crypto[native]

crypto[native]

Share this post

crypto[native]
crypto[native]
Part 3: You Are the Protocol

Part 3: You Are the Protocol

How Agents Use Identity as Infrastructure and UX Becomes You

Tom Serres's avatar
Tom Serres
Jul 29, 2025
∙ Paid
2

Share this post

crypto[native]
crypto[native]
Part 3: You Are the Protocol
Share

This article is part of a 4-part Crypto Native series titled Agents Ate the App Store, a narrative exploration of how agent-based systems are replacing traditional apps. We’ll unpack the collapse of the application layer into modular agents, intent-routing workflows, and composable micro-experiences. Part 1 explores the death of the front-end as we knew it. In Part 2, we move into real-time orchestration and agent coordination.

Part 3 shifts the focus to identity and protocol-native UX. Finally, Part 4 explores the self-writing internet, where agents build, compose, and evolve interfaces on the fly. By the end of this series, you’ll see why the future of software is not downloaded, but summoned.

Are you ready to browse the strategies that matter? Explore curated investment plays at Nautilus.Finance, and follow Tom Serres on X.com or LinkedIn for real-time guidance.


You Are the Protocol

Let’s be honest. If the internet were a restaurant, most apps still treat you like a walk-in. You may have eaten there before, sure. You may have left a glowing five-star review on Yelp and a tip that would make a crypto degen blush. But every time you show up, they ask for your name, phone number, and whether you’d like to sign up for the newsletter. Again. It’s like they’re suffering from short-term memory loss, and you're stuck in a bad remake of 50 First Dates, starring you and a very clingy login screen.

In Part 1, we buried the app. In Part 2, we watched agents dance on its grave with orchestration so smooth it made Zapier look like a fax machine with performance anxiety. The interfaces vanished, workflows dissolved into goal choreography, and the software started behaving more like a performance than a product. Now, in Part 3, we’re cracking open the last mile of digital interaction: identity. Because it turns out, the interface isn’t the only relic of the old world that needed a proper send-off. Your user account is next in line for cremation. Toss in the password manager while you’re at it.

Here’s the thing no one wants to admit: when agents are this good, when they can summon workflows from thin air, execute logic without dashboards, and route across APIs like a caffeine-addled conductor with a baton made of GraphQL, the only thing they still struggle with is you. Not your clickstream or your heatmap position. You. The real human behind the request. Who you are. What you like. What you’ve already done. What you should probably avoid because your crypto wallet says “absolutely not.” Agents can call any tool. They can parse any schema. But they still need to know who they’re working for.

Because in a world without apps, the user doesn’t show up at a login screen, they are the login screen. There’s no email/password combo. No two-factor text message to your burner phone. No link that expires in 10 minutes unless you're sitting at your laptop on one leg facing north. There’s just you, embedded into the protocol fabric like a watermark. Your preferences, permissions, and past behaviors, cryptographically signed and ready to be interpreted. You don’t identify yourself. You are your own identifier.

And that’s what changes everything. When identity becomes portable, legible, and machine-readable at runtime, the entire stack recalibrates. The agent doesn’t need to ask who you are, it just reads the signature you’ve already scattered across the network. Your identity isn’t stored. It’s streamed. It’s not attached to a service. It is the service. You, composable. You, verifiable. You, unboxed from the tyranny of “Create Account” buttons.

This is where the concept of “you” stops being a login event and starts becoming a living, cryptographic context that your agent carries across surfaces. The system doesn’t adapt to the screen anymore. It adapts to you, fluidly, privately, and on your terms. Because in the agent economy, the most important API isn’t your data. It’s your identity. And once that becomes protocol-native, the software finally knows how to listen.

Let me know when you’d like to expand the next section or stitch it into the full Part 3 flow.

Portable Intent, Not Persistent Logins

Traditional identity systems were built for walled gardens. Email and password were your keys to the kingdom, if by kingdom you mean the glorified spreadsheet that is Salesforce or the shared document forest that is Notion. Each service sat behind its own velvet rope, demanding your credentials like a bouncer who never remembers your face, even though you've been on the guest list since 2014. But in the agent economy, there are no walls. There’s no velvet rope. There’s not even a door. Just a loosely federated sea of tools, data, and services that don’t care where you came from, only what you’re trying to do.

Your intent doesn’t log in. It arrives. It flows. It drifts in carrying just enough information to prove it belongs, like a jazz musician showing up to a session with a trumpet and a vibe. It doesn’t need a username and password. It doesn’t need to fill out a CAPTCHA or verify a six-digit code sent to the Gmail account you only use for Netflix logins. The agent doesn’t ask, “What’s your username?” It asks, “What does this person usually do in this situation, and are they allowed to do it?” Identity stops being a noun. It becomes a verb. It’s not something you carry. It’s something you perform, ephemeral, contextual, purpose-built.

This subtle shift is what allows agents to move at the speed of thought. Because in a composable world where logic gets assembled on the fly and interfaces are just temporary ghosts, the last thing you want is a modal popup asking you to verify your billing address again. The agent economy doesn’t have patience for static sessions. It trades in trust fragments. Portable identity. Lightweight context. Credentials that are summoned, not stored.

And that’s where decentralized identity (DID), verifiable credentials (VCs), and encrypted context step in like the new backstage crew. These aren’t identity solutions in the old sense. They’re cryptographic vibes. They whisper just enough about you, what you’re permitted to do, what you’ve done before, what preferences you tend to follow, so the agent can act without overstepping. It’s not your full resume. It’s not a KYC dossier. It’s just enough signal to move the task forward without revealing your entire digital autobiography.

You don’t need to log in to order lunch. You don’t need to authenticate your way through three separate workflows to book a boat for your friend’s questionable bachelor weekend. You don’t need to prove you exist every time you want to check your calendar. You simply are, and your agent knows how to represent you because your credentials are composable, encrypted, and scoped to the task at hand.

That’s the heart of portable intent. You don’t carry identity like a passport. You emit it like a scent. The systems that need to recognize you catch just enough of the signal to act accordingly. No persistent cookies. No cross-site tracking. No “accept all” banners pretending to care about your privacy. Just fluid identity, stitched into the protocol layer, ready to move with you wherever your agent leads.


Explore More From Crypto Native: The Thermodynamics of Civilization, The Future of Belonging, You Are a Citizen of Your Stack, and Not Your Corporate Overlord, Not Your Financial Asset.


The Passport is Dead. Long Live the Self

Let’s pour one out for the login screen. It tried its best. Really. It gave us OAuth dance routines, password managers that forgot our master password, 2FA tokens expiring just before we entered them, and captcha boxes so obscure they might’ve been curated by a surrealist art museum. It stacked friction on top of friction in the name of security, and somewhere along the way, we accepted the absurdity. But let’s be honest, it was never designed for agents. It was built for humans. And not just humans, but guests. Intermittent visitors. Manual verifiers of their own digital presence.

Keep reading with a 7-day free trial

Subscribe to crypto[native] to keep reading this post and get 7 days of free access to the full post archives.

Already a paid subscriber? Sign in
© 2025 Tom Serres
Privacy ∙ Terms ∙ Collection notice
Start writingGet the app
Substack is the home for great culture

Share