Bridge to Implementation
The preceding argument is analytical. What follows is normative.
The book demonstrates that verification cost determines the structure of trust, that cheap verification makes a new constitutional order possible, and that the absence of that order produces domination without a dominator. The two documents that follow propose a specific constitutional response. They are offered not as the only possible response but as a sufficient one — a proof of concept demonstrating that the architecture described in the preceding chapters can be operationalized in institutional terms precise enough to implement, critique, and improve.
From Claims to Articles
The book's twelve canonical claims are empirical and structural — they can be right or wrong. The constitutional proposal's twelve articles are normative — they can be accepted or rejected. The articles depend on the claims but do not follow from them deductively. Other constitutional responses to the same claims are possible. This one is specified because specification disciplines thought in ways that aspiration does not.
The table below maps each article to the canonical claim or claims that must be true for the article to be justified. If any claim falls, the reader can immediately identify which articles are affected.
| Right | Depends On |
|---|---|
| 1. Right to a receipt | C1 (tempo exceeds participation → contestability must be mechanized), C8 (no receipt, no legitimacy) |
| 2. Right to contest through independent review | C8 (receipt fields must be sufficient for contestation), C9 (receipts fail in predictable ways) |
| 3. Right to human review for material adverse actions | C1 (legitimacy requires contestability at human tempo), C7 (local compliance ≠ global accountability) |
| 4. Right to export data, credentials, and relational context | C10 (contestability requires credible exit), C11 (quiet foreclosure eliminates alternatives through architecture) |
| 5. Right to present portable credentials | C10 (without fork rights, receipts become petitions), C3 (the trust tax persists through lock-in) |
| 6. Right against cross-domain composition without consent | C4 (bilateral coherence ≠ compositional coherence), C12 (without mercy threshold, receipted coercion becomes permanent caste) |
| 7. Right to time-bounded personal records | C12 (mercy is the constraint that prevents verification costs from diverging) |
| 8. Right to know the rule invoked | C8 (receipt fields must be evaluable), C7 (domination without a dominator is structural) |
| 9. Right against excess data collection | C3 (the trust tax includes extractable surveillance premiums), C11 (quiet foreclosure operates through information asymmetry) |
| 10. Anti-waiver: constitutional floor cannot be contracted away | C7 (domination persists despite contractual consent), C11 (foreclosure of alternatives makes "consent" structurally coerced) |
| 11. Settlement-layer integrity | C5 (energy structured through computation is the emerging factor of production), C8 (receipt integrity requires a substrate that cannot be edited by the receipted entity) |
| 12. Mandatory independent audit | C9 (receipt regimes fail predictably and can be hardened), C4 (compositional failure is computable and therefore auditable) |
What follows is the constitutional proposal in two parts: the Orientation, which states the commitments, and the Design Brief, which specifies how they become enforceable.