Constitutional Framework

Computational Republicanism

Power is glass; persons are veiled.


I. The Name

Political persuasions do not begin with platforms. They begin with a structural diagnosis that precedes any particular policy and outlasts the administrations that attempt to implement it. Liberalism diagnosed the danger of interference. Socialism diagnosed the danger of exploitation. Republicanism diagnosed the danger of domination — arbitrary power, the kind that needs no justification because no mechanism exists to demand one.

Each persuasion named its enemy before it named its remedy. The remedy changed across centuries; the diagnosis persisted. What follows names a diagnosis for the computational age and specifies the constitutional orientation it implies.

The diagnosis: coordination at computational speed produces domination without a dominator. Not interference by a tyrant but the emergent composition of individually compliant processes whose aggregate effect on a particular human life is unaccountable, uninspectable, and unreachable through any mechanism the affected party can invoke. No one decided. Everyone is affected. The decision cannot be found because it was never made — it accumulated, default upon default, optimization upon optimization, until the person discovers her diminished condition by collision with a world that has already moved against her.

The orientation that follows from this diagnosis is computational republicanism: the commitment that freedom, understood as the structural impossibility of arbitrary interference, must be maintained in domains where coordination operates faster than human deliberation can follow. Republican because the core inheritance is Pettit's non-domination, extended through Hirschman's exit-voice framework to a substrate that has no will and therefore cannot be petitioned in the traditional sense. Computational because the domain is machine-speed coordination among autonomous agents — processes that negotiate, commit, settle, and terminate before any human party can participate in the exchange, let alone contest it.

Not a party. Not a platform. A constitutional orientation — the way liberalism or republicanism names a cluster of commitments that precede any specific legislative agenda and persist regardless of which coalition holds power.


II. The Axiom

One commitment is prior to all others and bears the weight of everything that follows.

Freedom is the structural impossibility of arbitrary interference — extended to domains where the interferer has no will, no body, and no future.

Philip Pettit recovered the republican tradition's deepest insight: a slave with a kind master is still a slave, because the master's kindness is voluntary and the slave's condition depends on character rather than structure. Remove the structural capacity for arbitrary interference and the slave is free regardless of the master's disposition. The tradition assumed a dominator with will — a king, a magistrate, a corporation — an entity that could be identified, constrained, held to account. The computational age produces domination without a dominator. Interference is real: a payment rail severed, a content feed throttled, a credit score adjusted, a score shifted while you sleep. The interferer is absent. Processes produced the outcome, each locally correct, none individually accountable for the aggregate effect, and the aggregate effect shapes the conditions of a life whose owner had no standing to participate in the coordination that produced it.

The axiom extends non-domination to this condition. It insists that structural incapacity for arbitrary interference remains the test of freedom even when the interference emerges from composition rather than command, from architecture rather than intention, from default rather than decree. A person subject to processes she cannot inspect, cannot contest, and cannot exit without forfeiting everything she has built is dominated — regardless of the process's efficiency, regardless of the platform's benevolence, regardless of the absence of any human being who willed the outcome.


III. Standing

A constitutional order that does not specify who can invoke it is a decoration.

Any person subject to a coercive computational act has standing to demand a receipt, contest the act, and exit the substrate — regardless of citizenship, membership, platform status, or contractual waiver.

Standing is not contingent. It attaches to the person affected, not to the person's relationship with the entity that acted. A terms-of-service clause that purports to waive the right to a receipt is void under this framework, for the same reason a contract that purports to waive the right to habeas corpus is void: certain structural protections against domination cannot be contracted away because they are prior to the contract. The contract exists within the constitutional order; the constitutional order does not exist at the pleasure of the contract.

Standing extends to non-citizens, non-residents, and non-members because the coercive act does not check citizenship before it executes. A payment freeze affects a merchant in Lagos and a merchant in Louisville identically. A content-distribution throttle silences a creator in São Paulo as completely as one in Stockholm. If the coercion is indifferent to jurisdiction, the protection must be equally indifferent. This is not cosmopolitanism. It is operational realism: a constitutional framework that protects only those who already hold citizenship in the jurisdictions that adopt it reproduces the structural exclusion it was designed to prevent.


IV. Definitions

The following terms are used throughout with specific constitutional meaning. Each names a structural feature, not a contingent technology.

Coercive Computational Authority (CCA). Any entity — state agency, platform, protocol, or autonomous agent system — that exercises power over persons through computational processes, where "power over persons" means the capacity to restrict, deny, degrade, or eliminate a person's access to economic participation, communication, reputation, identity, or essential services. The definition is functional, not categorical: a small community forum that cannot materially affect a person's livelihood does not meet the threshold; a payments platform that controls a merchant's revenue stream does, regardless of the platform's legal classification.

Coercive Computational Act. Any act by a CCA that restricts, denies, degrades, suspends, or eliminates a person's access to services, funds, credentials, reputation, communication, or economic participation. The act need not be intentional. Emergent effects of algorithmic classification, model retraining, and automated policy application qualify if they produce material adverse consequences for identifiable persons.

Receipt. A structured, machine-readable, human-evaluable record of a coercive computational act, containing five mandatory fields: Act (what was done), Authority (under what rule), Bounds (scope and duration), Justification (evidence or reasoning), and Appeal Path (mechanism for contestation). A receipt is issued at the time of the act, not retroactively. A receipt whose fields contain only template language satisfies the form but not the substance and is subject to challenge.

Appeal. A process for contesting a coercive computational act, reviewed by a party independent of the entity that took the action, operating on defined timelines, with the power to reverse or modify the action. An appeal reviewed by the entity that took the original action is reconsideration, not appeal. An appeal whose timeline exceeds the duration of the harm is autopsy, not contestation.

Exit. The right to leave a coordination substrate without forfeiting the value accumulated within it. Exit is credible only when it preserves four layers: data (including relational context), identity (portable credentials attesting to performance), rules (the governance formula, modifiable above the constitutional floor), and protocol connections (interoperability that prevents exit from becoming exile).

Portable Credential. A verifiable attestation of a person's performance, history, or standing that can be presented to any compatible system without requiring the issuing platform's permission or cooperation. The credential attests to what the person did, not to the person's membership in the platform that observed it.

Settlement Layer. The substrate of record on which receipts, credentials, and constitutional commitments are registered. The settlement layer's integrity determines the integrity of everything built upon it. A settlement layer whose records can be edited by a single entity without detectable cost is a trust dependency, not a constitutional foundation.

Audit. Systematic inspection of a CCA's receipt stream by a body with the technical capacity and legal authority to identify patterns of abuse, deficient receipts, and proportionality violations across populations. Audit is distinct from individual appeal: appeal addresses a single act; audit addresses systemic practice.

Delegating Principal. The persistent party at the end of every delegation chain — the entity that deployed the computational process, bears liability for its effects, and answers when the process has terminated. When multiple entities share the delegation chain, the principal is the entity that set the objective the process pursued, not the entity that provided the infrastructure.

Designed Forgetting. The structured constraint on a system's memory through five operations — expiration, sealing, aggregation limits, separation, and amnesty — such that records of individual conduct are bounded in the domains across which they can compose and the duration for which they persist. Designed forgetting applies to records of persons. It does not apply to records of coercive authority.


V. Three Constitutional Principles

Below the axiom, three commitments define what legitimate governance looks like when coordination operates at speeds that preclude human participation. They are principles about the character of a constitutional order, not mechanisms for implementing it. The mechanisms come after.

Civic Asymmetry

Power is glass; persons are veiled. Transparency obligations fall on those who exercise coercive authority, not on those subject to it. The more authority you wield, the more legible you must become. The less power you hold, the more privacy you retain.

The principle is older than computation. When the English Parliament compelled the Crown to publish its expenditures while protecting private papers from unreasonable search, it drew this line. When the American Fourth Amendment prohibited warrantless searches while requiring government proceedings on the public record, it drew the same line from the other direction. The current platform architecture inverts the polarity: the platform is opaque to the user, the user transparent to the platform, the algorithm that shapes your feed invisible to you while your every interaction is visible to it. Civic asymmetry demands the inversion be reversed. Not because transparency is an unqualified good — it is not — but because the direction of transparency determines whether a system constrains power or amplifies it.

Designed Forgetting

Perfect memory is incompatible with freedom. A legitimate system must include structured mechanisms by which records of individual conduct expire, are sealed, are bounded in the domains across which they can compose.

Two constitutional clauses govern the boundary between memory and mercy, stated here in the form that resists demagoguery:

Clause A: The Persistence of Power. Receipts document exercises of coercive authority. The actor is the authority; the object is the act. Receipts persist as long as the issuing institution exists and are not subject to expiration, sealing, or amnesty. An institution that froze an account or denied a loan in bad faith fifty years ago must still answer for the exercise.

Clause B: The Finitude of Persons. Personal records document individual conduct and identity data. The actor is the person; the object is conduct. Personal records are subject to expiration, sealing, aggregation limits, cross-domain separation, and amnesty, through narrowly defined due-process channels administered by independent bodies. A person is not the permanent property of her documented past.

The two clauses are not in tension. They are the same principle applied in opposite directions. Power-time is eternal because institutions are structurally continuous across decades and centuries. Person-time is mortal because persons change, and a just order must be organized to acknowledge the change. Without Clause A, power escapes accountability. Without Clause B, verification becomes caste. The receipt regime requires both, because the machinery of proof must constrain power without imprisoning persons.

No protocol can forgive. No algorithm can look at a person and say: you are more than the sum of your documented failures. Forgiveness requires encounter — the specific person, the specific eyes, the particular distance between who someone was and who they have become. That encounter is the mercy threshold: a constitutional requirement, not a sentimental aspiration.

Thermodynamic Grounding

The integrity of the constitutional record must be anchored in a cost that no institution can unilaterally waive.

This is the principle that requires the most careful statement, because it is the most often misunderstood — confused with monetary policy, or with advocacy for a particular protocol, when it is a constitutional constraint about the editability of the record on which every other guarantee depends.

The argument proceeds from a structural observation. Every constitutional order rests on a settlement layer — a substrate whose integrity the entire apparatus of governance depends upon. In medieval commerce, the settlement layer was the chain of endorsed bills, grounded in the notary's seal and the endorser's staked capital. In the gold standard era, the settlement layer was the metallic reserve, grounded in geological scarcity. In the fiat era, the settlement layer is the central bank's ledger, grounded in the sovereign's taxing authority and institutional credibility.

Each grounding carries a characteristic vulnerability. The notary could be bribed. Gold could be confiscated. The sovereign's credibility can be debased. The question is not whether the grounding is perfect — no grounding is — but what kind of capture each admits. A settlement layer grounded in institutional authority is vulnerable to institutional capture: whoever controls the institution controls the ledger, and whoever controls the ledger can rewrite the record that the entire constitutional apparatus depends upon.

The constitutional requirement is this: the settlement layer must be grounded in a cost whose replication is physically verifiable and whose waiver requires no one's permission. This rules out settlement layers whose integrity depends solely on the continued honesty of a single institution. It admits multiple implementations:

  • Proof-of-work grounds integrity in thermodynamic expenditure — energy converted into computational proof, verifiable by any participant, irreversible by anyone. Currently the most battle-tested mechanism at global scale.
  • Proof-of-stake grounds integrity in economic cost — validators locking capital that can be destroyed for dishonesty. The cost is real but is denominated in the asset being secured, creating a circularity that thermodynamic grounding avoids.
  • Hybrid architectures may combine both, using thermodynamic anchoring for the base settlement layer and economic staking for higher-throughput coordination layers.

The adversarial test: if someone accepts civic asymmetry, designed forgetting, the receipt regime, and fork rights, but rejects energy-based settlement in favor of a multi-institutional consortium with distributed key management and mutual audit obligations — are they outside the constitutional order?

They are inside the order if and only if the consortium satisfies the editability constraint: no single member, and no politically feasible coalition of members, can alter the record without detectable cost. If the consortium's integrity depends on ongoing mutual good faith among members who share regulatory jurisdiction, political incentives, or commercial relationships, the grounding is institutional and therefore vulnerable to coordinated capture. The constitutional question is not "how much energy does the settlement layer consume?" but "what would it cost to rewrite the record, and who would have to cooperate?"

Thermodynamic grounding is not a preference for one chain. It is the constitutional requirement that the foundation on which every receipt, credential, and guarantee rests cannot be edited by the entity whose power those instruments constrain. The analogy is geological: no clerk can counterfeit what only a planet's interior can produce. The Joule Standard names the same property in computational form — a settlement layer whose integrity is guaranteed by physics rather than policy, because policy is reversible and physics is not.

Every constitutional guarantee in this framework terminates, eventually, in the question: who controls the ledger? Thermodynamic grounding is what prevents the answer from being: whoever has the most political leverage this decade.


VI. The Bill of Rights

Twelve clauses. Each names a right that attaches to any person subject to coercive computational authority. Together they constitute the constitutional floor below which computational governance lacks legitimacy.

Article 1. Every person subject to a coercive computational act shall receive a receipt at the time of the act, specifying Act, Authority, Bounds, Justification, and Appeal Path in terms evaluable by a literate person or by standardized verification software.

Article 2. Every person who receives a receipt shall have the right to contest the act through a process reviewed by a party independent of the entity that took the action, on a timeline proportionate to the severity of the harm.

Article 3. In cases where a coercive computational act crosses the threshold from computational to embodied consequence — restricting access to funds, employment, housing, medical care, communication, or legal standing — the affected person shall have the right to human review by a qualified, independent arbiter within a defined period.

Article 4. Every person shall have the right to export their data, identity credentials, reputation attestations, and relational context from any coordination substrate in interoperable, machine-readable formats, without requiring the platform's ongoing cooperation.

Article 5. Every person shall have the right to present portable credentials attesting to performance, history, and standing to any compatible system, without the issuing platform's permission. Credentials attest to what a person did, not to membership in the platform that observed it.

Article 6. No coercive computational authority shall compose personal records across more than a defined number of domains without the affected person's explicit, informed, revocable consent. Aggregation limits prevent the construction of comprehensive profiles from individually innocuous records.

Article 7. Personal records of individual conduct shall be subject to expiration, sealing, and separation according to schedules defined by the administering jurisdiction. The right to become someone new is constitutionally protected. Records of exercises of coercive authority are exempt from expiration and persist indefinitely.

Article 8. Every coercive computational authority shall disclose, upon request by an affected person, the specific rule invoked in any adverse act — stated in terms a literate person can evaluate. Disclosure of the rule does not require disclosure of model weights, proprietary algorithms, or trade secrets, but does require disclosure of the policy the algorithm implements and the threshold it applied.

Article 9. Coercive computational authorities shall collect only the minimum data necessary for the contracted service. Data collection beyond operational necessity requires explicit, informed, revocable consent and is subject to audit.

Article 10. No contractual waiver shall extinguish the rights enumerated in Articles 1 through 9. Terms of service, end-user license agreements, and platform policies that purport to waive receipt, appeal, exit, or portability rights are void as against the constitutional floor.

Article 11. The settlement layer on which receipts, credentials, and constitutional commitments are registered shall be grounded in a cost whose replication is physically verifiable and whose waiver requires no single entity's permission.

Article 12. Every coercive computational authority operating above the threshold of systemic significance shall submit to periodic independent audit of its receipt stream, its compliance with portability standards, and its adherence to the proportionality requirements of this framework.


VII. The Constitutional Machine: A Separation of Powers

The separations are asserted throughout Res Agentica. Here they become institutional.

Four Separations

Issuers vs. Verifiers. The entity that issues a credential may not be the sole entity that can verify it. An employment credential issued by Platform A must be verifiable by Platform B, Auditor C, and Court D without requiring Platform A's cooperation. Monopoly over verification is monopoly over identity.

Operators vs. Auditors. The entity that exercises coercive computational authority may not audit its own compliance. Independent auditors — publicly chartered, privately bonded, with access to receipt streams and the technical capacity to evaluate them — inspect operators the way financial auditors inspect banks: systematically, adversarially, and with the power to compel disclosure.

Rule-Makers vs. Adjudicators. The entity that sets the rules governing a coordination substrate may not adjudicate disputes arising under those rules. Standard-setting bodies draft the receipt format, the portability requirements, the audit criteria. Arbitration bodies — independent, bonded, accountable to review — adjudicate disputes between affected persons and operators. The separation prevents the rule-maker from interpreting its own rules in its own favor.

Credentialers vs. Identity Providers. The entity that attests to a person's performance (a credential) is distinct from the entity that attests to a person's identity. A seller's reputation is credentialed by the transaction record. Her identity is attested by an identity provider. The two functions are separated at the protocol level to prevent any single entity from controlling both what a person can prove she did and who she can prove she is.

One Institutional Blueprint

How these separations work in practice, for a payment platform operating above the threshold of systemic significance:

The Operator (the payment platform) processes transactions, applies fraud-detection models, and exercises coercive acts (freezes, holds, restrictions). For every coercive act, it issues a receipt to the affected person and files a copy with the Auditor.

The Auditor (an independent body, publicly chartered or privately bonded) receives receipt streams from the Operator, inspects them for patterns of abuse, template justifications, proportionality violations, and demographic disparities. The Auditor publishes periodic reports. It has the power to compel disclosure of receipt metadata and to refer cases to the Adjudicator. It does not have the power to reverse individual decisions — that is the Adjudicator's function.

The Adjudicator (an independent arbitration body, bonded, with no contractual or commercial relationship to the Operator) reviews individual appeals. The affected person files a contestation. The Adjudicator evaluates the receipt against the rule invoked, the evidence cited, and the proportionality of the bounds. It has the power to reverse, modify, or uphold the action, and to award remedy including expedited release, compensation for demonstrated harm, and structural injunctions against repeat violations.

The Standard-Setting Body (a multi-stakeholder organization including platform representatives, civil-society organizations, technical experts, and affected-party advocates) defines the receipt schema, the portability standards, the audit criteria, and the proportionality guidelines. It does not adjudicate individual cases. It publishes standards, reviews compliance data from Auditors, and revises standards based on emerging patterns.

The Court System (existing judicial infrastructure, extended to computational governance) provides the backstop. Decisions of the Adjudicator are subject to judicial review. The Standard-Setting Body's rules are subject to legislative override. The Auditor's charter is subject to public accountability. No element of the Constitutional Machine is beyond democratic contestation.


VIII. Three Structural Mechanisms

The Receipt Regime

Every exercise of coercive computational authority produces a receipt with five fields: Act (what was done), Authority (under what rule), Bounds (scope and duration), Justification (the evidence or reasoning), and Appeal Path (the mechanism for contestation). The receipt does not prevent the action. It makes the action inspectable, and inspectability is the precondition for everything else. You cannot contest what you cannot see. You cannot challenge what you cannot name.

Proportionality governs depth. A content-moderation decision that temporarily reduces a post's visibility requires a light receipt — act named, authority cited, bounds stated, appeal path identified, justification a brief policy reference. A decision that permanently suspends a user's account requires substantive justification, expedited appeal, and mandatory review by an independent arbiter. Emergency situations receive specific accommodation: a financial platform detecting probable fraud issues a provisional receipt — Act and Bounds filled immediately, Justification completed within forty-eight hours. Quick action is preserved. Documentation follows. The affected party's appeal window begins when the justification is produced.

A tyrant who must issue receipts can still be a tyrant — but not a silent one. The difference between visible tyranny and invisible tyranny is the difference between a regime that can be contested and one that cannot.

Fork Rights

The right to exit a coordination substrate taking your data, your identity, your accumulated reputation, and your protocol connections — and to reconstitute the service under different stewardship. Four layers, all four required:

  • Data — including relational context: not just the user's own records but the network position, connection patterns, and community memberships that make records meaningful. A fork that carries records without context has achieved data portability. It has not achieved exit.
  • Identity — portable credentials attesting to performance, not membership. A seller's reputation belongs to the seller. She earned it through the quality of her goods and the reliability of her shipping. Its confiscation upon departure is the mechanism by which lock-in operates.
  • Rules — the governance formula, modifiable above the constitutional floor. The minority that forks adopts the rules it prefers while preserving the receipt regime's minimums. The fork is a constitutional exercise, not a schism.
  • Protocol connections — interoperability that prevents a fork from becoming exile. A fork that cannot transact with the original's users has not achieved exit; it has achieved banishment.

A fork that carries fewer than four layers arrives diminished. A platform that can prevent any one of the four has reimposed the lock-in the right was designed to break.

The Constitutional Machine

Four separations prevent any single entity from accumulating enough authority to dominate: issuance from verification, operator from arbiter, rule-making from adjudication, identity from credentialing. Bonded arbitration ensures that dispute resolution is independent of the entities being disputed. Fractal jurisdiction allows governance structures to nest — each level constrained by the constitutional floor but free to vary above it.


IX. The Boundary Condition: The Competence Trap

Delegation without maintained understanding produces domination by default.

The orientation is not anti-delegation. Delegation to computational processes is inevitable, desirable, and in many domains vastly superior to human coordination. The boundary condition insists that the delegating party — the surviving principal, the one who answers when the agent has terminated — must retain enough understanding to evaluate whether the constitutional constraints are being honored.

A radiologist who signs an AI-generated report without the independent diagnostic capacity to catch the system's errors has not delegated. She has abdicated. The signature assures the world that a qualified human reviewed the image. If the assurance is hollow — if her independent capacity has eroded through months of unchallenged confirmation — the signature is not oversight. It is ceremony, and ceremony is a species of fraud when it substitutes for the judgment it claims to represent.

The Competence Trap is the boundary condition that prevents the entire framework from becoming a rubber stamp. Without it, the receipt regime produces receipts no one can evaluate, fork rights offer exits no one understands how to exercise, and the constitutional machine separates powers that no human participant can independently assess. The architecture works only if the beings for whom it was built remain competent to operate it — and maintaining that competence is itself a constitutional obligation, not a personal virtue.


X. Implementation Pathway

Constitutional orientations that do not specify a path from principle to practice are philosophical. The following three phases are designed to be implementable within existing legal and technical frameworks, each creating the conditions for the next.

Phase 1: Receipts and Appeal (Years 1–3)

Scope: Payment platforms, employment platforms, housing-eligibility systems, and critical-communications platforms above a threshold of systemic significance (defined by user count, transaction volume, or market share in the relevant domain).

Requirements: Every coercive computational act produces a receipt with five fields. Every affected person has access to an appeal process with defined timelines and independent review. Provisional receipts are permitted for emergency actions, with full justification required within forty-eight hours.

Mechanism: Legislative mandate, modeled on existing consumer-protection frameworks (TILA for financial disclosure, FCRA for credit reporting, GDPR for data rights). Alternatively, regulatory mandate through existing agencies (CFPB for payments, FTC for platform practices, sectoral regulators for domain-specific applications). Early adoption by voluntary platforms creates compliance infrastructure and competitive pressure.

Institutional build: Training and certification of independent arbiters. Establishment of receipt-schema standards through multi-stakeholder processes. Development of standardized verification software that can evaluate receipt adequacy.

Phase 2: Portability and Fork Rights (Years 2–5)

Scope: All platforms subject to Phase 1 requirements, plus social platforms, credential-issuing systems, and marketplace platforms above the significance threshold.

Requirements: Data portability in interoperable formats, including relational context. Portable credential standards enabling cross-platform reputation transfer. Protocol interoperability preventing exit from becoming exile. Privacy-preserving mechanisms (zero-knowledge proofs, differential privacy, k-anonymity) protecting counterparty data during export.

Mechanism: Interoperability mandates modeled on telecommunications portability (number portability, interconnection requirements) and financial portability (account-switching services). Credential-portability standards developed through industry consortia with regulatory backstop.

Institutional build: Establishment of independent audit bodies with technical capacity and legal authority. Development of portability standards through standard-setting organizations. Creation of verification-advocate roles analogous to public defenders — professionals who inspect receipts on behalf of affected parties who lack the technical capacity to evaluate them.

Phase 3: Settlement and Audit Infrastructure (Years 3–10)

Scope: The settlement layer on which Phase 1 and Phase 2 commitments are registered.

Requirements: Receipt registries that satisfy the editability constraint — no single entity, and no politically feasible coalition, can alter the record without detectable cost. Periodic independent audits of operators' receipt streams, portability compliance, and proportionality adherence. Published audit reports with enforcement consequences.

Mechanism: Settlement-layer requirements defined by the degree of constitutional assurance required. High-assurance applications (criminal-justice records, financial regulatory receipts, identity credentials) may require thermodynamic grounding. Lower-assurance applications (content-moderation receipts, marketplace dispute records) may satisfy the editability constraint through multi-institutional architectures with mutual audit obligations. The constitutional question at each level is: what would it cost to rewrite this record, and who would have to cooperate?

Institutional build: Professional culture of computational auditing, analogous to financial auditing — with professional standards, certification requirements, liability for negligent audit, and independence requirements that prevent auditors from becoming captive to the entities they audit.


XI. Coalition Logic

Constitutional orientations become political movements when a coalition discovers that its members' disparate interests are served by the same structural commitments. Computational republicanism's natural coalition is broader than any single existing alignment.

Who Benefits Immediately

Small and medium business. Merchants whose livelihoods depend on platforms they do not control are the most direct beneficiaries of the receipt regime and fork rights. A potter whose payment hold is receipted can contest it. A merchant who can port her reputation can leave.

Gig workers and algorithmic labor. Drivers, delivery workers, and freelancers subject to algorithmic management — opaque ratings, undisclosed thresholds, uncontestable deactivation — benefit from receipt requirements and appeal guarantees. The receipt converts algorithmic management from a black box into a contestable system.

Civil liberties and privacy organizations. Civic asymmetry is their core commitment stated as constitutional architecture. The transparency direction — power is glass, persons are veiled — aligns directly with existing advocacy for surveillance reform, data minimization, and algorithmic accountability.

Consumer finance reform. The receipt regime for payment platforms and credit systems extends existing consumer-protection frameworks (FCRA, TILA, ECOA) to computational governance. The coalition with consumer-finance advocates is natural and immediate.

Dissidents, journalists, and at-risk populations. Fork rights and settlement-layer integrity are existential for populations whose access to communication, payment, and identity can be severed by a state or platform. The woman at the border with no passport is the standing test.

Antitrust and interoperability advocates. Fork rights and portability standards directly advance the structural goals of interoperability-focused antitrust policy. The overlap with existing legislative proposals (ACCESS Act, Digital Markets Act) is substantial.

Open-source and protocol-development communities. The constitutional machine's requirement that standards be publicly developed and implementations interoperable aligns with existing commitments to open standards and open-source infrastructure.

Who Pays

Platforms above the significance threshold. Receipt requirements impose compliance costs. Portability requirements reduce lock-in. Fork rights reduce switching costs that underpin market power. The cost is real. It is also the cost of legitimacy — the difference between governing and dominating.

Standard-setting and audit infrastructure. Building the institutional apparatus — training arbiters, chartering auditors, developing standards — requires sustained investment. Funding mechanisms include regulatory fees assessed on operators, fines collected from deficient-receipt issuers, and public investment in digital-governance infrastructure.

Who Fights

Platforms whose market power depends on lock-in. Portability and fork rights threaten the structural advantage that makes switching costs exceed submission costs. These entities will argue that portability compromises security, that interoperability degrades quality, and that fork rights endanger privacy. Each argument contains a genuine concern wrapped in a structural defense of market position. The genuine concerns must be addressed. The structural defense must be overcome.

Surveillance-advertising interests. Civic asymmetry and data-minimization requirements threaten business models built on comprehensive behavioral profiling. The argument will be that targeted advertising funds the free internet. The response is that the free internet is not free — its price is paid in domination, and the domination is invisible precisely because the advertising model requires it to be.

State surveillance interests. Civic asymmetry and designed forgetting constrain state surveillance programs. The argument will be national security. The response is that civic asymmetry does not prohibit lawful surveillance under judicial oversight — it prohibits the inversion of transparency that makes every citizen visible to the state while the state's criteria remain invisible to the citizen.


XII. The Opponent Model

The Quiet Foreclosure is not an accident. It is a stable equilibrium maintained by identifiable interests.

Opacity serves extraction. A platform whose decision criteria are invisible to users can optimize for extraction without triggering the political response that visible extraction would provoke. The trust tax — the premium charged for occupying the verification chokepoint — is invisible precisely because visibility would invite competition. The opacity is not a side effect of complexity. It is a business model.

Lock-in serves retention. A platform whose users cannot leave with their data, credentials, and reputation need not compete on quality of governance. It competes on switching costs, and switching costs are raised by architectural decisions — proprietary data formats, non-portable credentials, platform-specific reputation — each individually defensible as a product feature and collectively constituting a structural barrier to exit. The lock-in is not a market failure. It is a market strategy.

Permanent memory serves control. A system that remembers everything about persons while forgetting nothing can use the documented past as leverage over the institutional future — pricing risk from decades-old data, screening employment from archived social media, conditioning access on comprehensive behavioral profiles. The permanence is not a technical default. It is an asset, and the entities that hold it will resist any framework that constrains its use.

Editable ledgers serve impunity. A settlement layer whose records can be altered by the entity whose authority the records document is a system in which accountability is voluntary. The entity that controls the audit log can edit the audit log. The entity that issues receipts on its own ledger can revise the receipts. Editability is not a security vulnerability. It is a feature for those who prefer power without trace.

These four interests — opacity, lock-in, permanent memory, editable ledgers — constitute the structural architecture of the Quiet Foreclosure. Each serves a constituency. Each generates revenue. Each resists the corresponding constitutional commitment: civic asymmetry threatens opacity, fork rights threaten lock-in, designed forgetting threatens permanent memory, thermodynamic grounding threatens editable ledgers. The resistance is rational, well-funded, and politically organized. A constitutional orientation that does not name its opponents cannot defeat them.


XIII. The Structure

One axiom: non-domination, extended to computational coordination.

One standing rule: any person subject to a coercive computational act may invoke the constitutional order.

Three principles: civic asymmetry, designed forgetting, thermodynamic grounding.

Three mechanisms: receipt regime, fork rights, constitutional machine.

One boundary condition: the competence trap.

Twelve articles specifying the constitutional floor.

The structure is layered because the problems it addresses are layered. Each layer addresses the failure mode of the layer below it, and the sequence is not arbitrary. Receipts without exit are petitions. Exit without grounding is migration between equivalent prisons. Grounding without competence is a fortress whose inhabitants have forgotten what the walls are for.


XIV. What This Is Not

Computational republicanism is not crypto-libertarianism. The crypto-libertarian impulse — exit from all governance, sovereign individuals, code as the only law — is precisely the orientation the framework argues against. A protocol that governs without constitutional constraints is domination automated. The Protocol Republic requires institutions: auditors, arbiters, standard-setting bodies, appeal processes, verification advocates, professional cultures of impartiality. It requires politics. It requires conflict, because conflict about the terms of collective life is what politics exists to process. What it does not require is unanswerable coercion.

Computational republicanism is not techno-utopianism. The framework specifies a floor, not a ceiling. It does not promise that the architecture will produce justice, only that it will produce the conditions under which justice can be pursued. Magna Carta did not end tyranny. It specified what the governed could demand, in terms precise enough to argue over and durable enough to survive the arguing.

Computational republicanism is not a party platform. It is prior to any specific policy agenda. A social democrat and a market liberal could both operate within its constraints, disagreeing vigorously about tax rates and welfare programs while agreeing that no computational authority should exercise coercive power without a receipt, that no platform should foreclose exit through architectural lock-in, and that the settlement layer on which all constitutional commitments rest should be grounded in a cost that no institution can unilaterally waive.


XV. The Wager

The orientation bets that four claims are true, and it structures the bet so the world can collect if the claims are wrong.

First, that domination without a dominator is a structural condition, not a metaphor — that the composition of individually compliant processes can produce aggregate interference as real and as harmful as any tyrant's decree. If systems composed of individually compliant components produce no emergent interference, the claim is wrong.

Second, that verification cost is the primitive variable determining the structure of trust and therefore the structure of power. If plausibility without proof suffices for accountability in a world of cheap fabrication, the claim is wrong.

Third, that the integrity of the constitutional record must be anchored in a cost whose replication is physically verifiable. If a settlement layer grounded in institutional promise alone proves durable against capture at civilizational scale, the claim is wrong.

Fourth, that freedom requires mercy — that perfect verification without designed forgetting produces permanent caste. If perfect verification produces no pathology of permanent exclusion, the claim is wrong.

Each claim names its own falsification condition. A constitutional orientation that does not subject itself to its own critique expects belief, not evaluation — and belief is precisely the disposition computational republicanism is designed to replace.


XVI. The Choice

Two equilibria are technically achievable with tools that exist today.

In the first, coordination substrates are property — owned, operated, and optimized for the builders' objectives, presenting interfaces designed to extract value from participation while making the extraction invisible. Exit is impractical. Voice is meaningless. The governed discover the terms of their subjection by waking one morning to find that the world has already decided against them. Call this the Quiet Foreclosure. It is the frictionless default.

In the second, coordination is infrastructure — governed by rules that apply to builders and users alike, producing receipts that make power inspectable, preserving exit that makes voice credible, grounding the settlement layer in a cost that makes the record durable. Conflict persists. Politics persists. Disagreement about the good persists, as it must. What does not persist is unanswerable coercion.

Every day without receipts, without fork rights, without the constitutional floor held in place, the first equilibrium hardens — not because anyone chose it, but because the frictionless default compounds in the absence of deliberate resistance. Compounding is not reversible by wishing. Only by building.

The architecture can be specified. It cannot build itself.


Trust was the price of ignorance; mercy is the price of omniscience.

The question is whether we will pay as citizens or have it extracted as subjects.