Crypto Agents and Verifiable Systems Are the Future of Safe, User-Centric Tech
Rather than “giving power to the machines,” AI agents give users autonomy to handle complex processes, acting as reliable allies in an increasingly complicated and opaque digital landscape, says David Sneider, Co-founder of Lit Protocol.

As technology continues to progress, a critical question surfaces: how can we build systems that empower individuals while safeguarding against misuse? The answer may lie in an emerging class of autonomous digital technology, commonly being referred to as “agents.” Agents are self-governing systems designed to operate independently, securely, and transparently on the Internet.
Now, when we think of autonomy in tech, it often triggers visions of runaway AI, out-of-control systems, and an unsettling loss of human oversight. “Giving power to the machines,” if you will. There is much talk at the moment about agents “transforming human’s jobs,” and prominent recent examples in crypto involve trading memecoins and interacting autonomously on-chain.
But agents can be designed to complement human efforts, not replace them. These verifiable autonomous systems enhance user empowerment by embedding trust in technology and managing high-stakes tasks efficiently, removing the possibility of tampering. That being said, both the agent's autonomy and transparency in their operations is crucial for fostering trust and aligning with human values, which is why decentralized protocols are so important to their development.
When autonomous technology is thoughtfully implemented, it could become a powerful ally, especially as we confront the potential challenges and consequences of increasingly powerful artificial intelligence.
What Are Crypto Agents?
A crypto agent is autonomous technology – a specialized software program that operates on a blockchain or within a decentralized environment. It uses cryptographic tools to carry out transactions, make decisions, and interact with on-chain and off-chain resources without human intervention.
As opposed to “generative” AI, think of crypto agents as smart, impartial technology that maintains security and integrity by design. They follow predefined rules or AIs, making them predictable, tamper-resistant, and suitable for high-stakes applications.
Importantly, this autonomous technology is not limited to futuristic, high-tech situations. Such automation can already be seen in isolated instances such as the Pittsburgh-based Surtrac traffic system that uses it to coordinate city traffic lights, reducing wait times by 40%.
Crypto agents bring this level of intelligent autonomy to the widely composable landscape of blockchains, securely performing tasks like executing smart contracts and signing transactions. With the right tools they can even interact with traditional Internet platforms and applications, all with minimal risk.
Empowering Users
Properly implementing autonomous tech on blockchains is leading us toward a user-centered tech future by embedding trust directly into systems, enabling transparent and secure interactions across applications. Currently, only one network, Lit Protocol, is live with a sufficiently secure setup to ensure agents are autonomous via the management of decentralized keys. Specifically, Lit Protocol is a network that manages a distributed private key (MPC TSS) that is programmable and across a network of nodes running cryptographically sealed encrypted virtual machines (TEE).
By executing complex tasks autonomously, these agents enhance security, reduce dependence on central authorities, and eliminate intermediaries. This empowers users to have more control over their digital interactions, while minimizing the trust they need to extend to these agents.
Applications for this technology span finance, data sharing, education, and beyond. For instance, platforms like Genius Terminal use agents for decentralized digital asset trading, while in data sharing, agents allow users to control their information, choose who gets to use it, and either sell it or exchange it for personalized recommendations. In education, they link LLMs for assessing the accuracy of answers to blockchains for transparent verification and real-time rewards that engage learners. This is really just the beginning, as these agents get more advanced, they’ll be able to take on more sophisticated tasks too.
Beyond what this autonomous technology can improve for our lives, there are also important ways that it may be able to protect us as well. As AI-generated content surges, agents may become essential for verifying data and authenticating sources, providing clarity amid information overwhelm.
With companies like Fox and TIME exploring blockchain-enabled content verification, crypto agents may be positioned to act as digital stewards of authenticity, empowering users to navigate a secure, transparent, and verified digital landscape.
Decentralized infrastructure like Lit Protocol provides the essential tools that allow these agents to operate autonomously and securely. This is made possible by the defense in depth architecture of running MPC TSS across a network of bare metal TEEs. Networks like Lit Protocol that provide secret management and private, immutable computation permit autonomous technology to perform sensitive tasks independently, ensuring privacy,data integrity, and user control.
Such capabilities are critical, allowing agents to handle private information and make decisions without reliance on centralized systems, which establishes the trust and transparency foundational to their role.
The Future of Verifiable, Autonomous Technology
Crypto agents represent a shift towards secure, user-centered technology that operates independently, with robust guardrails to keep interactions safe and verifiable. As they perform critical tasks – from verifying information to managing digital assets – they help create a trust-based internet where transparency, empowerment, and privacy coexist.
Rather than “giving power to the machines,” users gain more autonomy as agents handle complex processes, acting as reliable allies in an increasingly complicated and opaque digital landscape. Crypto agents could provide the foundation for an internet that empowers individuals, ensuring they stay at the center of an efficient, secure, and authentically verifiable experience.
Note: The views expressed in this column are those of the author and do not necessarily reflect those of CoinDesk, Inc. or its owners and affiliates.
Note: The views expressed in this column are those of the author and do not necessarily reflect those of CoinDesk, Inc. or its owners and affiliates.
More For You
Protocol Research: GoPlus Security

What to know:
- As of October 2025, GoPlus has generated $4.7M in total revenue across its product lines. The GoPlus App is the primary revenue driver, contributing $2.5M (approx. 53%), followed by the SafeToken Protocol at $1.7M.
- GoPlus Intelligence's Token Security API averaged 717 million monthly calls year-to-date in 2025 , with a peak of nearly 1 billion calls in February 2025. Total blockchain-level requests, including transaction simulations, averaged an additional 350 million per month.
- Since its January 2025 launch , the $GPS token has registered over $5B in total spot volume and $10B in derivatives volume in 2025. Monthly spot volume peaked in March 2025 at over $1.1B , while derivatives volume peaked the same month at over $4B.
More For You
Trump's National Security Strategy Ignores Bitcoin and Blockchain

The U.S. president's latest national security strategy focused on AI, biotech, and quantum computing.
What to know:
- U.S. President Donald Trump's latest national security strategy omits digital assets, focusing instead on AI, biotech, and quantum computing.
- The administration's strategic Bitcoin reserve was created using seized BTC, not new purchases.











