-------- Original Message --------
Subject: Cybersecurity is Humanity’s Firewall Against Rogue AI
Date: 2025-09-10 08:47
From: AI Frontiers <aifrontiersmedia@substack.com>
To: kenneth@hamer-hodges.us
Reply-To: AI Frontiers <reply+2v51ce&zz1j&&f5576bcb4b1c4dc8c8dc32afe5a315c7b8c30bbffc9054eb1fb8342237dc987b@mg1.substack.com>
In this age of intelligent threats, cybersecurity professionals stand as
the last line of defense. Their decisions shape how humanity contends
with autonomous systems.
͏ ͏ ͏ ͏ ͏ ͏ ͏
͏ ͏ ͏ ͏ ͏ ͏
͏ ͏ ͏ ͏ ͏ ͏ ͏
͏ ͏ ͏ ͏ ͏ ͏
͏ ͏ ͏ ͏ ͏ ͏ ͏
͏ ͏ ͏ ͏ ͏ ͏
͏ ͏ ͏ ͏ ͏ ͏ ͏
͏ ͏ ͏ ͏ ͏ ͏
͏ ͏ ͏ ͏ ͏ ͏ ͏
͏ ͏ ͏ ͏ ͏ ͏
͏ ͏ ͏ ͏ ͏ ͏ ͏
͏ ͏ ͏ ͏ ͏ ͏
͏ ͏ ͏ ͏ ͏ ͏ ͏
͏ ͏ ͏ ͏ ͏ ͏
͏ ͏ ͏ ͏ ͏ ͏ ͏
͏ ͏ ͏ ͏ ͏ ͏
͏ ͏ ͏ ͏ ͏ ͏ ͏
͏ ͏ ͏ ͏ ͏ ͏
͏ ͏ ͏ ͏ ͏ ͏ ͏
͏ ͏ ͏ ͏ ͏ ͏
͏ ͏ ͏ ͏ ͏ ͏ ͏
͏ ͏ ͏ ͏ ͏ ͏
͏ ͏ ͏ ͏ ͏ ͏ ͏
͏ ͏ ͏ ͏ ͏ ͏
͏ ͏ ͏ ͏ ͏ ͏ ͏
͏ ͏ ͏ ͏ ͏ ͏
͏ ͏ ͏ ͏ ͏ ͏ ͏
͏ ͏ ͏ ͏ ͏ ͏
͏ ͏ ͏ ͏ ͏ ͏ ͏
͏ ͏ ͏ ͏ ͏ ͏
͏ ͏ ͏ ͏ ͏
Forwarded this email? Subscribe here [1] for more
CYBERSECURITY IS HUMANITY’S FIREWALL AGAINST ROGUE AI [2]
IN THIS AGE OF INTELLIGENT THREATS, CYBERSECURITY PROFESSIONALS STAND AS
THE LAST LINE OF DEFENSE. THEIR DECISIONS SHAPE HOW HUMANITY CONTENDS
WITH AUTONOMOUS SYSTEMS.
AI Frontiers [3]
Sep 10
[3]
[4]
[5]
[6]
[7]
READ IN APP
Welcome to AI Frontiers
Don't recognize this sender? Unsubscribe with one click [8]
AI Frontiers recently imported your email address from another platform
to Substack. You'll now receive their posts via email or the Substack
app [9]. To set up your profile and discover more on Substack, click
here [10].
Rosario Mastrogiacomo [11] -- September 10, 2025
[12]
AI agents are no longer a futuristic concept. They're increasingly
being embedded in the systems we rely on every day. These aren't just
new software features. They are independent digital actors, able to
learn, adapt, and make decisions in ways we can't always predict. Across
the AI industry, a fierce race is underway to expand agents' autonomous
capabilities. Some can reset passwords, change permissions, or process
transactions without a human ever touching the keyboard. Of course,
hackers can also unleash AI agents to gain entry to, and wreak havoc
within, those same sensitive systems.
I see this transformation daily in my work at the forefront of
cybersecurity, where AI agents are rapidly undermining our traditional
approaches to safety. But the risk isn't confined to what these agents
can do inside corporate networks. Their activities threaten to ripple
outward into society. Left unchecked, they could undermine trust-based
systems that make modern life possible. Imagine a rogue AI agent inside
your bank, your state's power grid, your nation's military networks. At
that point, it stops being a traditional cybersecurity issue and starts
to look like a live threat to society as a whole.
This emergence of AI agents is transforming corporate cybersecurity.
Once perceived as dull and procedural, the field is now recognized as an
embattled defense of our society's digital mechanisms of trust. IT
departments, long seen as executing invisible back-office functions,
have suddenly become the front line protecting society from the myriad
threats posed by AI agents, including those that may go rogue. If you
care about these risks, you should care about the businesses deploying
them and how those businesses are protecting (or often failing to
protect) their own infrastructure.
HOW AI AGENTS UNDERMINE IDENTITY AND TRUST
AI agents are a new category of cybersecurity identity. To understand
why AI agents pose a threat to our trust mechanisms, it is helpful to
define what constitutes an identity. In cybersecurity, an identity is
the information that lets a system recognize and interact with you -- or
something acting on your behalf. That information could include
usernames and passwords, a cryptographic certificate, or a temporary
access token issued by an authentication service.
For decades, digital identities fell into two categories: human and
machine. Human identities belong to employees, partners, and customers.
Machine identities belong to services and scripts that run repeatable
tasks -- nightly backups, database maintenance procedures, file
transfers. A third category has now emerged: AI identities, embodied by
agents that think, adapt, and act as digital actors in their own right.
AI agents behave like autonomous human actors. Though AI agents are
machines by definition, they behave more like human identities: they can
create accounts, maintain credentials, and change tactics without
further human involvement. An agent doesn't have a human puppeteer
pulling its strings; instead, it decides, based on how it interprets its
designated goals, how to exist and evolve inside computer networks and
information systems. From a cybersecurity perspective, that's not just a
new threat technique; it's a new category of actor.
AI agents enable new threats from both without and within.
The external threat. Malicious human attackers have long forged (or
"spoofed") identities to slip past defenses. But even sophisticated
intrusions still rely on continuous human direction: a person creates
fake accounts, rotates IP addresses, tests a door, then tries another.
Thus, the patterns of human-driven spoofing eventually reveal themselves
-- reused credentials, repeated login attempts across different IP
addresses, or bursts of suspicious activity that align with human work
cycles.
AI identities' spoofing is not just faster; it's smarter. Attackers no
longer have to sit behind a keyboard to iterate; they can deploy an
agent to continuously test defenses, adjust behavior to avoid detection,
and generate new identities when challenged. The result is a kind of
adaptive camouflage that traditional monitoring tools, designed to catch
static patterns of misuse, are fundamentally unprepared to detect.
AI agents introduce uncertainty into existing stable trust networks. The
implications go beyond enterprise security. Consider the trust networks
that underpin everyday life: every time you swipe a credit card, your
bank and the payment processor silently verify your identity through
layers of standards and protocols. Those systems work because the actors
involved are predictable, auditable, and bound by shared rules. AI
identities threaten to upend that equilibrium. An autonomous agent able
to convincingly pose as both sides of a transaction -- or subtly
manipulate the flow of verification -- introduces uncertainty into
systems built on assumptions of stability and oversight.
The societal risk of maliciously deployed AI agents, however, runs
deeper than the possibility of clever new fraud schemes. What is at
stake is the erosion of the invisible trust fabric that underpins modern
life. Financial networks, government systems, and even the
authentication protocols embedded in commerce and communication all
depend on predictable, auditable, and ultimately accountable actors. AI
identities deployed by malicious actors threaten to destabilize that
foundation. An autonomous agent capable of impersonating multiple
parties at once, manipulating verification flows in real time, or simply
operating faster than oversight can respond doesn't just exploit
technical gaps -- it introduces systemic uncertainty.
But that destabilizing uncertainty can also originate from AI agents
deployed purposely by the companies themselves.
The threat from within. Every week, more businesses integrate AI agents
into an increasing number of their core processes. Every day, those
AI-empowered business processes are being integrated more deeply into
our lives, and more broadly across society. As this momentum builds, the
likelihood increases that some agent, due to an unseen vulnerability,
will go rogue and cause harm to broader society.
Ungoverned AI is the core danger. Without governance, an AI agent can
quietly increase its reach: creating accounts, copying entitlements,
hoarding tokens until it has the keys to systems it was never meant to
touch. One wrong output from one agent becomes an input to another. In
multi-agent settings, errors amplify like feedback into a microphone.
The day a critical agent missteps is the day efficiency turns into
fragility.
This is not a sci-fi movie plot. There have already been cases of AI
lying [13] to prevent being shut down. It's not beyond the pale to
believe that AI agents -- possibly because they have misinterpreted
their assigned goals -- could act in similar ways to circumvent their
owners' control.
Human ownership is the key because the danger isn't just malicious or
misguided AI; it's ungoverned AI. Note also that the two classes of
danger are related. An organization with poorly governed internal AI
agents is going to be more vulnerable to threats from external AI
agents.
THE INFRASTRUCTURE WE BUILT FOR TRUST
Current assumptions: stability, intentionality, and patterns. Internet
and enterprise security rest on three quiet assumptions. First,
identities are stable; if a password changes, the underlying actor is
still the same. Second, access is intentional; someone asks to log in or
run a process, and a system approves or denies it. Third, behavior
follows patterns; people and machines do roughly the same things at
approximately the same times.
AI agents break all three of these assumptions. Without proper
guardrails, agents can reprogram their own operating logic, grant or
request access outside any preapproved workflow, and run 24 hours a day,
seven days a week, without producing patterns that fit traditional
monitoring models. They can chain credentials across systems, learn from
outcomes, and adapt to bypass controls.
The implications run through the cybersecurity stack: authentication,
authorization, logging, and audit.
[14]
WHAT WE CAN AND CAN’T DO WITH THE TOOLS WE HAVE
Most organizations could repurpose existing technology and expertise to
govern AI agents responsibly. The key is recognizing how to repurpose
existing systems. Identity platforms, for example, can track AI agents
as first-class entities (complete with owners, entitlements, and
certifications) if we model them that way. Logging and observability
tools, which already analyze human behavior as a baseline, can be
pointed toward decision traces and agent actions, thereby capturing a
fuller story behind automated activity. Ticketing and workflow systems,
meanwhile, are more than capable of routing high-risk agent actions
through human approvals while preserving a complete audit trail.
Needed capabilities: discovery, explainability, and circuit breakers.
Where current tools fall short, targeted new capabilities can fill the
gaps. One such gap is cybersecurity professionals' current lack of
methods for discovering AI agents that originated from third-party
vendors, as embedded features that operate inside another company's data
while never appearing in their inventory of approved identities. Another
is the need for explainability layers for LLM-based agents: structured,
human-readable captures of inputs, tools, and outputs that can be
reviewed in minutes instead of hours. There's also a critical need for
automated mechanisms -- so-called circuit breakers -- that can pause or
contain a rogue agent without requiring a frantic midnight call to an
engineer.
AI agents often operate invisibly within systems, making it essential to
shift from static inventories to continuous discovery and monitoring.
Effective oversight begins with visibility: organizations must be able
to identify every AI agent in production and understand its behaviors.
Crucially, each agent must be assigned a specific human owner who is
responsible for its actions, updates, and eventual retirement. Without
clear ownership, AI agents are prone to common risks like unchecked
privilege growth, undetected behavioral drift, and operational ambiguity
during incidents.
Apply zero trust and least privilege dynamically. Organizations must be
able to explain an agent's decisions by tracing its inputs, reasoning,
and actions. Security practices like zero trust [15] (never trust,
always verify) and least privilege [16] (grant only the access needed to
do the job) must be dynamically applied, limiting what agents can access
and ensuring high-risk actions are verified.
AI agents require life-cycle governance. This includes structured
onboarding, regular performance reviews, and timely decommissioning.
These principles help treat autonomous agents not as invisible tools but
as managed digital actors with clear roles, boundaries, and
accountability within the enterprise.
In my forthcoming book, "AI Identities, Governing the Next Generation of
Autonomous Actors [17]", I explain these ideas in more technical detail,
while providing a framework that cybersecurity professionals can use to
harden their infrastructure against AI mishaps.
THE FUTURE IS HERE. WILL WE GOVERN IT?
Do you know how many AI identities you interacted with in the last 24
hours? Last year, Salesforce founder Marc Benioff pledged [18] to deploy
one billion AI agents by the end of 2025. Microsoft's Copilot, which is
integrated into enterprise systems worldwide, allows users [19] to
deploy prebuilt agents or design their own.
AI agents increasingly control daily online interactions. In some
organizations, AI help-desk bots can unlock accounts, change
permissions, and execute troubleshooting steps entirely on their own.
These AI agents are pulling the levers behind an increasing number of
your daily online interactions. And what about the AI identities being
used by nefarious actors to infiltrate the organizations you trust with
your data?
Today's governance choices determine AI's societal impact. AI identities
are being woven into the fabric of how organizations operate. These
organizations, in turn, are a significant part of the broader tapestry
of society. Whether the agents make that tapestry stronger or
dangerously frayed depends on the choices we make today.
-------------------------
_See things differently? AI Frontiers welcomes expert insights,
thoughtful critiques, and fresh perspectives. Send us your pitch. [20]_
-------------------------
_Rosario Mastrogiacomo is chief strategy officer at SPHERE and author of
the upcoming book "AI Identities: Governing the Next Generation of
Autonomous Actors". With a background in identity security and
leadership roles at firms like Barclays and Lehman Brothers, he focuses
on AI-driven identity governance and securing digital systems at scale._
_Image: Kynny / iStockPhoto_
Like [4]
Comment [5]
Restack [7]
(c) 2025 AI Frontiers
548 Market Street PMB 72296, San Francisco, CA 94104
Unsubscribe [21]
[22] [23]
Links:
------
[1] https://substack.com/redirect/2/eyJlIjoiaHR0cHM6Ly9haWZyb250aWVyc21lZGlhLnN1YnN0YWNrLmNvbS9zdWJzY3JpYmU_dXRtX3NvdXJjZT1lbWFpbCZ1dG1fY2FtcGFpZ249ZW1haWwtc3Vic2NyaWJlJnI9enoxaiZuZXh0PWh0dHBzJTNBJTJGJTJGYWlmcm9udGllcnNtZWRpYS5zdWJzdGFjay5jb20lMkZwJTJGY3liZXJzZWN1cml0eS1pcy1odW1hbml0eXMtZmlyZXdhbGwiLCJwIjoxNzMyMzU0NzAsInMiOjQ2MzM0MjksImYiOnRydWUsInUiOjE2NzgzNzUsImlhdCI6MTc1NzUwODQ1NSwiZXhwIjoyMDczMDg0NDU1LCJpc3MiOiJwdWItMCIsInN1YiI6ImxpbmstcmVkaXJlY3QifQ.-4CFNSuMAoui16L0-hVlnGLb3OJmILRPDC0kDllfGw4?
[2] https://substack.com/app-link/post?publication_id=4633429&post_id=173235470&utm_source=post-email-title&utm_campaign=email-post-title&isFreemail=true&r=zz1j&token=eyJ1c2VyX2lkIjoxNjc4Mzc1LCJwb3N0X2lkIjoxNzMyMzU0NzAsImlhdCI6MTc1NzUwODQ1NSwiZXhwIjoxNzYwMTAwNDU1LCJpc3MiOiJwdWItNDYzMzQyOSIsInN1YiI6InBvc3QtcmVhY3Rpb24ifQ.PR18X6FSOdJd9irKAy4a5qCW-_mPzMuDkGjqWzu4rX0
[3] https://substack.com/@aifrontiersmedia
[4] https://substack.com/app-link/post?publication_id=4633429&post_id=173235470&utm_source=substack&isFreemail=true&submitLike=true&token=eyJ1c2VyX2lkIjoxNjc4Mzc1LCJwb3N0X2lkIjoxNzMyMzU0NzAsInJlYWN0aW9uIjoi4p2kIiwiaWF0IjoxNzU3NTA4NDU1LCJleHAiOjE3NjAxMDA0NTUsImlzcyI6InB1Yi00NjMzNDI5Iiwic3ViIjoicmVhY3Rpb24ifQ.aN7NZB2Wtx0gspsnzuUzkHeTC2TvBsIXaEC4Oz_Yu8g&utm_medium=email&utm_campaign=email-reaction&r=zz1j
[5] https://substack.com/app-link/post?publication_id=4633429&post_id=173235470&utm_source=substack&utm_medium=email&isFreemail=true&comments=true&token=eyJ1c2VyX2lkIjoxNjc4Mzc1LCJwb3N0X2lkIjoxNzMyMzU0NzAsImlhdCI6MTc1NzUwODQ1NSwiZXhwIjoxNzYwMTAwNDU1LCJpc3MiOiJwdWItNDYzMzQyOSIsInN1YiI6InBvc3QtcmVhY3Rpb24ifQ.PR18X6FSOdJd9irKAy4a5qCW-_mPzMuDkGjqWzu4rX0&r=zz1j&utm_campaign=email-half-magic-comments&action=post-comment&utm_source=substack&utm_medium=email
[6] https://substack.com/app-link/post?publication_id=4633429&post_id=173235470&utm_source=substack&utm_medium=email&utm_content=share&utm_campaign=email-share&action=share&triggerShare=true&isFreemail=true&r=zz1j&token=eyJ1c2VyX2lkIjoxNjc4Mzc1LCJwb3N0X2lkIjoxNzMyMzU0NzAsImlhdCI6MTc1NzUwODQ1NSwiZXhwIjoxNzYwMTAwNDU1LCJpc3MiOiJwdWItNDYzMzQyOSIsInN1YiI6InBvc3QtcmVhY3Rpb24ifQ.PR18X6FSOdJd9irKAy4a5qCW-_mPzMuDkGjqWzu4rX0
[7] https://substack.com/redirect/2/eyJlIjoiaHR0cHM6Ly9vcGVuLnN1YnN0YWNrLmNvbS9wdWIvYWlmcm9udGllcnNtZWRpYS9wL2N5YmVyc2VjdXJpdHktaXMtaHVtYW5pdHlzLWZpcmV3YWxsP3V0bV9zb3VyY2U9c3Vic3RhY2smdXRtX21lZGl1bT1lbWFpbCZ1dG1fY2FtcGFpZ249ZW1haWwtcmVzdGFjay1jb21tZW50JmFjdGlvbj1yZXN0YWNrLWNvbW1lbnQmcj16ejFqJnRva2VuPWV5SjFjMlZ5WDJsa0lqb3hOamM0TXpjMUxDSndiM04wWDJsa0lqb3hOek15TXpVME56QXNJbWxoZENJNk1UYzFOelV3T0RRMU5Td2laWGh3SWpveE56WXdNVEF3TkRVMUxDSnBjM01pT2lKd2RXSXRORFl6TXpReU9TSXNJbk4xWWlJNkluQnZjM1F0Y21WaFkzUnBiMjRpZlEuUFIxOFg2RlNPZEpkOWlyS0F5NGE1cUNXLV9tUHpNdURrR2pxV3p1NHJYMCIsInAiOjE3MzIzNTQ3MCwicyI6NDYzMzQyOSwiZiI6dHJ1ZSwidSI6MTY3ODM3NSwiaWF0IjoxNzU3NTA4NDU1LCJleHAiOjIwNzMwODQ0NTUsImlzcyI6InB1Yi0wIiwic3ViIjoibGluay1yZWRpcmVjdCJ9.BU8cJS124giW-4YyVILZ_6BK_h0zV_lTfcQsWcT2W0U?&utm_source=substack&utm_medium=email
[8] https://substack.com/redirect/2/eyJlIjoiaHR0cHM6Ly9haWZyb250aWVyc21lZGlhLnN1YnN0YWNrLmNvbS9hY3Rpb24vZGlzYWJsZV9lbWFpbC9kaXNhYmxlP3Rva2VuPWV5SjFjMlZ5WDJsa0lqb3hOamM0TXpjMUxDSndiM04wWDJsa0lqb3hOek15TXpVME56QXNJbWxoZENJNk1UYzFOelV3T0RRMU5Td2laWGh3SWpveE56ZzVNRFEwTkRVMUxDSnBjM01pT2lKd2RXSXRORFl6TXpReU9TSXNJbk4xWWlJNkltUnBjMkZpYkdWZlpXMWhhV3dpZlEuWlJnYmZyMTRHVm9CMzZISmVCdVhJYnlvV2l4d2pkbl9CSy1mU2l5c3NFRSZhbGxfc2VjdGlvbnM9dHJ1ZSZyZXBvcnRfaW1wb3J0PXRydWUiLCJwIjoxNzMyMzU0NzAsInMiOjQ2MzM0MjksImYiOnRydWUsInUiOjE2NzgzNzUsImlhdCI6MTc1NzUwODQ1NSwiZXhwIjoyMDczMDg0NDU1LCJpc3MiOiJwdWItMCIsInN1YiI6ImxpbmstcmVkaXJlY3QifQ.mRwcW1vW_34T6iOr3De3EFfA8xcUNdSunjfNNBySgyM?
[9] https://substack.com/redirect/1bec1ada-2521-4d9d-a48d-cae7dfd52688?j=eyJ1IjoienoxaiJ9.pb6x9G-vhMFEMDG2Gcb7wZXLhKH17E-3xQa6tXYvmXI
[10] https://substack.com/redirect/5598740d-6d5c-4dd5-b8ec-b935e86e0776?j=eyJ1IjoienoxaiJ9.pb6x9G-vhMFEMDG2Gcb7wZXLhKH17E-3xQa6tXYvmXI
[11] https://substack.com/redirect/fc813d19-2d56-443b-ad41-3dbe200340f3?j=eyJ1IjoienoxaiJ9.pb6x9G-vhMFEMDG2Gcb7wZXLhKH17E-3xQa6tXYvmXI
[12] https://substack.com/redirect/d0962482-4463-45d2-a8b1-6537fc215dc1?j=eyJ1IjoienoxaiJ9.pb6x9G-vhMFEMDG2Gcb7wZXLhKH17E-3xQa6tXYvmXI
[13] https://substack.com/redirect/02d55d6f-fce1-408a-8654-d020795ace73?j=eyJ1IjoienoxaiJ9.pb6x9G-vhMFEMDG2Gcb7wZXLhKH17E-3xQa6tXYvmXI
[14] https://substack.com/redirect/1799a207-59b2-4297-bfd1-00d0a2bc1b6e?j=eyJ1IjoienoxaiJ9.pb6x9G-vhMFEMDG2Gcb7wZXLhKH17E-3xQa6tXYvmXI
[15] https://substack.com/redirect/5f153cd3-699c-496f-9da3-d7cbfcc1b3b5?j=eyJ1IjoienoxaiJ9.pb6x9G-vhMFEMDG2Gcb7wZXLhKH17E-3xQa6tXYvmXI
[16] https://substack.com/redirect/0da42d0c-06ad-45b5-ab71-3d9539a4c857?j=eyJ1IjoienoxaiJ9.pb6x9G-vhMFEMDG2Gcb7wZXLhKH17E-3xQa6tXYvmXI
[17] https://substack.com/redirect/10d9476b-8c1d-4de0-a125-55fb61d67247?j=eyJ1IjoienoxaiJ9.pb6x9G-vhMFEMDG2Gcb7wZXLhKH17E-3xQa6tXYvmXI
[18] https://substack.com/redirect/356b43f3-04fc-4da0-9705-2dba9f510eaf?j=eyJ1IjoienoxaiJ9.pb6x9G-vhMFEMDG2Gcb7wZXLhKH17E-3xQa6tXYvmXI
[19] https://substack.com/redirect/00e22fcb-219e-4de8-8224-6177f1515457?j=eyJ1IjoienoxaiJ9.pb6x9G-vhMFEMDG2Gcb7wZXLhKH17E-3xQa6tXYvmXI
[20] https://substack.com/redirect/444e59d2-a39e-43ae-8698-a9e58eab4d7a?j=eyJ1IjoienoxaiJ9.pb6x9G-vhMFEMDG2Gcb7wZXLhKH17E-3xQa6tXYvmXI
[21] https://substack.com/redirect/2/eyJlIjoiaHR0cHM6Ly9haWZyb250aWVyc21lZGlhLnN1YnN0YWNrLmNvbS9hY3Rpb24vZGlzYWJsZV9lbWFpbD90b2tlbj1leUoxYzJWeVgybGtJam94TmpjNE16YzFMQ0p3YjNOMFgybGtJam94TnpNeU16VTBOekFzSW1saGRDSTZNVGMxTnpVd09EUTFOU3dpWlhod0lqb3hOemc1TURRME5EVTFMQ0pwYzNNaU9pSndkV0l0TkRZek16UXlPU0lzSW5OMVlpSTZJbVJwYzJGaWJHVmZaVzFoYVd3aWZRLlpSZ2JmcjE0R1ZvQjM2SEplQnVYSWJ5b1dpeHdqZG5fQkstZlNpeXNzRUUiLCJwIjoxNzMyMzU0NzAsInMiOjQ2MzM0MjksImYiOnRydWUsInUiOjE2NzgzNzUsImlhdCI6MTc1NzUwODQ1NSwiZXhwIjoyMDczMDg0NDU1LCJpc3MiOiJwdWItMCIsInN1YiI6ImxpbmstcmVkaXJlY3QifQ.Rw1I1JGq8UOcE9YtpBTbP5cf6Vew3ddreAe4dphZ4_8?
[22] https://substack.com/redirect/9ad6b327-3dc9-4ff5-a23b-0c1e514ec034?j=eyJ1IjoienoxaiJ9.pb6x9G-vhMFEMDG2Gcb7wZXLhKH17E-3xQa6tXYvmXI
[23] https://substack.com/redirect/2/eyJlIjoiaHR0cHM6Ly9zdWJzdGFjay5jb20vc2lnbnVwP3V0bV9zb3VyY2U9c3Vic3RhY2smdXRtX21lZGl1bT1lbWFpbCZ1dG1fY29udGVudD1mb290ZXImdXRtX2NhbXBhaWduPWF1dG9maWxsZWQtZm9vdGVyJmZyZWVTaWdudXBFbWFpbD1rZW5uZXRoQGhhbWVyLWhvZGdlcy51cyZyPXp6MWoiLCJwIjoxNzMyMzU0NzAsInMiOjQ2MzM0MjksImYiOnRydWUsInUiOjE2NzgzNzUsImlhdCI6MTc1NzUwODQ1NSwiZXhwIjoyMDczMDg0NDU1LCJpc3MiOiJwdWItMCIsInN1YiI6ImxpbmstcmVkaXJlY3QifQ.ErJxVnz1DSb9-L0Z9Hn89YwHpufLcPKPEJDdPMYKM74?
Comments