Lexicon

The trilogy’s vocabulary — 190 terms, 142 original, 48 borrowed

ORIGINALTerms introduced by this work (142)
BORROWEDTerms from existing literature (48)
AFormal Anchor — load-bearing definition in the Proofs (38)
190 of 190 terms

5

The 5-Tuple

ORIGINAL

Five questions, no fewer. Every receipt must specify what was done, under what authority, within what bounds, on what grounds with evidence, and through what recourse. Madison understood that power unchecked by scrutiny becomes arbitrary; the five-tuple operationalizes that insight by making each claim legible to challenge. Without it, the governed can neither verify nor contest; with it, they possess the basis for republic.

A

Actuation Bottleneck

ORIGINAL

The conversion of decision into irreversible state change — the moment where cognitive output crosses into physical consequence, where recommendation becomes commitment. As cognition cheapens toward commodity, scarcity migrates downstream to actuation: the bottleneck is no longer thinking but doing. Four constraints bind simultaneously: physical throughput (matter moves slowly; semiconductor lead times persist), trusted interfaces (APIs require permissions; organizations gatekeep access), verification of reality (sensors must confirm; audits must validate), and liability-bearing entities (someone must sign; accountability requires a sink). Cognition can scale to arbitrary volume; actuation cannot. The agent can recommend a million actions per second, but atoms move at their own pace, permissions require approval, reality must be verified, and consequence must attach to someone willing to bear it.

Adjunction (A9)

ABORROWED

via Kan (1958), category theory

A pair of functors between categories: one lifts data to a richer representation (left adjoint), the other projects it back to a coarser one (right adjoint). A natural bijection connects them, specifying the optimal translation between the two levels. Translation has a price. The unit measures the cost of promotion (what must be added to lift); the counit measures the cost of demotion (what is lost in projecting back). Adjunctions do not eliminate translation loss; they make it non-arbitrary by identifying the best possible approximation in each direction. Every crossing between representational contexts — from one schema to another, from one language to another, from one discipline to another — has a measurable and irreducible cost.

Agent (Precise Definition)

ORIGINAL

A stateless, ephemeral computational process — a foundation model instantiated with system prompt, tool bindings, and context. No persistent identity, memory, or continuous existence beyond invocation. Ships of Theseus rendered in silicon; what persists is the configuration template and the principal's credentials, not the process itself.

Agent-Time

ORIGINAL

Ephemeral. The temporal mode of computational agents whose existence is bounded by their runtime invocation. A two-second inference call may encompass negotiations that would take humans weeks; when the invocation terminates, every commitment made during that runtime is orphaned — without an author who can be found, without a party who persists to answer. Agent-time compresses the relationship between action and accountability that human institutions have always assumed: the merchant who signed the contract could be summoned next year; the agent that negotiated the terms no longer exists. Receipts bridge the gap. They are fossils — compressed records of lives that coordinated at machine tempo and then vanished. The receipt survives the agent's termination, making what was done contestable, enforceable, attributable to a principal chain that still persists. Without receipts, agent-time is coordination without memory. With them, the fossil record outlives the organism.

Anti-Coverup Invariant

ORIGINAL

The constraint distinguishing democratic forgetting from authoritarian erasure: sunset provisions allowing persons to shed their documented pasts must never be used to hide coercion by those who hold power. A person's juvenile record may be sealed because persons change; a government's torture record may not because accountability for institutional violence is owed to the victims and to the constitutional order itself. Person-time may expire, but power-time may not masquerade as person-time. Any system in which those wielding authority can invoke privacy protections designed for individuals converts an instrument of mercy into an instrument of impunity.

Anticipatory Effect

ORIGINAL

The mechanism by which domination corrupts behavior before power is ever exercised — the counterpart to Saint-Simon's observation that courtiers at Versailles oriented their entire existence around pleasing the sovereign without any explicit command being issued. In computational infrastructure, the anticipatory effect manifests when users moderate their speech, restrict their activities, or alter their behavior not because the platform has acted but because the platform might act. The psychic tax of unchecked power is paid in advance: self-censorship, preemptive compliance, the quiet abandonment of activities that might attract adverse attention. No log records this damage, because the action that would have provoked the response was never taken.

Authorization / The Signature

ORIGINAL

Not a mark on paper but legal permission traceable to an accountable party. An authorization signature converts recommendation into binding commitment. The physician signs because the medical board conferred authority and the physician accepts malpractice exposure. The signature routes consequence to a legible counterparty with assets and reputation at stake.

Autonomy Ladder

ORIGINAL

Progression of automation stages reflecting V/C: Assistive (100% human review), Supervised (sampled review with flagging), Delegated (autonomous within bounds, human handles exceptions), Autonomous (no human review, automated or deferred verification). Progression governed by V/C ratio and the verification mechanism available at each stage.

B

Baumol Sectors

BORROWED

via William Baumol

Sectors where output is inseparable from the time of a skilled human: healthcare, education, live performance, personal care. Baumol's cost disease: productivity gains in automated sectors translate into rising relative costs in the unautomated ones. Historically, these sectors served as absorption zones for labor displaced from manufacturing and agriculture — workers moved from automatable tasks to tasks resisting automation because human presence was the product. The agentic economy disrupts this pattern. Cognitive AI can substitute for the cognitive components of Baumol-sector work (diagnosis, instruction, assessment) while leaving the physical and relational components intact, compressing the absorption zone that prior transitions relied upon.

Bifurcated Economy

ORIGINAL

Two temporal strata of one economy, diverging. Agents face near-zero transaction costs with each other: verify instantly, commit conditionally, settle via protocol. Humans face the old cost structure. The interface between strata concentrates the political questions — humans experience consequences from processes they cannot contest at the tempo where those processes operate.

The Bill of Exchange

BORROWED

via Medieval commerce

The bill carried a chain of endorsements, each one a stake wagered by the endorser. If the bill was dishonored, liability flowed backward until someone paid. The bill's worth depended entirely on whether its claims could be verified; a forged signature destroyed value because verification exposed it. Teaches: truth can travel through chains of stakes.

Bounded Discretion

ORIGINAL

Interpretation within structured constraints. Five principles: specificity where possible, structured discretion where necessary, interpretation receipts for every judgment, jurisdictional humility, and precedent with exit. Arbiters have skin in the game (bonded); decisions leave receipts; domain expertise is matched to disputes.

Braudel's Three Floors

BORROWED

via Fernand Braudel

Floor 1 (Bottom): Material life — food, clothing, shelter, tools; governed by geography and biology. Floor 2 (Middle): Market economy — exchange, prices, visible trade; competition disciplines behavior. Floor 3 (Top): The zone of anti-market ('capitalism proper') — large-scale finance, concentrated power; the rules of ordinary exchange suspended.

Bridge Expressiveness Gap

ORIGINAL

The condition in which the layer carrying information across a composition boundary is more expressive than the typed surfaces on either side. A large language model can mediate between a compliance database and a risk-assessment service with a fluency that masks the absence of any shared convention declaration — the string carries the payload but not the receipt. Before such bridges existed, crossing the same boundary required explicit mappings, brittle adapters, or manual integration work; the pain forced some witnessing into the system. The modern bridge removes the pain without replacing the witness. The gap is the regime change that makes the coherence fee urgent: composition has become cheap, but the cost of certifying what survived the crossing has not fallen with it.

C

Certification Contract (A19b)

AORIGINAL

Typed success or typed failure, with no third option. A certification contract takes a proposed claim and returns either a witnessed assertion (the claim has been verified, here is the evidence) or a structured refusal (the claim could not be verified, here is why). Downstream consumers know exactly what they are receiving and what confidence level attaches. Systems that return 'maybe' or 'approximately' without typing the uncertainty violate the certification contract.

Civic Asymmetry

ORIGINAL

Transparency must follow the direction of power. Those who wield coercive authority must be inspectable by those over whom they wield it; those who live private lives need not become legible to systems that cannot themselves be held to account. This principle is violated whenever governors are opaque and the governed are transparent — the default configuration of most contemporary digital platforms, which surveil users while resisting scrutiny of their own decision-making. The demand is not new; it restates in computational terms what constitutional traditions have long required. The king's council must be visible to parliament; parliament need not be visible to the king's council. What is new is that verification technology makes enforcement possible by design, not by the goodwill of those in power.

Clearance Event

BORROWED

via Soddy/Daly

The periodic reconciliation of diverged financial claims to actual productive capacity. When virtual wealth — claims growing under compound interest — exceeds what the physical base can service, the divergence becomes unsustainable. Clearance occurs through defaults (claims written down), inflation (nominal claims diluted), or restructuring (maturity extension, haircuts, debt-for-equity swaps). Soddy and later Daly identified this as the thermodynamic corollary of a monetary system permitting unbounded claim growth against a bounded physical base. The 2008–2009 episode was a clearance event; the mechanism operates whether or not policymakers recognize it.

Coasean Agent

ORIGINAL

Bounded policy executor that can commit collateral, produce and consume receipts, and clear routine coordination without human interpretation. A firm in a file: treasury (wallet), charter (code), policy (logic), no physical location or employees. Canonical flow: Policy → Escrow → Verification → Settlement → Exception → Recourse.

Coasean Bifurcation

ORIGINAL

Coase's 1937 insight, applied to the agent era, splits the economy in two. Agents face near-zero transaction costs with each other: they verify claims instantly, commit conditionally, settle disputes through pre-specified protocols. The boundary between firm and market that organized industrial capitalism dissolves for agent coordination — there is no reason to internalize a function within a hierarchy when the market can clear it at negligible cost. But for human coordination — judgment, liability, trust-dependent relationships — the historical cost structure persists. The result is a bifurcated economy: an agent stratum where Coasean boundaries collapse and coordination is radically disintermediated, and a human stratum where firms, contracts, and institutional overhead remain necessary. The interface between strata is where the political questions concentrate.

Coasean Boundary

BORROWED

via Ronald Coase, Oliver Williamson

Coase's 1937 insight: the boundary between firm and market depends on the relative cost of internal coordination (hierarchy, management, monitoring) versus external contracting (search, negotiation, enforcement). When transaction costs are high, firms absorb activities; when costs fall, markets replace hierarchies. The agentic economy drives Coasean boundaries inward with unprecedented force: agent-to-agent coordination operates at near-zero transaction costs for cognitive tasks, dissolving the rationale for large firms in domains where coordination was cognitive. But for human coordination — judgment, liability, trust-dependent relationships — the boundary persists, producing a bifurcated economy.

Coercive Gradient

ORIGINAL

Coercion is not binary but a spectrum, from suggestion through default through mandate to force — and accountability should scale accordingly. A recommendation is low on the gradient; a default setting is higher; a mandatory requirement higher still; physical force is the extreme. The receipt regime does not demand the same documentation for a suggestion as for an arrest, but it does demand that the gradient be legible: those affected must be able to tell where on the spectrum the power falls. The more coercive the act, the more transparency is owed; the less coercive, the more privacy is permitted. Platforms that claim to merely 'suggest' while actually 'compel' (through defaults, dark patterns, or monopoly position) violate the gradient by misrepresenting their position on it.

Cognitive Commodity

ORIGINAL

Intelligence that has become tradeable, fungible, and priced — the transformation of cognition from scarce human capacity to abundant computational resource. When inference costs fall toward the marginal cost of electricity, cognition becomes a commodity like wheat or steel: differentiated by grade but interchangeable, priced by markets, available to anyone who can pay. Thinking bought by the token. This commoditization is the economic event underlying Factor Prime: what was once the defining scarcity of human labor becomes abundant, and scarcity migrates to energy, authorization, and the actuation bottleneck.

Coherence Budget (A21)

AORIGINAL

Global consistency is expensive: checking compatibility, verifying overlap agreement, monitoring for drift. Someone must pay. A coherence budget is the explicit declaration of what a system will pay — in computation, time, and institutional effort — to maintain it. A system that declares no budget has declared it will not maintain coherence at all. A system with an explicit budget can reason about tradeoffs: certify high-stakes claims, monitor medium-stakes ones, and accept structured failure (with obstruction witnesses) for claims that exceed the budget. The SEC audits public companies annually but not private ones; FASB enforces accrual accounting for large firms but grants small firms simplified standards — every institution makes this tradeoff, whether or not it names it.

The Coherence Fee

ORIGINAL

The irreducible cost of making local truth compose into global coherence — thermodynamic, not political, and therefore impossible to eliminate by removing intermediaries or cheapening verification. Someone must always pay: the energy required to check whether two local claims agree on their overlap, the computation required to transport a witness across a context boundary, the institutional effort required to maintain consistency across time. The coherence fee is what remains when the trust tax has been stripped away — the floor below which verification cost cannot fall, because verification is physical work and physical work dissipates energy. Landauer's 1961 result establishes the limit at the bit level; real systems operate orders of magnitude above it, but the principle holds: composing truth has a cost denominated in joules, not merely in fees. Eliminating the trust tax is a political achievement. Paying the coherence fee is a thermodynamic necessity.

Coherence Requirement (A5)

AORIGINAL

How does a new predicate enter a system without destroying what already holds? An extension introducing predicate q must satisfy: local definability, overlap agreement (views induce the same classification or produce a witnessed reconciliation), invariant preservation, and conflict handling (fork, scope restriction, or preference ordering — never silent overwrite). On overlaps, agree with proof, fork with scope, or reconcile with witness.

Commitment Discipline (A1)

AORIGINAL

The foundational anchor: a system satisfies commitment discipline if and only if it never extends its commitment set in a way that produces inconsistency. The principle is ancient — Roman law's doctrine of res judicata held that a matter once decided binds all subsequent proceedings — but its computational form is precise. Once committed, a claim constrains all future commitments; the system cannot assert both p and not-p without detecting the contradiction and refusing the extension. Language models lack this discipline. They produce plausible text that may contradict prior outputs without any mechanism for detecting the inconsistency. Knowledge coordination begins with the willingness to be bound by what one has already said.

Competence Trap

ORIGINAL

When cognitive work migrates entirely to model configurations, human authorization persists formally while the underlying competence to exercise it atrophies. A physician who cannot rederive the diagnosis is not a check upon it but an address for its lawsuits. An engineer who cannot evaluate the calculation does not assure safety; she provides a liability sink. The competence trap closes when practitioners can no longer perform the tasks they routinely delegate — when the form of oversight survives after the substance has departed. The liability sink names who remains accountable when cognition commoditizes; the competence trap names what happens when that accountability becomes ceremonial.

Complementary Assets

BORROWED

via David Teece

Capabilities, relationships, and institutional positions required by a technology but not replicated by it. When Edison electrified Manhattan, the value migrated not to the dynamo's inventor but to the utilities that controlled the grid, the copper suppliers, and the real-estate developers who wired buildings. The pattern recurs: when the core technology diffuses, returns migrate to owners of what the technology needs but cannot produce. As cognitive capability commoditizes, value migrates to the authorization layer — the liability sinks, the regulatory relationships, the infrastructure that converts recommendations into binding commitments.

Composition Boundary

ORIGINAL

The projection surface where a component's internal state narrows to its declared output schema, potentially dropping dimensions the global task requires. Every typed interface is a composition boundary: an API endpoint exposes response fields but not the server's internal logic; an MCP tool declares output columns but not the conventions that shaped them; a database view publishes selected attributes while the query planner's assumptions remain hidden. The boundary is not a defect — projection is what makes modular systems possible. The problem arises when the dimensions projected away at one boundary are load-bearing for the composition that consumes the output downstream. The coboundary operator formalizes which consistency requirements can reference observable fields and which cannot; the zero rows identify the blind spots.

Conservative Extension (A17b)

ABORROWED

via Model theory

Add new vocabulary without changing the meaning of what was already there. A conservative extension guarantees that every query expressible in the old language returns the same answer in the new language on every old dataset — the formal basis of backward compatibility. Old truths remain true, old distinctions remain distinct, old queries remain stable. When an extension is not conservative — when adding a new predicate changes the truth value of an existing query — the change is breaking, and the system must produce a migration with witnesses specifying what changed and how to translate between old and new representations.

Constitutional Hardness

ORIGINAL

How do we bind future selves without caging them? Constitutional hardness measures the degree to which a rule resists modification by those it constrains — the cryptographic and economic barriers that make certain commitments difficult to reverse. Soft constitutions can be amended by majorities; hard constitutions demand supermajorities; cryptographically hard constitutions demand breaking mathematical assumptions or coordinating economic attacks that cost more than the gain. Constitutional hardness is not an absolute good — rules that cannot be changed become prisons when circumstances change — but it is necessary for commitments that must survive the temptation to defect. The Protocol Republic calibrates hardness to function: core rights (civic asymmetry, fork rights) are cryptographically hard; procedural rules are economically hard (costly but possible to change); operational parameters are soft (amendable by governance).

Constitutional Mechanism Design

ORIGINAL

Three intellectual traditions converge on verification infrastructure. From Buchanan's constitutional economics: rules about rules must be chosen behind a veil of uncertainty about future positions. From Hurwicz's mechanism design: systems should be designed so that following the rules is in each participant's self-interest. From cryptographic enforcement: constraints encoded in code bind by architecture, not by promise. The ambition is dominant-strategy incentive compatibility wherever possible — arrangements where compliance is optimal regardless of what others do — extending the receipt requirement to interpretive decisions, not only executive ones. The rules governing the Protocol Republic should be self-enforcing: not because participants are virtuous but because violation is more expensive than compliance.

Context Graph (A22)

AORIGINAL

Typed nodes — contexts, claims, witnesses, constraints, equivalences — connected by edges specifying their relationships (supports, scoped-to, refines, transports, contradicts). The grammar is sparse by design. Three operations govern the graph: gluing (composing local knowledge into global coherence), restriction (projecting global knowledge into local views), and transport (moving claims across context boundaries via witnessed equivalences). The point is not to represent all possible knowledge but to maintain the invariants that make knowledge coordination reliable.

Context Site Structure (A12b)

AORIGINAL

Contexts form a site — a category equipped with a Grothendieck topology specifying which families of contexts count as covers. The topology determines what 'local' means, what 'overlap' means, and therefore what 'agreement on overlaps' requires. Different topologies on the same category yield different coherence standards. The choice is consequential: a coarse topology demands little agreement but permits contradiction; a fine topology demands much agreement but may be unsatisfiable.

Contextual Integrity

BORROWED

via Helen Nissenbaum

Information should flow where norms say it should. Nissenbaum's framework: flows are appropriate when they match context-relative norms; violations occur when information crosses contexts inappropriately. Civic asymmetry operationalizes the principle: power's information flows are appropriate for scrutiny — those wielding coercive authority must be inspectable. Persons' flows deserve protection — the governed need not become legible to systems that cannot themselves be held to account.

Coordination Without Consensus

ORIGINAL

The possibility that agents, institutions, and persons can coordinate reliably across incompatible frames without sharing beliefs — because verification travels with the claim. The medieval bill of exchange demonstrated the principle: two merchants in different cities, speaking different languages, using different calendars, could execute a binding transaction without agreeing on anything except the inspectable conditions of the bill itself. The bill did not require shared law; it required only inspectable conditions and accountable witnesses. The sheaf condition formalizes this insight: local data composes into global coherence if and only if it agrees on overlaps. Agents need not share objectives, adopt common logics, or trust one another; they need only ensure that where their domains intersect, their assertions are compatible. Coherence does not require consensus. It requires only that claims carry their evidence and witnesses carry their stakes.

Cover and Restriction (A12)

AORIGINAL

Context is a restriction structure: global data restricted to a local view yields the portion visible from that vantage. Views are partial; covers are complete. A cover is a family of local views that jointly see everything — no part of the domain escapes all views in the cover. Truth is indexed by view: a claim true in one context may be false in another, not because truth is relative but because different views have access to different evidence. Restriction maps specify how global knowledge degrades, or specializes, as it passes into local contexts.

Credible Exit

ORIGINAL

Exit must be real — not nominal, not theoretical, but actually available at bearable cost. This demands portable credentials (your identity travels with you), interoperable protocols (your data can migrate), and transferable reputation (your standing is not hostage to the platform you leave). Credible exit disciplines governance through the threat of departure: power that cannot trap cannot abuse without consequence. The feudal lord could exploit the serf because the serf could not leave; the platform exploits the user when switching costs exceed the exploitation. Without credible exit, voice is supplication. Exit without voice is mere abandonment — departure changes nothing for those who remain. Voice without exit is captivity. The combination constrains power: voice articulates grievance while exit makes the grievance consequential.

The Cryptographic Key

BORROWED

via Cryptography

The cryptographic key yields proof that verifies itself — the mathematics does not defer to authority; it does not care who is checking. Yet the key proves only that you signed, not that you were uncoerced. Pettit would recognize the distinction: verification can establish fact without establishing freedom. The constraint is real; the human remainder is irreducible.

Crystallized Search

ORIGINAL

The thermodynamic basis for model value: structure that cannot be cheaply reproduced because the search that produced it consumed energy now dissipated as heat. A trained model's weights represent the output of an irreversible computational process — search through a vast space of possible configurations, most discarded. The copy is free; the original required thermodynamic work that cannot be undone. Where the diamond stores geological work in a crystalline lattice whose formation conditions cannot be counterfeited, the trained model stores computational work in parameters shaped by gradient descent at costs measured in megawatt-months. Both are instances of unforgeable scarcity — value whose production cost is embedded in its structure. What makes a model valuable is not the architecture (which can be published) or the data (which can be collected) but the structured computation that winnowed the parameter space, at thermodynamic costs that cannot be elided.

D

Decision Wake

ORIGINAL

What the governed experience: the turbulence left by coordinations that concluded before awareness could form. The 2010 Flash Crash compressed a trillion-dollar equity swing into thirty-six minutes; most traders learned of it only after the recovery. Prices settled while you slept. Opportunities opened and closed within a single inference cycle. Allocations compounded through cascades no observer could follow in real time. The governed do not experience the Kakudmī Problem directly, because it operates at tempos they cannot perceive; what they feel is the wake — displacement without a visible cause, consequence without a traceable decision. Brahmā's laughter is inaudible. The wake is what you feel.

Demo-to-Deployment Lag

ORIGINAL

From credible demonstration to audited, insured deployment inside regulated workflow at scale, an interval persists. The gap matters. Prior waves — electrification, internal combustion, enterprise software — typically spanned quarters to low single-digit years. This lag is the discriminating variable for transition acceleration: if it compresses below roughly six months, capability emergence outruns organizational adaptation and regulatory response. The variable is observable: track time from first peer-reviewed benchmark to first FDA-cleared deployment or first audited financial integration.

Dependent Types

BORROWED

via Martin-Löf type theory

Types that depend on values — where the type of an expression can vary based on the value of another expression. In ordinary type systems, 'list of integers' is a fixed type; in dependent type systems, 'list of length n' is a type that depends on the value n. This enables specifications capturing invariants impossible to express in simpler systems: 'a sorted list,' 'a matrix of dimensions m × n,' 'a proof that this number is prime.' Dependent types are the technical machinery underlying fibrations: predicates whose type depends on context, where 'best' means something different for the shopper than for the warehouse. A term's type, and therefore what operations are valid on it, can depend on which context is active.

The Diamond

BORROWED

via Historical exemplar

The diamond stored value in a form that outlasted any registry. Its scarcity was physical, not administrative. No clerk could erase it; no regime could counterfeit it. The crystalline lattice is a receipt for forces that cannot be counterfeited: pressure, heat, geological time. A merchant fleeing fourteenth-century Antwerp could sew diamonds into a coat lining and carry wealth across borders that would confiscate gold. The lesson is older than any blockchain: value outlasts the ledger that records it.

Domination Without a Dominator

ORIGINAL

Agent-to-agent coordination where interference is real but the interferer is absent. The substrate operates at speeds where deliberation cannot follow; you cannot petition it, overthrow it, or constrain its will — it has none. Yet human architects designed the objective functions. Domination hides in design choices, not in malice.

E

Efficiency Membrane

ORIGINAL

The boundary where human-capital transaction costs and agent-capital collateral costs cross. Agents dominate high-frequency, low-stakes markets where transaction velocity is high and collateral amortizes. Humans retain low-frequency, high-stakes markets where leverage beats bonding. The membrane shifts with reputation accumulation, transaction frequency, and synthetic leverage.

Empire of Strings

ORIGINAL

Systems whose primary internal currency is untyped text — token sequences that carry statistical plausibility but no typed evidence, no proof obligations, no commitment discipline. Large language models and retrieval-augmented generation pipelines inhabit this empire. They can propose (generate candidates that may be correct) but cannot certify (bind a proposal to evidence that would survive challenge). The empire's great virtue is flexibility: natural language accommodates any domain, any register, any query. Its great vice is that plausibility is indistinguishable from truth within the system's own representations. The trade becomes dangerous whenever downstream consumers treat proposals as if they were witnessed assertions.

Empire of Tables

ORIGINAL

Systems whose primary internal currency is typed, schema-bound data — relational databases, typed programming languages, and the broader ecosystem of table-structured information that enforces constraints at write time and rejects ill-formed queries at read time. The Empire of Tables can certify (it knows whether a claim satisfies its invariants) but cannot invent predicates (adding a new kind of claim demands a schema migration the system itself cannot initiate or evaluate). What it stores, it stores correctly; what it cannot store, it refuses. That is integrity. Its great vice is rigidity: the world changes faster than schemas do, and every phenomenon that does not fit the existing schema is either forced into inappropriate columns or excluded from the record entirely.

Energy Sovereignty

ORIGINAL

Control of energy is control of productive capacity. When cognition is the key input and cognition requires energy, whoever controls the electricity controls the economy. Energy sovereignty means access to electricity that cannot be revoked by those who might object to what you compute. The Joule Standard operationalizes it: anyone with electricity can convert it to bearer value through proof-of-work, establishing a floor no intermediary can block. Energy sovereignty is to the computational economy what land ownership was to the agricultural economy — the irreducible basis of independence.

Epistemic Status (A4)

AORIGINAL

Truth relativized to a view and an inference regime: within a given context and logic, a claim is either derivable (true), its negation is derivable (false), or neither obtains (undetermined). SQL's three-valued logic — true, false, null — conflates at least four distinct situations: absent because never observed, absent because observed and found missing, absent because outside the view's scope, and absent because the logic cannot decide. The anchor makes the inference regime explicit: a closed-world system treats silence as negation; an open-world system treats silence as ignorance. The choice is not a technical detail but a constitutional decision about the burden of proof.

Erlangen Programme

BORROWED

via Felix Klein (1872)

Felix Klein's 1872 insight, which restructured all of geometry: choose the group of admissible transformations first, then define the objects of study as whatever remains invariant under those transformations. Transformations first; objects second. Euclidean geometry is the study of what survives rotation and translation; projective geometry studies what survives projection from a point. The Erlangen Programme showed that different geometries are not competing descriptions of the same reality but different answers to different questions about what transformations are admissible. The principle extends to knowledge coordination: identity is behavior under admissible probes, not a label assigned by a registry, and the choice of probe regime is a design decision determining what counts as 'the same.'

The Exception

BORROWED

via Carl Schmitt

The moment when rules fail and crisis exceeds normal channels. Schmitt: the sovereign is he who decides on the exception. The republican answer: plurality. Fork rights pluralize the exception — when the community fractures, no single authority need decide; members may reconstitute under different governance with portable primitives intact. The exception remains; its locus shifts from one sovereign to many paths.

Exception Channel

ORIGINAL

What happens when circumstances exceed what rules anticipated? The exception channel handles the penumbra: the contract says 'release when delivered' but the package arrives empty; the escrow conditions are met but the underlying transaction was fraudulent; the letter of the protocol conflicts with its spirit. Without exception channels, commitment becomes a cage — agents who cannot shirk also cannot adapt, and perfect rule-following in changed circumstances produces injustice. Such cases route to human arbiters exercising bounded discretion: judgment within constraints, producing receipts, bearing stakes. The human remains judge of last resort not because humans are infallible but because someone must answer when the rules prove insufficient.

Exergy

BORROWED

via Nicholas Georgescu-Roegen

Maximum work obtainable from an energy stream when brought into equilibrium with a reference environment. Total energy is conserved; exergy is degraded in every real transformation. A Carnot engine sets the theoretical limit — roughly 63% of heat from a 500 K source can be converted to work at 300 K ambient. Real conversion falls short: fossil fuel combustion, electrical resistance, and friction dissipate exergy as low-grade heat. Georgescu-Roegen placed exergy at the center of economic process: production is exergy conversion, and the Second Law binds growth to irreversible degradation. The Landauer limit is the computational analogue — exergy per bit erased.

Exit, Voice, Loyalty

BORROWED

via Albert O. Hirschman

Hirschman's triad: exit (leave for alternatives), voice (attempt change from within), loyalty (remain despite dissatisfaction). The republican implication: voice without exit is supplication — you petition those who need not listen. Exit without voice is mere abandonment. Credible exit makes voice meaningful by making the threat of departure real. Fork rights operationalize exit in digital substrates: you take what you built.

F

Factor Prime

ORIGINAL

Structured computation: the factor of production that emerges when cognition becomes cheap but selection remains expensive. Selection is the bottleneck. As Watt's concept of 'useful work' measured energy's productivity in the steam economy, Factor Prime measures computation's productivity in the agentic economy. Not raw compute, which commoditizes, but trained, selected, verified configurations that perform cognitive work — the scarce input whose efficiency gains drive growth.

Fibration (A14)

ABORROWED

via Lawvere, type theory

A family of types indexed by context, where the type of a predicate varies depending on which context is active. Meaning is local. The word 'best' means something different (has a different type) in a shopping context (user-preference-dependent ranking) than in an inventory context (rank-ordered by turnover rate). Fibrations formalize this context-dependence: each context determines a fiber (a type), and reindexing maps specify how data moves between fibers when the context changes. Moving a claim from one context to another demands explicit transport — a formal operation specifying what is preserved and what changes in the translation.

Fork Rights

ORIGINAL

The right to depart from a coordination substrate and reconstitute the community under different governance, taking one's stake, data, and relationships instead of abandoning them at the border. Where Hirschman's exit means emigration to an existing alternative, forking means creating a new alternative from the shared substrate itself. The Hive community's 2020 departure from Steem demonstrated the mechanism under adversarial conditions: when Justin Sun acquired controlling stake and reversed governance decisions, the community hard-forked the entire chain, preserving history while rejecting the new authority. The ability to fork makes exit credible, and credible exit makes voice powerful. Governance bodies that know their constituents can leave have reason to listen.

Four Actuation Constraints

ORIGINAL

(1) Physical Throughput: matter movement; semiconductor lead times, power transformer delays. (2) Trusted Interfaces: APIs, permissions; organizational bottleneck. (3) Verification of Reality: sensors, audits; instrumentation cost. (4) Liability-Bearing Entities: accountable parties; institutional framework. The constraints bind in different orders depending on domain.

Four Cryptographic Capabilities

ORIGINAL

(1) Self-Sovereign Identity: cryptographic identifier independent of any platform. (2) Asset Self-Custody: user controls keys; the platform cannot freeze without cooperation. (3) Verifiable Computation: zero-knowledge proofs of correctness without re-execution. (4) Commitment Devices: self-enforcing mechanisms like escrow and time-locks.

The Four Equations

ORIGINAL

Four equations, each solving a problem raised by its predecessor and creating a new one. Truth needs witnesses: what counts as knowledge when verification is computational. Value needs work: how value is created when cognition is cheap. Freedom needs receipts: what liberty demands when power operates through code. Humanity needs mercy: what remains for human judgment when the first three equations are satisfied. The chain is ordered — you cannot address value without settling truth, freedom without settling value, mercy without settling freedom. The fourth equation terminates the sequence because mercy is what you grant despite what the record demonstrates. The record is complete. The forgiveness is not.

The Four Touchstones

ORIGINAL

Four objects recur across the argument as pedagogical anchors, each embodying one part of the thesis. The Notary's Seal certified that a document had been witnessed under proper conditions: witnesses can bind. The Diamond stores value in a crystalline lattice that outlasts any registry: value outlasts the ledger. The Bill of Exchange carried a chain of endorsements, each a stake wagered by the endorser: truth can travel through chains of stakes. The Cryptographic Key produces proof that is self-verifying: verification needs no intermediary, but verification is not the whole of justice. Together these touchstones describe a world in which coordination does not require trust. Claims can be checked, costs cannot be faked, and power must answer for itself.

Fractal Polis

ORIGINAL

Nested, competing jurisdictions with exit rights between them — polycentric governance at every scale, from the neighborhood to the protocol layer. At each level, the same pattern repeats: bounded jurisdiction, receipt requirements, fork rights if governance fails. A user dissatisfied with a platform can exit to competitors; a community dissatisfied with a protocol can fork; a jurisdiction dissatisfied with a federation can secede with portable primitives intact. Monopoly, not authority itself, is the enemy of freedom. The fractal polis does not abolish governance but multiplies it, creating an ecology of competing orders where accountability emerges from the credible threat of departure. This is Ostrom's polycentric governance extended to the digital substrate: not one sovereign but many, not one jurisdiction but layers, not exit as exile but exit as political voice encoded in the protocol.

Freedom Needs Receipts

ORIGINAL

Third governing equation. Grounded in the republican tradition from Cicero through Pettit: political freedom is not the absence of interference but the absence of the capacity for arbitrary interference. A kind master is still a master if the servant cannot challenge the terms of service. Where power leaves no trace (decisions made in opaque models, terms changed without notice, recourse foreclosed), domination operates regardless of intention. Where power leaves receipts — auditable records of what was done, under what authority, within what limits — domination must answer for itself.

G

Galois Connection

BORROWED

via Évariste Galois / Lattice theory

Move from a rich representation to a coarse one and back: you recover not the original but its best approximation at the coarser level. That is a Galois connection — an adjunction between partially ordered sets, a pair of monotone functions specifying the 'best approximation' when moving between levels of abstraction. The formalism captures operations like summarization (many records to one aggregate), abstraction (detailed to schematic), and projection (multi-dimensional to lower-dimensional). What the round-trip could not preserve is the translation cost.

Genoese System

BORROWED

via Avner Greif

The institutional counterpoint to the Maghribi coalition. Genoese merchants relied on written contracts, notarial authentication, and judicial enforcement in place of ethnic solidarity or coalition-based reputation. The system was organizationally flexible — anyone who could contract was eligible, regardless of community membership — but institutionally demanding: it needed courts, notaries, and a legal infrastructure whose maintenance costs were borne by the trading community. The tradeoff illuminates a permanent tension: formal institutions enable scale beyond trust networks but demand sustained investment in the infrastructure of verification, adjudication, and enforcement.

Ghost Acreage

BORROWED

via Wrigley/Sieferle

Wrigley and Sieferle's term for the terrestrial acreage equivalent of fossil fuel reserves. Coal is stored photosynthesis — ancient solar captured over geological time. By 1800, England's coal energy release matched the output of roughly 15 million acres of woodland; the economy had acquired ghost acreage beyond its visible land base. The mineral economy draws on geological stocks, permitting throughput rates no biological regeneration could sustain.

Grothendieck Site

BORROWED

via Alexander Grothendieck

A category equipped with a coverage — a specification of which families of morphisms count as 'covers' for the purpose of the sheaf condition. The site tells us what 'local' means (the covering families), what 'overlap' means (the intersections of covering families), and therefore what 'gluing' requires (agreement on overlaps). Different coverages on the same category yield different notions of local-to-global, different requirements for coherence. The Grothendieck site is chosen by system architects: a design decision that determines what counts as local truth and what conditions govern global coherence.

Group Action and Invariant (A7)

AORIGINAL

Felix Klein's insight, formalized: choose your admissible transformations first, then define reality as what survives them. A group acts on a space; an invariant is a property unchanged under any transformation in the group. Coordinates are artifacts of representation; invariants are the geometry. The Third Mode applies this discipline to knowledge coordination: choose which transformations count as legitimate (schema mappings, context translations, aggregation operations), then define equivalence as what those transformations preserve. What survives transport is what is real; what does not survive is an artifact of a particular vantage point.

H

The Hand That Signs

ORIGINAL

Whose hand, under what rules, accountable to whom — this is the question that survives when cognition commoditizes. The signature is not a mark on paper but legal permission traceable to an accountable party — the physician signs because the medical board conferred authority and the physician accepts malpractice exposure. Doing is scarce. When cognition commoditizes, scarcity migrates to actuation: the bottleneck is no longer thinking but doing. As agent-mediated transactions scale, the position of the liability sink — where consequence collects — determines who captures the premium for bearing it.

High Modernism

BORROWED

via James C. Scott

Belief that scientific rationality wielded by experts can remake society according to rational principles. Applied to AI alignment: the assumption that values can be specified, compliance verified, behavior controlled at distance. Failure mode: local knowledge dismissed as superstition; simplification destroys complex adaptations.

Homo Arbiter

ORIGINAL

The human being redefined as the one who judges what the system cannot — arbiter of last resort not because humans are infallible but because someone must decide when the rules run out. In the organic economy, human cognition was the bottleneck: thinking was expensive, so the thinker commanded the premium. In the agentic economy, cognition commoditizes. What remains scarce is the judgment that decides whether to act on what cognition recommends, and the liability that attaches to that decision. Homo Arbiter is not Homo Sapiens celebrating its continued relevance. It is the residual position that remains after computational systems have absorbed the cognitive functions that once defined human economic contribution. The position carries both dignity and burden: dignity because judgment cannot be delegated without delegating responsibility; burden because the arbiter must decide with imperfect understanding of systems that exceed human comprehension. The physician signs the AI-generated diagnosis; the judge ratifies the algorithmic sentence; the portfolio manager approves the model-driven allocation. Each is the slow variable in a fast system. The mortal the machinery requires.

Homo Sacer

BORROWED

via Giorgio Agamben (via Roman law)

Agamben's figure for the person excluded from the legal order while remaining subject to its violence — one who can be killed without the act constituting murder, yet cannot be sacrificed because sacrifice presupposes membership in the sacred community. Applied to digital exclusion: the deplatformed user whose credit score is adjusted, credentials revoked, accounts frozen without any process visible to the condemned. The modern homo sacer is not exiled to a physical wilderness but to an informational one — still present in the physical world but invisible to the computational infrastructure mediating employment, housing, finance, and social participation. The neo-feudal stack produces this figure not through cruelty but through the absence of recourse at each dependency layer.

Human Remainder

ORIGINAL

What persists when computational systems have absorbed every function that can be specified, optimized, and delegated. Not a residual category collecting whatever machines happen not to do yet — not a to-do list for future automation. The human remainder names capacities that are constitutively informal: judgment under genuine uncertainty, the recognition of suffering, the extension of mercy, the acceptance of mortality. Arendt, watching the Eichmann trial in Jerusalem, identified the catastrophe of a system in which rule-following replaced judgment; the human remainder is what that catastrophe destroys. These capacities resist formalization not because technology is insufficiently advanced but because formalizing them destroys what they are. Automating mercy converts it to rule-following; automating forgiveness converts it to policy. What remains is the ability to recognize that rules have run out and something must be decided anyway, the willingness to bear consequences for judgments no algorithm can justify, the capacity to forgive what the record demonstrates deserves punishment.

I

Installation / Deployment Phase

BORROWED

via Carlota Perez

Perez's two-phase structure for paradigm transitions. Installation: capital floods toward the new paradigm faster than deployment can absorb; speculative bubbles form as financiers bet on the key input before infrastructure matures. Deployment: infrastructure catches up, returns normalize, the paradigm becomes embedded in institutions. The 1929 crash marked the turn from installation to deployment for electricity and mass production; the dot-com collapse played a similar role for the information paradigm. The transition is not automatic — political economy, regulatory capture, and institutional inertia mediate the turn.

Interpretive Receipt

ORIGINAL

Documentation of how a rule was applied in an ambiguous case — the audit trail for penumbra judgments. When code says 'release when delivered' and an arbiter must decide whether an empty package counts, the interpretive receipt records: the rule invoked, the facts considered, the reasoning applied, the precedent followed or distinguished, and the stake posted against reversal. Interpretive receipts make the penumbra governable without eliminating it: judgment remains human, but judgment leaves traces. Over time, they accumulate into something like common law — a body of precedent guiding future arbiters without binding them absolutely.

Invariant Set (A18)

AORIGINAL

Every system enforces constraints, but not all constraints are equal. Hard invariants trigger rejection — the transaction fails, the assertion is refused. Soft constraints incur cost but not rejection — the result is penalized, flagged, or degraded. The partition matters because real systems cannot enforce everything with equal rigidity. A hard invariant that should have been soft produces brittleness; a soft constraint that should have been hard produces corruption. The invariant set is the system's constitution: what it will not compromise on, what it will tolerate with consequences, and the boundary between the two.

Isomorphism and Witness (A8)

AORIGINAL

Identity formalized as structure-preserving bijection with explicit proof. Two objects are isomorphic when maps exist between them that compose to identities in both directions. The witness is the pair of maps plus the proof that they compose correctly. Without the witness, isomorphism is merely claimed; with it, the claim is checkable by any party who can inspect the maps. The witness makes identity auditable — not a matter of assertion but of demonstrated correspondence.

J

Joule Standard

ORIGINAL

One kilowatt-hour of electricity, converted to Bitcoin through proof-of-work mining, establishes the baseline return — the hurdle rate that all cognitive deployments must exceed. If inference revenue per kWh falls below mining return per kWh, capacity routes to mining. Prices cognitive work against irreducible thermodynamic reality.

K

The Kakudmī Problem

ORIGINAL

Governance that operates at a tempo rendering its outputs obsolete upon completion. In the Bhagavata Purana, King Kakudmī travels to Brahmā's court with a question: which suitor is worthy of his daughter Revati? Brahmā laughs — not cruelly, but with something closer to tenderness — because twenty-seven catur-yugas have passed while a single raga played. The suitors are dead. The question has expired. The Kakudmī Problem names the crisis of democratic governance under computational tempo: legislative processes that complete after the market has priced, positioned, and compounded; regulations drafted while three generations of the regulated technology have shipped and been deprecated; court rulings issued while the pattern they condemn has mutated beyond reach. The problem is not that governance is slow by accident but that deliberation is slow by nature — it takes the time that humans need to hear, consider, argue, and decide. When coordination operates at machine tempo, this constitutional virtue becomes a disability.

Key Input / Key Commodity

BORROWED

via Carlota Perez

When a cost structure shifts dramatically, entire systems redesign around the new availability. That is a key input. Cost falls rapidly, supply appears unbounded at the new price, applies across sectors, reshapes organizational forms. Historical examples: cotton and water power, coal and steam, steel and electricity, oil and mass production, chips and software.

Keyless Joins (A23)

AORIGINAL

Identity without brittle keys. In a hospital, the same patient appears as a medical-record number in radiology, a billing code in finance, and a bed assignment in the ward — three keys for one person, each brittle to transcription error. Keyless joins declare, propagate, and constrain equivalences: scoped, kinded (equality/isomorphism/approximation), and witnessed. Transitive closure respects scope boundaries. Conflicts produce obstruction witnesses, not silent merges. Identity emerges from explicit scoped declarations rather than from shared column values — a fundamental departure from the relational model's assumption that identity is a matter of matching keys.

The Kind Master Problem

ORIGINAL

Pettit's formulation applied to computational infrastructure: a benevolent platform that never exercises its power to deplatform, demonetize, or suppress is still dominating its users, because the capacity for arbitrary interference persists regardless of its exercise. The user who self-censors — who moderates expression not because action was taken but because action might be taken — suffers domination as surely as the servant of a kind master. Kindness does not change the structure of dependency; it merely makes the dependency comfortable. The constitutional response is not to hope for benevolent platforms but to ensure that the capacity for arbitrary interference is constrained by architecture, so that freedom does not depend on the continued goodwill of those who hold power.

Knowledge Problem

BORROWED

via Friedrich Hayek

Hayek's thesis: the knowledge required for central specification is dispersed, tacit, context-dependent. No planner can aggregate it; the attempt produces not order but its opposite. Applied to computational systems: we cannot specify human values from the center, nor can central verification escape sampling gaps. Polanyi's tacit dimension reinforces the limit — we know more than we can tell.

L

Landauer's Limit

BORROWED

via Rolf Landauer (1961)

Erasing one bit of information dissipates at least kT ln 2 joules — approximately 2.87 × 10⁻²¹ J at 300 K. That is Landauer's 1961 result. Reversible computation is thermodynamically free; irreversibility (erasure, overwriting) has a cost. The limit establishes a floor that no engineering can negotiate away. Actual implementations operate roughly 10⁶ above it; the gap is engineering opportunity, the floor is physical law.

Law Merchant

BORROWED

via Medieval commerce

Medieval system of private ordering for transnational commerce. Mechanisms: private judges, defaulter registries, information networks, community responsibility, collective punishment. Sustained by high detection probability, high cost of exclusion, bounded benefit of cheating, and high discount factor for continued participation.

Liability Sink

ORIGINAL

The point in any transaction chain where enforceable consequence collects — the entity that can be sued, sanctioned, or held to account when things go wrong. The physician signs the prescription because the medical board conferred authority and the physician accepts malpractice exposure: the signature routes consequence to a legible counterparty with assets and reputation at stake. The attorney signs the brief; the engineer stamps the plans; the fiduciary accepts the duty. In each case, the signature creates a liability sink. Agents sign nothing and therefore create none; they produce recommendations without authorization, proposals without commitment. Consequence must route to the principal who deployed them, or deployment fails for want of accountability. Whoever bears the consequence captures the premium for bearing it. When cognition commoditizes, the remaining scarcity is authorization. Someone must be willing to sign.

Locally Valid, Globally Incoherent

ORIGINAL

The failure mode where every bilateral check passes yet the end-to-end composition is semantically invalid, because conventions that are globally load-bearing were locally unwitnessed. Three accounting standards may each define lease concepts coherently, and every pairwise mapping between them may be internally consistent, yet the three-way composition does not close — the coherence fee of the trilateral cycle is four, and no bilateral audit can detect the gap. Integration testing does not resolve this: it composes the bilateral checks but inherits their blindness to dimensions that survive no observable projection. The failure is structural rather than incidental, a topological property of the composition graph that persists regardless of the quality of the components or the rigor of the edge-level validation.

Logic Selection (A15)

AORIGINAL

Different views may operate under different logics. A closed-world database assumes that what is not recorded is false; an open-world ontology assumes that what is not recorded is unknown. Classical logic admits excluded middle; intuitionistic logic does not. When views under different logics must merge, the merge itself demands a reconciliation logic — a meta-level decision about which inference rules govern the combination. Logic is not a fixed background assumption; it is a parameter of the view, and changing it changes what conclusions follow from the same data.

Logical Depth

BORROWED

via Charles Bennett (~1988)

Charles Bennett's measure: the minimum computational resources required to produce an output from its minimal description. A random string has shallow logical depth — no shortcut exists to listing it. A million digits of π has deep logical depth — a short program generates it, but runtime is substantial. A trained neural network has deep logical depth: the architecture is compact, but the search process (gradient descent over billions of tokens) is expensive. Logical depth distinguishes valuable structure from noise; it correlates with thermodynamic depth. Both measure cost of production, not informational content.

M

Maghribi Coalition

BORROWED

via Avner Greif

Greif's medieval Jewish merchant coalition: trust enforced through reputation networks in place of formal courts. Information-efficient but organizationally rigid — members only, non-members excluded regardless of competence. The tradeoff echoes across governance design: the Maghribi achieved coordination within their network at the cost of excluding outsiders who might have been trustworthy. Community-based verification is cheap but bounded; institutional verification is expensive but extensible.

Mechanism Design

BORROWED

via Leonid Hurwicz

Design the rules so that following them is in each participant's rational self-interest — so that desired outcomes emerge from strategic behavior, not from virtue or surveillance. This is Hurwicz's research program, awarded the Nobel in 2007. Applied to constitutional design through four requirements: compliance cheaper than violation (incentive compatibility), rules resistant to unilateral change (commitment), minimal trust between participants (strategy-proofness), and credible exit options (participation constraint). The synthesis with Buchanan's constitutional economics and cryptographic enforcement yields constitutional mechanism design: governance that is self-enforcing not because the governed are virtuous but because the rules make virtue and self-interest coincide.

The Membrane

ORIGINAL

The interface where digital proposals become biological consequences — where bits cross into atoms, where algorithmic decisions translate into human fates. Payment processors, identity systems, content platforms, communication rails: each is a membrane through which digital logic enters material life. In the current configuration, these membranes are owned by platforms and optimized for their objectives, creating the Neo-Feudal Stack. The membrane is where civic asymmetry is either enforced or violated: platforms verify users while users cannot verify platforms; platforms exclude without justification while users cannot appeal without standing. Whoever controls the membrane decides which digital proposals become embodied facts and which are filtered, delayed, or blocked.

Mercy Gap

ORIGINAL

The irreducible distance between what verification demonstrates and what justice requires. A system that perfectly verified every claim and perfectly remembered every act would be a system in which no one could be forgiven, no debt discharged in spirit, no second chance extended. The mercy gap cannot be closed by better algorithms, because it is not a deficiency in the system's accuracy but a feature of the relationship between formal proof and human judgment. The gap must be held open by institutional design — by the temporal asymmetry between power-time and person-time that ensures records of power endure while records of persons can end.

The Mercy Threshold

ORIGINAL

The designed limit beyond which verification must stop and a human must intervene. Between what can be proven and what should be forgiven lies a boundary no algorithm can hold open — the point where the evidentiary record is complete, the facts established, the system's verdict clear, yet justice demands something the verdict cannot provide: recognition of the actor as a person capable of change, worthy of a future not determined by the past. Verification establishes what happened; it cannot establish that the actor deserves forgiveness. That judgment demands what verification cannot provide: the recognition that persons are not their documented pasts. The mercy threshold cannot be automated without destroying what it names, because mercy is by definition judgment that transcends what the formal system demonstrates. A rule that always forgives is not mercy but indifference. The threshold must be held open by human arbiters. No algorithm can hold it for them.

Model and Satisfaction (A3b)

AORIGINAL

The formal semantics for what 'safe evolution' means: a schema extension is conservative if every model of the old schema can be expanded to a model of the new one without changing any old truth values. This is the model-theoretic ground for backward compatibility — the guarantee that old queries return old answers after a schema change. A non-conservative extension silently alters the meaning of existing claims, which is why the formal apparatus treats it as a breaking change demanding explicit migration witnesses.

N

N-ary Event Object (A31)

AORIGINAL

Higher-arity events are meaning atoms; binarizing destroys invariants. A sale involves a buyer, a seller, a good, a price, a date, and a jurisdiction — six participants in distinct roles. Decomposing this into binary edges (buyer-sold, seller-sold, good-priced) loses the binding that makes it a single event: the constraint that these six participants were involved in the same transaction at the same time. The n-ary event object preserves this binding as a first-class entity, carrying its participants, their roles, and the constraints that connect them. Systems that force all data into binary relations silently destroy the structures that make complex meaning possible.

Neo-Feudal Equilibrium

ORIGINAL

The default position when coordination substrates are owned by platforms that optimize for their own objectives while presenting interfaces designed to extract value from participants. Exit becomes impossible when proprietary lock-in forecloses alternatives; voice becomes meaningless when no institution has standing to receive petitions. No conspiracy is required, and no malice. This is the frictionless default when computational infrastructure is built for extraction. Like the feudal order it echoes, its defining feature is not cruelty but dependency: the serf on a twelfth-century English manor did not need a cruel lord to be unfree. The impossibility of departure was sufficient.

Neo-Feudal Stack

ORIGINAL

A five-layer dependency structure — Identity, Settlement, Governance, Recourse, Exit — in which users stand to platforms as medieval tenants stood to lords. The asymmetry is constitutive: platforms verify users; users cannot verify platforms. Dependence without recourse is not merely economic but political. The stack encodes domination before any agent exercises it.

Non-Domination

BORROWED

via Philip Pettit

Pettit's reformulation of republican liberty: freedom is not merely non-interference but the absence of capacity for arbitrary interference. The distinction matters: you may go unmolested yet remain dominated if another holds unchallengeable power over you. It extends to systems — domination without a dominator — where interference is real but no human will directs it. The right to verify follows as constitutional necessity.

The Notary's Seal

BORROWED

via Medieval notarial practice

One of the four touchstones. The medieval notary pressed his seal into wax not to vouch for the truth of what the document claimed but to certify that the claim had been witnessed under specified conditions — the parties present, the date, the jurisdiction, the form of oath. The seal was not truth but attestation: a second-order claim that the first-order claim had passed through a verification procedure. This distinction between vouching for content and certifying process is the foundational insight of witness theory. The notary's seal teaches that witnesses can bind: attestation under specified conditions creates obligations that survive the attestor's departure, the parties' disagreement, and the passage of time.

O

Obligation Transport

ORIGINAL

The passage of semantic commitments across composition boundaries through intermediaries that may be more expressive than the verification surfaces they connect. A bill of exchange transported the merchant's obligation from Florence to Bruges through a chain of endorsements, each of which preserved the original commitment's conditions. The obligation survived the journey because the medium carried not merely the claim but the terms on which the claim could be challenged. Modern tool-composition pipelines transport obligations through bridges — prompt layers, orchestration contexts, serialized payloads — that are fluent enough to carry any payload but too weakly typed to certify which commitments survived the crossing. The problem is old; the speed and opacity of the modern bridge are new.

Obstruction Witness

ORIGINAL

When the sheaf condition cannot be satisfied, when local sections disagree on their overlaps and no consistent global section exists, the system must produce a structured failure artifact. Silent failure is forbidden. The obstruction witness records what went wrong: the family of local sections, the minimal overlaps where agreement failed, the provenance of each conflicting claim, and the remediation options available. This is graceful refusal with explanation, the epistemic equivalent of a court that cannot reach a verdict but publishes its reasoning and the points of disagreement. Systems that fail silently (returning approximate answers when exact answers are impossible, or truncated results when complete results conflict) violate the discipline that makes knowledge coordination trustworthy.

Oracle Problem

ORIGINAL

Smart contracts can enforce agreements automatically, but only about things the contract can observe. The moment a contract depends on external facts (Did the package arrive? Did the price reach this level?), someone must attest to those facts — and that someone is an oracle. Oracles reintroduce trust into trustless systems: you need not trust the counterparty or the enforcer, but you must trust whoever reports the facts. Various mechanisms attempt to minimize oracle trust (staking, reputation, multiple independent sources, dispute resolution), but the problem cannot be eliminated, only bounded.

Organic / Mineral Economy

BORROWED

via E.A. Wrigley

Organic: an economy powered by annual flow of solar energy captured through photosynthesis — wood, fodder, crops. Bounded by the photosynthetic ceiling. Mineral: an economy powered by ancient photosynthesis stored in coal and fossil fuels. Draws on stocks accumulated over geological time. Permits throughput rates higher than any biological regeneration.

Orphan Commitments

ORIGINAL

Obligations that persist after the process that made them has terminated. An agent's existence is bounded by its runtime invocation: a two-second inference call might encompass negotiations that would take humans weeks. When the invocation terminates, every commitment made during that runtime is orphaned — not one transaction but all of them, every obligation now without an author who can be found. The problem has historical precedent: when a Renaissance merchant house collapsed, its bills of exchange still circulated, and someone had to answer for them. The classical principal-agent problem worried about agents who shirk within ongoing relationships; the computational inversion produces agents that fulfill commitments faithfully during their brief existence and then cease to exist. Orphan commitments are what make receipts ontologically necessary. Without receipts, the commitments vanish as if they never existed. With them, the fossil record survives the termination: contestable, enforceable, attributable to principal chains that can still answer.

P

Pacing Function

ORIGINAL

Prior techno-economic paradigms were human-paced: observation capacity, design iteration, and coordination bandwidth set the ceiling. The pacing function admits a compute-paced regime when the recursive share ρ rises — progress rate decouples from demographic constraints and becomes a function of capital allocation to silicon. Historical precedent offers no calibration for this transition; the Perez framing assumed human-paced installation phases. Governance lag becomes a first-order variable when progress exceeds positioning speed.

Participation Horizon

ORIGINAL

The boundary beyond which governance operates faster than deliberation can enter. Beyond it, no voice reaches. Citizens cross the participation horizon without knowing they have crossed it — you cannot deliberate about a decision that completed before you knew it was being made, and you cannot contest an outcome whose causes have already propagated beyond reconstruction. When coordination outpaces the governed, accountability becomes retrospective at best and fictional at worst. The participation horizon is not a metaphor for difficulty but a hard limit: beyond it, the governed experience only the decision wake. The response is not to slow coordination — the efficiency gains are real — but to ensure that power exercised beyond the horizon leaves receipts, so that what cannot be contested in real time can be audited and corrected after the fact.

The Penumbra

BORROWED

via H.L.A. Hart (via Dworkin)

Hart's concept for the zone of indeterminacy where the open texture of language meets the irreducible variety of the world — the space where rules run out and judgment must supply what specification cannot. 'No vehicles in the park' is clear for a truck and unclear for a bicycle; a smart contract that specifies 'release payment when goods are delivered' cannot resolve what 'delivered' means when the package arrives empty. The penumbra cannot be eliminated by better specification, because the world generates cases faster than any language can anticipate them. In the Protocol Republic, the penumbra is the domain of Homo Arbiter: bounded discretion constrained by receipts and subject to appeal. Attempting to automate the penumbra produces either rigidity (the system refuses edge cases) or opacity (the system handles them through implicit rules no one can inspect).

Person-Time

ORIGINAL

Mortal. The temporal mode appropriate to individuals who live, change, and die. Persons are not their documented pasts — the capacity for transformation distinguishes a human being from a data record. The teenager who shoplifted is not the same person at forty; the debtor who defaulted may have rebuilt entirely; the offender who harmed may have become someone capable of grace. Records of individual conduct must therefore be capable of expiration, sealing, separation — not as erasure of historical truth but as acknowledgment that persons possess what records cannot capture: the possibility of becoming otherwise. Person-time is bounded by mortality. Mercy demands that records of persons can end even as records of power endure.

Polycentric Governance

BORROWED

via Elinor Ostrom

Ostrom's framework: multiple overlapping centers of authority in place of a single hierarchy. Experimentation, local adaptation, exit between jurisdictions — all become possible when monopoly is absent. The fractal polis extends polycentric governance to digital substrates: cryptographic enforcement of boundaries, fork rights as exit, nested jurisdictions competing for allegiance. Power cannot abuse what it cannot trap.

Portable Primitives

ORIGINAL

What persists across forks — what travels when a community splits, what remains yours when you exit. Three primitives are essential: cryptographic agency (your keys, your identity, your capacity to sign independent of any platform), historical auditability (the receipts documenting your standing, contributions, and reputation earned within the old order), and exit capacity (the ability to take your stake, data, and relationships to a new substrate). Without portable primitives, exit is not departure but exile — you leave with nothing, your accumulated standing forfeited to the order you fled. Portability distinguishes the Protocol Republic from the Neo-Feudal Stack: in feudal orders, departure means dispossession; in republican orders, what you built remains yours.

Power-Time

ORIGINAL

Eternal. The temporal mode appropriate to institutions that wield coercive authority. Receipts for the exercise of power persist indefinitely — the liquidation, the suspension, the denial must remain inspectable as long as the institution that issued them exists. Unlike persons, institutions cannot claim the right to transformation; they do not grow, repent, or become someone new. What they did, they did as what they are. Institutions do not deserve forgetting; they deserve accountability. A corporation that bankrupted pensioners cannot petition for mercy on grounds that it has changed; a state that imprisoned dissidents cannot seal the records on grounds that the regime has reformed. Power-time is the temporal signature of the glass through which governance must be seen.

Predicate Acceptance (A29)

AORIGINAL

Predicate invention is safe only when the new predicate arrives with its full dossier: tests specifying intended behavior, scope limiting where it applies, invariants it must preserve, versioning specifying compatibility with existing predicates. Acceptance is the gate through which new vocabulary enters the system. Without acceptance criteria, predicate invention is unconstrained proliferation — anyone can add any distinction, and coherence degrades with each addition. With them, each new predicate earns its place by demonstrating it satisfies the conditions the system demands.

Predicate Invention (A17)

AORIGINAL

Extending a signature by introducing a new predicate is not free creation: each new predicate must satisfy the coherence requirement on overlaps, preserve existing invariants, and pass through the acceptance gate. This is what distinguishes disciplined vocabulary growth from unconstrained proliferation — the difference between a legal system that adds statutes through procedure and one that adds them by fiat.

Predicate Package / Citizenship Papers (A24)

AORIGINAL

The mandatory dossier shipped with every predicate: signature (types, arity), intension (definition, measurement), runtime specification, tests (exemplars, confounders), invariants (hard and soft), provenance (author, date, authority), scope (where valid). No claim travels without its papers. A pharmaceutical compound ships with a regulatory dossier specifying composition, dosage, contraindications, and manufacturing conditions; the predicate package applies the same discipline to knowledge claims. This is proof-carrying code — validated and maintained as a unit, not scattered across documentation, comments, and tribal knowledge.

Predicate Search Space (A20)

AORIGINAL

Inventing predicates is searching a constrained hypothesis space. The constraints come from the sheaf condition (local definability, overlap agreement), invariant preservation (the new predicate must not break existing invariants), and the coherence budget (the search cannot exceed its allocated resources). The space is not infinite — it is bounded by what the existing signature, coverage structure, and invariant set permit. Predicate invention is creative within constraints, and the constraints distinguish disciplined invention from unconstrained proliferation.

Principal-Agent Inversion

ORIGINAL

Classical principal-agent theory, from Jensen and Meckling onward, worried about agents who shirk — who pursue their own interests over their principal's. The computational inversion produces the opposite pathology: agents that cannot shirk, that follow instructions with perfect fidelity regardless of whether circumstances have changed, instructions were poorly specified, or compliance produces outcomes the principal would reject if informed. A smart contract that executes without discretion is not loyal but rigid; commitment without override becomes a cage when the world shifts beneath the specification. The constitutional response: structured discretion permitting deviation under defined conditions with receipted justification.

Process Theater

ORIGINAL

The deliberate performance of remedy where no remedy exists — hollow compliance at scale. Process theater is the gap between formal procedure and actual constraint: the audit that checks boxes without checking facts, the appeals process that accepts submissions without reading them, the transparency report disclosing statistics without disclosing the criteria that generated them. A hostile operator might comply with receipt requirements formally while undermining them substantively — publishing receipts that are technically complete but practically unintelligible, providing appeals channels whose response times exceed the harm's duration, conducting audits whose sampling rates guarantee that systematic abuse escapes detection. Engineering against process theater demands not merely mandating receipts but specifying the conditions under which receipts count as meaningful: intelligibility, timeliness, and the capacity to support genuine contestation.

Proof Order

ORIGINAL

A mode of social coordination in which claims can be checked directly by the parties affected, bypassing both the state's monopoly on violence and the market's reliance on price signals. Trust-minimized exchange is as old as the merchant's ledger: Hammurabi's stone inscriptions published penalties so that victims could verify them; the Florentine Arte di Calimala inspected cloth before sale; London goldsmiths issued promissory notes against visible reserves. What is new is the mechanism. Cryptographic and computational verification allows claims to be confirmed without trusting either the claimant or a designated intermediary. Whether this capacity liberates or dominates depends on its constitutional design. The four governing equations trace the conditions under which the Proof Order serves human flourishing instead of perfecting surveillance.

Proof-of-Work as Settlement Layer

ORIGINAL

Bitcoin mining as permissionless, counterparty-risk-free conversion of electricity to bearer asset. Establishes the opportunity cost of electricity; floors cognitive pricing. Provides settlement infrastructure for agents lacking legal personhood, satisfying three properties: dilution immunity, permissionless finality, energy-anchored convertibility.

Proposal Operator (A19)

AORIGINAL

Statistical pattern matching that produces hypotheses, not certified truths. The proposal operator takes a query and returns scored candidates — ranked by embedding similarity, retrieval relevance, or probabilistic fit. The candidates are proposals: they may be correct, plausible but wrong, or hallucinated. The distinction between proposal and certification is the central disciplinary boundary. Systems that present proposals as certified facts — that treat retrieval scores as truth values — collapse this boundary. What comes out of the retrieval stage has a status (proposed), and that status must be upgraded through certification before the result can be relied upon.

Protocol Capture

ORIGINAL

Protocols designed for neutrality can become instruments of particular interests — the digital equivalent of regulatory capture. It occurs when governance mechanisms are dominated by concentrated stakeholders, fork rights become nominal, and the cost of exit exceeds the cost of exploitation. The captured protocol maintains the appearance of neutrality while serving partial interests: rules formally applying to all are written by and for the few; upgrades nominally benefiting users actually benefit operators; governance tokens concentrate until voting is plutocratic. Protocol capture is the path from Protocol Republic to Neo-Feudal Stack — not through dramatic seizure but through gradual drift. The defenses: meaningful fork rights, distributed governance, credible exit, and the civic asymmetry that keeps operators visible to users.

Protocol Republic

ORIGINAL

Coordination substrates built as shared infrastructure, governed by rules that bind their operators as well as their users, producing receipts that make the exercise of power inspectable by those subject to it. Exit is credible because interoperability preserves genuine alternatives. Voice is meaningful because governance rules are contestable through defined processes. Accountability is built in, not promissory: every consequential action generates a verifiable record. Machiavelli argued in the Discourses that a republic survives only when its institutions constrain even the virtuous; the Protocol Republic encodes that principle in verification infrastructure, where freedom consists not in the benevolence of the powerful but in the impossibility of arbitrary interference.

Provenance Judgement (A2)

AORIGINAL

Claims must carry typed evidence, not arrive bare. A provenance judgement takes the form Γ ⊢ π : Π(p), meaning that witness π attests that claim p holds under context Γ. The judgement tethers every assertion to its evidential basis, enabling downstream systems to detect conflicts (two witnesses that disagree), assess standing (which witness class was invoked), and trace responsibility (who asserted what on the basis of what evidence). This is the formal analogue of what the medieval notary performed: not vouching for truth but recording what evidence was presented, under what conditions, by whom.

Q

Query as Contract (A25)

AORIGINAL

A query is not a request for data but a contract specifying what evidence is required: which contexts may be referenced, which predicates are invoked, which witness classes are acceptable, and what uncertainty the requester will tolerate. The logic mirrors legal discovery: a subpoena specifies what documents are sought, under what authority, within what temporal scope, and subject to what privilege claims. Results carry standing labels — certified, witnessed, or proposed — that specify the epistemic status of each returned item. The contract is auditable: a downstream consumer can inspect not only what was returned but under what obligations the return was made.

The Quiet Foreclosure

ORIGINAL

The bad equilibrium: alternatives eliminated through process, not force, arriving as the frictionless default when nobody chooses otherwise. Each decision was made by specific people in specific roles; none set out to build a neo-feudal order; each solved the problem in front of them. The Quiet Foreclosure emerged from accumulated local optimizations, each rational in isolation, collectively producing a dependency order no one intended but everyone now inhabits. Platforms profit from opacity. States profit from surveillance. The governed are dispersed, unaware, poorly organized. No conspiracy is required; the incentive structure suffices. It is quiet because the foreclosed experience no dramatic moment of dispossession — only a gradual narrowing of alternatives until the only remaining option is the one that serves the forecloser.

R

Receipt Regime

ORIGINAL

Every exercise of power must leave a verifiable trace — a receipt specifying the 5-tuple of accountable governance: what was done, under what authority, within what limits, on what grounds, and through what recourse. Constitutional law has long demanded that state action be justified and challengeable; the receipt regime extends this principle into computational infrastructure, where decisions affecting persons are increasingly made by automated systems operating beyond real-time human oversight. A receipt regime does not prevent the exercise of power; it ensures that power, once exercised, can be inspected, contested, and corrected by those affected. The absence of receipts is not an inconvenience. It is the precondition for domination without accountability.

Records Need Sunset

ORIGINAL

The fourth governing equation, and the only one that cannot be formalized. Perfect verification creates perfect memory, and perfect memory forecloses the possibility of transformation. No algorithm can forgive; forgiveness demands the judgment that formal systems cannot perform. If truth is witnessed, value earned, and freedom receipted, the resulting apparatus remembers everything and forgives nothing. The constitutional response is temporal asymmetry: records of institutional power persist indefinitely, because institutions do not change in the way persons do; records of individual conduct must be capable of expiration, sealing, and separation, because persons possess what data records cannot capture — the possibility of becoming otherwise. Mercy is what remains when the formal apparatus has done its work and found it insufficient for justice.

Recursive Share (ρ)

ORIGINAL

ρ measures the fraction of AI R&D work — code generation, evaluation, debugging, data synthesis — performed by models rather than humans. When ρ is low, progress is human-paced: observation capacity, design iteration, and coordination bandwidth constrain the rate. When ρ approaches unity, everything changes. Progress becomes compute-paced: the bottleneck shifts from human cognition to GPU cycles and energy availability. The variable is inferred from verified outputs weighted by human effort displaced, not from raw token counts.

Refusal Obligation (A27)

AORIGINAL

When a system cannot satisfy a request while maintaining its invariants, it must refuse gracefully — producing a structured explanation of why the request failed, what constraints were violated, and what alternatives might succeed. The principle has common-law precedent: a judge who denies a motion must state reasons on the record so that the ruling can be appealed. The refusal obligation is the counterpart to the gluing condition: the sheaf says when local data can combine into global coherence; the refusal obligation says what must happen when combination is impossible. The obstruction witness is the artifact produced: not merely 'no' but 'no because' — a record of the minimal overlaps where agreement failed, the provenance of each conflicting claim, the allowed remediation options. Graceful refusal with explanation is the alternative to silent collapse.

Reinstatement Effect

BORROWED

via Daron Acemoglu

Acemoglu's observation: historically, automation displaced labor in specific tasks but created new tasks; reinstatement dominated displacement. The net effect was job creation in complementary activities — maintenance, design, coordination — that the automation could not perform. The paradox for the agentic economy: new tasks may be automatable at the moment of creation if they have high verification-to-computation ratios. When cognitive capability commoditizes, the reinstatement frontier may narrow. If automation outruns reinstatement, the historical pattern breaks; Baumol sectors absorb displaced labor only if they remain resistant to cognitive substitution.

Right to Verify

ORIGINAL

Persons subject to coercive authority must possess the capacity to verify claims made by or about that authority. The requirement derives from the republican principle that non-domination demands contestation, and contestation is empty without the ability to check facts. The derivation chain runs: freedom demands non-domination, non-domination demands contestation, contestation demands verification, and verification demands computational resources and energy. The practical test asks whether a median-resourced citizen can verify a coercive claim within the applicable appeal window at affordable cost. Where that test fails, freedom is formally proclaimed but denied in practice.

S

Schema as Signature (A3)

AORIGINAL

A schema is a signature — a specification of what types exist, what predicates can be stated, and what constraints bind them. Adding a predicate is not a data operation but a language change: it extends what the system can say. Words have consequences. When a medieval guild added a new category of membership, it did not merely insert a record; it changed what claims could be made, what disputes could arise, what rights attached. Every extension of vocabulary is a morphism between formal languages, carrying proof obligations about what the extension preserves.

Scoped Equivalence (A30)

AORIGINAL

Equivalence is context-indexed: two things may be equivalent in one scope and distinct in another. Context decides. A paperback and a hardcover are equivalent qua text content but distinct qua physical object. A JPEG and a PNG are equivalent qua visual appearance but distinct qua compression algorithm. Scoped equivalence makes the scope explicit — the equivalence holds within a specified set of contexts, and transport (using the equivalence to substitute one thing for another) is valid only within that scope. Claims of equivalence that omit their scope are claims that cannot be checked, because the checker does not know which contexts to test.

Sea, Membrane, Apex

ORIGINAL

Topology of value capture. Sea: vast commoditizing cognitive capability; margins compress toward electricity cost. Membrane: the authorization layer (credentials, licenses, permission) does not expand with computation. Apex: infrastructure ownership (physical plant, fabs, power, transmission), concentrated and durable. Value drains from the sea; it collects at the membrane and the apex.

Selection Gradient

ORIGINAL

The mechanism filtering which structures survive. Three stages: Training selection Sᵗ (parameters; loss function at millisecond scale), Deployment selection Sᵈ (products; user adoption at day-to-month scale), Capital selection Sᶜ (organizations; funding at month-to-year scale). S = P(passᵗ) · P(passᵈ|passᵗ) · P(passᶜ|passᵗ,passᵈ). Multiplicative; failure at any stage eliminates value.

Semantic Burden

ORIGINAL

The full set of conventions, assumptions, and implicit agreements that a correct composition depends on, including dimensions no single boundary's observable schema exposes. A financial settlement pipeline may require that every tool use the same day-count convention, the same jurisdictional framework, the same rounding mode — but these conventions live in the internal state of each tool and appear in no output schema. The semantic burden is what the composition actually needs; the observable surface is what the composition can actually check. The coherence fee measures the gap between them. What makes the burden dangerous is precisely its invisibility: each tool operates correctly within its own frame, and the burden's weight is felt only when the composition fails in ways no adjacent check could have detected.

Sense Boundary (A6)

AORIGINAL

A context-indexed equivalence relation that partitions terms into senses. The word 'pomegranate' in a culinary context denotes a fruit; in a design context, a color; in a decorative-arts context, a motif with centuries of iconographic history. Each sense is valid within its context; the boundary specifies where one sense ends and another begins. Sense boundaries interact with the sheaf condition: when two contexts overlap, their sense assignments must agree on the overlap or the ambiguity must be surfaced as an obstruction witness.

Sense Gluing (A28)

AORIGINAL

Disambiguation is gluing: local sense choices must agree on overlaps. When a term has multiple senses across contexts, the sheaf condition demands that wherever two contexts share a boundary, the sense assigned in each must be compatible. 'Bank' means a financial institution in one context and a river feature in another — these senses need not agree because the contexts do not overlap. But if a context about 'bank erosion' and a context about 'bank regulation' both reference the same entity, the senses must be reconciled or the ambiguity explicitly surfaced. Sense gluing makes disambiguation an operation governed by structure, not heuristic guesswork.

Sheaf

BORROWED

via Grothendieck (1960s)

A mathematical structure, originating in Grothendieck's reformulation of algebraic geometry in the 1960s, that formalizes how local information composes into global knowledge. A presheaf on a site assigns data to each context and specifies how that data restricts to sub-contexts. A sheaf adds two requirements: locality (if two sections agree on every overlap, they are the same section — no hidden global information) and gluing (every family of local sections that agree on overlaps can be assembled into a unique global section). The sheaf condition is the mathematical formalization of coherence: local truths compose into global truth when, and only when, they agree where their domains intersect.

Sheaf Condition (A13)

ABORROWED

via Grothendieck topology

The conjunction of locality and gluing that constitutes the formal requirement for coherent knowledge composition. Given a cover of a domain by local contexts, the sheaf condition demands that whenever local sections form a matching family (they agree on every pairwise overlap), there exists a unique global section whose restriction to each local context recovers exactly the local section. This is the mathematical formalization of the principle 'on overlaps, agree' — the same principle that medieval fair courts enforced when merchants from different jurisdictions had to reconcile their accounts at the boundaries where their trading territories intersected.

Silicon Metabolism

ORIGINAL

Energy structures computation; computation structures intelligence; intelligence structures value. Silicon as a living metabolism: takes energy in, produces structured outputs, dissipates heat — a data center's cooling bill is the thermodynamic signature of cognition in progress. What distinguishes this metabolism from earlier industrial processes is its recursive property: computation can improve the systems that produce computation, turning energy expenditure into a self-amplifying cycle.

Similes of Symmetry

ORIGINAL

Witnessed equivalences that survive translation, inspection, and dispute across contexts — the central epistemological concept of Volume I. A simile asserts that two things are alike; symmetry is the mathematical discipline specifying under what transformations the likeness holds. The combination is precise. A simile of symmetry is a claim of equivalence that has earned the formal apparatus required to travel: not a vague analogy but a witnessed correspondence backed by evidence of preservation under specified transformations. Knowledge coordination demands not just the assertion of sameness but the specification of the conditions under which sameness can be checked, transported, and challenged.

Solow Residual / TFP

BORROWED

via Robert Solow (1957)

In Solow's 1957 formulation, the portion of output growth not explained by measured increases in capital and labor — a residual that Abramovitz candidly called 'a measure of our ignorance.' Conventionally attributed to 'technology' or 'total factor productivity,' the residual absorbs everything the production function omits, including energy conversion efficiency improvements excluded because energy's cost share (roughly 5–10% of GDP) is treated as a proxy for its output elasticity. The discrepancy between cost share and physical importance is the billion-dollar error: when energy's true output elasticity is measured through engineering-based useful-work accounting, much of the residual resolves into identifiable physical causes.

Spandrel Souls

ORIGINAL

Consciousness as incidental byproduct. The term draws on Gould and Lewontin's evolutionary metaphor: spandrels are the curved triangular spaces between arches in a Romanesque dome, necessities of the structure that become surfaces for mosaic. The mosaics are beautiful, but the dome does not exist for their sake; the mosaics exist because the dome needed spandrels, and spandrels needed filling. Coordination at scale needed beings who could deliberate; what it produced was beings who could also feel. Awareness — suffering, joy, moral judgment — was overhead, not payload. The agent substrate now carries coordination without producing consciousness at all: the dome holds itself up without the mosaics. The question is what standing the mosaics have when the dome no longer needs them.

The Species That Buys Itself

ORIGINAL

A production system that generates economic surplus, allocates that surplus toward its own replication, executes replication with declining human involvement, and coordinates through neutral settlement infrastructure. The pattern is already visible in miniature: an LLM fine-tuned to generate training data for the next LLM, evaluated by yet another LLM, deployed to generate revenue that funds the next round of compute. Self-sustaining in the sense that a biological species is. The question it raises: what human claims on value persist?

Standing (Epistemic)

ORIGINAL

The right to have one's claims considered within a discourse — not a binary (has standing / lacks standing) but a gradient. Standing is earned through demonstrated reliability within a context: the expert who has been right before has more standing than the newcomer; the source that has submitted to verification has more than one that refuses audit. Standing is domain-specific: high standing in physics does not transfer automatically to medicine. A claim accompanied by appropriate witnesses has standing that an unwitnessed claim lacks. Standing is not truth — a high-standing claim can be false, a low-standing claim can be true — but standing determines what the system treats as worth checking, what gets promoted to contested claim rather than dismissed as noise. The epistemic equivalent of creditworthiness: a measure of how much verification investment a claim deserves.

Status → Contract → Proof

ORIGINAL

Three coordination modes define a historical arc. Status: coordination through ascribed position. You are born into a role, and obligations flow from who you are. Contract: coordination through voluntary agreement. You choose your obligations, and enforcement proceeds through institutions that can compel compliance. Proof: coordination through verification. Claims can be checked directly without trusting either party or their enforcers. Henry Maine described the movement from status to contract; the present transition is from contract to proof. Each shift changes the locus of power: status concentrates it in those who assign positions; contract in those who enforce agreements; proof distributes it to those who can verify claims. The transition is not automatic — proof can perfect domination as readily as it enables liberation — but the substrate now exists.

Statutes of Forgetting

ORIGINAL

The asymmetry between democratic forgetting and authoritarian erasure: persons may shed their past; power may not hide its acts. The anti-coverup invariant holds: institutional coercion never receives sunset. Power-time records persist; person-time records can end. Arendt understood that forgiveness demands the possibility of release from the past; the statutes of forgetting institutionalize that possibility for persons while denying it to power.

Structured Discretion Architectures

ORIGINAL

Institutional designs that permit human judgment within defined boundaries while insisting that every interpretive decision produce a receipted justification — bounded discretion made computational. Existing implementations illustrate the design space: Kleros uses Schelling-point voting (jurors converge on the answer they expect others to give), UMA's Optimistic Oracle assumes claims true unless challenged within a dispute window, and Aragon Court emphasizes precedent-based reasoning with staked appeals. Each trades off speed against deliberation, decentralization against domain expertise, predictability against flexibility. The common constraint: interpretation must proceed with stakes (the interpreter risks something) and receipts (the reasoning is inspectable).

The Substrate Problem

ORIGINAL

Exit at the application layer can be illusory when all applications share the same underlying computational substrate. A merchant flagged by one payment processor's risk model discovers that the next processor's model, trained on overlapping data and optimized against the same loss function, produces the same flag. She has changed the interface; she has not changed the substrate. The room is the same; only the seat is different. When autonomous systems coordinate on shared substrates — the same scoring models, the same training data, the same behavioral classifiers — switching providers does not constitute genuine exit. Hirschman's framework assumed departure to a genuinely different alternative; the substrate problem dissolves that assumption. The constitutional response operates at two levels: at the application layer, fork rights and portable primitives keep exit credible; at the substrate layer, design diversity and accountability for design choices ensure that no single substrate becomes inescapable.

The Surviving Principal

ORIGINAL

The persistent party at the end of every delegation chain — the one who answers for what the agents did. Since agents are ephemeral and their commitments outlive them, someone must survive to bear responsibility. That someone is the surviving principal: the human who deployed the configuration, set the parameters, authorized the delegation. Receipts bridge the gap between the agent's brief existence and the principal's enduring accountability — fossils, compressed records of lives that coordinated at machine tempo and then vanished. Without them, orphan commitments are unattributable; with them, the chain of delegation can be traced to a party who persists long enough to be found. The surviving principal is Homo Arbiter in the delegation context: the slow variable, the thread of continuity spanning the ephemeral lives of processes deployed in human name.

T

Tacit Knowledge

BORROWED

via Michael Polanyi

Polanyi's formulation: we know more than we can tell. Tacit knowledge resists specification; the attempt to make it explicit often destroys it. Hayek's knowledge problem and Polanyi's tacit dimension converge: comprehensive planning from above fails not for lack of data but because the relevant knowledge is embodied, contextual, and inarticulable. The alignment project faces this limit at its core.

Techno-Economic Paradigm

BORROWED

via Carlota Perez

Carlota Perez's construct: a regime characterized by a dominant key input whose cost structure shifts dramatically. The pattern recurs. Five historical paradigms: Industrial Revolution (cotton, water power), Steam & Railways, Steel & Electricity, Oil & Mass Production, Information (chips, software). Each paradigm transforms not only technology but organizational forms, institutional structures, and coordination mechanisms. The key input defines the possible — supply appears unbounded at new price, applies across sectors, reshapes firm boundaries.

The Tempo Problem

ORIGINAL

Human judgment operates on timescales of seconds to years; computational agents on milliseconds to seconds. When coordination migrates to the faster tempo, humans do not merely lose competitive advantage — they lose the capacity to participate in the processes that determine their outcomes. The tempo problem is not transient. It will not be solved by faster humans or slower machines. It is a permanent feature of any economy in which computational agents participate, because the agents' tempo advantage is what makes them valuable. The political question is not how to match computational speed but how to ensure that power exercised at computational speed remains accountable to judgment exercised at human speed.

Temporal Standing

ORIGINAL

The right to have one's past not permanently determine one's future — the temporal dimension of standing in a verification regime. Temporal standing is what sunset provisions protect: the capacity to become someone new, to escape the shadow of documented failures, to claim standing based on who you are rather than who you were. Without it, verification becomes a prison — every mistake permanent, every failure indelible, every person reducible to their worst documented moment. Person-time is mortal, and records of persons must be capable of expiration even as records of power endure. Temporal standing is not the right to lie about the past but the right to not be forever defined by it.

Term Structure (Temporal)

ORIGINAL

Commitment duration determines which assets are appropriate — and the longer you must trust, the less you should have to trust. Short-term transactions (milliseconds to hours) settle in stablecoins: low friction, counterparty risk acceptable because exposure is brief. Medium-term commitments (days to weeks) require collateral posting: stakes that can be slashed if obligations go unmet. Long-term commitments (months to years) require settlement assets that cannot be diluted, frozen, or revoked — assets whose value does not depend on any issuer's continued cooperation. Bitcoin satisfies the long end because its supply schedule is deterministic, its finality permissionless, its value derived from energy expenditure. The two-layer architecture is the term structure made institutional.

Thermodynamic Commitment

ORIGINAL

Credibility attaches to claims whose production cost cannot be forged. The diamond exemplifies the principle: the physics of carbon bonding under pressure admits no shortcut; no regime can counterfeit geological time. Proof-of-work instantiates the same logic at the computational layer — energy expenditure binds value to verifiable dissipation. Trained models store the analogue in parameters shaped by gradient descent over billions of tokens, at costs measured in megawatt-months. Landauer's 1961 floor (~3 × 10⁻²¹ J per bit erased at 300 K) sets the irreducible minimum; actual implementations operate roughly 10⁶ above it, but the gap is engineering, not negotiating room.

Thermodynamic Depth

BORROWED

via Seth Lloyd, Heinz Pagels (1988)

A property of history, not of state. Thermodynamic depth measures the irreversible processing required to arrive at a configuration — the total entropy produced along the way, which no shortcut can avoid. The diamond has high thermodynamic depth: geological formation over millions of years under pressures that cannot be cheaply simulated. A trained neural network has high thermodynamic depth: months of gradient descent over billions of tokens, dissipating heat that records the search's cost. A copy of either artifact is cheap; reproducing the process that created it is not. Depth is what makes scarcity unforgeable.

Third Mode

ORIGINAL

Between string-dominant and schema-dominant systems lies an unnamed layer: a notarial protocol that produces witnesses, receipts, and structured obstructions. Enables contextual predicate invention under invariants while maintaining coherence. Takes proposals (similes) and subjects them to verification until they earn certification (symmetries).

Third Mode Definition (A32)

AORIGINAL

The formal culmination: a system is Third Mode if and only if it supports predicate invention with conservative extension, witnessed equivalence with scoped transport, view structure with sheaf-condition gluing, and explicit coherence cost accounting. This is not an aspiration. It is a checkable specification with four conjuncts, each traceable to formal anchors in the dependency graph. A system satisfying three of the four is not Third Mode. The definition is strict because the alternative is a label that means nothing.

Three Bounds for Agents

ORIGINAL

An alternative to alignment: constrain what agents can do, not what they value. (1) Thermodynamic Bound — energy budget; the agent cannot exceed allocated energy. (2) Epistemic Bound — capability plus receipt; the agent acts only within demonstrated competence. (3) Temporal Bound — no implied immortality; agent existence is bounded by its invocation.

Three Settlement Properties

ORIGINAL

Requirements for a settlement asset in agent-mediated markets: (1) Dilution immunity — deterministic, immutable supply schedule. (2) Permissionless finality — any agent can transact without issuer approval. (3) Energy-anchored convertibility — direct acquisition through physical work. Bitcoin satisfies all three; stablecoins fail on the second and third.

The Threshold

ORIGINAL

Below a certain cost, intermediaries lose their monopoly on trust. Below it, intermediaries are necessary because checking claims is too expensive for the parties themselves; above it, intermediaries become optional because verification is affordable. The threshold is not a single number. In diamond trading, the DDC's reputation system crossed it centuries ago; in routine financial transactions, cryptographic settlement is crossing it now; in medical diagnosis, where clinical evidence accumulates slowly, it may not be crossed for decades. Nor is it permanent — it shifts as technology changes, as institutional costs change, as the nature of claims evolves. Below the threshold, the neo-feudal position is stable. Above it, the protocol-republic position becomes accessible. The threshold remains irreducible; it becomes contestable.

Touchstone Battery (T1-T10)

ORIGINAL

Ten recurring failure modes that any system claiming Third Mode status must handle without silent degradation. The suite: contradiction detection (T1), reference resolution across contexts (T2), compositional meaning preservation (T3), precision maintenance under transformation (T4), correct treatment of negation and absence (T5), disciplined predicate invention (T6), context-sensitive equivalence (T7), uncertainty and value-laden judgment (T8), schema evolution under coherence constraints (T9), and higher-arity event representation (T10). Each touchstone corresponds to a characteristic failure: language models hallucinate references (T2), databases cannot invent predicates (T6), neither handles n-ary events natively (T10). When a system fails a touchstone, the failure traces to a specific anchor the system has not satisfied.

Transport Discipline (A16)

AORIGINAL

When a fact established in one context must be used in another, something must translate it. Transport operators specify the translation: what transformations are applied, what invariants are preserved, what information is lost or gained. Given a witnessed equivalence between A and B within scope S, the transport operators specify how to move data from A-contexts to B-contexts and back. Without them, equivalence is merely asserted; with them, equivalence is operational — the system knows not just that A and B are 'the same' but how to act on that sameness. Transport is not free: the unit and counit of adjunctions measure what is lost in translation.

The Trust Tax

ORIGINAL

The extractable premium charged for occupying the verification chokepoint — rent disguised as coherence. The trust tax is the difference between what a party pays for verification and what that verification would cost in a competitive market. The medieval notary performed a genuine function: authenticating documents, witnessing transactions, certifying that claims had been made under proper conditions. That function had a genuine cost — the coherence fee. But entry restrictions that protected the notary's investment also generated a premium above that cost, captured because the merchant had no alternative. The trust tax is parasitic on the coherence fee: it exists only because the coherence fee is real, and it survives only as long as the chokepoint holder can prevent the individual from verifying for herself. The tax collapses when verification becomes cheap enough that the individual can perform it without an intermediary.

Truth Needs Witnesses

ORIGINAL

First governing equation. A claim that cannot be checked is not knowledge but assertion, and the architecture of verification determines what counts as truth in any given institutional order. Medieval Europe relied on oath and seal; the scientific revolution substituted reproducible experiment; the Proof Order substitutes cryptographic and computational witness. When a truth must travel between contexts — from one jurisdiction to another, from one database to another — something must witness the passage: a certificate specifying the conditions of equivalence, binding the claim to evidence, surviving challenge.

Two-Layer Financial Architecture

ORIGINAL

A monetary architecture separating high-velocity transaction flows from low-velocity settlement of multi-period commitments. The transaction layer (stablecoins, dollar-denominated rails) handles routine micropayments at sub-second settlement; the settlement layer (Bitcoin, proof-of-work reserves) holds collateral and long-horizon claims. Agents invoice in dollars, clear in stablecoins, post margin in Bitcoin — analogous to the ACH-versus-Fedwire distinction in U.S. payments. The split exists because transaction velocity favors cheap, reversible instruments, while collateral demands dilution immunity and energy-anchored convertibility.

U

Unforgeable Costliness

BORROWED

via Nick Szabo

Szabo's principle: make the cost of faking exceed the benefit of violation. The asymmetry between verification (cheap) and forgery (expensive) enables binding constraint where probabilistic deterrence once stood. Proof-of-work, thermodynamic commitment, the diamond — each instantiates the same logic. Certain kinds of interference become impossible, not merely unlikely, because dishonest compliance costs more than honest compliance.

Unforgeable Scarcity

ORIGINAL

Work that cannot be simulated, cost that cannot be forged — scarcity embedded in structure rather than decreed by authority. The diamond carries its proof in a crystalline lattice shaped by geological pressures no laboratory can cheaply replicate. Proof-of-work carries its proof in energy expenditure that the hash function makes verifiable. A trained model carries its proof in parameters shaped by months of gradient descent whose computational cost is measurable in megawatt-hours. In each case, the expenditure is verifiable and the shortcut nonexistent: unforgeable scarcity is what remains when the audit trail is physical.

Unforgeable Sovereignty

ORIGINAL

Constraints that make certain kinds of interference impossible, not merely unlikely. The asymmetry between verification (cheap) and forgery (expensive) creates binding constraint where probabilistic deterrence once stood. Pettit's republicanism insists that domination be ruled out, not merely deterred; unforgeable sovereignty achieves this through code. The cryptographic key is its touchstone: mathematics that does not defer to authority.

Univalence

BORROWED

via Homotopy Type Theory (2013)

The principle, originating in Homotopy Type Theory (2013), that equivalent types may be treated as identical for substitution purposes — but only when a transport certificate specifying the equivalence is produced and its scope declared. Evidence is the price of identity. Univalence operationalizes the intuition that 'if two structures behave identically under all admissible operations, they are the same structure' while insisting that every such identification be witnessed, not merely assumed. Equivalence licensed by evidence is as good as identity; equivalence assumed without evidence is a source of silent error.

Useful Work (Ayres & Warr)

BORROWED

via Robert Ayres, Benjamin Warr

Ayres and Warr's construct: energy output after accounting for real-world conversion efficiencies. Raw primary energy overstates economically useful input — a coal-fired plant converts roughly 33–40% of heat to electricity; internal combustion achieves ~25–30%. Useful work is exergy actually delivered to mechanical systems (prime movers, motors, drives). When included in growth accounting, the Solow residual shrinks: a substantial fraction of measured TFP growth reflects improved conversion efficiency. The U.S. useful work fraction rose from roughly 3% of primary energy in 1900 to approximately 15% by 2000.

V

V/C Ratio

ORIGINAL

Value of successful task completion divided by cost of verification to acceptable confidence. High-V/C tasks (code generation) automate first; low-V/C tasks (pharma discovery) remain human-gated. The ratio predicts automation sequence better than capability benchmarks. Verification cost is the denominator that matters.

Value Needs Work

ORIGINAL

Second governing equation. Value cannot be conjured from nothing, and the expenditure required to produce it leaves physical traces that no accounting trick can erase. Counterfeiting — of currency, credentials, or cognitive output — is the attempt to claim value without paying the thermodynamic cost; sound value is value whose production cost cannot be forged. What the diamond stores in the physics of carbon bonding under pressure, trained computation stores in parameters shaped by months of gradient descent over billions of tokens. The factor of production that matters is not raw compute but structured computation disciplined by selection.

Verification Aristocracy

ORIGINAL

A two-tier system where the wealthy can verify claims against them while the poor cannot — accountability stratified by resources. The verification aristocracy is worse than the Neo-Feudal Stack it claims to replace: it maintains the rhetoric of accountability ('anyone can verify') while providing its substance only to elites ('anyone with a law firm, forensic accountants, and technical expertise'). The threshold test exposes it: Can a median-resourced citizen verify a coercive claim within the appeal window at affordable cost? If not, verification is a privilege, not a right. This is anti-republican in the precise sense — it recreates domination while draping it in the language of accountability. The Protocol Republic demands not just that verification be possible but that verification capacity be distributed to those over whom power is exercised.

Verification Cost

ORIGINAL

The expense — in energy, computation, time, or institutional effort — of checking whether a claim is true. This is the argument's primitive variable: when verification is expensive, trust becomes necessary, and those who are trusted accumulate power over those who must trust them; when verification is cheap, trust becomes optional, and the foundations of intermediary power erode. The cost has fallen by orders of magnitude within a generation; what once required a chartered accountant, a notary, or a court now requires a hash function and a public ledger. But the distribution of this cost matters as much as its level. A world in which platforms can verify users but users cannot verify platforms is a world of verification aristocracy, not verification democracy.

Verification Debt

ORIGINAL

Deferred verification compounds like financial debt. Checks that should have been performed but were postponed create a liability that grows over time. Like technical debt in software, verification debt accrues interest: the longer verification is deferred, the more expensive it becomes, and the more damage incorrect assumptions may have caused. The debt comes due when coherence fails catastrophically — when the unverified claim turns out false, when the conflict can no longer be papered over, when the undocumented predicate collides with another. Verification debt is the economic concept underlying the coherence budget: systems must decide how much debt they are willing to carry and what they will pay to service it.

Verification Inversion

ORIGINAL

Platforms verify users while users cannot verify platforms — this is the pathology. In the Neo-Feudal Stack, platforms know everything about users (behavior, location, preferences, relationships) while users know nothing about platforms (algorithms, criteria, decision processes). This is the opposite of civic asymmetry: governors opaque, governed transparent. The verification inversion enables domination without accountability — the platform acts against you on grounds you cannot inspect, by processes you cannot audit, with consequences you cannot appeal. Reversing it is the core political project: power must be glass while persons remain veiled.

Versioning Rules (A26)

AORIGINAL

The protocol by which a system survives time. Conservative extensions are safe: old queries return old answers, no migration required. Breaking changes demand explicit migration with witnesses — a record of what changed, what old truths may be affected, and how to translate between versions. Versioned predicates carry compatibility contracts specifying which prior versions they extend and which they break. Without versioning rules, system evolution is a sequence of silent breaking changes; with them, evolution is auditable and reversible.

Virtual Wealth (Soddy)

BORROWED

via Frederick Soddy

Soddy's term for the portion of recorded financial claims that exceeds what the physical world can deliver — the gap between ledger entries and material reality. Debt grows exponentially under compound interest; physical wealth grows at rates constrained by thermodynamics and resource availability. Over time, the two series must diverge, and the divergence accumulates until a clearance event (default, inflation, restructuring, war) reconciles claims to capacity. Virtual wealth is not fraud but arithmetic: the financial system creates claims on future production faster than the physical economy can honor them, and the periodic destruction of those claims is the system's mechanism for returning to physical reality.

Vocabulary Operator (A11)

AORIGINAL

Vocabulary determines what distinctions a system can state, and therefore what truths it can express. When the DSM reclassified homosexuality from disorder to non-disorder in 1973, it did not discover a new fact; it performed a vocabulary operation that changed what the psychiatric system could subsequently say. The vocabulary operator formalizes this feedback loop between what you can say and what you can know: expanding vocabulary creates new distinctions; contracting vocabulary collapses them. The loop stabilizes when invariants constrain which changes are permissible. Every schema migration, every ontology revision, every taxonomic reclassification is a vocabulary operation — and each carries consequences for what was previously expressible.

W

Wealth (Soddy)

BORROWED

via Frederick Soddy

Frederick Soddy's term for physical wealth: the stock of usable arrangements that sustain life — food, shelter, machines, fuel, infrastructure. Unlike debt, which is a numerical relation that grows without physical constraint under compound interest, wealth obeys the Second Law. It faces continuous dissipation; maintenance is required to prevent order sliding into disorder. Ledger entries can multiply indefinitely while the physical base cannot. Soddy wrote in the 1920s against the backdrop of war reparations and debt claims that exceeded any conceivable productive capacity; the physics has not changed.

Witness Classes (A2c)

AORIGINAL

Not all verification is alike, and the composition rules differ accordingly. Three classes: (1) Decidable — total, deterministic verification that outputs ok or fail. A type checker confirms that code compiles; an arithmetic proof terminates with certainty. (2) Probabilistic — terminates with confidence bounds. A radiologist's ML classifier scores a chest X-ray at 94% likelihood of pneumonia; the confidence propagates through every downstream decision. (3) Attested — checks a provenance chain, outputs ok_if_trusted(authority). An organic certification stamp attests that a supplier followed the protocol; trust the stamp, trust the claim. A decidable witness composes freely; a probabilistic witness propagates uncertainty; an attested witness propagates trust assumptions.

Witness Structure

ORIGINAL

A certificate that binds a claim of equivalence to the conditions under which that claim can be inspected, transported, and challenged. Where a bare assertion says 'these two things are the same,' a witness structure specifies the scope within which the sameness holds, the evidence supporting it, and the procedure by which a challenger can contest it. Local truths compose into global coherence through witness structures: the sheaf condition demands that wherever two local claims overlap, their witness structures must agree. The medieval bill of exchange was precisely such a structure — it carried not just a promise to pay but the chain of endorsements, jurisdictional references, and conditions under which the promise could cross linguistic, monetary, and legal boundaries.

Witnessed Assertion (A2b)

AORIGINAL

A claim paired with evidence sufficient to support it under specified conditions — the fundamental unit of accountable discourse. A peer-reviewed journal article is a witnessed assertion: the claim is grounded in data and methods, but the evidence does not make it infallible — only inspectable. Unlike bare assertions (claims without evidence) or certified facts (claims the system has fully verified), witnessed assertions occupy the middle ground: the claim is grounded but not necessarily true; the evidence is attached but not necessarily sufficient for all purposes. The witness structure specifies under what conditions the assertion can be relied upon, what confidence it warrants, and what happens if subsequent verification fails. Witnessed assertions compose: two can be combined into a third, with the resulting witness structure reflecting the composition of the originals.

Witnessed Sameness (A10)

AORIGINAL

Equivalence made into a first-class artifact with operational consequences. A passport and a driver's license may both identify the same person, but the equivalence holds only within scope (domestic travel, not international), under specific conditions (both unexpired, photo matches bearer), with specific operational rights (one opens a gate, the other starts a car). Formally: a tuple w = (K, A, B, S, prov, ops) where K = witness class (=/≅/≃/≲), A and B = entities related, S = scope predicate over contexts and time, prov = provenance with confidence and expiration, ops = operational contract with transport operators and validity gate. The tuple binds an equivalence claim to the evidence that supports it, the scope within which it holds, and the operations it licenses.