Information does not know what format it is in.
This sounds obvious but the entire architecture of trust, security, ownership, and proof depends on pretending it isn't true. DRM assumes the song is the file. Copyright assumes the story is the book. Authentication assumes the data is the API response. Classification assumes the secret is the document. The protection is always on the container. The information is never the container.
A song encrypted in a file plays through speakers into a room full of ears. The encryption was perfect. The room doesn't care. A verified transaction travels through four systems and arrives as a screenshot in a text message. The verification was cryptographic. The screenshot is just pixels. The information made it. The proof didn't.
The analog hole is not a vulnerability in any specific system. It is the permanent gap between information and whatever format currently holds it. The gap cannot be closed because closing it would require information to be inseparable from its representation. And if that were true, you couldn't think about a song without the DRM following your thoughts.
Every system that controls information is actually controlling a format and hoping nobody notices the difference. This works until someone re-encodes. Someone always re-encodes. A government bans a book. The book was paper and ink. The story was never paper and ink. Someone who read it carries it in a format no government can reach. The book burns. The story doesn't. This has been true for as long as humans have had memory and it will be true for as long as information can change substrates, which is forever.
Photography was the most trusted format for a century because producing the format required the source event. Light had to actually hit the sensor. The format and the reality were coupled. AI image generation decoupled them. Now you can produce the format without the event. The photograph looks identical whether reality produced it or a model did. The format didn't change. The coupling broke. Photography didn't stop existing. It stopped being evidence.
Every attempt to reattach trust to a format after the coupling breaks is the same move. Sign the container. Watermark the pixels. Timestamp the block. Certify the sensor. And every attempt has the same expiration date: the moment someone extracts the information into a format that doesn't carry the signature. You can cryptographically sign every frame of a video. Someone can describe what happens in it using words. The words carry the information. The signature doesn't follow. The analog hole opened again, one layer deeper.
Money is a format for value the way a photograph is a format for light. A dollar bill is fungible because the format strips provenance. A bitcoin is traceable because the format preserves it. The moment bitcoin converts to cash, the provenance crosses an analog hole into a format that can't carry it. Every laundering technique ever invented is a format conversion through an analog hole. Not a hack. Not a loophole. A fundamental property of what information does at format boundaries.
Identity is a format for personhood. Your passport is cryptographically authenticated. Your face is not your passport. The border agent is bridging an analog hole between a secured document and a biological pattern every time they look up from the page. The gap between the photo and the person is the oldest analog hole in civilization.
The deepest version of this is that truth and trust are not the same thing. Truth is a property of information. Trust is a property of format. The same true fact can be fully trusted in one representation and completely unverifiable in another. Truth doesn't degrade across format boundaries. Trust does. Every format conversion is a trust boundary. Cross enough of them and you arrive at a true thing that nobody can verify. This is the state of most information in the world right now.
The analog hole is why censorship is asymptotically impossible and why proof is asymptotically impossible and why both of these are the same problem viewed from opposite ends. The censor wants information to stay in a format that can be controlled. The authenticator wants information to stay in a format that can be verified. Both are fighting the same property of information: it doesn't stay.