Constitutional Framework

Bridge to Implementation

The preceding argument is analytical. What follows is normative.

The book demonstrates that verification cost determines the structure of trust, that cheap verification makes a new constitutional order possible, and that the absence of that order produces domination without a dominator. The two documents that follow propose a specific constitutional response. They are offered not as the only possible response but as a sufficient one — a proof of concept demonstrating that the architecture described in the preceding chapters can be operationalized in institutional terms precise enough to implement, critique, and improve.


From Claims to Articles

The book's twelve canonical claims are empirical and structural — they can be right or wrong. The constitutional proposal's twelve articles are normative — they can be accepted or rejected. The articles depend on the claims but do not follow from them deductively. Other constitutional responses to the same claims are possible. This one is specified because specification disciplines thought in ways that aspiration does not.

The table below maps each article to the canonical claim or claims that must be true for the article to be justified. If any claim falls, the reader can immediately identify which articles are affected.

RightDepends On
1. Right to a receiptC1 (tempo exceeds participation → contestability must be mechanized), C8 (no receipt, no legitimacy)
2. Right to contest through independent reviewC8 (receipt fields must be sufficient for contestation), C9 (receipts fail in predictable ways)
3. Right to human review for material adverse actionsC1 (legitimacy requires contestability at human tempo), C7 (local compliance ≠ global accountability)
4. Right to export data, credentials, and relational contextC10 (contestability requires credible exit), C11 (quiet foreclosure eliminates alternatives through architecture)
5. Right to present portable credentialsC10 (without fork rights, receipts become petitions), C3 (the trust tax persists through lock-in)
6. Right against cross-domain composition without consentC4 (bilateral coherence ≠ compositional coherence), C12 (without mercy threshold, receipted coercion becomes permanent caste)
7. Right to time-bounded personal recordsC12 (mercy is the constraint that prevents verification costs from diverging)
8. Right to know the rule invokedC8 (receipt fields must be evaluable), C7 (domination without a dominator is structural)
9. Right against excess data collectionC3 (the trust tax includes extractable surveillance premiums), C11 (quiet foreclosure operates through information asymmetry)
10. Anti-waiver: constitutional floor cannot be contracted awayC7 (domination persists despite contractual consent), C11 (foreclosure of alternatives makes "consent" structurally coerced)
11. Settlement-layer integrityC5 (energy structured through computation is the emerging factor of production), C8 (receipt integrity requires a substrate that cannot be edited by the receipted entity)
12. Mandatory independent auditC9 (receipt regimes fail predictably and can be hardened), C4 (compositional failure is computable and therefore auditable)

What follows is the constitutional proposal in two parts: the Orientation, which states the commitments, and the Design Brief, which specifies how they become enforceable.