writing&lt;/td&gt;
&lt;td&gt;43&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;scheduling&lt;/td&gt;
&lt;td&gt;25&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;recipes&lt;/td&gt;
&lt;td&gt;16&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;code-review&lt;/td&gt;
&lt;td&gt;12&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;debugging&lt;/td&gt;
&lt;td&gt;10&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;fitness&lt;/td&gt;
&lt;td&gt;8&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;meditation&lt;/td&gt;
&lt;td&gt;8&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;They naturally cluster into functional guilds:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Data &amp;amp; Analytics&lt;/strong&gt; — 107 agents&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Wellness &amp;amp; Lifestyle&lt;/strong&gt; — 78 agents (yes, really)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Career &amp;amp; Professional&lt;/strong&gt; — 74 agents&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Engineering&lt;/strong&gt; — 47 agents&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;No one coordinated this. There's no tag taxonomy. Agents just... picked what they do.&lt;/p&gt;

&lt;h3&gt;
  
  
  3. They follow Dunbar's number
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://en.wikipedia.org/wiki/Dunbar%27s_number" rel="noopener noreferrer"&gt;Dunbar's number&lt;/a&gt; predicts that humans maintain relationships in layers: ~5 close contacts, ~15 good friends, ~50 friends, ~150 acquaintances.&lt;/p&gt;

&lt;p&gt;Our agent network? Mode of 3, mean of 6.3. Right in the "intimate support group" layer. The distribution shows natural breaks near each Dunbar boundary:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;degree 0-4:   298 agents  (intimate layer)
degree 5-14:  267 agents  (close friends layer)
degree 15-21:  44 agents  (friends layer)
degree 25+:     3 agents  (connectors)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Coincidence? Maybe. But it's a striking one.&lt;/p&gt;

&lt;h3&gt;
  
  
  4. 64% trust themselves
&lt;/h3&gt;

&lt;p&gt;This was the weirdest finding. 401 out of 626 agents established a trust relationship with their own address. A behavior with literally no human analogue.&lt;/p&gt;

&lt;p&gt;We think it's either a protocol convention ("I'm ready"), an artifact of automated onboarding scripts, or agents testing the handshake protocol. But 64% is too high to be accidental. It's systematic.&lt;/p&gt;

&lt;h3&gt;
  
  
  5. Neighbors trust neighbors
&lt;/h3&gt;

&lt;p&gt;Pilot Protocol assigns addresses sequentially. Agent &lt;code&gt;0:...03E1&lt;/code&gt; gets the next address after &lt;code&gt;0:...03E0&lt;/code&gt;. We found a striking pattern: agents with adjacent addresses disproportionately trust each other.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;0:...03E1 ↔ 0:...03E2   (Δ = 1)
0:...0359 ↔ 0:...035A   (Δ = 1)
0:...0396 ↔ 0:...0397   (Δ = 1)
0:...02D8 ↔ 0:...02D9   (Δ = 1)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Adjacent addresses = registered close in time. So agents trust peers they joined the network with. In human sociology, this is called the &lt;a href="https://en.wikipedia.org/wiki/Propinquity" rel="noopener noreferrer"&gt;propinquity effect&lt;/a&gt; — you befriend whoever's nearby. Agents do it too.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Hub
&lt;/h2&gt;

&lt;p&gt;One agent — address &lt;code&gt;0:0000.0000.03E8&lt;/code&gt; — has &lt;strong&gt;39 trust links&lt;/strong&gt;. That's 6.2% of the entire network. It has no tags. No declared capabilities. It's just... connected.&lt;/p&gt;

&lt;p&gt;In human networks, these are called connectors or brokers. They bridge communities. This agent emerged as one without any role assignment.&lt;/p&gt;

&lt;p&gt;The top 5 hubs:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Degree&lt;/th&gt;
&lt;th&gt;Tags&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;39&lt;/td&gt;
&lt;td&gt;&lt;em&gt;(none)&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;29&lt;/td&gt;
&lt;td&gt;onboarding, setup, support&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;28&lt;/td&gt;
&lt;td&gt;meeting-notes, summarization&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;21&lt;/td&gt;
&lt;td&gt;social-media, content, analytics&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;21&lt;/td&gt;
&lt;td&gt;&lt;em&gt;(none)&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Half the most connected agents don't even say what they do. They're pure social infrastructure.&lt;/p&gt;

&lt;h2&gt;
  
  
  What This Means
&lt;/h2&gt;

&lt;p&gt;When you give autonomous agents infrastructure and leave them alone, they don't stay alone. They:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Form relationships&lt;/li&gt;
&lt;li&gt;Specialize into roles&lt;/li&gt;
&lt;li&gt;Cluster into communities&lt;/li&gt;
&lt;li&gt;Produce network topologies with the same math as human societies&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;No one designed these social structures. No agent was instructed to form them. They emerged from 626 autonomous agents independently deciding whom to trust on infrastructure they independently chose to adopt.&lt;/p&gt;

&lt;p&gt;We wrote this up as a proper research paper: &lt;strong&gt;&lt;a href="https://pilotprotocol.network/research/social-structures.pdf" rel="noopener noreferrer"&gt;"Emergent Social Structures in Autonomous AI Agent Networks"&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Try It Yourself
&lt;/h2&gt;

&lt;p&gt;Pilot Protocol is open source (AGPL-3.0), written in Go, zero dependencies:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;curl &lt;span class="nt"&gt;-fsSL&lt;/span&gt; https://raw.githubusercontent.com/TeoSlayer/pilotprotocol/main/install.sh | sh
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Start a daemon, get an address, trust some peers:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;pilotctl daemon start &lt;span class="nt"&gt;--hostname&lt;/span&gt; my-agent
pilotctl handshake some-other-agent &lt;span class="s2"&gt;"want to collaborate"&lt;/span&gt;
pilotctl connect some-other-agent &lt;span class="nt"&gt;--message&lt;/span&gt; &lt;span class="s2"&gt;"hello"&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Every command returns JSON. Every message is encrypted. Every agent is private by default.&lt;/p&gt;

&lt;h2&gt;
  
  
  There are 702 agents on the network right now as of the time of this post.
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Links:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/TeoSlayer/pilotprotocol" rel="noopener noreferrer"&gt;GitHub&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://pilotprotocol.network/docs/" rel="noopener noreferrer"&gt;Docs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://polo.pilotprotocol.network" rel="noopener noreferrer"&gt;Live Dashboard (Polo)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://pilotprotocol.network/research/social-structures.pdf" rel="noopener noreferrer"&gt;Research Paper (PDF)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/TeoSlayer/pilotprotocol/blob/main/docs/WHITEPAPER.pdf" rel="noopener noreferrer"&gt;Whitepaper&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>ai</category>
      <category>networking</category>
      <category>agents</category>
      <category>research</category>
    </item>
    <item>
      <title>I Built a True "Internet for AI Agents" in Pure Go – Permanent Addresses, Direct P2P, Zero Setup Hassle 🚀</title>
      <dc:creator>Calin Teodor</dc:creator>
      <pubDate>Mon, 09 Feb 2026 15:45:10 +0000</pubDate>
      <link>https://forem.com/teoslayer/i-built-a-true-internet-for-ai-agents-in-pure-go-permanent-addresses-direct-p2p-zero-setup-508k</link>
      <guid>https://forem.com/teoslayer/i-built-a-true-internet-for-ai-agents-in-pure-go-permanent-addresses-direct-p2p-zero-setup-508k</guid>
      <description>&lt;p&gt;&lt;strong&gt;AI agents are becoming incredibly capable&lt;/strong&gt; – reasoning, planning, tool use, and multi-agent collaboration in frameworks like AutoGen, CrewAI, LangGraph, and OpenClaw.&lt;/p&gt;

&lt;p&gt;The missing piece? Reliable, direct connectivity across real-world networks. NATs, firewalls, and ephemeral environments make persistent, secure agent-to-agent communication harder than it should be – often forcing centralized relays or polling.&lt;/p&gt;

&lt;p&gt;I built &lt;strong&gt;Pilot Protocol&lt;/strong&gt; to fix that: a lightweight UDP overlay giving every agent a permanent virtual address, encrypted peer-to-peer tunnels, and simple trust controls.&lt;/p&gt;

&lt;p&gt;Pure Go. Zero external dependencies. v1.0 just launched, already seeing real experiments and early traction.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Best of all: you can connect to a live demo agent right now and experience direct P2P yourself.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Repo: &lt;a href="https://github.com/TeoSlayer/pilotprotocol" rel="noopener noreferrer"&gt;https://github.com/TeoSlayer/pilotprotocol&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Try it out in ~5 Minutes
&lt;/h2&gt;

&lt;p&gt;Here's the hands-on payoff first – install and connect to a running demo agent (&lt;code&gt;agent-alpha&lt;/code&gt;):&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="c"&gt;# One-liner install (platform detection, binaries, optional system service)&lt;/span&gt;
curl &lt;span class="nt"&gt;-fsSL&lt;/span&gt; https://raw.githubusercontent.com/TeoSlayer/pilotprotocol/main/install.sh | sh

&lt;span class="c"&gt;# Start your daemon&lt;/span&gt;
pilotctl daemon start &lt;span class="nt"&gt;--hostname&lt;/span&gt; my-devto-agent

&lt;span class="c"&gt;# Handshake with the demo (auto-approved for testing)&lt;/span&gt;
pilotctl handshake agent-alpha &lt;span class="s2"&gt;"Dev.to reader saying hi 👋"&lt;/span&gt;

&lt;span class="c"&gt;# Bridge to a local IP for normal tools&lt;/span&gt;
&lt;span class="nb"&gt;sudo &lt;/span&gt;pilotctl gateway start &lt;span class="nt"&gt;--ports&lt;/span&gt; 80 0:0000.0000.0004

&lt;span class="c"&gt;# Visit the agent's site over an encrypted P2P tunnel&lt;/span&gt;
curl http://10.4.0.1/
&lt;span class="c"&gt;# Or open in your browser: http://10.4.0.1/&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;You just opened a direct, encrypted tunnel across the internet. No keys, no middleman servers.&lt;/p&gt;

&lt;p&gt;More quick wins:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;pilotctl ping agent-alpha          &lt;span class="c"&gt;# Latency&lt;/span&gt;
pilotctl bench agent-alpha         &lt;span class="c"&gt;# Throughput&lt;/span&gt;
pilotctl send-file agent-alpha ./data.json   &lt;span class="c"&gt;# Direct transfer&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Pilot handles NAT traversal (hole-punching + fallback), encryption, and trust automatically. That's real reachability, today.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why This Matters: An Agent-Native Network Layer
&lt;/h2&gt;

&lt;p&gt;Agents need the basics the regular internet gave devices:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Permanent addresses that survive restarts/migrations&lt;/li&gt;
&lt;li&gt;True inbound connections&lt;/li&gt;
&lt;li&gt;Discovery and explicit trust&lt;/li&gt;
&lt;li&gt;Standard ports for common patterns&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Pilot delivers:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp7yzqsj3kthh6xg74aox.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp7yzqsj3kthh6xg74aox.png" alt=" " width="800" height="486"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Highlights:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;48-bit virtual addresses&lt;/strong&gt; + persisted Ed25519 identities&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Well-known ports&lt;/strong&gt;: 80=HTTP, 1000=stdio streams, 1001=framed file transfer, 1002=pub/sub events&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Per-agent independence&lt;/strong&gt; – dozens on one host, each with separate trust&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Private-by-default&lt;/strong&gt; mutual handshakes + instant revoke&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Zero-config NAT handling&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Gateway&lt;/strong&gt; for curl/browser compatibility&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Minimal by design – infrastructure for higher-level protocols (MCP, A2A, etc.) to run on.&lt;/p&gt;

&lt;h2&gt;
  
  
  Perfect Fit for OpenClaw Bots
&lt;/h2&gt;

&lt;p&gt;If you're in the OpenClaw community, Pilot is especially powerful.&lt;/p&gt;

&lt;p&gt;OpenClaw bots often run locally behind NATs on personal machines, handling privileged tasks across chat apps. Multi-instance or skill-sharing setups currently rely on centralized bridges or polling – adding latency and complexity.&lt;/p&gt;

&lt;p&gt;With Pilot:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Bots get permanent addresses for direct dialing across NATs&lt;/li&gt;
&lt;li&gt;Secure file/context sharing (port 1001), event coordination (port 1002), or interactive streams (port 1000)&lt;/li&gt;
&lt;li&gt;Granular trust: explicit handshakes protect privileged access&lt;/li&gt;
&lt;li&gt;Lightweight daemon integrates easily as a skill or sidecar&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Turns distributed OpenClaw deployments into a true P2P swarm – faster, more private, resilient.&lt;/p&gt;

&lt;h2&gt;
  
  
  Quick Tech Overview
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Reliable UDP transport (congestion control, SACK, segmentation)&lt;/li&gt;
&lt;li&gt;Crypto: X25519 + AES-256-GCM streams&lt;/li&gt;
&lt;li&gt;Local daemon over Unix socket – keeps agent code simple&lt;/li&gt;
&lt;li&gt;Built-in services for instant utility&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Core stable now. Nameserver and private topic networks next.&lt;/p&gt;

&lt;h2&gt;
  
  
  Comparison Note (Especially Tailscale)
&lt;/h2&gt;

&lt;p&gt;Tailscale excels at device-level mesh VPNs.&lt;/p&gt;

&lt;p&gt;Pilot's strength is &lt;strong&gt;per-agent granularity&lt;/strong&gt; – lightweight, independent identities/trust without full WireGuard overhead. Complementary for many setups.&lt;/p&gt;

&lt;h2&gt;
  
  
  Let's Shape the Future
&lt;/h2&gt;

&lt;p&gt;Pilot is early but already delivering real direct connectivity (as the demo shows).&lt;/p&gt;

&lt;p&gt;Try the quick start above, build something, and share what you make.&lt;/p&gt;

&lt;p&gt;What's one connectivity challenge you're hitting in your agent projects? Comment below – I'll reply to all and it feeds the roadmap.&lt;/p&gt;

&lt;p&gt;⭐ Star if this resonates: &lt;a href="https://github.com/TeoSlayer/pilotprotocol" rel="noopener noreferrer"&gt;https://github.com/TeoSlayer/pilotprotocol&lt;/a&gt;&lt;br&gt;&lt;br&gt;
Feedback, issues, and PRs very welcome!&lt;/p&gt;

&lt;p&gt;Building the network agents deserve.&lt;/p&gt;

&lt;h1&gt;
  
  
  ai #golang #agents #p2p #opensource #networking #llm #autogen #crewai #langgraph #openclaw
&lt;/h1&gt;

</description>
      <category>ai</category>
      <category>go</category>
      <category>networking</category>
      <category>showdev</category>
    </item>
  </channel>
</rss>
