Constitutional Framework
Power is glass; persons are veiled.
The following constitutional architecture operationalizes the principles developed in the trilogy. It is normative — a proposal, not a proof.
The Four Separations
- Issuers vs. VerifiersThose who issue credentials, tokens, or attestations must be structurally separated from those who verify them.
- Operators vs. AuditorsThose who operate computational infrastructure must be auditable by parties they do not control.
- Rule-Makers vs. AdjudicatorsThose who set the rules of a coordination substrate must be separated from those who adjudicate disputes under them.
- Credentialers vs. Identity ProvidersThose who attest to capabilities must be separated from those who hold identity records.
Documents
- Computational RepublicanismThe full constitutional essay — twelve articles grounding republican governance in the computational age.
- The Constitutional MachineImplementation blueprint — the four separations, receipt architecture, and fork-rights protocol.
- Bridge to ImplementationPolicy-grounding document — how constitutional principles translate to deployable infrastructure.