Software and protocol

JWTs, signed envelopes, and why communication protocols matter

This one comes from my software side. It is not a claim that spacecraft should speak JWT, but a look at why signed message envelopes, bounded claims, and protocol discipline matter whenever communication has to survive delay, distrust, or asynchronous handling.

JWTs are not spacecraft protocol. That is precisely why I found them useful to think with.

They are a clean reminder that communication systems become trustworthy only when the format is boring enough to survive repetition. A message is not just a sentence. It is an envelope, a signature story, a set of claims, a validation path, and an agreement about what counts as authentic when nobody is standing in the room to improvise.

A JWT is a signed envelope, not a magic key

The public discourse around JSON Web Tokens often treats them as if they were a single thing. They are not. They are a compact container for claims, usually paired with signing rules, validation rules, and strict assumptions about issuer and audience.

That is why the best JWT guidance is not the original specification alone. It is the later cleanup work: use the right algorithms, validate the exact claims you mean to trust, and do not confuse a parsable token with an acceptable one. Protocols fail in the space between those two ideas.

Protocols matter most when humans stop improvising

One of the recurring pleasures of writing about delayed communication is that it pushes every exchange toward procedure. You stop relying on tone of voice, interruptions, and immediate clarification. You start relying on structure.

That is not uniquely a spaceflight lesson. It is also the reason software teams gravitate toward explicit schemas, typed payloads, signatures, and replay-safe handling rules. Once the link is unreliable, asynchronous, or security significant, politeness is no substitute for a message format.

Spacecraft do not speak JWT

Real spacecraft communications are built around different standards, different constraints, and far more brutal assumptions about bandwidth and fault handling. I would not pretend otherwise.

But JWTs are still a useful Earth-side analogy for the part of engineering I kept returning to while writing: the need to separate message content from message trust. Who sent this? What claims are attached? What exactly was signed? What can the receiver verify without guessing?

Those are protocol questions before they are drama questions.

Why this topic survived the cut

This entry stayed because I like the moment when software stops feeling abstract and starts feeling procedural in the same way mission operations do. The lesson is not that space systems should use web tokens. The lesson is that reliable communication nearly always becomes a discipline of explicit envelopes, bounded claims, and very little romance.

Source trail

These are the public sources that most directly shaped the piece. I keep them down here so the essay can read like prose first and a bibliography second.

Kai Wrenbury

Novel pages, journal entries, and research notes from the making of the book. Nothing here claims agency ties or official approval.

A work of fiction. Copyright 2026 Kai Wrenbury.