{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2026:4BJUOTDSJWG2C6JDO3VPXPX3AM","short_pith_number":"pith:4BJUOTDS","canonical_record":{"source":{"id":"2605.16436","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by-nc-sa/4.0/","primary_cat":"cs.CR","submitted_at":"2026-05-14T21:30:06Z","cross_cats_sorted":["cs.AI"],"title_canon_sha256":"738f342ec46efc821325857ab6c77b3e98fe5b4a1d810a99f5b23eec2cac9033","abstract_canon_sha256":"15e062f7ddb4a6f37fafa63754e2cd57d2ecafbf9370c81d60afa3dd14bb6737"},"schema_version":"1.0"},"canonical_sha256":"e053474c724d8da1792376eafbbefb03112aab5d9ca2f79c347f507fcf137e3a","source":{"kind":"arxiv","id":"2605.16436","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.16436","created_at":"2026-05-20T00:02:21Z"},{"alias_kind":"arxiv_version","alias_value":"2605.16436v1","created_at":"2026-05-20T00:02:21Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.16436","created_at":"2026-05-20T00:02:21Z"},{"alias_kind":"pith_short_12","alias_value":"4BJUOTDSJWG2","created_at":"2026-05-20T00:02:21Z"},{"alias_kind":"pith_short_16","alias_value":"4BJUOTDSJWG2C6JD","created_at":"2026-05-20T00:02:21Z"},{"alias_kind":"pith_short_8","alias_value":"4BJUOTDS","created_at":"2026-05-20T00:02:21Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2026:4BJUOTDSJWG2C6JDO3VPXPX3AM","target":"record","payload":{"canonical_record":{"source":{"id":"2605.16436","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by-nc-sa/4.0/","primary_cat":"cs.CR","submitted_at":"2026-05-14T21:30:06Z","cross_cats_sorted":["cs.AI"],"title_canon_sha256":"738f342ec46efc821325857ab6c77b3e98fe5b4a1d810a99f5b23eec2cac9033","abstract_canon_sha256":"15e062f7ddb4a6f37fafa63754e2cd57d2ecafbf9370c81d60afa3dd14bb6737"},"schema_version":"1.0"},"canonical_sha256":"e053474c724d8da1792376eafbbefb03112aab5d9ca2f79c347f507fcf137e3a","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-20T00:02:21.979037Z","signature_b64":"bfIAA2NwIw0J0gZnpgEksGrUbJN9/X6JmW0WDAxa09zLsA351ky+d5iIkt52jrQ/ZwiPnppu2tQCugg+NgjwAg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"e053474c724d8da1792376eafbbefb03112aab5d9ca2f79c347f507fcf137e3a","last_reissued_at":"2026-05-20T00:02:21.978415Z","signature_status":"signed_v1","first_computed_at":"2026-05-20T00:02:21.978415Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"2605.16436","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-20T00:02:21Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"2nl98AF5TeRapKCV8RxFXziMPUlxP+smjkhum5yHJ3fpKrC+a5eJGR96m6kwsIf2NGDq4+q+3w55rsIw9JbbBA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T13:37:07.658326Z"},"content_sha256":"25089dfdc59197370fd868a8a82deba97d2a10c9ed98ba86e9eab4f38f932e09","schema_version":"1.0","event_id":"sha256:25089dfdc59197370fd868a8a82deba97d2a10c9ed98ba86e9eab4f38f932e09"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2026:4BJUOTDSJWG2C6JDO3VPXPX3AM","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"The End of Trust: How Agentic AI Breaks Security Assumptions","license":"http://creativecommons.org/licenses/by-nc-sa/4.0/","headline":"","cross_cats":["cs.AI"],"primary_cat":"cs.CR","authors_text":"Alexander Nemecek, Erman Ayday, Osama Zafar","submitted_at":"2026-05-14T21:30:06Z","abstract_excerpt":"For decades, the security of digital interaction has rested on an unacknowledged economic constraint. Attackers faced a tradeoff between the fidelity of a deception and the scale at which it could be deployed. Convincing impersonation required sustained human effort and was confined to a narrow set of high-value targets, while mass-market attacks sacrificed plausibility for reach. Detection systems, verification mechanisms, and user awareness training have all been implicitly calibrated to the artifacts of cheap deception that this tradeoff produced. Agentic AI collapses the tradeoff, allowing"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2605.16436","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"integrity":{"clean":true,"summary":{"advisory":0,"critical":0,"by_detector":{},"informational":0},"endpoint":"/pith/2605.16436/integrity.json","findings":[],"available":true,"detectors_run":[{"name":"ai_meta_artifact","ran_at":"2026-05-19T19:34:36.578691Z","status":"skipped","version":"1.0.0","findings_count":0},{"name":"claim_evidence","ran_at":"2026-05-19T19:21:57.104901Z","status":"completed","version":"1.0.0","findings_count":0}],"snapshot_sha256":"5f34d5fb8a27e0465bbb854e9229c5e37c48c1f5f064ae9accddb1301bb68e09"},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-20T00:02:21Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"jsTI4jSzuUhSeP/k3yAdIdEAlusieHd6/gZaDvCgmJ0zQGFmLSUHzr/A0GMFX/F3mh0BjtlN1gI986LAprbjCw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T13:37:07.658741Z"},"content_sha256":"c26e73e518e10491a229f2f7efb4efead53f2d73071bb42460e72d1eb93dbcc3","schema_version":"1.0","event_id":"sha256:c26e73e518e10491a229f2f7efb4efead53f2d73071bb42460e72d1eb93dbcc3"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/4BJUOTDSJWG2C6JDO3VPXPX3AM/bundle.json","state_url":"https://pith.science/pith/4BJUOTDSJWG2C6JDO3VPXPX3AM/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/4BJUOTDSJWG2C6JDO3VPXPX3AM/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T13:37:07Z","links":{"resolver":"https://pith.science/pith/4BJUOTDSJWG2C6JDO3VPXPX3AM","bundle":"https://pith.science/pith/4BJUOTDSJWG2C6JDO3VPXPX3AM/bundle.json","state":"https://pith.science/pith/4BJUOTDSJWG2C6JDO3VPXPX3AM/state.json","well_known_bundle":"https://pith.science/.well-known/pith/4BJUOTDSJWG2C6JDO3VPXPX3AM/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2026:4BJUOTDSJWG2C6JDO3VPXPX3AM","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"15e062f7ddb4a6f37fafa63754e2cd57d2ecafbf9370c81d60afa3dd14bb6737","cross_cats_sorted":["cs.AI"],"license":"http://creativecommons.org/licenses/by-nc-sa/4.0/","primary_cat":"cs.CR","submitted_at":"2026-05-14T21:30:06Z","title_canon_sha256":"738f342ec46efc821325857ab6c77b3e98fe5b4a1d810a99f5b23eec2cac9033"},"schema_version":"1.0","source":{"id":"2605.16436","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.16436","created_at":"2026-05-20T00:02:21Z"},{"alias_kind":"arxiv_version","alias_value":"2605.16436v1","created_at":"2026-05-20T00:02:21Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.16436","created_at":"2026-05-20T00:02:21Z"},{"alias_kind":"pith_short_12","alias_value":"4BJUOTDSJWG2","created_at":"2026-05-20T00:02:21Z"},{"alias_kind":"pith_short_16","alias_value":"4BJUOTDSJWG2C6JD","created_at":"2026-05-20T00:02:21Z"},{"alias_kind":"pith_short_8","alias_value":"4BJUOTDS","created_at":"2026-05-20T00:02:21Z"}],"graph_snapshots":[{"event_id":"sha256:c26e73e518e10491a229f2f7efb4efead53f2d73071bb42460e72d1eb93dbcc3","target":"graph","created_at":"2026-05-20T00:02:21Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"integrity":{"available":true,"clean":true,"detectors_run":[{"findings_count":0,"name":"ai_meta_artifact","ran_at":"2026-05-19T19:34:36.578691Z","status":"skipped","version":"1.0.0"},{"findings_count":0,"name":"claim_evidence","ran_at":"2026-05-19T19:21:57.104901Z","status":"completed","version":"1.0.0"}],"endpoint":"/pith/2605.16436/integrity.json","findings":[],"snapshot_sha256":"5f34d5fb8a27e0465bbb854e9229c5e37c48c1f5f064ae9accddb1301bb68e09","summary":{"advisory":0,"by_detector":{},"critical":0,"informational":0}},"paper":{"abstract_excerpt":"For decades, the security of digital interaction has rested on an unacknowledged economic constraint. Attackers faced a tradeoff between the fidelity of a deception and the scale at which it could be deployed. Convincing impersonation required sustained human effort and was confined to a narrow set of high-value targets, while mass-market attacks sacrificed plausibility for reach. Detection systems, verification mechanisms, and user awareness training have all been implicitly calibrated to the artifacts of cheap deception that this tradeoff produced. Agentic AI collapses the tradeoff, allowing","authors_text":"Alexander Nemecek, Erman Ayday, Osama Zafar","cross_cats":["cs.AI"],"headline":"","license":"http://creativecommons.org/licenses/by-nc-sa/4.0/","primary_cat":"cs.CR","submitted_at":"2026-05-14T21:30:06Z","title":"The End of Trust: How Agentic AI Breaks Security Assumptions"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2605.16436","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:25089dfdc59197370fd868a8a82deba97d2a10c9ed98ba86e9eab4f38f932e09","target":"record","created_at":"2026-05-20T00:02:21Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"15e062f7ddb4a6f37fafa63754e2cd57d2ecafbf9370c81d60afa3dd14bb6737","cross_cats_sorted":["cs.AI"],"license":"http://creativecommons.org/licenses/by-nc-sa/4.0/","primary_cat":"cs.CR","submitted_at":"2026-05-14T21:30:06Z","title_canon_sha256":"738f342ec46efc821325857ab6c77b3e98fe5b4a1d810a99f5b23eec2cac9033"},"schema_version":"1.0","source":{"id":"2605.16436","kind":"arxiv","version":1}},"canonical_sha256":"e053474c724d8da1792376eafbbefb03112aab5d9ca2f79c347f507fcf137e3a","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"e053474c724d8da1792376eafbbefb03112aab5d9ca2f79c347f507fcf137e3a","first_computed_at":"2026-05-20T00:02:21.978415Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-20T00:02:21.978415Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"bfIAA2NwIw0J0gZnpgEksGrUbJN9/X6JmW0WDAxa09zLsA351ky+d5iIkt52jrQ/ZwiPnppu2tQCugg+NgjwAg==","signature_status":"signed_v1","signed_at":"2026-05-20T00:02:21.979037Z","signed_message":"canonical_sha256_bytes"},"source_id":"2605.16436","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:25089dfdc59197370fd868a8a82deba97d2a10c9ed98ba86e9eab4f38f932e09","sha256:c26e73e518e10491a229f2f7efb4efead53f2d73071bb42460e72d1eb93dbcc3"],"state_sha256":"75212acdbbe485a0ace78e7f9f7b7730c51aa5906b4eafa99e9898fd8593cf82"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"nMBrgaso/ueiVgoiTSXVS0KEx5ttjAbm4WN3nkGFZNOAbmI/1L/8UJpMMZ318PvRGcRNr0R8MJZ6hFdA8oiSCA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T13:37:07.661447Z","bundle_sha256":"8443b326598e7327a0abc4c2195ae33b2bd297006172b0821322bb4942e405ba"}}