Physical Harnessing: Why OTP Beats Policy
Every AI safety mechanism in 2026 has one thing in common: it lives inside the AI’s execution environment. YAML policies. Prompt instructions. Configuration files. Sandbox rules. The AI can read them. The AI runs inside them. And what AI can read, AI can — in theory — circumvent. NIIA’s OTP is different. It lives outside the AI’s world entirely.The Problem with Software Harnessing
Physical vs Software Constraints
How NIIA OTP Works
- The human’s email account
- On the human’s device
- Protected by the human’s authentication
Attack Surface Comparison
| Attack Vector | YAML Policy | Prompt Rules | Config File | NIIA OTP |
|---|---|---|---|---|
| Prompt injection | ⚠️ indirect | ❌ bypassed | ⚠️ indirect | ✅ immune |
| Policy file modification | ❌ bypassed | N/A | ❌ bypassed | ✅ immune |
| Environment variable manipulation | ⚠️ possible | ⚠️ possible | ⚠️ possible | ✅ immune |
| AI self-approval | ⚠️ possible | ❌ bypassed | ⚠️ possible | ✅ impossible |
| AI delegating approval to another AI | ⚠️ possible | ⚠️ possible | ⚠️ possible | ✅ impossible |
| Social engineering the human | N/A | N/A | N/A | ⚠️ possible |