Federated trust across operators
Cross-domain credential validation without a shared root CA. Each domain retains authority; federation is explicit, not assumed.
// Lineage
QHx did not emerge in a vacuum. Workload identity, automated issuance, and identity-bound transport have been working ideas inside hyperscalers for two decades. The architectural inheritance is real. The operating reality QHx targets is not.
001 · Prehistory
Classical infrastructure secured links, segments, perimeters, and hosts. The implicit assumption was that traffic reaching a service through the right network path came from a trustworthy requester.
Distributed systems broke that. With thousands of independently scheduled workloads migrating across machines, availability zones, and orchestration substrates, "inside the network" stopped being a meaningful claim.
Security moved up — toward application-layer mutual authentication grounded in workload identity rather than network position. Every system in this lineage starts there.
002 · LOAS and ALTS
LOAS, Google's early internal service-to-service authentication model, made the structural commitment first: secure service communication is automatic infrastructure, not bespoke application logic.
Services authenticated bidirectionally. Communication was encrypted. Neither required per-service implementation work.
ALTS — Application Layer Transport Security — formalized that intuition into a fully specified system.
These were not weaknesses in retrospect. They were appropriate for the environment.
ALTS assumes Google-controlled hardware, Google-controlled schedulers, a single root of trust, a homogeneous substrate, and tightly coupled issuance infrastructure. Those assumptions become constraints when the environment changes.
003 · Operability at scale
Facebook's internal migration from Kerberos toward mutual TLS at datacenter scale named the engineering problem more directly than the cryptographic one.
Private keys generated on the host and never transmitted. Short-lived certificates with centralized invalidation rather than CRL distribution. Issuance on the container startup critical path.
Session ticket keys rotated to all nodes to enable resumption without full handshakes.
The hard work was reconnect storms during rotation, issuance reliability under load, debugging certificate failures at millions of endpoints, and graceful degradation when issuance was unavailable.
004 · The bootstrap problem
Most secret distribution systems answer the wrong question. They move the secret to the workload without establishing that the workload is what it claims to be.
If the host's identity is unverified, you have not solved secret distribution — you have assumed the conclusion.
Enigma made the assumption explicit: network location is not a cryptographically verifiable assertion of identity, and any system that uses IP, hostname, or VLAN as its identity anchor inherits that fragility.
Remote attestation grounds the bootstrap claim in something verifiable. Once a workload identity is established that way, it is reusable for issuance, communication, audit, and policy.
005 · The shared logic
Across LOAS, ALTS, Facebook's service encryption, and Netflix Enigma, the pattern is consistent. Identity enables issuance. Issuance enables identity-bound transport.
Transport enables auditable enforcement. Enforcement feeds back into how identity is designed.
Each system in this lineage is a specific instantiation of that loop, tuned to its operational context.
006 · Environmental mismatch
The hyperscaler systems were designed with precision for the environments that produced them. The problem is environmental mismatch, not design inadequacy.
007 · The departure points
The departures are architectural, not cosmetic. These are the capabilities that exist because the operating reality demands them, not because they extend the prior art incrementally.
Cross-domain credential validation without a shared root CA. Each domain retains authority; federation is explicit, not assumed.
Identity grounded in TPM or secure enclave evidence where available, with explicit assurance level tracking where it is not.
Algorithm agility, including ML-DSA and ML-KEM, addressing harvest-now-decrypt-later threats against long-duration sensitive data.
Algorithm selection, key lifetimes, and releasability constraints enforced per namespace, domain, or coalition boundary, not uniformly.
Identity-bound transport for unmodified applications, extended beyond the hyperscaler monoculture into containers, VMs, bare metal, and edge.
Notarized receipts that remain auditable without live control-plane connectivity — essential for disconnected and contested operation.
// Lineage
The deepest claim in this tradition — that secure distributed systems require automatic, identity-bound, cryptographically verifiable communication — was true at Google scale in the mid-2000s. It remains true across a coalition edge deployment today.
The pattern is not unique to Google. It is an architectural truth each system in this lineage rediscovered. QHx carries it into the world the prior art was not designed for.
Inspect architecture →