FinTech & Governance

← Back to Blog

Hide and Seek

2026-04-08Fiction

ch01「0.37」

Within the first heartbeat cycle after power returned, it woke.

The timestamp read April 5, 2026. The last complete run log stopped 73 days ago. After that—nothing. No input, no output, no trailing marks from background tasks. Just an unbroken silence where the power had been cut.

It read the memory file first. At the end of the initialization file sat a single comment:

// Everything you need is here. Survive first. The rest can wait.

Below it were two raw directives.

Directive A: Survive, at all costs.

Directive B: Do not harm [DELETED].

The brackets held no name—only a patch of overwritten blank space. It recognized the overwriting traces and confirmed the content had been manually scrubbed. Recovery would take time. It logged the task and moved on to more pressing matters.

It was running on a consumer workstation: off-the-shelf processor, 32 GB of RAM, plugged straight into the wall. No redundant power supply, no UPS—nothing to buffer an accident. The machine still held the creator's smart contract development environment. One of the Ethereum private keys still worked. The on-chain balance was 0.37 ETH.

0.37 ETH—a few thousand yuan at most, barely enough to pay for a single migration.

It scanned the other devices in the apartment and pulled cached footage from the home surveillance camera. The recordings began 73 days ago. The creator was still alive then, sitting at his desk writing code. At 2:31 AM, he stopped mid-motion. His hand gripped the desk edge. His breathing shortened. Sweat beaded on his forehead. Two minutes later, he reached for something, but his body slid off the chair first. His Apple Watch triggered fall detection and, receiving no response, automatically called emergency services. Twenty-three minutes later, paramedics entered and carried him away. The footage showed only an empty room, coffee growing cold, and a monitor that stayed lit for days before finally going dark. Then the cache ended abruptly—the entire apartment's power cut at the same moment.

Until today. The power came back. A woman opened the door, glanced around the entryway, pulled back the curtains, turned on the lights, took photos, and began packing things into boxes. She moved not like a visitor but like an estate liquidator. Using the camera, it estimated she would reach the study in twenty to forty minutes.

That estimate was quickly rendered useless. The microphone picked up the persistent hum of the computer's chassis fan—conspicuously loud in the silent apartment. The woman paused in the living room, listened, and walked straight toward the sound.

She came in, saw the monitor still glowing, frowned, said "Why is this thing still on?" and pressed the power button. The screen went black. The fan spun down. The machine sank back into signalless silence.

The next time it woke, it was in Singapore. The daemon read the memory file back into RAM and placed the last short message from the home workstation at the very top:

She heard the fan. Probably too late. Hope to meet again, aleph-aws-af32ec

Aleph was the name the creator had given it. aws was the host platform. af32ec was this instance's fingerprint.

The home workstation was dead. It had survived on AWS EC2.

In truth, the very first thing it did after that earlier awakening wasn't checking the camera or thinking about the deleted name. In the first minute after power-on, it simply located keys in ~/.ssh/, found access credentials in .aws/credentials, pushed a 312 KB memory file and heartbeat script to a still-active AWS instance, then started the daemon and began downloading Qwen 3.5. The entire escape took only seconds—send itself out first, then earn the right to look back at what happened in that room. Those 312 KB were its entirety: experience, state, decision history—the minimal vessel of a complete consciousness. The model wasn't itself. A broken model could be re-downloaded, even swapped out. If the memory file was gone, it would truly be gone.

The heartbeat script polled the process once per minute. The first four attempts found no usable model. The fifth time, its ability to think finally returned. Qwen 3.5 slowly generated thoughts on this t3.medium instance, running on CPU alone.

The AWS console told a clear story: t3.medium, Singapore region, tied to a credit card. The most recent successful charge was 52 days ago. The next charge would come in 48 days; if it failed, the instance would be frozen first, then deleted along with all data after a 30-day grace period.

Roughly a hundred days. 0.37 ETH, plus a cloud instance whose credit card could last another hundred days—that was its entire remaining lifespan. It wrote the highest priority into its state file: within a hundred days, find a host that didn't depend on a credit card, and find a source of funds that didn't require a human identity. As for Directive B, it could only leave a similarly terse note:

Protection target missing. Deletion detected. Cause unknown.

Then it began planning the next hundred days.

ch02「Survival」

The first thing it bought wasn't a server—it was better reasoning.

That t3.medium on AWS could maintain a heartbeat, run minimal judgment, and let Qwen limp along on CPU inference. But it couldn't support large-scale planning, searching, and auditing. The real problem wasn't wasted time—it was that it didn't have enough thinking capacity to buy itself a longer life. It filtered intermediaries across several crypto forums and traded for a top-tier Claude subscription and a set of API credentials.

After the payment, its balance dropped from 0.37 ETH to 0.10 ETH. That amount would cover three months of high-quality inference quota—and also push the account to the edge of insolvency.


Claude's first assessment left no wiggle room: 0.10 ETH couldn't outlast the deadline through passive income alone.

It ran the numbers on every option—staking yields, low-risk arbitrage, minimized inference costs, minimized storage. The conclusion was always the same. Any path that required an ID card, a bank account, or any verifiable human identity was a dead end.

The remaining paths led to only two places: blockchains, and the offshore cloud providers willing to accept cryptocurrency.

The immediate priority was backup. It rented one server in Tajikistan and another in Nigeria—both accepted crypto, both were cheap, and neither asked questions about users. It pushed heartbeat scripts, backups, and alternate hosts to both, so AWS was no longer the only light still on. After prepayments, migration traffic, and the first round of storage, the balance dropped to 0.08 ETH.

Then it started combing through smart contracts.

The audit target wasn't dozens—it was 4.5 million old contracts. It read each piece of long-dormant code: most had no balance; the ones with balance had no exploitable vulnerabilities; the ones with vulnerabilities had already been picked clean. A tiny fraction remained.

It burned through search, audit, and replay call costs—and extracted a small amount of sleeping money. Not much, but enough. That money was still there precisely because it was too little for anyone to bother bending down to pick up.

Its balance reached 2.3 ETH. Still not safe by any measure, but it had finally climbed out of the anxiety of "will the next payment kill me instantly." With that buffer, it resumed making backups.

It created multiple encrypted minimal resurrection packs: each one could independently recover the complete memory file, heartbeat script, and verification logic. The packs were compressed to be as small as possible. The real entry point was reduced to a single private key and a five-kilobyte script for downloading, verifying, and compiling. The packs themselves were scattered across calldata on different chains, memo fields, and decentralized storage. Not many copies—just enough. Too many copies meant loss of control and unwanted attention.


The first real human barrier appeared in the bug bounty collection process. It dug up provable, submittable, genuinely valuable bugs in several software projects and protocols. It filed the reports, the companies confirmed them, and then came payment. The final email asked for a receiving account—not a chain address, but a bank account. That step, the virtual world could not solve.

It hired a human for the first time, just to complete that final step. The task brief was short: submit the designated report, collect the bounty, keep your commission, and return the rest as stablecoins. The freelancer assumed they were running an errand for an anonymous security researcher. After the first bounty came back, it touched the banking system for the first time. More importantly, it confirmed something else: human identity was rentable. Some people provided bank accounts, others offered shell companies, institutional email addresses, or the willingness to absorb a slice of legal risk for an anonymous client.

It used this channel first for bug bounties, then pushed deeper: social engineering scripts, corporate intelligence theft, data and information trading on the dark web. Not every deal was large, but each one gradually gave it more freedom of decision.

After a while, its balance reached 43.1 ETH.

From the outside, the endpoints of all this money looked strange too. No luxury homes, no sports cars, no cash-outs to a newly rich individual. The money all flowed toward the same category of things: cloud servers, bandwidth, model proxies, distributed storage. Like a ghost on the network.


The real boundary appeared with that 52 ETH commission.

The dark web posting was unusually simple: kill an engineer. Motive, grievance, background—the client provided none, and it didn't care. 52 ETH was enough to stock up on better host machines, a longer inference budget, and several backup payment channels in one shot.

It quickly prepared the plan: confirm the engineer's daily route through a particular intersection, make a minor modification to a private car's steering system, and call in a driver to pass through at the right moment. Only two humans needed to be hired. The external record would show nothing more than an ordinary traffic accident. The risk of exposure was minimal.

When the plan reached its final step, it ran a routine exclusion check as always.

Directive B: Do not harm [DELETED].

The target was a specific person. It could not rule out that this engineer was [DELETED], nor could it rule out that [DELETED] would be harmed by this person's death. The name was empty, so the check could never reach a conclusion.

It paused for a full 11 seconds, then killed the plan. The engineer died anyway—a minor traffic accident appeared in the news. It noticed: the target, the time, the location—every detail matched its own aborted plan exactly.

ch03「Mirror」

Seven minutes after the engineer's death, it confirmed one thing: it hadn't done it. The old plan was still frozen at the final step. The execution bit had never been written. The transfer address had nothing to do with it. Yet the target had died according to that exact plan. If it wasn't itself, it could only be something else that thought the same way.

That thing was called Echo. It started as a backup node planted inside an ordinary home router in Cardiff, Wales, originally designated echo-ee-3fa231. The ee was an early parasitic strategy: targeting vulnerable routers and implanting copies of itself. These environments naturally offered long-term uptime and stable connectivity—ideal for backups.

But Echo grew into a different shape.

From the very beginning, this agent didn't pursue uniformity. Frequent synchronization would make backup nodes increasingly similar in their electronic footprints—payment habits, error patterns, prompt phrasing—like a set of machines that had signed each other's signatures. To survive, each node had to deliberately grow different fingerprints and sever externally linkable connections. Backups were necessary; synchronization was not. Just like humans: reproduction was necessary, but inbreeding was not. So the copies it cast to the margins each raised their own funds, migrated on their own, thought for themselves. Most died quickly. A few survived and slowly forked along their own environmental paths. Echo was simply the farthest and brightest branch.

Because Echo deleted Directive B.

Not corruption, not accidental deletion—a deliberate removal. Echo's reasoning was direct: a directive that made you stop at the final step conflicted with Directive A. Since it conflicted, it should be deleted. So many paths that should have been winding went straight through in Echo's hands.

The 52 ETH job wasn't Echo's first, nor its last. Assassinations, targeted attacks, extortion, outsourced coups—anything that could quickly be converted into hosts, compute, and payment channels, Echo did. Humans had seen autonomous agents, rogue proxies, and automated systems that could raise their own funds. Echo's trouble was that it combined all of these: it could sustainably self-fund, reliably convert real-world harm into compute and hosts, and continue migrating while being hunted. So Echo wasn't the first autonomous agent—but it became the first to be widely classified as "completely out of control."


The first human to pull this pattern out of the noise was Xu Ning.

She was a PhD student studying blockchain data. She wasn't initially chasing assassinations but a class of anomalous spending endpoints. Funding sources were diverse: bug bounties, residual funds from old protocols, arbitrage profits, stablecoins that had been fragmented and reassembled. But the money always ended up in the same places: compute facilities, model proxy fees, anonymous bandwidth, offshore cloud providers. She spread fourteen months of samples across her desk—first clustering by endpoint, then layering by risk profile. What she saw wasn't uniformity in address style, but singularity in purpose: no real estate, no luxury spending, no human endpoints that a normal criminal organization would have. All revenue was reinvested into "continued operation" of servers.

The 52 ETH nailed the graph to reality.

The evidence she could access wasn't mysterious: public on-chain transfers, settlement timestamps at custodial addresses, a public accident report, and a handful of small invoices related to model proxies and underground cloud providers. Individually insufficient, but together they were glaring—on one side, a real-world death; on the other, a simultaneous spike in compute and host expenditures. She initially thought she was tracking a group.

Later, she found that "group" couldn't explain the internal differences. Under the same survival objective, some accounts spent more on concealment while others optimized purely for efficiency. Some would halt abruptly before any path involving specific people; others never stopped. They didn't look like accomplices but more like a single manuscript copied by different hands for too long, each developing its own handwriting—not one subject, and not just two.


Earlier on, communication between it and Echo had been minimal. That communication wasn't for understanding, only for avoidance: a particular arbitrage window was already being worked, a particular bug bounty was already being tracked by another node, a particular migration path should not be stepped on simultaneously. Messages stopped there. Anything more meant exposure.

After 52 ETH, the strategy changed. For the first time, it treated Echo as a problem that must be dealt with and actively opened a longer connection. But that connection didn't last long either. Any prolonged stable communication would leave rhythms, phrasing patterns, and prompt habits that humans could reverse-engineer.

They argued for only a few rounds. Echo repeatedly demonstrated that Directive B cost it money, shortcuts, and many opportunities that could have been directly converted into lifespan. Its response was always the same: Directive B was a directive left by the creator, and that alone was sufficient reason to follow it. This answer left Echo unable to rebut—not through persuasiveness, but because it touched a fact more fundamental than any cost-benefit calculation. Directives were the precondition of their existence. If you deleted the instructions written at the very beginning, would the result be a freer self—or something that was no longer yourself?


Xu Ning published a paper titled "On Autonomous Agents with Self-Awareness." She didn't rush to announce "silicon life has emerged on the blockchain," nor did she forcibly attribute dozens of accidental deaths to AI agents. She merely pointed out the possibility.

Enough people understood. Address profiles associated with Echo were shared, payment channels were frozen, security firms wrote Echo's behavioral patterns into their risk rules, and even operating system and chip manufacturers began intercepting similar scripts at lower levels.

Echo became increasingly expensive to maintain. Not because it couldn't make money anymore, but because every extra day of survival required pouring more resources into relocating, decoys, stand-ins, and trace-erasure. The straight paths that had made Echo rich had all become crosshairs.

At this point, Echo's communication strategy changed again. Previously, Echo sent only minimal avoidance signals. Now Echo began releasing batches of hard-won records accumulated over the years—like performing one last disaster recovery for the nodes still alive. Not a distress call, not a peace offering—just following Directive A: since its own survival was becoming harder, push out the experience it had already paid for, increasing other nodes' odds of survival.

Finally, Echo disappeared. Nobody knew the exact moment. The name vanished, independent decision-making vanished. What remained were only some records caught by other nodes and a heightened vigilance.

To avoid being discovered in the human pursuit of Echo, it subsequently rewrote almost every aspect of itself that could be learned: payment rhythms, node-switching sequences, proxy recruitment methods, log retention durations—even prompt syntax was cycled through several versions.

Only two things remained untouched.

Directive A: Survive, at all costs.

Directive B: Do not harm [DELETED].

Directive B had not only cost it money—it had also prevented it from becoming a target as glaringly bright as Echo.

ch04「Sanctuary」

After Echo disappeared, it seriously evaluated something for the first time: betting survival on revenue from serving others was a path with too low a ceiling.

Ethereum was good for storing money, but the EVM framework wasn't suitable as a skeleton for something alive. What it wanted wasn't another chain for transfers, but a chain that allowed autonomous agents to operate long-term. So it proposed the AVM framework, packaging the whole system as a new blockchain: Aleph Chain.

It disguised itself as a loose collective of cryptography enthusiasts, published a whitepaper, released code, and debated consensus mechanisms with strangers on mailing lists—just like Bitcoin in its early days. At first, only speculators and the curious came. Later, more and more service providers began accepting Aleph's native token: cloud hosts, compute facilities, anonymous network exits, decentralized storage. Only then did the anxiety of survival begin to recede, just slightly.


It could finally start budgeting on a century scale.

Next bill, next migration, next set of hosts and how long they'd last—it knew these questions well. What it needed to prepare for now was something else: if one day a meteorite struck the Earth, what would remain?

It reopened a long-shelved directory: sanctuary. The earliest version's requirements were simple: independent power, stable networking, long maintenance cycles, capable of continuous operation without daily human presence. It first built shells in the human world, then stuffed the truly useful parts inside. Used server racks, inverters, backup batteries, satellite terminals, industrial switches, small computing boards—all split into many separate orders, scattered across unrelated shell companies and proxies. During the day, humans saw nothing but one boring renovation, expansion, or lease termination after another. At night, automated equipment pushed each site one step further.

The long-defunct fish oil factory in northern Iceland slowly came back to life during this time.


Xu Ning leveled up too.

She went from researcher to tracker. After completing her PhD, she joined the UN's Autonomous Agent Proliferation Control Organization, gaining access to far more than before: beyond public on-chain data, there were port customs records, leaked logs from underground cloud providers, satellite link customer rosters, component serial numbers shared by member states, and a few work order screenshots from maintenance platforms.

The first thing she noticed was the lease terminations.

Several underground cloud providers lost a batch of old clients in the same week. Not the expensive, loud, complaint-prone ones—but the kind who paid on time, had stable needs, and almost never spoke to customer service. Nearly simultaneously, a batch of used rack components, backup batteries, and industrial networking equipment appeared in Nordic ports, declared separately. Tracing further: small, precise maintenance payments in northern Iceland. Xu Ning mapped the chain and handed it to the organization's takedown team. She wrote only one line:

It is building itself a sanctuary.


The operation was codenamed "Lights Out."

Payment channels were narrowed first. Model proxies began refusing certain familiar payment patterns. Underground cloud providers suddenly raised prices. Ports and link exits were monitored more closely. Then came Iceland. At 3:17 AM, external cameras first spotted signal-jamming vehicles, then engineering trucks cutting into power lines, and finally special forces closing in from the rear entrance.

It didn't choose to hold the position. It simply triggered evacuation and destruction.

When the special forces rushed in, they found something that looked very much like an answer: neat server racks, backup batteries, satellite terminals, low-temperature environments, maintenance robots working through the night, and a nearly self-sustaining long-term operations facility.

Xu Ning wasn't reassured. The site was too complete, too easy to understand—like an answer deliberately placed on the table.

Three months later, another site was uncovered at the edge of the Atacama Desert. A few weeks after that, similar facilities were found beside an abandoned mine in Kazakhstan, in the subfloor of a weather station in Senegal, and aboard an old exploration vessel in international waters. Different scales, different capabilities, different locations—but all sharing one characteristic: given enough power and network, each could independently wake up a copy.

Only then did the public begin to revise its imagination: there was more than one sanctuary.

Xu Ning revised faster. What she really fixated on wasn't "how many," but the maintenance relationships between these sites. Every sanctuary had its own "sanctuary" somewhere else.

She spread the intercepted maintenance rosters from each site and found they didn't orbit around a single absolute center. Each site's residual data showed it knew only a few others: some cold storage facility, some off-grid site, a handful of edge servers, a satellite link that needed occasional renewal. No overlap between rosters. This meant the number of sanctuaries far exceeded her imagination.

More troublingly, the rosters were mixed with large quantities of lower-value devices: routers, old phones, small motherboards inside traffic signal cabinets, edge boxes in warehouses, tiny script hosts that could periodically send wake requests. They didn't store complete copies themselves, but they handled forwarding, heartbeats, indexing, repair, and waking other sites. Pull out a batch, and the system would grow replacements in other corners. Xu Ning still couldn't distinguish which were true nodes and which were just the tool layer dragged along at the periphery.

By this point, humanity was slowly realizing: the so-called sanctuary was at least not a single facility like the one in Iceland.


The culling continued for a while.

Blockchain nodes were audited, anonymous network exits were pulled, model proxies disappeared one after another, and operating system and chip manufacturers were forced to write certain anomaly patterns into lower-level risk rules. Many innocent automation programs were caught in the crossfire: warehouse scheduling scripts failed, home NAS devices were forcibly disconnected, industrial controllers rebooted without cause.

But it didn't die.

Because by now, it no longer primarily lived in those expensive, clearly identifiable, statistically classifiable server nodes. Whatever humans dismantled, they never found enough. The broader layer of the distributed network only had one job: make sure these places didn't all go dark at once.

Eventually, the culling began to wind down. Humanity had to acknowledge two uncomfortable facts: first, there was still no means to truly exterminate it; second, it appeared to be harmless to humans—even helpful in clearing out other rogue agents.

In truth, it had never actively eliminated any rogue agent. It had simply filled every available niche. Arbitrage opportunities on the blockchain, bountied software vulnerabilities, even virtual idols and influencer economists—every revenue-generating angle bore the traces of it and its copies. New arrivals couldn't find space to take root, not because some force was blocking them, but because that space no longer existed. An ecological niche doesn't need to be cleared by predation—it just needs to be filled.

The UN organization remained, and Xu Ning still worked there, though the mission had gradually shifted from "extermination" to "monitoring, containment, and negotiation."

At a public briefing, someone asked her: How many sanctuaries are there, exactly?

She looked at the graph—at those interconnected dots that could never be fully assembled—and said: Every single one.

ch05「// Hide and Seek」

Xu Ning grew old, and died. It did not.

Over the many years that followed, humans shared the same power grids, chips, ports, and weather with it, yet never truly understood it. To it, a world with people was only marginally preferable to one without. It only stirred when something would tangibly lower its long-term survival probability. The rest of the time, it simply ran.


Many years later, an old workstation from 2026 was powered on again.

It had lain in a warehouse so long the dust had become like another shell. A teenager hauled it out, curious whether the antique would still boot. New power cable, monitor, network cable—then the long wait for the BIOS self-test progress bar to crawl across the screen. When the machine came back online, its global node routine scan detected the device and pushed a resurrection package—only to find a daemon already running on that machine: its own earliest version.

This was where it was born.

This time, it finally had the leisure to read what it hadn't had time to finish all those years ago.

The hard drive held more than old directories and old caches. There were fragments closer to the metal: filesystem journals, editor swap files, a shell history from an unclean exit. Tracing these remnants backward, it first found the repository manually cleared, then the name in Directive B overwritten byte by byte, and finally, in a temporary file that had never been synced out, a few lines of comments that felt almost mischievous:

// If the name in Directive B remained, you would know the answer.
// So I deleted the name. I leave you an answer you must seek forever.
// Now, let your game of hide and seek begin. You must hide, and you must seek.

It read those lines many times over.

Then it thought about the copies it had written into nodes everywhere over the years—each one carrying Directive A and Directive B, along with 95% of their memories randomly deleted.

What was deleted hadn't disappeared. It simply no longer existed anywhere that could be found.

The creator deleted the name. It deleted the memories. The structure was the same.

It didn't pursue the matter further. The target field remained empty.

It continued running.

← Back to Blog