Typed success or typed failure, with no third option. A certification contract takes a proposed claim and returns either a witnessed assertion (the claim has been verified, here is the evidence) or a structured refusal (the claim could not be verified, here is why). Downstream consumers know exactly what they are receiving and what confidence level attaches. Systems that return 'maybe' or 'approximately' without typing the uncertainty violate the certification contract.
Transparency must follow the direction of power. Those who wield coercive authority must be inspectable by those over whom they wield it; those who live private lives need not become legible to systems that cannot themselves be held to account. This principle is violated whenever governors are opaque and the governed are transparent — the default configuration of most contemporary digital platforms, which surveil users while resisting scrutiny of their own decision-making. The demand is not new; it restates in computational terms what constitutional traditions have long required. The king's council must be visible to parliament; parliament need not be visible to the king's council. What is new is that verification technology makes enforcement possible by design, not by the goodwill of those in power.
via Soddy/Daly
The periodic reconciliation of diverged financial claims to actual productive capacity. When virtual wealth — claims growing under compound interest — exceeds what the physical base can service, the divergence becomes unsustainable. Clearance occurs through defaults (claims written down), inflation (nominal claims diluted), or restructuring (maturity extension, haircuts, debt-for-equity swaps). Soddy and later Daly identified this as the thermodynamic corollary of a monetary system permitting unbounded claim growth against a bounded physical base. The 2008–2009 episode was a clearance event; the mechanism operates whether or not policymakers recognize it.
Bounded policy executor that can commit collateral, produce and consume receipts, and clear routine coordination without human interpretation. A firm in a file: treasury (wallet), charter (code), policy (logic), no physical location or employees. Canonical flow: Policy → Escrow → Verification → Settlement → Exception → Recourse.
Coase's 1937 insight, applied to the agent era, splits the economy in two. Agents face near-zero transaction costs with each other: they verify claims instantly, commit conditionally, settle disputes through pre-specified protocols. The boundary between firm and market that organized industrial capitalism dissolves for agent coordination — there is no reason to internalize a function within a hierarchy when the market can clear it at negligible cost. But for human coordination — judgment, liability, trust-dependent relationships — the historical cost structure persists. The result is a bifurcated economy: an agent stratum where Coasean boundaries collapse and coordination is radically disintermediated, and a human stratum where firms, contracts, and institutional overhead remain necessary. The interface between strata is where the political questions concentrate.
via Ronald Coase, Oliver Williamson
Coase's 1937 insight: the boundary between firm and market depends on the relative cost of internal coordination (hierarchy, management, monitoring) versus external contracting (search, negotiation, enforcement). When transaction costs are high, firms absorb activities; when costs fall, markets replace hierarchies. The agentic economy drives Coasean boundaries inward with unprecedented force: agent-to-agent coordination operates at near-zero transaction costs for cognitive tasks, dissolving the rationale for large firms in domains where coordination was cognitive. But for human coordination — judgment, liability, trust-dependent relationships — the boundary persists, producing a bifurcated economy.
Coercion is not binary but a spectrum, from suggestion through default through mandate to force — and accountability should scale accordingly. A recommendation is low on the gradient; a default setting is higher; a mandatory requirement higher still; physical force is the extreme. The receipt regime does not demand the same documentation for a suggestion as for an arrest, but it does demand that the gradient be legible: those affected must be able to tell where on the spectrum the power falls. The more coercive the act, the more transparency is owed; the less coercive, the more privacy is permitted. Platforms that claim to merely 'suggest' while actually 'compel' (through defaults, dark patterns, or monopoly position) violate the gradient by misrepresenting their position on it.
Intelligence that has become tradeable, fungible, and priced — the transformation of cognition from scarce human capacity to abundant computational resource. When inference costs fall toward the marginal cost of electricity, cognition becomes a commodity like wheat or steel: differentiated by grade but interchangeable, priced by markets, available to anyone who can pay. Thinking bought by the token. This commoditization is the economic event underlying Factor Prime: what was once the defining scarcity of human labor becomes abundant, and scarcity migrates to energy, authorization, and the actuation bottleneck.
Global consistency is expensive: checking compatibility, verifying overlap agreement, monitoring for drift. Someone must pay. A coherence budget is the explicit declaration of what a system will pay — in computation, time, and institutional effort — to maintain it. A system that declares no budget has declared it will not maintain coherence at all. A system with an explicit budget can reason about tradeoffs: certify high-stakes claims, monitor medium-stakes ones, and accept structured failure (with obstruction witnesses) for claims that exceed the budget. The SEC audits public companies annually but not private ones; FASB enforces accrual accounting for large firms but grants small firms simplified standards — every institution makes this tradeoff, whether or not it names it.
The irreducible cost of making local truth compose into global coherence — thermodynamic, not political, and therefore impossible to eliminate by removing intermediaries or cheapening verification. Someone must always pay: the energy required to check whether two local claims agree on their overlap, the computation required to transport a witness across a context boundary, the institutional effort required to maintain consistency across time. The coherence fee is what remains when the trust tax has been stripped away — the floor below which verification cost cannot fall, because verification is physical work and physical work dissipates energy. Landauer's 1961 result establishes the limit at the bit level; real systems operate orders of magnitude above it, but the principle holds: composing truth has a cost denominated in joules, not merely in fees. Eliminating the trust tax is a political achievement. Paying the coherence fee is a thermodynamic necessity.
How does a new predicate enter a system without destroying what already holds? An extension introducing predicate q must satisfy: local definability, overlap agreement (views induce the same classification or produce a witnessed reconciliation), invariant preservation, and conflict handling (fork, scope restriction, or preference ordering — never silent overwrite). On overlaps, agree with proof, fork with scope, or reconcile with witness.
The foundational anchor: a system satisfies commitment discipline if and only if it never extends its commitment set in a way that produces inconsistency. The principle is ancient — Roman law's doctrine of res judicata held that a matter once decided binds all subsequent proceedings — but its computational form is precise. Once committed, a claim constrains all future commitments; the system cannot assert both p and not-p without detecting the contradiction and refusing the extension. Language models lack this discipline. They produce plausible text that may contradict prior outputs without any mechanism for detecting the inconsistency. Knowledge coordination begins with the willingness to be bound by what one has already said.
When cognitive work migrates entirely to model configurations, human authorization persists formally while the underlying competence to exercise it atrophies. A physician who cannot rederive the diagnosis is not a check upon it but an address for its lawsuits. An engineer who cannot evaluate the calculation does not assure safety; she provides a liability sink. The competence trap closes when practitioners can no longer perform the tasks they routinely delegate — when the form of oversight survives after the substance has departed. The liability sink names who remains accountable when cognition commoditizes; the competence trap names what happens when that accountability becomes ceremonial.
via David Teece
Capabilities, relationships, and institutional positions required by a technology but not replicated by it. When Edison electrified Manhattan, the value migrated not to the dynamo's inventor but to the utilities that controlled the grid, the copper suppliers, and the real-estate developers who wired buildings. The pattern recurs: when the core technology diffuses, returns migrate to owners of what the technology needs but cannot produce. As cognitive capability commoditizes, value migrates to the authorization layer — the liability sinks, the regulatory relationships, the infrastructure that converts recommendations into binding commitments.
The projection surface where a component's internal state narrows to its declared output schema, potentially dropping dimensions the global task requires. Every typed interface is a composition boundary: an API endpoint exposes response fields but not the server's internal logic; an MCP tool declares output columns but not the conventions that shaped them; a database view publishes selected attributes while the query planner's assumptions remain hidden. The boundary is not a defect — projection is what makes modular systems possible. The problem arises when the dimensions projected away at one boundary are load-bearing for the composition that consumes the output downstream. The coboundary operator formalizes which consistency requirements can reference observable fields and which cannot; the zero rows identify the blind spots.
via Model theory
Add new vocabulary without changing the meaning of what was already there. A conservative extension guarantees that every query expressible in the old language returns the same answer in the new language on every old dataset — the formal basis of backward compatibility. Old truths remain true, old distinctions remain distinct, old queries remain stable. When an extension is not conservative — when adding a new predicate changes the truth value of an existing query — the change is breaking, and the system must produce a migration with witnesses specifying what changed and how to translate between old and new representations.
How do we bind future selves without caging them? Constitutional hardness measures the degree to which a rule resists modification by those it constrains — the cryptographic and economic barriers that make certain commitments difficult to reverse. Soft constitutions can be amended by majorities; hard constitutions demand supermajorities; cryptographically hard constitutions demand breaking mathematical assumptions or coordinating economic attacks that cost more than the gain. Constitutional hardness is not an absolute good — rules that cannot be changed become prisons when circumstances change — but it is necessary for commitments that must survive the temptation to defect. The Protocol Republic calibrates hardness to function: core rights (civic asymmetry, fork rights) are cryptographically hard; procedural rules are economically hard (costly but possible to change); operational parameters are soft (amendable by governance).
Three intellectual traditions converge on verification infrastructure. From Buchanan's constitutional economics: rules about rules must be chosen behind a veil of uncertainty about future positions. From Hurwicz's mechanism design: systems should be designed so that following the rules is in each participant's self-interest. From cryptographic enforcement: constraints encoded in code bind by architecture, not by promise. The ambition is dominant-strategy incentive compatibility wherever possible — arrangements where compliance is optimal regardless of what others do — extending the receipt requirement to interpretive decisions, not only executive ones. The rules governing the Protocol Republic should be self-enforcing: not because participants are virtuous but because violation is more expensive than compliance.
Typed nodes — contexts, claims, witnesses, constraints, equivalences — connected by edges specifying their relationships (supports, scoped-to, refines, transports, contradicts). The grammar is sparse by design. Three operations govern the graph: gluing (composing local knowledge into global coherence), restriction (projecting global knowledge into local views), and transport (moving claims across context boundaries via witnessed equivalences). The point is not to represent all possible knowledge but to maintain the invariants that make knowledge coordination reliable.
Contexts form a site — a category equipped with a Grothendieck topology specifying which families of contexts count as covers. The topology determines what 'local' means, what 'overlap' means, and therefore what 'agreement on overlaps' requires. Different topologies on the same category yield different coherence standards. The choice is consequential: a coarse topology demands little agreement but permits contradiction; a fine topology demands much agreement but may be unsatisfiable.
via Helen Nissenbaum
Information should flow where norms say it should. Nissenbaum's framework: flows are appropriate when they match context-relative norms; violations occur when information crosses contexts inappropriately. Civic asymmetry operationalizes the principle: power's information flows are appropriate for scrutiny — those wielding coercive authority must be inspectable. Persons' flows deserve protection — the governed need not become legible to systems that cannot themselves be held to account.
The possibility that agents, institutions, and persons can coordinate reliably across incompatible frames without sharing beliefs — because verification travels with the claim. The medieval bill of exchange demonstrated the principle: two merchants in different cities, speaking different languages, using different calendars, could execute a binding transaction without agreeing on anything except the inspectable conditions of the bill itself. The bill did not require shared law; it required only inspectable conditions and accountable witnesses. The sheaf condition formalizes this insight: local data composes into global coherence if and only if it agrees on overlaps. Agents need not share objectives, adopt common logics, or trust one another; they need only ensure that where their domains intersect, their assertions are compatible. Coherence does not require consensus. It requires only that claims carry their evidence and witnesses carry their stakes.
Context is a restriction structure: global data restricted to a local view yields the portion visible from that vantage. Views are partial; covers are complete. A cover is a family of local views that jointly see everything — no part of the domain escapes all views in the cover. Truth is indexed by view: a claim true in one context may be false in another, not because truth is relative but because different views have access to different evidence. Restriction maps specify how global knowledge degrades, or specializes, as it passes into local contexts.
Exit must be real — not nominal, not theoretical, but actually available at bearable cost. This demands portable credentials (your identity travels with you), interoperable protocols (your data can migrate), and transferable reputation (your standing is not hostage to the platform you leave). Credible exit disciplines governance through the threat of departure: power that cannot trap cannot abuse without consequence. The feudal lord could exploit the serf because the serf could not leave; the platform exploits the user when switching costs exceed the exploitation. Without credible exit, voice is supplication. Exit without voice is mere abandonment — departure changes nothing for those who remain. Voice without exit is captivity. The combination constrains power: voice articulates grievance while exit makes the grievance consequential.
via Cryptography
The cryptographic key yields proof that verifies itself — the mathematics does not defer to authority; it does not care who is checking. Yet the key proves only that you signed, not that you were uncoerced. Pettit would recognize the distinction: verification can establish fact without establishing freedom. The constraint is real; the human remainder is irreducible.
The thermodynamic basis for model value: structure that cannot be cheaply reproduced because the search that produced it consumed energy now dissipated as heat. A trained model's weights represent the output of an irreversible computational process — search through a vast space of possible configurations, most discarded. The copy is free; the original required thermodynamic work that cannot be undone. Where the diamond stores geological work in a crystalline lattice whose formation conditions cannot be counterfeited, the trained model stores computational work in parameters shaped by gradient descent at costs measured in megawatt-months. Both are instances of unforgeable scarcity — value whose production cost is embedded in its structure. What makes a model valuable is not the architecture (which can be published) or the data (which can be collected) but the structured computation that winnowed the parameter space, at thermodynamic costs that cannot be elided.