Ledger Wallet™ just got a major upgrade.

Take control today

Enterprise, Thought leadership | 04/28/2026

Mapping the Agentic AI Infrastructure Landscape

In the middle of a recent X article by a16z on AI Agent Infrastructure is a simple truth that aligns with what Ledger has been saying for years, “The only security is by design. Security theatre is not security.”

Want an accurate map of the unchartered agent-infrastructure landscape? Read the replies on the recent article A16z posted on XThe missing infrastructure for AI agents: 5 ways blockchains can help.

Among the competing voices seeking to bring clarity, three cut through:

Read those three together and you have the diagnosis the original A16z piece points at. 

“In the end, governing AI systems is really an infrastructure challenge, not a policy one. Real authority depends on building enforceable guarantees into the system itself.”

  • You can register an agent on ENS
  • Anchor it in ERC-8004
  • Give it a Treebeard score
  • Route its payments through Spritz
  • Store its memory on Filecoin
  • Adjudicate disputes through GenLayer.

Every layer in that stack runs in software the agent’s runtime already controls. Whoever owns the runtime owns the outcome.

Ledger published its 2026 AI Security Roadmap on April 14, and, because it’s based on a hardware root of trust, it offers a unique alternative within this crowded field of software-based solutions.

The Reality Of Ledger’s Root Of Trust

Now, many misread Ledger’s value in this conversation based on the “human oversight capacity collapse” framing. This logic assumes the only hardware option requires a human pressing a button on every agent action. That is not what Ledger is offering to the Enterprise market (and soon to be rolled out to retail).

What we built is this: 

  • The human sets the policies, but the Hardware Security Module (HSM) enforces that policy on every agent action thereafter.
  • Agents act autonomously, at machine speed, inside the policy. 
  • When an action falls outside the policy, the human signs that specific action on hardware. 
  • Two ways to be in the loop. 
  • Both anchored in hardware. 
  • Autonomy and security, not autonomy or security.

As we move into a world where Enterprises employ more agents than people, we are looking for companies and teams who would like to get an early start on this new product from Ledger. Please contact Ledger Enterprise if you are interested.

Agentic AI Infrastructure: Ledger’s Position

So, where does Ledger sit relative to the thread A16z kicked off?

Above us, complementary. ENS, ERC-8004, BAP-6174, DIDs, x402, MCP, NEAR Intents, Filecoin, Treebeard. Whichever identity standard, payment rail, or trust score wins, the secure element underneath stays the same.

Anchor any of those layers to a hardware root of trust and they finally have the enforceable guarantee the a16z piece is asking for.

Below us, unanswered. Runtime control. The thing ATBASH, Katrina, and Manny each circle. Software agents cannot enforce on themselves what they are allowed to do. The HSM can.

Also of interest!: One open-weight LLM team has shipped the pattern at the developer scale. shisad, the agent security daemon from Shisa AI in Tokyo, features Ledger as the trusted-display signer for the highest-risk tier of approvals. The full story is its own post (also coming soon).

Read the a16z piece. In the middle is a simple truth that aligns with what Ledger has been saying for years, “The only security is by design. Security theatre is not security.”

Read Ledger’s AI roadmap. Then come back to that line. Real authority is built into the system, not bolted on. Hardware is what makes built-in possible.

Humans sign the policy. Hardware enforces it. Agents run inside.


ian c rogers,
Chief Human Agency Officer, Ledger

Stay in touch

Announcements can be found in our blog. Press contact:
[email protected]

Subscribe to our
newsletter

New coins supported, blog updates and exclusive offers directly in your inbox


Your email address will only be used to send you our newsletter, as well as updates and offers. You can unsubscribe at any time using the link included in the newsletter. Learn more about how we manage your data and your rights.