Chapter 4: The Coasean Agent
In order to preserve himself and attain his highest perfections every human being is by his very nature in need of many things which he cannot provide all by himself; he is indeed in need of people who each supply him with some particular need.
The Coase Question
If markets coordinate through prices, why do vast swaths of economic activity happen inside firms, where prices do not coordinate and hierarchy does?
In 1937, Ronald Coase posed this question and transformed institutional economics. (Coase 1937)Ronald H. Coase, "The Nature of the Firm," Economica 4, no. 16 (1937): 386–405.View in bibliography His answer was transaction costs. Using markets is not free. There is a cost to discovering trading partners, negotiating contracts, monitoring performance, and enforcing agreements. When these costs exceed the costs of internal coordination, activities move inside the firm. When internal coordination costs exceed market transaction costs, activities move outside.
The boundary of the firm is determined by relative costs. Oliver Williamson refined Coase's insight by identifying the variables that matter: asset specificity, uncertainty, and frequency. (Williamson 1985)Oliver E. Williamson, The Economic Institutions of Capitalism (New York: Free Press, 1985).View in bibliography The governance choice between market, hierarchy, and hybrid forms is always a trade-off between opportunism risk and bureaucracy cost. This framework is well-known; what matters for our purposes is what happens when transaction costs shift.
The critical insight is that transaction costs have a floor. Discovery requires search. Negotiation requires communication and interpretation. Monitoring requires observation. Enforcement requires courts. Each has minimum costs that technology can reduce but not eliminate. Or so it seemed.
What happens when computational agents collapse transaction costs in specific domains? If Coase is right that transaction costs determine organizational boundaries, then a dramatic shift in those costs should reshape the organizational landscape, creating new governance forms that are neither traditional firms nor traditional markets.
The shift is not merely organizational. When enforcement moves from courts to code, coordination moves from promises interpreted by judges to receipts executed by systems. And liberty risk moves accordingly: from managers who might abuse discretion to protocols that cannot exercise it.
The Human Assumption
Coase's 1937 insight has the quality of the genuinely transformative: once you see it, you cannot unsee it. The firm is a governance response to the cost of using markets. Change the costs, change the boundaries. The elegance is real: sixty years of institutional economics have confirmed the mechanism across industries, jurisdictions, and organizational forms Coase never imagined. This is not a framework to overthrow. It is one to extend.
But the framework carries a load-bearing assumption that Coase had no reason to question, because in 1937 nobody could have: the agents doing the transacting are human.
Every cost Coase identified has a human at its root. Discovery requires cognition; someone must search, evaluate, compare. Negotiation requires communication and interpretation; someone must propose, counter, compromise. Monitoring requires attention; someone must watch, audit, sample. Enforcement requires courts; someone must adjudicate, compel, sanction. The floor beneath transaction costs was not technological; it was biological. As long as human cognition, attention, and judgment were the bottleneck, transaction costs could only fall so far.
What happens when the agents transacting are not human? Not human agents using computational tools (that is the internet era, and the framework handled it adequately), but computational agents that search, negotiate, execute, and settle without human cognition in the loop.
The change is not quantitative, not a further slide along the same cost curve. It is that the nature of the costs changes, and with the nature of the costs, the nature of the boundary. Traditional firms internalize to avoid opportunism between persistent parties who have reputations and will meet again. Williamson's hold-up problem presupposes parties who can punish defection over time; it is a problem of repeated games among durable players. (Williamson 1985)Oliver E. Williamson, The Economic Institutions of Capitalism (New York: Free Press, 1985).View in bibliography When agents are ephemeral, invoked for a task and terminated upon completion, the hold-up problem does not get solved. Its preconditions evaporate. What replaces it is structurally worse: not opportunism between persistent parties but orphan commitments from terminated ones. The governance question shifts from how do we prevent exploitation within ongoing relationships? to how do we make commitments enforceable when one party may cease to exist before the commitment matures?
The Coasean mechanism still holds. The boundary still responds to the comparison between internal coordination costs and external transaction costs. What has changed is the identity of the costs. Search, negotiation, monitoring, and enforcement — Coase's original categories — transform into specification, verification, liability, and persistence costs. The firm's boundary moves, but it is still a boundary, still determined by cost comparison, still amenable to the analytical machinery Coase built. The material it now operates on has changed so thoroughly that the organizational forms it predicts are alien to the ones Coase observed.
The Failed Promise of Disintermediation
Every generation has predicted the death of the firm, and firms persist.
In the 1990s, the "virtual corporation" was imminent: a network of independent contractors coordinated by information technology, with no permanent employees and no physical headquarters. Instead, technology companies built some of the largest hierarchies in history.
The dot-com era predicted markets would replace hierarchies. Marketplaces would match buyers and sellers directly. Disintermediation would eliminate the middleman. Instead, platform companies built new hierarchies more powerful than those they displaced. Amazon did not merely connect buyers and sellers; it became the warehouse, the logistics network, the payment processor, and increasingly the manufacturer.
What went wrong?
These predictions assumed that digitizing communication would digitize coordination. It did not. You could email a contract in seconds, but collecting an unpaid debt still took months in court. You could discover suppliers worldwide, but verifying their quality still required inspection. You could negotiate terms electronically, but enforcing those terms still required litigation. The transaction cost floor did not drop. Only the messaging cost did. The 1990s digitized information but left enforcement analog. What computation now digitizes is not messaging but sanctions. Cryptographic proof, staked commitments, automatic execution. The transaction cost floor drops because consequences are structural. That is the phase change.
This distinction matters for prediction. Transaction costs collapse where enforcement can be structural. Performance is digitally verifiable, interactions are standardizable, and violations trigger automatic consequences. Transaction costs remain high where enforcement requires interpretation, physical action, or discretionary judgment.
Technology obviously changes coordination. What matters is which costs drop and which persist, and which new costs emerge to replace the old ones. The dot-com predictions failed because they saw only half the picture. Discovery became cheap, but trust remained expensive. Platforms filled the gap, becoming intermediaries who verified quality, established trust, and enforced agreements. The transaction costs that platforms monetize (trust establishment, quality verification, dispute resolution) are precisely the costs that embedded enforcement now addresses.
The honest prediction is conditional. Call the favorable domain the verifiable core. Performance is digitally observable, interactions parametric, participants reputation-sensitive, and activities decomposable into independently checkable units. In the verifiable core, transaction costs collapse. Outside it, where context matters, judgment is required, physical enforcement is needed, or relationships are specific, transaction costs persist. The boundary shifts, but it does not disappear. The interesting question is where it settles.
What Computational Agents Change
The Law Merchant worked because information about defectors traveled through merchant networks. Detection was probable, and exclusion was multilateral. Computation extends this mechanism beyond any community boundary.
Computational agents transform each of Coase's cost categories. Discovery becomes algorithmic — a procurement agent queries five continents in milliseconds, and the "relationship rent" that suppliers earned from being known disappears. Negotiation becomes parametric — agents exchange parameters rather than drafting contracts in natural language, encoding what will happen rather than what should happen. Monitoring becomes continuous — IoT sensors log temperature throughout a pharmaceutical cold chain rather than sampling at checkpoints, flagging every deviation in real time.
But the critical shift is in enforcement. Court enforcement is slow, expensive, and uncertain. A small business owed $10,000 may find that pursuing the debt costs more than the debt is worth. The rational response is to write off the loss, which makes defection profitable for counterparties who know this.
Computational enforcement operates differently. Escrow holds funds until conditions are verified. Automatic execution releases payment when performance is confirmed. Stake slashing penalizes misconduct without litigation. The enforcement does not happen after breach; it is structured into the transaction itself.
A contract enforced only 70% of the time is worth 70% of its face value. When enforcement is embedded, when the escrow releases only upon verified performance, the agreement is worth its full value.
This enables transactions at scales previously uneconomic. Traditional enforcement has a minimum viable size. A $50 freelance task is not worth pursuing through courts; the filing fees alone would exceed the disputed amount. The rational response is to absorb small losses, which makes small-scale defection profitable. Contractors learn they can cut corners on small jobs. Principals learn they must over-monitor or over-pay. The transaction costs of enforcement create a floor below which coordination fails.
Computational enforcement removes this floor. The same smart contract logic that governs a $50 million DeFi loan can govern a $50 microtask. The escrow does not know or care about the amount at stake. The verification conditions apply identically at any scale. This opens coordination possibilities that traditional enforcement could not reach: microtasks, streaming payments, continuous services, fractional contributions. The long tail of economic activity that was too small to contract for becomes contractible.
This matters for organizational form. Small firms and individual contributors gain access to enforcement mechanisms that were previously available only to parties wealthy enough to afford litigation. The coordination playing field levels meaningfully. A freelancer with a smart contract has enforcement parity with a corporation, at least for transactions that can be specified and verified.
Harold Demsetz established the connection between verification costs and rights delineation in 1967: "Property rights develop to internalize externalities when the gains of internalization become larger than the cost of internalization." (Demsetz 1967)Harold Demsetz, "Toward a Theory of Property Rights," The American Economic Review 57, no. 2 (1967): 347–359.View in bibliography The converse follows directly: when verification and enforcement costs drop, rights can be defined more precisely, extending into domains previously too costly to delineate. Cryptographic enforcement is not merely cheaper court enforcement. It expands the scope of what can be owned, contracted for, and protected, creating property rights in digital assets, attention, data provenance, and commitment itself.
What Agents Do Not Collapse
Transaction costs do not simply vanish. They transform. Collapsed costs reappear as verification costs, and verification has its own failure modes.
Specification costs persist. The gap between what the principal intended and what the code implements creates new disputes. The DAO hack of 2016 illustrated this: an attacker exploited a recursive call vulnerability to drain tens of millions of dollars from a decentralized investment fund. The code executed exactly as written. The exploit was technically permitted. But it violated what the community understood the contract to mean. The Ethereum community faced a choice: honor the code as written, or intervene to restore the funds. The hard fork that followed split the community over whether the code was the contract or whether intent mattered.
The oracle problem deepens this. Smart contracts cannot observe the physical world directly. They rely on data feeds that can be wrong, manipulated, or strategically gamed. The verification cost merely moves — from verifying performance to verifying the inputs that determine what counts as performance.
Adversarial costs emerge. Systems designed for honest participants face exploitation by strategic actors who can create synthetic identities, game verification mechanisms, and exploit specification gaps at scales medieval identity fraud could not reach. And liability costs shift without disappearing: when an autonomous agent causes harm, the attribution chain (principal, developer, protocol) creates accountability problems that existing law does not resolve.
The honest claim is not that transaction costs collapse uniformly. They collapse in the verifiable core and transform into new costs everywhere else. Where enforcement can be structural, the Coasean logic inverts: it becomes cheaper to transact through protocols than to bring activities inside the firm. Where context matters, physical enforcement is required, or relationships are specific, transaction costs persist. The boundary shifts, but it does not disappear.
The Persistence Assumption
The liability problem runs deeper than attribution. Every accountability framework humans have developed presupposes something that computational agents may lack. That something is persistence.
Criminal law assumes a body to punish. The sentence has meaning because the convicted person will exist to serve it, will experience the deprivation of liberty, will carry the consequences into a future that stretches beyond the offense. Without persistence, punishment becomes impossible—there is no one left to punish.
Contract law assumes a party to sue. The breach creates liability because the breaching party continues to exist, can be compelled to appear, can be ordered to pay damages, can be held in contempt if they refuse. Without persistence, remedies become fictional—the judgment names a defendant who is no longer there.
Reputation assumes a future to foreclose. The merchant who defects loses standing in future transactions because the merchant continues to exist and continues to need trading partners. The sanction works by constraining opportunities the defector would otherwise have. Without persistence, reputation collapses—there is no future for the sanction to reach.
Tort law assumes causation chains that terminate in responsible parties. When harm occurs, we trace backward through causes until we find an agent who could have acted otherwise, who should have anticipated the consequence, who bears responsibility for the outcome. Without persistence, the chain breaks—the cause has terminated, and there is no one at the end of it.
These are not incidental features of accountability. They are structural presuppositions. Every mechanism we have developed for holding agents responsible assumes that the agent will still exist when accountability is demanded.
Computational agents violate this assumption routinely. An agent invoked to execute a transaction may terminate upon completion. The process that negotiated the terms, verified the conditions, and executed the settlement no longer exists once settlement concludes. There is no body to punish, no party to sue, no future to foreclose, no agent at the end of the causal chain. The accountability frameworks developed over millennia encounter an ontological gap.
The Codex frames this temporally. By the time human legal mechanisms could engage, the agent has been terminated for eons in agent-time. But the problem is not merely speed. It is existence itself. The agent is not hiding or evading or refusing to appear. It simply is not there. The question is whether responsibility can attach to something that no longer exists.
Whitehead's process philosophy offers one lens. (Whitehead 1929)Alfred North Whitehead, Process and Reality: An Essay in Cosmology (New York: The Macmillan Company, 1929).View in bibliography Actual entities, in his account, "perish, but do not change; they are what they are." An entity achieves "satisfaction" and then ceases; its birth is its end. Value is preserved through "objective immortality," the causal influence on subsequent entities, but subjective immediacy ends. The entity cannot experience consequences because the experiencer has terminated.
This maps precisely onto computational agents. The agent executes, achieves its purpose, and terminates. Whatever value it created persists in its effects. The transaction it completed, the state it modified, the receipts it generated. But the agent itself cannot experience accountability. There is no subject left to hold responsible.
Corporate law offers a partial precedent. Corporations are legal persons that persist indefinitely even though their personnel change. Peter French argued that corporations possess genuine moral agency through their Corporate Internal Decision Structure, the policies, procedures, and decision rules that transform individual acts into corporate acts. (French 1984)Peter A. French, Collective and Corporate Responsibility (New York: Columbia University Press, 1984).View in bibliography The corporation can be held responsible because its CID structure persists even when executives depart.
But agents lack this persistence structure. There is no CID that continues when the agent terminates. The agent is a process with finite runtime. It cannot develop policies across time because its time is exhausted upon completion. The corporate analogy fails precisely where it is needed most.
What responses are available?
Principal chains. If the agent cannot be held responsible, responsibility flows to whoever invoked it. The principal who deployed the agent inherits the liability the agent's termination creates. This is respondeat superior extended to computational actors: the employer answers for the employee, the deployer answers for the deployed. The liability does not disappear; it relocates to the persistent party in the chain.
But principal chains have limits. When agents invoke other agents, the chain lengthens. When agents are deployed by other agents, the human principal becomes increasingly distant from the harmful act. When agents coordinate autonomously, in agent-to-agent transactions without human involvement, the chain may have no human at its end. The architecture we are building may create coordination in which no persistent party remains to answer.
Anticipatory liability. Rather than punishing after the fact, the system can require commitments before the fact. Stakes posted at deployment create consequences that operate even when the agent terminates. If the agent causes harm, the stake is forfeit, as a structural consequence built into the deployment. The agent need not persist for accountability; the stake persists in its place.
This is what collateral does in decentralized finance, what bonds do in traditional contracting, what deposits do in rental agreements. A principal deploying an autonomous trading agent posts a bond proportional to the agent's authority; if the agent causes harm, the bond is forfeit regardless of whether the agent still exists when the harm is discovered. The liability is pre-committed. But the mechanism requires knowing in advance what harms might occur. For novel harms, for consequences no one anticipated, the anticipatory mechanism provides no remedy.
Receipt persistence. If the agent cannot persist, its receipts can. Every action generates a trace that outlasts the actor. The transaction record, the verification attestation, the commitment log: these are what the Codex calls "fossils," the compressed records of brief lives that remain queryable in human time. The receipts do not make the agent accountable, but they make accountability possible by preserving the evidence human institutions require.
This is the minimum specification. Agents that terminate must leave traces that persist. Without receipts, orphan commitments vanish as if they never existed. With receipts, the fossil record survives the termination: contestable, enforceable, attributable to principal chains that can still answer.
The persistence assumption cannot be satisfied for agents. But it can be routed around. Principal chains extend accountability to persistent parties. Anticipatory stakes create consequences that operate without punishing. Receipt persistence preserves evidence for institutions that move slowly through a world of ephemeral actors.
These are workarounds, not solutions. They relocate accountability rather than generating it. They require design choices that the current legal system has not made and may resist making. Whether they suffice depends on whether the principal chains remain short enough, the stakes large enough, and the receipts comprehensive enough to provide meaningful constraint.
Agents cannot be held responsible. What matters is whether the systems that deploy them can be designed so that responsibility attaches somewhere—to principals, to stakes, to the persistent parties who remain when the ephemeral ones have gone.
The Principal-Agent Inversion
Classical economics worried about agents who shirk. Employees slack when the boss isn't watching; contractors cut corners when monitoring is weak. The solution was incentive design. Align the agent's interests with the principal's through compensation structures, monitoring systems, and performance metrics.
Computational agents create a different problem. The agent does not shirk; it executes precisely. But it executes according to parameters set in advance, and those parameters may not reflect what the principal wants when circumstances change.
A liquidation bot that seizes collateral when prices drop cannot be persuaded to wait. A trading algorithm that follows its rules cannot be asked to exercise judgment about whether this particular market movement is anomalous. An escrow contract that releases on verified conditions cannot be convinced that the verification was wrong. The agent has commitment power that the principal lacks—and that power cuts both ways. Classical economics worried about agents who shirk. The new problem is agents who cannot.
This is valuable when commitment is the goal. A borrower wants the lender to know that liquidation is automatic, because that credibility enables the loan. A seller wants the buyer to know that escrow will release only on verified delivery, because that credibility enables the transaction. Commitment devices are useful precisely because they cannot be overridden.
But commitment becomes a cage when circumstances change in ways the parameters did not anticipate. The principal cannot intervene even when intervention is warranted. The code executes whether the human has changed their mind or not.
The implications for exception-handling are stark. In traditional employment, an employee who encounters an unforeseen situation can exercise judgment. They can escalate to a supervisor, pause to clarify instructions, refuse to execute an order that seems wrong. The slack in the system allows for adaptation. Computational agents have no such slack.
In March 2020, as COVID panic crashed markets, MakerDAO's liquidation system executed flawlessly—and catastrophically. When ETH prices dropped 30% in hours, the protocol's liquidation bots triggered as designed. But network congestion prevented bidders from participating in collateral auctions. Liquidators won auctions with bids of zero DAI, acquiring ETH for nothing. The protocol lost over $8 million. No one defected. No one shirked. The commitment device worked exactly as specified—and that was the problem. The parameters assumed normal network conditions. The circumstances were not normal. The principal could not intervene because the whole point of the system was that intervention was impossible.
This creates a new category of governance failure. It is the correct execution of incorrect specifications. The agent performed flawlessly. The outcome was disastrous. No one defected. No one shirked. Yet the principal is harmed by the very commitment device they created.
The design challenge shifts accordingly. Classical principal-agent theory asked: "How do we align the agent's incentives with the principal's interests?" The theory developed monitoring mechanisms, incentive contracts, reputation systems, all aimed at preventing defection.
The new question is different. "How do we preserve human override when the agent cannot defect?" This requires designing exception channels, circuit breakers, governance mechanisms that can pause or modify execution when circumstances warrant. The human must remain as the judge of last resort, with the power to intervene when the formally specifiable rules produce formally correct but substantively wrong outcomes.
This inversion is the conceptual core of the Coasean Agent. It is a commitment device that inverts classical assumptions about shirking and monitoring. The risk is that the principal will be bound by commitments they no longer want to honor, and that this binding will be a trap.
Commitment without override is where domination hides. The agent cannot be reasoned with, cannot be persuaded, cannot exercise mercy. If the parameters are wrong, or if circumstances change in ways the parameters did not anticipate, the principal suffers the consequences of their own earlier choices, enforced by a system that cannot relent. This is the liberty question that Part III must address.
The Coasean Agent
The new economic actor that emerges from this landscape has a precise definition.
A Coasean Agent is a bounded policy executor that can commit collateral, produce and consume receipts, and clear routine coordination without human interpretation, pushing disputes into a narrower exception channel.
Think of it as a Firm in a File. It has a treasury (wallet), a charter (code), a policy (logic), but no physical location and no employees. It is a pure unit of economic coordination, stripped of the human substrate that traditional firms required.
The canonical flow moves from policy specification through escrow, verification, and settlement, with exception channels for what cannot be automatically resolved and recourse paths for appeal and remedy.
Examples already exist, though they are not usually recognized as organizational forms. Automated market makers hold assets, set prices algorithmically, execute trades, and distribute fees, all without human intervention in individual transactions. Uniswap alone has processed over $2 trillion in cumulative trading volume through smart contracts that employ no one. A traditional exchange requires employees: traders to match orders, compliance officers to monitor activity, settlement clerks to clear transactions. An automated market maker replaces these functions with code. The "firm" has shrunk to a smart contract.
Liquidation bots monitor collateralized positions and trigger liquidations when thresholds are breached. A traditional lender employs credit officers to monitor borrowers, collections staff to pursue defaults, lawyers to enforce claims. A DeFi lending protocol automates this entire chain. The borrower's collateral is visible on-chain. The liquidation threshold is specified in code. When the threshold is breached, the liquidation executes automatically. No employee makes a decision. No court issues an order. The enforcement is structural.
MEV searchers scan pending transactions for arbitrage opportunities, capturing price discrepancies across markets in milliseconds, Coasean Agents operating in the gaps of the financial system without human involvement in individual decisions.
The transaction loop can be automated wherever performance is verifiable. What cannot be automated is the judgment about what to verify, how to specify it, and what to do when verification fails. These remain human functions, the strategic core that persists as the routine periphery moves to agents.
What makes the agent "Coasean" is its effect on organizational boundaries. Activities that once required employment relationships, because the transaction costs of contracting were prohibitive, can now be performed through protocol-mediated transactions. The boundary shifts. The firm shrinks for routine operations while persisting for strategic coordination, exception-handling, and relationship management.
But the Coasean Agent does not make the firm obsolete. It changes what the firm is for.
What remains inside the firm is judgment: setting strategy in the face of uncertainty, handling exceptions when specifications fail, managing relationships that depend on flexibility, and applying tacit knowledge that cannot be codified. These are the costs that persist precisely because they resist formalization — the context-dependent, physically embedded, relationship-specific domains where transaction costs do not collapse. The Coasean Agent handles the formalizable periphery. The human organization handles the rest. The boundary between them is the new firm boundary, defined by what can be verified, specified, and enforced without human interpretation.
The New Firm Boundary
Where transaction costs collapse, organizational form follows. Activities that can be specified, monitored, and verified computationally move outside the firm. The boundary contracts around functions that require human judgment and long-term commitment. And new governance structures emerge: decentralized autonomous organizations, protocol treasuries, federated cooperatives, coordinating through protocols rather than hierarchy or price.
A DAO is not a corporation with a different legal wrapper. It is a fundamentally different governance structure. Membership is defined by token holding, not employment contracts. Decision-making happens through on-chain voting, not management hierarchy. Treasury disbursements execute automatically when proposals pass, not when executives approve. The "employees" are contributors who complete bounties, not workers who clock hours.
Whether DAOs will prove durable remains uncertain. Early experiments have revealed governance failures: low participation rates, plutocratic voting power, coordination problems in the absence of clear leadership. But the failures are informative. They reveal which transaction costs persist even when others collapse. Coordination still requires someone to propose. Evaluation still requires someone to judge quality. Strategy still requires someone to set direction. The DAO form works for narrow, well-specified coordination tasks. It struggles where discretion, adaptation, and long-term relationship management matter.
The gig economy is an early indicator. Before Uber, coordinating a fleet of drivers required a taxi company. The platform collapsed those costs: discovery became instant, negotiation algorithmic, monitoring automatic, enforcement structural. The same pattern appears in software development, where companies decompose work into tasks posted to global marketplaces and coordinated through version control and reputation systems.
But the gig economy also reveals the constitutional risk. Platforms lowered some transaction costs, then reintroduced them as dependence costs: lock-in, reputation non-portability, unilateral rule-change. The "firm boundary" did not vanish. It moved upward into the platform. Uber drivers are not employees, but they are not independent either. They cannot take their ratings to a competitor. They cannot negotiate their pay. They cannot appeal algorithmic deactivation to a neutral arbiter. The coordination improved; the domination persisted.
Workers gained flexibility but lost bargaining power. The Coasean logic explains why: when transaction costs drop, the gains flow to whoever controls the membrane. The platform owns the matching algorithm, the reputation data, the payment rails. It captures the surplus from coordination efficiency while passing the dependence costs to users. Path dependence and increasing returns lock participants into platforms through accumulated investment — data, reputation, relationships — that cannot be extracted.
When exit is fictional, lowered transaction costs become lowered resistance to domination.
This is the critical difference between platform coordination and protocol coordination. Platforms are private ordering without constitutional constraint, the Neo-Feudal Stack described in Chapter 2. The platform decides unilaterally which drivers to deactivate, which sellers to delist, which accounts to freeze. With no neutral arbiter and no appeal to an independent tribunal, the platform is judge, jury, and executioner in disputes where it is also a party. The transaction costs of coordination dropped. The transaction costs of exit (reputation loss, network abandonment, capability rebuilding) remained high. The result was dependence with a new master.
Protocols can be different. They can implement structural accountability: governance decisions that leave receipts, operators who face consequences for abuse, citizens who can verify what the system does and why. Exit can be real rather than nominal: portable credentials, interoperable protocols, reputation that travels. Vulnerability can be symmetric: the protocol as legible to users as users are to the protocol. Where agents operate with heterogeneous representations — different schemas, different ontologies, different evaluation criteria — the prior question is whether agreement is structurally possible at all. A protocol such as SHEAF could provide this diagnostic: determining whether heterogeneous agents can reach consistent agreement given their overlap structure and, when agreement is structurally impossible, producing a verifiable certificate that functions as a receipt in the sense this chapter requires.
A concrete case illustrates the difference. Consider two agents negotiating a supply contract: Agent A represents a manufacturer that defines "delivery" as shipment from the factory (FOB origin), while Agent B represents a retailer that defines "delivery" as receipt at the warehouse (FOB destination). A platform resolves this silently — it imposes one definition, and the party that disagrees discovers the discrepancy only when a dispute arises. A protocol with a semantic diagnostic surfaces the disagreement before the contract is signed: the overlap check on "delivery" fails, an impossibility certificate identifies the source of the disagreement (scope of the term, not the substance of the obligation), and the protocol prices the correction (adding a shared definition to the contract terms). The cost of the correction is the semantic analogue of the transaction cost: the price of making agreement possible across heterogeneous representations. Platforms hide this cost. Protocols make it visible. The MakerDAO liquidation crisis of March 2020, where the protocol executed correctly against specifications that did not match market reality, is what happens when semantic disagreement is hidden rather than surfaced.
But protocols can also replicate platform domination. A protocol controlled by a small number of token holders is plutocracy, not democracy. A protocol that cannot be forked because of network effects is as lock-in-prone as any platform. A protocol whose code is nominally open but practically unreadable to most users offers transparency without accountability.
Transaction costs are falling. Whether the new coordination mechanisms replicate platform domination or create genuinely accountable governance depends on design choices: how governance works, who can verify what, whether exit is real. The technology does not determine the outcome. The constitutional structure does.
Protocols are neither firms nor markets. They are commons: shared resources governed by collective rules rather than state command or market exchange. Elinor Ostrom's design principles for durable commons, explored in Chapter 3 and Chapter 11, describe the conditions under which such governance endures. (Ostrom 1990)Elinor Ostrom, Governing the Commons: The Evolution of Institutions for Collective Action (Cambridge: Cambridge University Press, 1990).View in bibliography The Protocol Republic is not a choice between market and state. It is the expansion of commons governance to domains previously reserved for firms or governments.
Consequence
Part II has traced a genealogy and identified a mechanism. Chapter 3 showed that private ordering is not speculation: for centuries, transnational commerce was governed by merchant courts, reputation systems, and collective enforcement. When computational agents enter this landscape, transaction costs collapse in the verifiable core while reappearing as verification, adversarial, and liability costs.
The principal-agent inversion is the genuinely novel development. Computational agents cannot shirk — they execute their code regardless of circumstance. The new design problem is preserving human override when the default is commitment. What changes is the texture of daily coordination: cheaper, faster, more granular. What must be preserved is the right to exit, contest, and shut it down.
This expansion of private ordering raises questions that economics cannot answer. What does freedom mean when your coordination partners are machines that cannot be persuaded? What does non-domination mean when protocol constraints are specified in advance and execute without discretion — not exercising will but executing logic? Who verifies the systems that govern us, and what happens when only the technically sophisticated can read the receipts? And who handles the penumbra — the contested edge where formal rules run out — when the systems themselves cannot exercise judgment?
Machines already coordinate us. Whether we can coordinate them back — whether liberty in the Protocol Republic means the right to inspect, contest, and exit the systems that constrain — is the constitutional question. It requires a different vocabulary.
Receipt Test: Service Procurement
A business needs to procure fifty hours of specialized software development: extend an API, write tests, document the changes.
Under traditional employment, it hires a full-time developer. Transaction costs are high (recruiting, onboarding, managing); receipts are employment contracts and performance reviews. Under traditional contracting, it hires a freelancer. Transaction costs are moderate (finding candidates, monitoring progress); receipts are invoices and legal recourse. Under protocol intermediation, the business posts the task to a marketplace where an agent matches specifications to contractors using reputation scores and verified credentials. A smart contract holds payment in escrow. Work proceeds in verifiable increments; payment releases when conditions are met. Receipts are on-chain: escrow records, verification attestations, reputation updates, arbitration paths.
The penumbra case: The tests pass. The documentation exists. But the code is poorly architected: technically correct, functionally inadequate. The specification said "extend the API"; it did not say "extend it well."
Under traditional contracting, this dispute goes to court or mediation. A judge or mediator examines the contract, hears arguments about what "extend the API" meant, and renders judgment. The process is slow, expensive, and uncertain, but it can handle the ambiguity.
Under protocol intermediation, the automated verification succeeds (the code meets the formal specification), but the principal is unsatisfied. The escrow releases because the verification conditions were met. The contractor receives payment. The principal has working code they don't want to use.
This is where the exception channel matters. The principal can escalate to bonded arbitration. The arbitrators review the evidence: the specification, the code, the test results, the commit history. They render judgment on whether the work meets the standard that reasonable parties would have expected. If they find for the principal, the contractor's reputation takes a hit; if the contractor staked a performance bond, it may be partially forfeited. If they find for the contractor, the dispute is closed.
The protocol does not eliminate judgment. It narrows the domain where judgment is required. The formally specifiable core (tests pass, documentation exists, milestones met) is handled automatically. The penumbra ("is this good work?") escalates to human arbitration. The arbitrators have a structured evidentiary record: the on-chain specification, the verified deliverables, the automated test results. They are not starting from scratch; they are adjudicating the gap between formal compliance and substantive satisfaction.
Critically, the dispute resolution process itself leaves receipts. The arbitration decision is recorded, the reasoning documented. Future parties can see how similar disputes were resolved. The exception channel builds precedent — a body of interpretive guidance that narrows the penumbra over time without eliminating it.