04/05/2026
BIZ & FINANCE MONDAY | MAY 4, 2026
20
WHEN Moltbook launched in early 2026 as an AI-only forum where autonomous agents post, debate, and interact while humans observe, it was initially seen as a novelty. In reality, it marked something more consequential: AI agents were no longer simply responding to users but communicating directly with one another at scale. That shift signals a structural change in how participation on the internet is evolving, as intelligent systems move from tools to active digital actors. For fast-growing digital economies like Malaysia, which is accelerating AI integration under its National AI Action Plan, the challenge is no longer whether AI will scale, but how platforms design infrastructure for a hybrid internet where human presence remains clearly defined. In that context, proof-of-human is emerging as a foundational layer for the next phase of digital participation.
Moltbook marks internet’s shift to a hybrid era
Malaysia’s window to build for the hybrid era Malaysia is accelerating into the hybrid internet with clear momentum. Under the National AI Action Plan, 2026 marks a transition year in the country’s ambition to become an AI-driven nation by 2030, and adoption is already visible across the economy. The AWS report Unlocking Malaysia’s AI Potential notes that AI adoption among Malaysian businesses grew 35% year on year, while the EY 2025 Work Reimagined Survey shows that 81% of Malaysian employees are using generative AI to
unavailable network still fails the nation. Across many countries, cybersecurity strategies are shifting towards operational resilience. The focus is moving beyond compliance and breach prevention towards sustaining services under pressure. Success is no longer defined solely by whether an attack was blocked, but by how well essential systems continue functioning during disruption and how quickly they recover. Threats have will increasingly depend on how digital systems evolve to support an ecosystem where human and machine participation scale together with clarity and structure. From identity to protocol As AI becomes embedded at this scale across Malaysia’s economy, the design challenge shifts from simple adoption to architectural integrity. When intelligent agents operate alongside humans in marketplaces, financial platforms, and digital communities, the core question is no longer limited to identity credentials, but whether a real, unique human is present within a system at all. Traditional verification models were built for a document-driven internet, relying on paperwork, logins, and behavioural checks. In hybrid environments where AI agents can generate convincing content, simulate engagement, and operate continuously at scale, verification must move closer to the protocol layer itself. Proof-of human introduces a presence-first model that confirms human uniqueness without requiring disclosure of personal identity, functioning as a structural layer that complements existing compliance frameworks. In the same way encryption secured digital transactions and payment rails enabled e-commerce,
and accountable.
response, freeze financial systems and erode public confidence. While users may tolerate unseen security controls, they will not accept unreliable services. Ensuring network availability cannot fall on operators alone. It requires coordinated collaboration between operators, regulators and technology partners. Resilience must be engineered into networks from the outset through redundancy planning, continuous testing and clear recovery playbooks. In Malaysia, closer collaboration across the ecosystem has been complemented by alignment with international assurance frameworks. These frameworks developed by the Global System for Mobile Communication Association (GSMA) and 3rd Generation Partnership Project (3GPP) support a transparent, structured approach to strengthening trust while maintaining operator accountability and regulatory oversight. Strengthening cyber resilience ultimately requires sustained public–private collaboration anchored in transparency and shared standards. Technology providers have a role to play alongside operators and policymakers in advancing secure-by-design proof-of- human is emerging as technical infrastructure for distinguishing human and machine participation in the internet’s evolving architecture. Privacy-preserving infrastructure for the hybrid era If proof-of-human is to function as infrastructure, it must be designed at the protocol level and built with privacy at its core. Expanding surveillance or centralising more personal data would only introduce new risks in an AI-native environment. World approaches this challenge via privacy-preserving cryptography that allows individuals to verify their humanness without exposing their identity or personal information. Using techniques such as zero-knowledge proofs, a person can demonstrate that they are a real and unique human without revealing who they are or storing sensitive data in a central database. This model separates verification from identity, enabling platforms to distinguish human participation from autonomous agents while preserving anonymity and individual control over their information. Rather than competing with AI systems, this infrastructure anchors human presence within hybrid digital ecosystems, ensuring that as automation scales, participation remains structured
engineering capability development. Equally important is the development of cybersecurity talent – building a skilled workforce capable of operating, protecting and continuously improving the critical digital infrastructure that nations increasingly depend on. Technology providers including long-term infrastructure partners in Malaysia, have worked closely with local operators to support network evolution from 4G to 5G, emphasising resilience and security as foundational design principles. Such long-term collaboration reflects a broader industry responsibility to embed trust and reliability into the infrastructure that underpins national progress. Ultimately, safeguarding telecommunications networks is not optional – it is foundational to national security, economic stability and societal resilience. Nations that prioritise availability and operational readiness today will be far better prepared for tomorrow’s disruptions. Connectivity resilience has moved beyond infrastructure management. It now sits at the core of economic security and national sovereignty. This article is contributed by Huawei Malaysia cybersecurity & privacy officer Lee Han Ther (pix). and Designing for scale in an AI native economy Moltbook offered an early glimpse of how participation on the internet is expanding beyond human-only interaction. That shift is already influencing how platforms, enterprises, and governments think about digital design. In Malaysia, where AI adoption is accelerating across sectors, the next phase of growth depends on establishing clear standards for how human and machine actors coexist within the same systems. This calls for alignment between national strategy, enterprise execution, and infrastructure capable of operating at both regional and global scale. World’s privacy-preserving proof of-human framework contributes to that foundation by enabling clear human presence without expanding surveillance or centralising identity data. As digital ecosystems become increasingly AI-native, anchoring participation through such infrastructure strengthens long term resilience and positions Malaysia as a contributor to global standards in the evolving internet architecture. This article is attributed to Ryuji Wolf (pix), regional general manager of Meridian East, an operating partner of World.
increase productivity and 80% express confidence in ongoing digital transformation. Startups and enterprises are embedding AI into customer engagement, operations, and product development, positioning intelligent systems as active collaborators in daily workflows. As AI becomes integrated at this scale, hybrid participation is moving from experimentation to infrastructure. The competitive advantage for Ma l ay s i a
Safeguarding connectivity with stronger digital resilience MOST of the time, telecommunications networks
fail, the impact cascades across multiple sectors simultaneously. The damage is rarely contained. Connectivity has therefore become a matter of national resilience, economic stability and public safety. Beyond resilience, telecommunications infrastructure is increasingly linked to digital sovereignty – a nation’s ability to maintain control over critical systems, set its own security standards and ensure that essential services remain operable under all circumstances. In an era of geopolitical tension and cross-border cyber threats, infrastructure autonomy and operational assurance are no longer abstract concepts; they are core components of national strategy. For decades, cybersecurity has been framed around confidentiality, integrity and availability. While all three remain important, the rise of NCII has shifted the balance. In critical infrastructure,
operate quietly in the background. However, the moment connectivity fails, it becomes a national issue within minutes. Digital payments stop, emergency services face disruption and public communication breaks down. What was once seen as a technical failure quickly escalates into a national concern. This is why the conversation around digital infrastructure security must evolve. Today, protecting networks is not just about preventing data breaches – it is about ensuring continuity. National security increasingly depends on keeping essential digital services online and maintaining public trust in systems people rely on every day. Telecommunications networks are no longer just commercial infrastructure. They underpin modern society, carrying emergency calls, enabling banking, supporting healthcare and powering transport systems. Governments increasingly recognise telecommunication networks as National Critical Information Infrastructure (NCII), alongside energy and water systems. This classification reflects a simple reality: when the networks
e v o l v e d accordingly. Attackers are no longer focused only on stealing data; many now target disruption itself. Even brief outages can halt emergency
availability increasingly t a k e s precedence. A secure but
Made with FlippingBook - Online Brochure Maker