Appendices

The Twelve Claims

C1. Tempo and Legitimacy (Chapter 0: The Crisis)

When decision tempo exceeds participation tempo, legitimacy collapses unless contestability is mechanized.

Type: Structural. Falsification: Identify a coordination regime operating faster than human deliberation that maintains legitimacy without mechanized contestability. Context: The crisis of the computational age is not that decisions are wrong but that they are fast. An account freeze that executes in milliseconds and offers an appeal that resolves in months has satisfied the formal requirements of governance while violating the substantive ones. The claim asserts that this temporal asymmetry is not a design flaw but a structural condition that can only be addressed by embedding contestability in the protocol itself.


C2. Convergent Witnessing (Chapter 1: The Weight of the Word)

The five witness properties — binding, conditions, stakes, recourse, composition — are structurally forced, not culturally contingent. Three civilizations converged independently.

Type: Empirical. Falsification: Identify a durable coordination system that achieved civilizational scale while omitting one of the five properties. Context: Mesopotamian bullae, Roman triptychs, and medieval bills of exchange each instantiated the same five structural requirements for making truth portable across contexts. The convergence across three millennia and three independent traditions suggests that the properties are forced by the coordination problem itself rather than invented by any particular culture.


C3. The Trust Tax (Chapter 2: The Trust Tax)

The intermediary's premium separates into an irreducible coherence fee and an extractable trust tax. Cheap verification collapses the tax.

Type: Structural. Falsification: Show that intermediary premiums do not decompose into these two components, or that cheap verification does not reduce the extractable component. Context: Every intermediary charges for two things: the real work of composing local truth into global coherence (the coherence fee) and the premium for occupying the exclusive position from which the work is performed (the trust tax). The Champagne fair wardens, the credit bureaus, and the platform gatekeepers all exhibit this decomposition. When verification becomes cheap, the tax component collapses while the fee component persists.


C4. Compositional Failure (Chapter 3: The Witness Protocol)

A system that passes all bilateral coherence checks can still fail at composition. The sheaf condition — agreement on overlaps — is the minimum requirement, and the obstruction to meeting it is computable.

Type: Structural. Falsification: Prove that bilateral coherence is sufficient for global coherence in the general case, or that the obstruction is not computable. Formal substantiation: Bridge Paper (Appendix D).


C5. Factor Prime (Chapter 6: The Selection Gradient)

Energy structured through computation and disciplined by selection is the emerging factor of production. Verification cost, not cognitive difficulty, governs the sequence of automation.

Type: Empirical. Falsification: Show that tasks automate in the order of cognitive difficulty rather than verification cost within a given domain. Context: The V/C ratio (verification cost relative to production cost) determines which tasks computational agents absorb first. Tasks that are cognitively difficult but easy to verify (chess, protein folding, route optimization) are automated before tasks that are cognitively simple but hard to verify (childcare, plumbing, nursing). The sequence follows the verification gradient, not the difficulty gradient.


C6. Bifurcation (Chapter 7: The Bifurcated Economy)

Agent coordination at near-zero transaction cost bifurcates the economy. Whoever controls the interface between the agent economy and the human economy controls the conditions of human life.

Type: Architectural. Falsification: Show that the interface between agent and human economies can be governed without concentrated power, or that bifurcation does not occur as transaction costs approach zero.


C7. Domination Without a Dominator (Chapter 10: The Kind Master Problem)

Domination without a dominator is a structural condition, not a metaphor. Local compliance does not imply global accountability.

Type: Structural. Falsification: Show that a system composed of individually compliant components cannot produce emergent interference that constitutes domination. Context: The Kind Master Problem identifies a form of domination that the republican tradition did not anticipate: a system in which no individual actor intends harm, each component follows its rules, and the aggregate behavior nevertheless constitutes arbitrary interference in the lives of those subject to the system. The dominator is structural, not personal, and the absence of a personal dominator makes the domination harder to identify, harder to contest, and harder to remedy.


C8. The Receipt Minimum (Chapter 11: The Receipt Regime)

A system may coerce only via a receipt whose fields — Act, Authority, Bounds, Justification, Appeal Path — are minimally sufficient for contestation. No receipt, no legitimacy.

Type: Architectural. Falsification: Show that a system that coerces without receipts can maintain legitimacy at civilizational scale.


C9. Predictable Failure (Chapter 12: Three Ways Receipts Fail)

Receipt regimes fail in predictable ways — semantic deception, structural capture, procedural obstruction — and can be hardened like protocols.

Type: Architectural. Falsification: Show that a receipt regime was captured in a way that does not reduce to one of the three failure modes, or that one of the failure modes cannot be hardened against.


C10. Credible Exit (Chapter 14: Fork Rights)

Contestability requires credible exit. Without fork rights, receipts become petitions.

Type: Structural. Falsification: Show that contestability can be maintained under conditions where exit is not credible.


C11. Quiet Foreclosure (Chapter 10: The Kind Master Problem)

Quiet foreclosure — the elimination of alternatives through process rather than force — is the dominant coercion form of the computational age.

Type: Empirical. Falsification: Show that alternatives to dominant platforms can be built at costs that do not exceed the surplus they provide.


C12. The Mercy Threshold (Chapter 17: The Price of Perfect Memory)

Without a mercy threshold, receipted coercion becomes permanent caste. Mercy is the constraint that prevents verification costs from diverging.

Type: Structural. Falsification: Show that a receipted system without designed forgetting produces no pathology of permanent exclusion. Context: The receipt regime that makes power legible also makes persons permanently documented. Perfect verification creates perfect memory, and perfect memory forecloses transformation. Designed forgetting — expiration, sealing, aggregation limits, separation, amnesty — is the architectural mechanism that prevents the receipt regime from becoming a system of permanent caste. The mercy threshold is the point at which the architecture acknowledges that persons are more than the sum of their documented failures, and that acknowledgment requires a human arbiter because no algorithm can say nevertheless.