The interface between proposal and verified claim: typed success or typed failure, with no third option. A certification contract takes a proposed claim and returns either a witnessed assertion (the claim has been verified, here is the evidence) or a structured refusal (the claim could not be verified, here is why). The contract is the architect-grade interface: downstream consumers know exactly what they are receiving and what confidence level attaches. Systems that return 'maybe' or 'approximately' without typing the uncertainty violate the certification contract.
The constitutional principle that the direction of transparency must follow the direction of power: those who wield coercive authority must be inspectable by those over whom they wield it, while those who live private lives need not become legible to systems that cannot themselves be held to account. Civic asymmetry is violated whenever governors are opaque and the governed are transparent — the default configuration of most contemporary digital platforms, which surveil users while resisting scrutiny of their own decision-making processes. The principle is not novel; it restates in computational terms what constitutional traditions have long demanded: the king's council must be visible to parliament; parliament need not be visible to the king's council. What is novel is that verification technology makes it enforceable through architecture rather than through the goodwill of those in power.
via Soddy/Daly
The periodic reconciliation of diverged financial claims to actual productive capacity. When virtual wealth—claims growing under compound interest—exceeds what the physical base can service, the divergence becomes unsustainable. Clearance occurs through defaults (claims written down), inflation (nominal claims diluted in real terms), or restructuring (maturity extension, haircuts, debt-for-equity swaps). Soddy and later Daly identified this as the thermodynamic corollary of a monetary system that permits unbounded claim growth against a bounded physical base. The 2008–2009 episode was a clearance event; the mechanism operates whether or not policymakers recognize it.
Bounded policy executor that can commit collateral, produce/consume receipts, clear routine coordination without human interpretation. Firm in a File: treasury (wallet), charter (code), policy (logic), no physical location/employees. Canonical flow: Policy → Escrow → Verification → Settlement → Exception → Recourse.
The structural split between two economies operating at different tempos with different cost structures — the consequence of Coase's 1937 insight applied to the agent era. Agents face near-zero transaction costs with each other: they verify claims instantly, commit conditionally, and settle disputes through pre-specified protocols. The boundary between firm and market that structured industrial capitalism dissolves for agent coordination — there is no reason to internalize a function within a hierarchy when the market can clear the same function at negligible cost. But for human coordination — judgment, liability, trust-dependent relationships — the historical cost structure persists. The result is a bifurcated economy: an agent stratum where Coasean boundaries collapse and coordination is radically disintermediated, and a human stratum where firms, contracts, and institutional overhead remain necessary. The interface between strata concentrates the political questions of the agentic economy: humans experience consequences from processes they cannot contest at the tempo where those processes operate. The V/C ratio governs which activities migrate to the agent stratum; the efficiency membrane marks the boundary where human-capital transaction costs and agent-capital collateral costs cross.
via Ronald Coase, Oliver Williamson
Ronald Coase's 1937 insight that the boundary between firm and market depends on the relative cost of internal coordination (hierarchy, management, monitoring) versus external contracting (search, negotiation, enforcement). When transaction costs are high, firms absorb activities; when they fall, markets replace hierarchies. The agentic economy drives Coasean boundaries inward with unprecedented force: agent-to-agent coordination operates at near-zero transaction costs for cognitive tasks, dissolving the rationale for large firms in domains where the coordination was cognitive rather than physical. But for human coordination — judgment, liability, trust-dependent relationships — the boundary persists, producing a bifurcated economy in which some activities are radically disintermediated while others remain stubbornly institutional.
The spectrum of power from suggestion to compulsion—the recognition that coercion is not binary but varies in intensity, and that accountability requirements should scale with coercive force. A recommendation is low on the gradient; a default setting is higher; a mandatory requirement higher still; physical force is the extreme. The receipt regime does not require the same documentation for a suggestion as for an arrest, but it does require that the gradient be legible: those affected must be able to tell where on the spectrum the power being exercised falls. The coercive gradient also clarifies when civic asymmetry applies: the more coercive the act, the more transparency is required; the less coercive, the more privacy is permitted. Platforms that claim to merely 'suggest' while actually 'compel' (through defaults, dark patterns, or monopoly position) violate the coercive gradient by misrepresenting their position on it.
Intelligence that has become tradeable, fungible, and priced—the transformation of cognition from scarce human capacity to abundant computational resource. When inference costs fall toward the marginal cost of electricity, cognition becomes a commodity like wheat or steel: differentiated by grade but fundamentally interchangeable, priced by markets, available to anyone who can pay. The commoditization of cognition is the economic event underlying Factor Prime: what was once the defining scarcity of human labor becomes abundant, and scarcity migrates elsewhere—to energy, to authorization, to the actuation bottleneck. The cognitive commodity is not 'artificial intelligence' in the science-fiction sense but something more prosaic and more consequential: thinking that can be bought by the token, reasoning that clears markets, judgment that flows through APIs. The question is not whether cognition will commoditize but what remains scarce when it does.
The explicit declaration of what a system will pay — in computation, time, and institutional effort — to maintain coherence across its knowledge base. The coherence budget acknowledges that global consistency is expensive: checking whether a new claim is compatible with all existing claims, verifying that overlapping contexts agree, monitoring for drift over time — each of these operations has a cost that grows with the system's size and complexity. A system that declares no coherence budget has, in effect, declared that it will not maintain coherence at all. A system that declares an explicit budget can reason about tradeoffs: certify the high-stakes claims, monitor the medium-stakes ones, and accept structured failure (with obstruction witnesses) for the claims that exceed the budget. This is the formal analogue of what every institution practices informally — the decision about which inconsistencies to investigate and which to tolerate.
The irreducible cost of making local truth compose into global coherence — thermodynamic, not political, and therefore impossible to eliminate by removing intermediaries or cheapening verification. Someone must always pay the coherence fee: the energy required to check whether two local claims agree on their overlap, the computation required to transport a witness across a context boundary, the institutional effort required to maintain consistency across time. The coherence fee is what remains when the trust tax has been stripped away — the floor below which verification cost cannot fall, because verification is physical work and physical work dissipates energy. Landauer's 1961 result establishes the limit at the bit level; real systems operate orders of magnitude above it, but the principle holds: composing truth has a cost denominated in joules, not merely in fees. The distinction between the coherence fee and the trust tax is the distinction between the cost of the work and the rent charged for the privilege of being the only one permitted to do it. Eliminating the trust tax is a political achievement. Paying the coherence fee is a thermodynamic necessity.
For views with local theories, an extension introducing predicate q must satisfy: local definability, overlap agreement (views induce same classification OR produce witnessed reconciliation), invariant preservation, conflict handling (fork, scope restriction, preference ordering—never silent overwrite). Core rule: on overlaps, agree with proof, fork with scope, or reconcile with witness.
The foundational anchor of the entire formal apparatus: a system satisfies commitment discipline if and only if it never extends its commitment set in a way that produces inconsistency. Once a claim has been committed, it constrains all future commitments — the system cannot assert both p and not-p without detecting the contradiction and refusing the extension. String-dominant systems (large language models, retrieval pipelines) characteristically lack commitment discipline: they produce plausible text that may contradict prior outputs without any mechanism for detecting the inconsistency. The First Anchor establishes that knowledge coordination begins with the willingness to be bound by what one has already said.
The condition where human authorization persists formally while the underlying competence to exercise it substantively has atrophied. If cognitive work is performed entirely by model configurations and human authorization becomes ceremonial rather than substantive, then the hand that signs becomes the hand that approves without understanding. A physician who cannot rederive the diagnosis is not a check upon it but an address for its lawsuits. An engineer who cannot evaluate the structural calculation does not assure safety; she provides a liability sink. The competence trap closes when practitioners can no longer perform the tasks they routinely delegate — when the form of oversight survives after the substance has departed. The thesis applies specifically where verification cost exceeds available time: high-frequency, high-complexity domains in which the professional cannot meaningfully evaluate agent output before signing. The liability sink names who remains accountable when cognition commoditizes; the competence trap names what happens when that accountability becomes ceremonial. Together they determine whether the authorization membrane operates as quality assurance or merely as litigation routing.
via David Teece
Capabilities, relationships, institutional positions required by a technology but not replicated by the technology itself. When core technology diffuses, returns migrate to owners of complementary assets. Example: as cognitive capability commoditizes, value migrates to authorization layer and infrastructure.
via Model theory
A schema extension in which every query expressible in the old language returns the same answer in the new language on every old dataset — the formal guarantee that evolution is safe, that adding new vocabulary does not silently change the meaning of what was already there. Conservative extension is the model-theoretic formalization of backward compatibility: old truths remain true, old distinctions remain distinct, old queries remain stable. When an extension is not conservative — when adding a new predicate changes the truth value of an existing query — the change is a breaking change, and the system must produce a migration with witnesses that specify what changed, what old truths may be affected, and how to translate between the old and new representations.
The degree to which a rule resists modification by those it constrains—the cryptographic and economic barriers that make certain commitments difficult to reverse. Soft constitutions can be amended by majorities; hard constitutions require supermajorities; cryptographically hard constitutions require breaking mathematical assumptions or coordinating economic attacks that cost more than the gain. Constitutional hardness is not an absolute good—rules that cannot be changed become prisons when circumstances change—but it is a necessary property for commitments that must survive the temptation to defect. The Protocol Republic calibrates hardness to function: core rights (civic asymmetry, fork rights) are cryptographically hard; procedural rules are economically hard (costly to change but possible); operational parameters are soft (amendable by governance). The spectrum of hardness is the mechanism design answer to the question: how do we bind future selves without caging them?
The synthesis of three intellectual traditions applied to verification infrastructure: James Buchanan's constitutional economics (rules about rules must be chosen behind a veil of uncertainty about future positions), Leonid Hurwicz's mechanism design (systems should be designed so that following the rules is in each participant's self-interest), and cryptographic enforcement (constraints encoded in code are structurally rather than promissorily binding). Constitutional mechanism design seeks dominant-strategy incentive compatibility wherever possible — arrangements where compliance is optimal regardless of what others do — and extends the receipt requirement to interpretive decisions, not only executive ones. The ambition is that the rules governing the Protocol Republic are self-enforcing: not because participants are virtuous but because violation is more expensive than compliance.
The formal substrate that stores the components of the Third Mode's knowledge coordination: typed nodes representing contexts, claims, witnesses, constraints, and equivalences, connected by edges specifying their relationships (supports, scoped-to, refines, transports, contradicts). Three operations govern the graph: gluing (composing local knowledge into global coherence), restriction (projecting global knowledge into local views), and transport (moving claims across context boundaries via witnessed equivalences). The context graph is deliberately not a general-purpose knowledge graph — its vocabulary is small and its scoping is explicit, because the point is not to represent all possible knowledge but to maintain the invariants that make knowledge coordination reliable.
Contexts form a site — a category equipped with a Grothendieck topology that specifies which families of contexts count as covers. This is the formal backbone of the coherence requirement: the topology determines what 'local' means, what 'overlap' means, and therefore what 'agreement on overlaps' requires. Different topologies on the same category yield different coherence standards. The choice of topology is a design decision with consequences: a coarse topology demands little agreement but permits contradiction; a fine topology demands much agreement but may be unsatisfiable.
via Helen Nissenbaum
Nissenbaum's framework: information flows are appropriate when they match context-relative norms; violations occur when information crosses contexts inappropriately. Civic asymmetry operationalizes it: power's information flows are appropriate for scrutiny—those who wield coercive authority must be inspectable. Persons' information flows deserve contextual protection—the governed need not become legible to systems that cannot themselves be held to account. The asymmetry is the constitutional application.
The possibility that agents, institutions, and persons can coordinate reliably across incompatible frames without requiring shared belief — because verification travels with the claim. The medieval bill of exchange demonstrated the principle: two merchants in different cities, speaking different languages, using different calendars, praying to the same God in different rites, could execute a binding transaction without agreeing on anything except the inspectable conditions of the bill itself. The bill did not require shared law; it required only inspectable conditions and accountable witnesses. The sheaf condition formalizes this insight: local data composes into global coherence if and only if it agrees on overlaps. Agents need not share objectives, adopt common logics, or trust one another; they need only ensure that where their domains intersect, their assertions are compatible. Coordination without consensus is the trilogy's overarching thesis, unifying the epistemological argument of Volume I (witnessed equivalences survive translation across incompatible contexts), the economic argument of Volume II (agents coordinate through settlement rather than shared intention), and the political argument of Volume III (the Protocol Republic does not require citizens to share values, only to produce and accept receipts). The claim is structural: coherence does not require consensus; it requires only that claims carry their evidence and witnesses carry their stakes.
Context is a restriction structure: global data restricted to a local view yields the portion visible from that vantage. A cover is a family of local views that jointly see everything — no part of the domain escapes observation by every view in the cover. Truth is indexed by view: a claim true in one context may be false in another, not because truth is relative but because different views have access to different evidence. The restriction maps specify how global knowledge degrades (or specializes) as it passes into local contexts.
Exit must be real—not nominal, not theoretical, but actually available at bearable cost. This requires portable credentials (your identity travels with you), interoperable protocols (your data can migrate), and reputation that transfers (your standing is not hostage to the platform you leave). Credible exit disciplines governance through the structural threat of departure: power that cannot trap cannot abuse without consequence. The feudal lord could exploit the serf because the serf could not leave; the platform can exploit the user when switching costs exceed the exploitation. Without credible exit, voice is supplication—you petition for mercy from those who have no reason to grant it. But exit without voice is mere abandonment—you leave without having contested, and your departure changes nothing for those who remain. Voice without exit is captivity—you complain to ears that need not listen. The combination constrains power: voice articulates grievance while exit makes the grievance consequential. This is Hirschman's framework operationalized for digital substrates: the Protocol Republic is the constitutional form in which both voice and exit remain meaningful.
via Cryptography
The cryptographic key yields proof that verifies itself—the mathematics does not defer to authority; it does not care who is checking. Yet the key proves only that you signed, not that you were uncoerced. Pettit would recognize the distinction: verification can establish fact without establishing freedom. The structural constraint is real; the human remainder is irreducible.
The thermodynamic basis for model value: structure that cannot be cheaply reproduced because the search that produced it consumed energy now dissipated as heat. A trained model's weights represent the output of an irreversible computational process — search through a vast space of possible configurations, most of which were discarded. The information encoded in those weights is crystallized search, the residue of a process whose energy cost has been paid and cannot be recovered. The copy is free; the original required thermodynamic work that cannot be undone. The concept extends the diamond metaphor that opens Volume II: where the diamond stores geological work in a crystalline lattice whose formation conditions cannot be counterfeited, the trained model stores computational work in parameters shaped by gradient descent over billions of tokens at costs measured in megawatt-months. Both are instances of unforgeable scarcity — value whose production cost is embedded in its structure. Crystallized search grounds the second equation's claim that value needs work: what makes a model valuable is not the architecture (which can be published) or the data (which can be collected) but the structured computation that winnowed the parameter space, at thermodynamic costs that cannot be elided.