{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2026:4BJUOTDSJWG2C6JDO3VPXPX3AM","short_pith_number":"pith:4BJUOTDS","schema_version":"1.0","canonical_sha256":"e053474c724d8da1792376eafbbefb03112aab5d9ca2f79c347f507fcf137e3a","source":{"kind":"arxiv","id":"2605.16436","version":1},"attestation_state":"computed","paper":{"title":"The End of Trust: How Agentic AI Breaks Security Assumptions","license":"http://creativecommons.org/licenses/by-nc-sa/4.0/","headline":"","cross_cats":["cs.AI"],"primary_cat":"cs.CR","authors_text":"Alexander Nemecek, Erman Ayday, Osama Zafar","submitted_at":"2026-05-14T21:30:06Z","abstract_excerpt":"For decades, the security of digital interaction has rested on an unacknowledged economic constraint. Attackers faced a tradeoff between the fidelity of a deception and the scale at which it could be deployed. Convincing impersonation required sustained human effort and was confined to a narrow set of high-value targets, while mass-market attacks sacrificed plausibility for reach. Detection systems, verification mechanisms, and user awareness training have all been implicitly calibrated to the artifacts of cheap deception that this tradeoff produced. Agentic AI collapses the tradeoff, allowing"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"2605.16436","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by-nc-sa/4.0/","primary_cat":"cs.CR","submitted_at":"2026-05-14T21:30:06Z","cross_cats_sorted":["cs.AI"],"title_canon_sha256":"738f342ec46efc821325857ab6c77b3e98fe5b4a1d810a99f5b23eec2cac9033","abstract_canon_sha256":"15e062f7ddb4a6f37fafa63754e2cd57d2ecafbf9370c81d60afa3dd14bb6737"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-20T00:02:21.979037Z","signature_b64":"bfIAA2NwIw0J0gZnpgEksGrUbJN9/X6JmW0WDAxa09zLsA351ky+d5iIkt52jrQ/ZwiPnppu2tQCugg+NgjwAg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"e053474c724d8da1792376eafbbefb03112aab5d9ca2f79c347f507fcf137e3a","last_reissued_at":"2026-05-20T00:02:21.978415Z","signature_status":"signed_v1","first_computed_at":"2026-05-20T00:02:21.978415Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"The End of Trust: How Agentic AI Breaks Security Assumptions","license":"http://creativecommons.org/licenses/by-nc-sa/4.0/","headline":"","cross_cats":["cs.AI"],"primary_cat":"cs.CR","authors_text":"Alexander Nemecek, Erman Ayday, Osama Zafar","submitted_at":"2026-05-14T21:30:06Z","abstract_excerpt":"For decades, the security of digital interaction has rested on an unacknowledged economic constraint. Attackers faced a tradeoff between the fidelity of a deception and the scale at which it could be deployed. Convincing impersonation required sustained human effort and was confined to a narrow set of high-value targets, while mass-market attacks sacrificed plausibility for reach. Detection systems, verification mechanisms, and user awareness training have all been implicitly calibrated to the artifacts of cheap deception that this tradeoff produced. Agentic AI collapses the tradeoff, allowing"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2605.16436","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"integrity":{"clean":true,"summary":{"advisory":0,"critical":0,"by_detector":{},"informational":0},"endpoint":"/pith/2605.16436/integrity.json","findings":[],"available":true,"detectors_run":[{"name":"ai_meta_artifact","ran_at":"2026-05-19T19:34:36.578691Z","status":"skipped","version":"1.0.0","findings_count":0},{"name":"claim_evidence","ran_at":"2026-05-19T19:21:57.104901Z","status":"completed","version":"1.0.0","findings_count":0}],"snapshot_sha256":"5f34d5fb8a27e0465bbb854e9229c5e37c48c1f5f064ae9accddb1301bb68e09"},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"2605.16436","created_at":"2026-05-20T00:02:21.978523+00:00"},{"alias_kind":"arxiv_version","alias_value":"2605.16436v1","created_at":"2026-05-20T00:02:21.978523+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.16436","created_at":"2026-05-20T00:02:21.978523+00:00"},{"alias_kind":"pith_short_12","alias_value":"4BJUOTDSJWG2","created_at":"2026-05-20T00:02:21.978523+00:00"},{"alias_kind":"pith_short_16","alias_value":"4BJUOTDSJWG2C6JD","created_at":"2026-05-20T00:02:21.978523+00:00"},{"alias_kind":"pith_short_8","alias_value":"4BJUOTDS","created_at":"2026-05-20T00:02:21.978523+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/4BJUOTDSJWG2C6JDO3VPXPX3AM","json":"https://pith.science/pith/4BJUOTDSJWG2C6JDO3VPXPX3AM.json","graph_json":"https://pith.science/api/pith-number/4BJUOTDSJWG2C6JDO3VPXPX3AM/graph.json","events_json":"https://pith.science/api/pith-number/4BJUOTDSJWG2C6JDO3VPXPX3AM/events.json","paper":"https://pith.science/paper/4BJUOTDS"},"agent_actions":{"view_html":"https://pith.science/pith/4BJUOTDSJWG2C6JDO3VPXPX3AM","download_json":"https://pith.science/pith/4BJUOTDSJWG2C6JDO3VPXPX3AM.json","view_paper":"https://pith.science/paper/4BJUOTDS","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=2605.16436&json=true","fetch_graph":"https://pith.science/api/pith-number/4BJUOTDSJWG2C6JDO3VPXPX3AM/graph.json","fetch_events":"https://pith.science/api/pith-number/4BJUOTDSJWG2C6JDO3VPXPX3AM/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/4BJUOTDSJWG2C6JDO3VPXPX3AM/action/timestamp_anchor","attest_storage":"https://pith.science/pith/4BJUOTDSJWG2C6JDO3VPXPX3AM/action/storage_attestation","attest_author":"https://pith.science/pith/4BJUOTDSJWG2C6JDO3VPXPX3AM/action/author_attestation","sign_citation":"https://pith.science/pith/4BJUOTDSJWG2C6JDO3VPXPX3AM/action/citation_signature","submit_replication":"https://pith.science/pith/4BJUOTDSJWG2C6JDO3VPXPX3AM/action/replication_record"}},"created_at":"2026-05-20T00:02:21.978523+00:00","updated_at":"2026-05-20T00:02:21.978523+00:00"}