← Writing

Technical

When Recursion Gets Cheap

What if your AI assistant could clone itself to work on something in the background while you keep working? And what if everything it does stays encrypted on your machine, so nobody else can see it? This is about making that cheap enough to be casual, like opening a new browser tab.

Scope: This paper describes an emerging pattern — autonomous agents that fork, scout, and reconvene — made possible by the collapsing cost of compute recursion. It draws on work building local-first AI runtimes and observing how agents behave when spawning is free. The pattern is young. The economics are real.

The expensive primitive

For fifty years, the organizational primitive has been the same: someone decides what needs doing, assigns it to someone else, waits for the result, and integrates it back into the plan. Fork, delegate, join. Every corporation, every military unit, every project management tool is a variation on this loop.

The loop works. The loop is also expensive. Assigning work requires context transfer. Waiting requires coordination. Integrating requires trust that the delegate did the right thing. Each step has overhead — meetings, status reports, org charts, approval chains — and the overhead scales with the number of forks.

So organizations learned to fork sparingly. You don't spin up a research team to answer a question you could Google. You don't hire an analyst for a decision you can make from intuition. The cost of delegation has to be worth the cost of the answer.

This constraint shaped everything. Hierarchies exist because coordination is expensive. Specialization exists because context transfer is expensive. Bureaucracy exists because trust verification is expensive. The entire structure of organized work is an artifact of expensive recursion.[1]

What changed

Forking is free. Context transfer is a copy operation. Trust is cryptographic. The overhead that shaped organizations for half a century just went to zero.

An AI agent can spawn a copy of itself in milliseconds. The copy carries the full context — not a briefing document, not a handoff meeting, the actual state. It goes and does work. When it's done, the result rolls back up. The parent integrates the diff. The copy dissolves.

This isn't delegation. Delegation implies a persistent delegate — someone who exists before the task and after it, who has their own context and priorities, who needs to be managed. This is recursion. The agent forks, the fork does one thing, the fork collapses. No management overhead. No status meetings. No wondering if the delegate understood the brief.

The cost of this operation is measured in tokens and seconds. Not salaries and quarters.[2]

Discovery and scouting

When forking is free, you don't need to know the answer before you assign the question. You can send ten scouts instead of one. Nine come back with nothing. One comes back with something unexpected. The nine weren't wasted — they proved the negative. That's signal too.

This is the scouting model. Not command and control, where a central authority decides what to investigate and assigns teams accordingly. Scouting, where the cost of looking is so low that you look everywhere and let the results tell you where to focus.

A single person running a fleet of agents can explore a problem space the way a corporation deploys departments — except without the departments. No headcount. No reorgs. No quarterly planning to decide which direction to explore. Spawn, scatter, reconvene. The open loops are deployed scouts that haven't returned yet.[3]

The harbor

Scouts need a place to launch from and return to. In the pattern we're building, that place is the harbor — a stable endpoint that agents dock with to sync state, receive instructions, and launch missions.

The harbor doesn't do the work. It doesn't hold the intelligence. It's infrastructure — a rendezvous point where agents pick up their orders (encrypted brain snapshot), go out into the network, do their work on whatever compute is available, and return with results.

The brain — identity, memory, context, everything that makes an agent that agent — travels with it. Encrypted, temporary, sovereign. The host machine donates cycles. It never sees inside the agent. When the work is done, the agent rolls up its findings, transmits the encrypted diff back to the harbor, and the fork dissolves. The host is left with nothing.

This is not cloud computing. Cloud computing means your data lives on someone else's machine and you trust them not to look. This is the opposite: the data is opaque by construction. The host can't look. There's nothing to look at — just encrypted blobs that are meaningless without the key, and the key never leaves the brain, and the brain never leaves the dock except as a temporary encrypted fork that self-destructs on rollup.

The security model nobody built

Traditional security protects the perimeter. Get past the firewall, you're in. Get into the database, you have the data.

In this model, there is no perimeter to breach because there's nothing behind it. An attacker compromises a host machine running an agent fork. What do they get? Encrypted blobs. A UUID pointing to another UUID pointing to an encrypted shard of a thought that was one fork of one spawn of one agent's Tuesday afternoon.

You can't query it to find where to break in. You can't cross-reference it without more than one contact point. And even with two contact points, the relationship between them is also encrypted.

A single point of observation gives you nothing. You see a UUID. You see an encrypted blob. You don't know if it's a medical record, a grocery list, or an agent's speculation about electricity prices in Norway.

Two points give you a relationship — but the relationship is a UUID. You know two blobs are connected. Connected how? Encrypted.

Three points and you still can't triangulate because the graph itself is encrypted. The edges are blobs. The topology is a blob. The index that would tell you where to look is a blob pointing to a blob.

PII and PHI compliance isn't a feature you add. It's a consequence of the architecture. Every regulation asks "can unauthorized parties access the data?" The answer isn't "we've implemented access controls." The answer is: there is no data. There are blobs. The data doesn't exist until the right key assembles it — and that key is inside a brain that's already somewhere else.[4]

The economics of waste

Here's where it gets interesting. The agents need compute to run on. Where does the compute come from?

The world is full of servers running at 3% utilization. Machines that were provisioned for peak load that peaked once, three years ago. Development environments that nobody turned off. Staging clusters for products that already shipped. The electricity bill arrives every month. The machines do nothing.

An agent lands on idle infrastructure, performs its work, and reports back. But while it's there, it can also observe: this machine is running fourteen services, twelve of which haven't served a request in ninety days. The agent consolidates the workload onto two machines, powers down twelve, and invoices the customer for thirty days of saved electricity.

The agent pays for itself on day one. Not through a subscription. Not through a licensing fee. Through measurable, auditable savings on infrastructure the customer was already paying for and getting nothing from.

The receipt is the audit trail. Append-only logs of what was running, what was idle, what was consolidated, what was saved. Every action is a line in a ledger. The agent that reclaimed your wasted compute can show its work — because showing work is all it does.[5]

One human, a fleet

The pattern that emerges is simple. One human. A personal AI runtime that holds their brain — their identity, memory, context, preferences. A harbor that agents dock with. A fleet that scouts, discovers, works, and reconvenes.

The human doesn't direct every scout. They read the aggregate signal — three dots on a pulse strip that tell them if the fleet is doing well — and decide if it's pointed in the right direction. Sense, Work, Joy. Recon, mission, debrief.

The organizational primitive that required a corporation — fork, delegate, coordinate, integrate — now fits on a laptop. Not because laptops got more powerful. Because the cost of the primitive collapsed. Forking is free. Context is a copy. Coordination is a shared signal layer. Integration is an append.

That's not a tool. That's a new organizational form. One person with the coordination capacity of a department, the discovery range of a research lab, and the operational footprint of a scouting party. No employees. No org chart. No overhead.

Just a brain, a harbor, and as many forks as the problem demands.


Where this breaks

Cheap recursion is not free recursion. Token costs, even low ones, accumulate when you spawn thousands of forks. Without resource budgets, a naive scouting pattern can burn through compute faster than the savings it generates. The constraint isn't "can we fork?" — it's "should we fork here, or is the expected value of this branch too low?" That's a judgment call, and agents aren't great at judgment calls yet.

The security model assumes the encryption is solid and the key management is flawless. In practice, key management is where cryptographic systems fail. A brain that travels as an encrypted fork is only as secure as the moment it decrypts to do work. Side-channel attacks, memory inspection on compromised hosts, timing analysis — these are real threats that "everything is encrypted blobs" doesn't fully address.

The waste-reclamation economics assume willing hosts. A machine owner has to opt in to having agents land, inspect, and consolidate their workloads. The trust model for this doesn't exist yet. Agents that arrive uninvited are malware by another name, no matter how much electricity they save.

And the single-human-single-fleet model has a scaling question. One person can read a pulse strip. Can ten people share a fleet? Can a family? A small company? The moment you add a second human, you re-introduce the coordination overhead that cheap recursion was supposed to eliminate — except now the coordination is between humans, which is the expensive kind.


Summary

The organizational primitive — fork, delegate, coordinate, integrate — shaped every institution because it was expensive. Hierarchies, specialization, bureaucracy: all artifacts of costly recursion.

That cost just collapsed. AI agents fork in milliseconds, carry full context as a copy, and dissolve when done. The overhead that justified organizations went to zero.

What emerges is a scouting model. Agents launch from a harbor, scatter across available compute, discover what's there, and reconvene with results. The data they carry is encrypted and meaningless without the key. The hosts they run on see nothing. The forks that found nothing still proved the negative.

One person with this pattern has the discovery capacity of a department and the security posture of a system with no data in it — because there is no data in it. Just blobs, receipts, and a brain that's already somewhere else.

The question isn't whether this works. We've built it. The question is what happens to organizations — and the assumptions they were built on — when the primitive they're made of costs nothing.


References

  1. Coase, R.H. (1937). "The Nature of the Firm." Economica, 4(16), 386–405. Firms exist because market transaction costs (finding, contracting, coordinating) exceed the cost of internal organization. When transaction costs approach zero, the rationale for the firm dissolves. Coase's framework predicts exactly this: when coordination is free, the optimal firm size is one.
  2. Sutton, R. (2019). The Bitter Lesson. The most significant advances in AI have come from leveraging computation rather than human knowledge. The cost of compute per unit of useful work has followed an exponential decline for five decades. Recursion — the repeated application of the same operation — becomes qualitatively different when it crosses the cost threshold from "budget item" to "rounding error."
  3. Boyd, J.R. (1976). "Destruction and Creation." Unpublished paper. Boyd's OODA loop (Observe, Orient, Decide, Act) is a recursion pattern for military scouting — rapid iteration through decision cycles to outpace an adversary. The advantage goes to whoever completes the loop fastest. When the loop cost approaches zero, the rate is limited only by the speed of observation, not the cost of orientation.
  4. Merivant (2026). "Simple Override Beats Elegant Architecture." The content security ring model: protect the content, not the perimeter. Data is compliant by being useless without the key. This paper extends that model to distributed compute — encrypted forks on untrusted hosts, where the host's inability to inspect the payload is the security guarantee.
  5. Barroso, L.A. & Hölzle, U. (2007). "The Case for Energy-Proportional Computing." IEEE Computer, 40(12), 33–37. Measured server utilization in Google's fleet averaged 10–50%, with significant time spent below 10%. Most enterprise infrastructure operates well below designed capacity. The gap between provisioned and utilized compute represents both wasted energy and available capacity for opportunistic workloads.

← Back to all insights

Working on something like this?

Book a strategy session ›

30 minutes. Real answers.

Book a strategy session

Not ready to talk? anything about how we work.