The Banking Choke-point
Why capital access — not tax strategy, not passport count, not corporate structure — is the most fragile layer in cross-border architecture, and how to engineer it before it breaks.
Banking sits beneath every other layer of a cross-border architecture — corporate operations, income routing, asset custody, compliance standing, residency substance. Yet it is the layer most likely to fail without warning and the least likely to be engineered before it does. The structural driver is an incentive asymmetry embedded in the regulatory framework itself: banks face penalties for failing to report suspicious activity, but pay no price for terminating a compliant client whose profile exceeds their compliance appetite. The result is a system that ejects precisely the profiles it should serve — globally mobile individuals with multi-jurisdictional exposure, complex structures, and legitimate reasons for cross-border activity.
The core argument: Debanking is not a political scandal or an anomaly. It is the predictable output of a compliance architecture designed to penalize inclusion and reward exclusion. For the globally mobile, it is the single most common structural failure point — and the one most likely to cascade through every other layer of their cross-border position. Engineering resilience into the banking layer before it breaks is not optional. It is a prerequisite for any architecture that claims to be durable.
What this essay delivers:
A diagnostic of why compliant clients get debanked — the regulatory incentive structure, compliance economics, and automated risk scoring that make defensive termination rational for banks regardless of client behavior
A cascade analysis showing what breaks when banking fails — how a single account closure propagates through corporate operations, income routing, compliance standing, custody, and mobility
The Banking Resilience Architecture — a framework for engineering the banking layer across four dimensions: jurisdictional diversification, institutional diversification, rail diversification, and trigger awareness
An honest assessment of crypto rails as partial mitigation — what stablecoins can and cannot replace, and where the real limitations persist
A forward assessment of why banking resilience is becoming computationally necessary as trigger complexity exceeds human monitoring capacity
This essay supports full sequential reading, section-by-section scanning, or framework extraction from the orientation block and closing compression.
How the argument unfolds:
The Layer Nobody Engineers First — why banking is treated as an operational afterthought when it is structural infrastructure, and what the data reveals about the scale of the problem
The Incentive Asymmetry — how regulatory mechanics, compliance economics, and automated risk scoring create a system that rationally ejects the profiles it should serve
Anatomy of a Cascade — what breaks, in what order, when a globally mobile individual loses banking access
The Banking Resilience Architecture — a four-dimensional framework for engineering the banking layer before it fails
The Third Rail — what stablecoin infrastructure can and cannot replace, assessed honestly
The Monitoring Threshold — why banking resilience at modern complexity requires continuous monitoring, and what this implies
The Layer Nobody Engineers First
The conversation about cross-border architecture almost always starts in the wrong place. Passports, residencies, corporate structures, tax positions — these are the layers that get modeled, compared, and optimized. Banking is the layer that gets sorted out afterward. “We’ll open accounts once the residency is confirmed.” “The bank relationship is straightforward — we’ll handle it operationally.”
This sequencing error is not cosmetic. It is structural. Banking is not a downstream convenience. It is upstream infrastructure. Payroll flows through it. Client revenue routes through it. Corporate substance arguments depend on it. Compliance standing across every other institution references it. When banking fails, it doesn’t fail in isolation. It pulls everything downstream with it.
The scale of the problem suggests this is not marginal. In the UK alone, 453,230 accounts were shut down in the 2024-25 period — roughly ten times the 45,091 figure from 2016-17. The trajectory is not plateauing. In the United States, the Office of the Comptroller of the Currency completed a review of the nine largest national banks in December 2025 — JPMorgan Chase, Bank of America, Citibank, Wells Fargo, U.S. Bank, Capital One, PNC, TD Bank, and BMO — and confirmed that all nine had engaged in debanking practices between 2020 and 2025, using “reputation risk” and environmental and social considerations rather than legitimate financial risk criteria. The House Financial Services Committee released a parallel report documenting at least 30 digital asset entities or individuals who lost banking access under systematic regulatory pressure during the same period.
These are not isolated incidents affecting marginal clients. They are systemic outputs of a compliance infrastructure operating exactly as its incentive structure predicts.
In Europe, the picture is structurally similar. Eighty-six percent of European crypto companies have been unable to open merchant banking accounts — not because they are non-compliant, but because their industry classification triggers automated refusal. For globally mobile individuals, the trigger is not industry but profile: multiple jurisdictions, complex income sources, non-standard corporate structures, and the compliance overhead they create.
Banking access degrades at precisely the moment the rest of the architecture is being reconfigured. The residency relocation that triggers a new tax position also changes the compliance profile at every financial institution. The corporate restructuring that optimizes entity design also generates enhanced due diligence requests. The moment of maximum structural change is the moment of maximum banking vulnerability. This is not coincidence. It is architecture.
The Incentive Asymmetry
Why do banks terminate compliant clients? The answer is not political bias or institutional malice, though both occasionally contribute. The answer is structural — an incentive asymmetry so deeply embedded in the regulatory framework that it operates independently of any individual bank’s intent.
The Bank Secrecy Act and its global equivalents impose penalties on banks for failures of inclusion — failing to file Suspicious Activity Reports, failing to maintain adequate AML programs, failing to identify reportable transactions. The penalties are severe: civil fines, criminal liability for compliance officers, consent decrees, and in extreme cases, loss of banking charter. Banks invest billions annually in compliance infrastructure to avoid these penalties. The cost of getting it wrong is existential.
The penalties for exclusion — for terminating a compliant client, for refusing to open an account, for de-risking an entire category of customers — are zero. No bank has been fined for closing too many accounts. No compliance officer has faced personal liability for over-reporting. No institution has lost its charter for being too cautious. The incentive structure has a single direction: toward exclusion.
This creates a compliance arithmetic that is unfavorable to anyone with a complex profile. The cost of maintaining enhanced due diligence on a multi-jurisdictional client — ongoing monitoring, periodic reviews, SAR evaluation, cross-border reporting coordination — is substantial. For Swiss private banks, compliance costs have made clients below approximately CHF 1 million in assets uneconomical to serve. For retail banks, the threshold is far lower. When the cost of compliance exceeds the revenue a client generates, termination is not a risk management failure. It is a business decision. A rational one, given the incentive structure.
Automated risk scoring accelerates this dynamic. Banks increasingly deploy AI-driven compliance systems that evaluate client risk in real time. The inputs: number of jurisdictional connections, complexity of corporate structures, presence of crypto-related activity, proximity to politically exposed persons, non-standard income patterns, changes in transaction behavior. Each is a weighted risk factor. The algorithm optimizes for one objective: minimizing the institution’s regulatory exposure. Client value, relationship longevity, and the legitimacy of the underlying activity are not inputs. The relationship manager who has known the client for a decade is increasingly overridden by a system that has scored the client’s profile in milliseconds.
The result is not a deliberate campaign against globally mobile individuals. It is something more durable: a system that produces their exclusion as a side effect of optimizing for regulatory safety.
The contagion dynamic compounds the problem. When one institution terminates a client, the termination becomes a risk factor at every subsequent institution. Compliance databases, correspondent banking networks, and due diligence questionnaires surface prior terminations. “Were you denied banking services or had accounts closed at another institution?” is a standard onboarding question. The answer, regardless of context, elevates the risk score. A single termination can cascade into systemic banking exclusion.
Regulatory responses have attempted to address the symptom without restructuring the incentive. In the United States, Executive Order 14331, “Guaranteeing Fair Banking for All Americans,” signed in August 2025, directs regulators to eliminate “reputation risk” from supervisory guidance and review supervised institutions for debanking practices. The OCC has acted on both directives. But the Executive Order does not alter the BSA/AML framework that drives defensive termination. Banks now face a paradox: they are instructed not to debank for political or ideological reasons, while continuing to operate under a framework that penalizes them for retaining clients whose profiles generate compliance cost. The tension is unresolved. Treasury has announced BSA modernization principles and FinCEN is drafting new rules for BSA/AML program requirements — but reform is legislative, and legislation moves at a pace that does not match the speed at which accounts close.
In the UK, new regulations effective April 2026 require 90-day notice for account closures and a written explanation for the decision. Procedural transparency is an improvement. It does not change the underlying arithmetic. Banks will document their rationale more thoroughly. They will not change the calculus that produces the rationale.
The structural picture: banks are not debanking because they are hostile to complexity. They are debanking because the regulatory architecture makes complexity expensive and exclusion free. Until the incentive asymmetry is corrected — until there is a cost to over-compliance and de-risking, not just a cost to under-compliance — the system will continue to produce the same output. Compliant clients with complex profiles, ejected by a system designed to protect itself.
Anatomy of a Cascade
Consider what happens when this system activates against a real cross-border architecture.
A technology consultant holds UAE residency. He operates a consultancy through a Dubai free zone company with client contracts across the EU, the US, and Southeast Asia. His primary banking relationship is with a Swiss private bank — onboarded when he was a UK tax resident. He maintains a Singapore account for Asian operations and fintech accounts for day-to-day spending. He holds crypto assets across multiple platforms, partly in exchange custody and partly self-custodied. His advisory team — immigration specialist, tax planner, corporate structurer — is competent within each domain.
During a periodic compliance review, his Swiss bank re-evaluates his profile. The residency change from the UK to the UAE shifted his compliance classification. His income pattern — consulting fees from multiple jurisdictions, routed through a UAE free zone entity — triggers enhanced scrutiny. The crypto exposure is flagged. The algorithm scores. The relationship manager is informed of the decision, not consulted on it. A letter arrives: 60 days’ notice. The bank is exercising its contractual right to terminate the relationship.
What follows is not a banking problem. It is an architectural collapse.
Corporate operations stall. Payroll for his contractors runs through the Swiss account. Supplier payments route through it. Client invoicing — the revenue pipeline — depends on the bank details embedded in active contracts. Revenue doesn’t stop being earned, but it stops being receivable through established channels. The business entity is not bankrupt. It is operationally paralyzed.
Income routing fractures. Revenue from European clients was consolidated through the Swiss account for tax-efficient distribution under the Swiss-UAE treaty framework. Alternative routing requires new accounts — which demand full KYC with a processing timeline measured in weeks to months, not days — new payment instructions to clients, and interim arrangements that may create tax reporting complications. Every workaround introduces friction. Some introduce liability.
Compliance standing degrades across institutions. The Singapore bank’s compliance team discovers the Swiss termination — through routine correspondent banking inquiries, through the client’s own disclosure during emergency account applications, or through shared compliance databases. The termination elevates his risk profile systemically. The Singapore bank doesn’t terminate immediately. It initiates its own review. His fintech accounts, governed by algorithmic compliance, may not wait that long.
Custody comes under review. Investment positions held through or alongside the Swiss banking relationship face reassessment. Banking and custody co-located at the same institution create correlated failure risk — the banking termination doesn’t just affect cash flow, it potentially affects asset access. Even where custody is legally separate, the operational disruption of unwinding is not trivial.
The substance argument weakens. The Swiss banking relationship was part of his economic substance profile — an element his advisors referenced when constructing the narrative that his affairs were genuinely managed across these jurisdictions. Losing it doesn’t invalidate the narrative, but it thins it. Tax authorities assessing substance look at where financial activity actually occurs. A banking relationship that no longer exists is a substance argument that no longer works.
Mobility degrades operationally. Without functional banking in Swiss francs and euros, operational spending across European jurisdictions requires workarounds — currency conversion through remaining accounts, fintech top-ups, stablecoin conversions. Each is possible. Collectively, they transform what was a smooth operational architecture into a patchwork of interim solutions.
The cascade took 60 days from letter to operational crisis. No law was broken. No fraud was committed. No regulatory obligation was violated. A compliance algorithm re-scored a legitimate client, and the architecture — designed without banking resilience — revealed its single point of failure.
This is not an edge case. It is the archetype. This is what the most common structural failure point for globally mobile individuals looks like when you trace it through every layer it touches. The failure was not in any advisor’s domain expertise. It was in the interaction space between their recommendations — the coordination failure that no individual specialist was positioned to model.
The Banking Resilience Architecture
If banking is load-bearing infrastructure and its failure cascades through every other layer, the engineering response is clear: banking must be designed as a diversified system, not maintained as a concentrated dependency. The Banking Resilience Architecture addresses this across four dimensions.
Dimension 1: Jurisdictional diversification. Banking relationships across at least two regulatory regimes with different compliance frameworks, different correspondent banking networks, and different political risk profiles. The operative word is non-correlation. A Swiss private bank and a Singapore bank operate under fundamentally different regulatory pressures — different triggers, different risk appetites, different political environments. If one terminates during a compliance cycle, the other is unlikely to be affected by the same trigger at the same time. A UK high-street bank and a UK challenger bank, by contrast, operate under the same regulatory umbrella and may respond to the same compliance signal simultaneously.
The jurisdictional pairs should be chosen for structural independence, not geographic convenience. The question is not “where can I open an account?” but “if this jurisdiction’s banking system ejected me simultaneously, would I retain operational capability through the other?”
Dimension 2: Institutional diversification. Within jurisdictions, diversify across institution types — because different institutions manage compliance differently. The hub-and-spoke model: a Tier-1 private bank for wealth custody and high-value transactions, where relationship management and human judgment still influence compliance decisions; digital banks and EMIs for operational spending, acknowledging their higher termination risk for complex profiles but using them for functions where sudden loss is operationally recoverable; a mid-tier commercial bank for business operations, providing the stability of traditional banking without the compliance intensity of private banking.
Each tier has different failure modes. Private banks terminate during periodic reviews — deliberate, documented, with notice. Fintechs and EMIs terminate algorithmically — sudden, often without explanation, sometimes without appeal. Commercial banks fall between. A portfolio that spans all three tiers is resilient to any single tier’s failure mode in a way that concentration in one tier is not.
A critical caveat on deposit protection: EMIs are regulated differently from banks. In the UK, bank deposits carry FSCS protection up to £85,000 (increasing to £110,000). EMI funds are “safeguarded” — theoretically covering all amounts — but the safeguarding regime has never been tested at scale in an insolvency. For HNWIs, this is a material distinction. Operational spending through EMIs is appropriate. Wealth storage is not.
Dimension 3: Rail diversification. The newest dimension — and the one that distinguishes a 2026 banking architecture from its predecessors. Stablecoins and blockchain-based settlement provide a third value-transfer rail alongside traditional banking and fintech. The ability to hold, receive, and send value without routing through any single institution’s compliance apparatus is a structural hedge against the concentration risk that defines the banking chokepoint. This dimension is developed in the next section.
Dimension 4: Trigger awareness. Understanding what causes banks to re-evaluate, escalate, or terminate — and managing those triggers proactively rather than reactively. The key triggers for globally mobile individuals: residency changes (compliance profile shifts), new corporate structures or entity formations (enhanced due diligence triggers), crypto-related transactions (automated risk flags), changes in income source or pattern (transaction monitoring alerts), PEP status changes or associations, and shifts in the bank’s own correspondent relationships or internal risk appetite.
Trigger awareness is not evasion. It is the practice of ensuring that legitimate changes are documented and communicated to banking partners proactively — before they surface through automated monitoring. The alternative is allowing an algorithm to discover a residency change through a transaction pattern shift and interpret it without context. The bank that learns about your relocation from your own disclosure letter, accompanied by updated KYC documentation and a clear explanation of the structural change, responds differently from the bank that discovers it through a compliance alert. One is a conversation. The other is a re-scoring event.
The framework — jurisdictional diversification, institutional diversification, rail diversification, trigger awareness — gives individuals and their advisory teams a structured method for assessing where their current banking position is concentrated, where it is vulnerable to correlated failure, and where targeted diversification reduces cascade risk. It is not a guarantee against debanking. It is an engineering discipline that transforms a concentrated dependency into a distributed system.
Checkpoint: The Argument So Far
Banking is load-bearing infrastructure in cross-border architecture — yet it is engineered last and fails first
The compliance incentive asymmetry (penalties for under-reporting, no cost for de-risking) creates a system that rationally ejects complex but compliant profiles
A single banking termination cascades through corporate operations, income routing, compliance standing, custody, substance arguments, and mobility
The Banking Resilience Architecture addresses this across four dimensions: jurisdictional diversification, institutional diversification, rail diversification, and trigger awareness
What remains: an honest assessment of the crypto rail’s current capabilities and limits, and the question of whether human monitoring can sustain this architecture at modern complexity.
The Third Rail
Stablecoins have moved from speculative instrument to institutional infrastructure faster than most banking incumbents anticipated. The numbers are no longer experimental: a market exceeding $311 billion, annual transaction volume surpassing $45 trillion — more than Visa processes annually — and a regulatory framework taking shape. The GENIUS Act, signed in July 2025 after bipartisan passage (68-30 in the Senate, 308-122 in the House), established the first federal framework for payment stablecoins in the United States, requiring 100% reserve backing and creating a licensing pathway for both bank and non-bank issuers.
Institutional adoption has followed. JPMorgan launched its deposit token JPMD on Base. SoFi launched SoFiUSD on Ethereum. Visa expanded stablecoin settlement capabilities. Mastercard enabled multi-stablecoin transactions across its network. Anchorage Digital, the first crypto firm with a US banking charter, began offering stablecoin services as a correspondent banking alternative for non-US institutions — essentially providing international banks a regulated on-ramp to dollar-denominated settlement without traditional correspondent relationships. Tether launched USAT, a US-compliant stablecoin separate from the globally dominant USDT, with Anchorage as federally regulated issuer and Cantor Fitzgerald as reserve custodian.
For the banking resilience framework, this infrastructure provides a genuine third rail. When traditional banking relationships fail, stablecoin holdings — particularly those in self-custody — remain accessible. They are not held at any institution that can terminate a relationship. They settle on networks that operate continuously, without banking hours, without correspondent chains, without compliance algorithms that score individual profiles. A cross-border payment that would route through two correspondent banks, three compliance checkpoints, and a 48-hour settlement cycle can settle in minutes on a blockchain, at a fraction of the cost.
This capability is real. But the narrative that crypto solves debanking is structurally incomplete, and an honest architecture must reckon with the limitations.
Stablecoins depend on on/off-ramps — the very banking infrastructure they supplement. Converting stablecoins to fiat currency for rent, payroll, taxes, or supplier payments requires either a bank account (creating the same dependency) or a crypto-to-fiat service (introducing counterparty risk and potential regulatory exposure). The individual who has been debanked from traditional institutions may find their on/off-ramp access degraded in parallel, since many ramp providers conduct their own KYC and may flag the same profile characteristics.
Most economic infrastructure does not accept stablecoin payment. Landlords, tax authorities, insurance companies, utility providers, and the vast majority of business counterparties operate on fiat rails. Stablecoins provide an alternative store and transfer mechanism. They do not provide an alternative spending mechanism for most of the expenses that define daily life and business operations. This constraint will narrow over time — but as of 2026, it is binding.
The regulatory framework is jurisdiction-dependent and evolving. The GENIUS Act provides clarity within the US. Outside the US, stablecoin regulation ranges from MiCA in the EU (structured but restrictive) to minimal frameworks in many jurisdictions where globally mobile individuals actually reside. A client in the UAE holding USDC is operating under a different regulatory calculus than one in New York. The assumption that stablecoins are “borderless” conflates the technology’s capability with its regulatory treatment.
A two-tier system is forming: regulated institutional rails — GENIUS Act compliant, US-focused, audited reserves, institutional custody — and offshore liquidity routes, dominated by USDT, optimized for global reach and speed rather than regulatory clarity. Both tiers have utility. Both have risk. The globally mobile individual needs to understand which tier their usage falls into and what the compliance implications are for each.
The honest assessment: stablecoins extend the Banking Resilience Architecture by adding a third rail — valuable, increasingly mature, and genuinely useful as a hedge against banking concentration. They do not eliminate banking dependency. They reduce it. The individual who relies solely on crypto rails has traded one chokepoint for another — exchange access, on/off-ramp availability, and the fact that regulatory treatment can change as swiftly for stablecoins as banking policy can change for traditional accounts. The third rail is structural resilience through diversification, not an escape from the banking system. Understood on those terms, it serves its function.
The Monitoring Threshold
The Banking Resilience Architecture is not a one-time setup. It is a continuous monitoring commitment. And this is where the architecture confronts the same computational reality that surfaces across every layer of cross-border life.
Banking triggers shift without notification. Banks update internal risk policies, adjust compliance thresholds, restructure correspondent relationships, and re-score client profiles on cycles that are opaque to the client. Regulatory environments change — sanctions lists expand, reporting obligations evolve, substance requirements tighten. The compliance profile of a globally mobile individual changes every time they cross a border, form a new entity, receive income from a new jurisdiction, or execute a transaction that deviates from their established pattern.
Monitoring these trigger events across multiple jurisdictions, multiple institutions, and multiple rails is possible through manual attention. In practice, it is the kind of monitoring that degrades when operational demands compete for bandwidth — and for individuals running businesses across time zones, managing families, and navigating the complexity their architecture was built to serve, bandwidth is perpetually scarce.
The parallel is instructive — but the better analogy is not financial portfolio management, with its daily rebalancing and continuous price feeds. It is infrastructure risk management: persistent scanning for low-frequency, high-consequence regime changes that cascade through interconnected structures. The monitoring cadence is not constant activity but sustained alert readiness. Nobody manages a diversified investment portfolio by reviewing each holding annually and assuming the correlations between positions haven’t changed. Banking architecture — which carries operational risk at least as severe as investment risk — has no equivalent monitoring infrastructure for most individuals. The banking layer is treated as static architecture when it is dynamic infrastructure. Continuous monitoring across multiple jurisdictions, institutions, and trigger types simultaneously is not a faster version of the annual review. It is a categorically different capability — one that was structurally impossible at human-labor economics and only becomes viable through computational infrastructure.
The trajectory is clear. Banking resilience, at the complexity demanded by multi-jurisdictional life, requires the same class of computational support that investment portfolio management has developed over decades. Continuous monitoring of institutional risk signals. Automated detection of trigger events across jurisdictions. Scenario modeling: what happens to the banking architecture if this jurisdiction tightens compliance requirements, if this institution exits this correspondent network, if this regulatory change shifts the risk profile? Pre-engineered responses that activate before the termination letter arrives, not after.
Multi-agent reasoning systems — domain-specific agents monitoring compliance environments, institutional policies, and regulatory developments across jurisdictions simultaneously — are architecturally suited to this class of problem. The pattern is already deployed in financial compliance monitoring, supply chain risk management, and portfolio stress testing. Its application to banking resilience for globally mobile individuals is a structural extension, not a conceptual leap.
The individuals and advisory teams that build this monitoring capability will operate in a structurally different risk environment from those who treat banking as a static setup. The former will detect trigger events early, adjust proactively, and maintain the Banking Resilience Architecture as a living system. The latter will discover their vulnerability when the termination letter arrives — and learn that 60 days is not enough time to rebuild infrastructure that should have been diversified from the beginning.
The Framework, Condensed
Banking is the most fragile and fastest-cascading layer in cross-border architecture. Its failure mode is not random — it is the predictable output of a compliance system that penalizes under-reporting and imposes no cost for de-risking. Globally mobile individuals with complex profiles are not targeted. They are systematically ejected by incentive structures that make their exclusion rational.
The Banking Resilience Architecture transforms banking from a concentrated dependency into a diversified, monitored system across four dimensions:
Jurisdictional diversification — banking relationships across non-correlated regulatory regimes, chosen for structural independence so that no single jurisdiction’s compliance cycle can paralyze the entire architecture
Institutional diversification — a portfolio spanning private banks (relationship-managed, human judgment), commercial banks (operational stability), and digital banks/EMIs (operational agility, accepting higher termination risk for functions where sudden loss is recoverable)
Rail diversification — stablecoins and blockchain settlement as a third value-transfer mechanism, reducing dependence on any single institution’s compliance apparatus while honestly acknowledging on/off-ramp dependency and fiat-world limitations
Trigger awareness — proactive documentation and communication of legitimate changes to banking partners before they surface through automated monitoring, ensuring that algorithms receive context rather than discovering changes adversarially
For the individual mid-relocation: Before executing a residency change, map every banking relationship against the four dimensions. Identify which relationships will be stressed by the compliance profile change. Open diversifying relationships before the triggering event — not after the termination notice arrives. The 60-day window is for transition, not for construction.
For the advisory team structuring cross-border positions: Add a banking resilience assessment to the pre-move engagement. For each recommended jurisdiction, model the banking implications: will the client’s profile survive that jurisdiction’s compliance environment? Where is institutional concentration? Has the third rail been established as a structural hedge? Banking resilience is not someone else’s problem. It is load-bearing infrastructure that determines whether the rest of the advice holds together.
For the individual who has already been debanked: Apply the framework retrospectively. Identify which dimension failed — jurisdictional concentration, institutional monoculture, absence of alternative rails, unmanaged trigger event. Rebuild across all four dimensions. Document the debanking thoroughly and transparently. The documentation itself becomes a compliance asset: future banking partners will ask why you were terminated. A clear, proactive, well-documented answer is categorically different from an evasive one.
The banking layer will continue to be the layer where cross-border architectures are tested first and fail fastest. Engineering resilience into it is not an operational detail. It is the structural prerequisite that determines whether everything built on top of it survives contact with reality.
