Nothing here yet.
That’s exactly it. The interesting part is that even once you expose it, most teams still think in terms of “a route”. In reality it’s rarely that clean. The same route can behave differently depending on destination, content type, or even time of day. So you end up not just designing failover, but defining what failure actually means for your use case. That’s usually where things either become manageable… or slowly drift back into guesswork.
This is a really solid breakdown. What stood out to me is how everything still looks clean at the design level, but in practice the flow itself becomes unpredictable. Same user, same KYC path on paper, but depending on providers, timing, retries or even small data differences, the actual execution can vary a lot. Feels like that’s where KYC and security really merge, not just in data, but in how the system behaves under real conditions.
this is actually super interesting, especially the part about juggling multiple channels one thing I kept running into when working on messaging stuff is that even if the inbox / orchestration layer is clean, the underlying delivery is still kind of a black box like you can build a great unified system on top, but if routing or carrier behavior shifts underneath, things start acting weird and it’s hard to trace why curious if you’ve run into that as well when scaling across channels or do you mostly rely on providers to handle that layer?