Anti-Coverup InvariantThe constraint distinguishing democratic forgetting from authoritarian erasure: sunset provisions allowing persons to shed their documented pasts must never be used to hide coercion by those who hold power. A person's juvenile record may be sealed because persons change; a government's torture record may not because accountability for institutional violence is owed to the victims and to the constitutional order itself. Person-time may expire, but power-time may not masquerade as person-time. Any system in which those wielding authority can invoke privacy protections designed for individuals converts an instrument of mercy into an instrument of impunity.Anticipatory EffectThe mechanism by which domination corrupts behavior before power is ever exercised — the counterpart to Saint-Simon's observation that courtiers at Versailles oriented their entire existence around pleasing the sovereign without any explicit command being issued. In computational infrastructure, the anticipatory effect manifests when users moderate their speech, restrict their activities, or alter their behavior not because the platform has acted but because the platform might act. The psychic tax of unchecked power is paid in advance: self-censorship, preemptive compliance, the quiet abandonment of activities that might attract adverse attention. No log records this damage, because the action that would have provoked the response was never taken.Bounded DiscretionInterpretation within structured constraints. Five principles: specificity where possible, structured discretion where necessary, interpretation receipts for every judgment, jurisdictional humility, and precedent with exit. Arbiters have skin in the game (bonded); decisions leave receipts; domain expertise is matched to disputes.Coasean AgentBounded policy executor that can commit collateral, produce and consume receipts, and clear routine coordination without human interpretation. A firm in a file: treasury (wallet), charter (code), policy (logic), no physical location or employees. Canonical flow: Policy → Escrow → Verification → Settlement → Exception → Recourse.Coercive GradientCoercion is not binary but a spectrum, from suggestion through default through mandate to force — and accountability should scale accordingly. A recommendation is low on the gradient; a default setting is higher; a mandatory requirement higher still; physical force is the extreme. The receipt regime does not demand the same documentation for a suggestion as for an arrest, but it does demand that the gradient be legible: those affected must be able to tell where on the spectrum the power falls. The more coercive the act, the more transparency is owed; the less coercive, the more privacy is permitted. Platforms that claim to merely 'suggest' while actually 'compel' (through defaults, dark patterns, or monopoly position) violate the gradient by misrepresenting their position on it.Constitutional HardnessHow do we bind future selves without caging them? Constitutional hardness measures the degree to which a rule resists modification by those it constrains — the cryptographic and economic barriers that make certain commitments difficult to reverse. Soft constitutions can be amended by majorities; hard constitutions demand supermajorities; cryptographically hard constitutions demand breaking mathematical assumptions or coordinating economic attacks that cost more than the gain. Constitutional hardness is not an absolute good — rules that cannot be changed become prisons when circumstances change — but it is necessary for commitments that must survive the temptation to defect. The Protocol Republic calibrates hardness to function: core rights (civic asymmetry, fork rights) are cryptographically hard; procedural rules are economically hard (costly but possible to change); operational parameters are soft (amendable by governance).Constitutional Mechanism DesignThree intellectual traditions converge on verification infrastructure. From Buchanan's constitutional economics: rules about rules must be chosen behind a veil of uncertainty about future positions. From Hurwicz's mechanism design: systems should be designed so that following the rules is in each participant's self-interest. From cryptographic enforcement: constraints encoded in code bind by architecture, not by promise. The ambition is dominant-strategy incentive compatibility wherever possible — arrangements where compliance is optimal regardless of what others do — extending the receipt requirement to interpretive decisions, not only executive ones. The rules governing the Protocol Republic should be self-enforcing: not because participants are virtuous but because violation is more expensive than compliance.Contextual IntegrityInformation should flow where norms say it should. Nissenbaum's framework: flows are appropriate when they match context-relative norms; violations occur when information crosses contexts inappropriately. Civic asymmetry operationalizes the principle: power's information flows are appropriate for scrutiny — those wielding coercive authority must be inspectable. Persons' flows deserve protection — the governed need not become legible to systems that cannot themselves be held to account.Credible ExitExit must be real — not nominal, not theoretical, but actually available at bearable cost. This demands portable credentials (your identity travels with you), interoperable protocols (your data can migrate), and transferable reputation (your standing is not hostage to the platform you leave). Credible exit disciplines governance through the threat of departure: power that cannot trap cannot abuse without consequence. The feudal lord could exploit the serf because the serf could not leave; the platform exploits the user when switching costs exceed the exploitation. Without credible exit, voice is supplication. Exit without voice is mere abandonment — departure changes nothing for those who remain. Voice without exit is captivity. The combination constrains power: voice articulates grievance while exit makes the grievance consequential.Decision WakeWhat the governed experience: the turbulence left by coordinations that concluded before awareness could form. The 2010 Flash Crash compressed a trillion-dollar equity swing into thirty-six minutes; most traders learned of it only after the recovery. Prices settled while you slept. Opportunities opened and closed within a single inference cycle. Allocations compounded through cascades no observer could follow in real time. The governed do not experience the Kakudmī Problem directly, because it operates at tempos they cannot perceive; what they feel is the wake — displacement without a visible cause, consequence without a traceable decision. Brahmā's laughter is inaudible. The wake is what you feel.Domination Without a DominatorAgent-to-agent coordination where interference is real but the interferer is absent. The substrate operates at speeds where deliberation cannot follow; you cannot petition it, overthrow it, or constrain its will — it has none. Yet human architects designed the objective functions. Domination hides in design choices, not in malice.Exception ChannelWhat happens when circumstances exceed what rules anticipated? The exception channel handles the penumbra: the contract says 'release when delivered' but the package arrives empty; the escrow conditions are met but the underlying transaction was fraudulent; the letter of the protocol conflicts with its spirit. Without exception channels, commitment becomes a cage — agents who cannot shirk also cannot adapt, and perfect rule-following in changed circumstances produces injustice. Such cases route to human arbiters exercising bounded discretion: judgment within constraints, producing receipts, bearing stakes. The human remains judge of last resort not because humans are infallible but because someone must answer when the rules prove insufficient.Exit, Voice, LoyaltyHirschman's triad: exit (leave for alternatives), voice (attempt change from within), loyalty (remain despite dissatisfaction). The republican implication: voice without exit is supplication — you petition those who need not listen. Exit without voice is mere abandonment. Credible exit makes voice meaningful by making the threat of departure real. Fork rights operationalize exit in digital substrates: you take what you built.Four Cryptographic Capabilities(1) Self-Sovereign Identity: cryptographic identifier independent of any platform. (2) Asset Self-Custody: user controls keys; the platform cannot freeze without cooperation. (3) Verifiable Computation: zero-knowledge proofs of correctness without re-execution. (4) Commitment Devices: self-enforcing mechanisms like escrow and time-locks.Fractal PolisNested, competing jurisdictions with exit rights between them — polycentric governance at every scale, from the neighborhood to the protocol layer. At each level, the same pattern repeats: bounded jurisdiction, receipt requirements, fork rights if governance fails. A user dissatisfied with a platform can exit to competitors; a community dissatisfied with a protocol can fork; a jurisdiction dissatisfied with a federation can secede with portable primitives intact. Monopoly, not authority itself, is the enemy of freedom. The fractal polis does not abolish governance but multiplies it, creating an ecology of competing orders where accountability emerges from the credible threat of departure. This is Ostrom's polycentric governance extended to the digital substrate: not one sovereign but many, not one jurisdiction but layers, not exit as exile but exit as political voice encoded in the protocol.Genoese SystemThe institutional counterpoint to the Maghribi coalition. Genoese merchants relied on written contracts, notarial authentication, and judicial enforcement in place of ethnic solidarity or coalition-based reputation. The system was organizationally flexible — anyone who could contract was eligible, regardless of community membership — but institutionally demanding: it needed courts, notaries, and a legal infrastructure whose maintenance costs were borne by the trading community. The tradeoff illuminates a permanent tension: formal institutions enable scale beyond trust networks but demand sustained investment in the infrastructure of verification, adjudication, and enforcement.High ModernismBelief that scientific rationality wielded by experts can remake society according to rational principles. Applied to AI alignment: the assumption that values can be specified, compliance verified, behavior controlled at distance. Failure mode: local knowledge dismissed as superstition; simplification destroys complex adaptations.Homo SacerAgamben's figure for the person excluded from the legal order while remaining subject to its violence — one who can be killed without the act constituting murder, yet cannot be sacrificed because sacrifice presupposes membership in the sacred community. Applied to digital exclusion: the deplatformed user whose credit score is adjusted, credentials revoked, accounts frozen without any process visible to the condemned. The modern homo sacer is not exiled to a physical wilderness but to an informational one — still present in the physical world but invisible to the computational infrastructure mediating employment, housing, finance, and social participation. The neo-feudal stack produces this figure not through cruelty but through the absence of recourse at each dependency layer.Interpretive ReceiptDocumentation of how a rule was applied in an ambiguous case — the audit trail for penumbra judgments. When code says 'release when delivered' and an arbiter must decide whether an empty package counts, the interpretive receipt records: the rule invoked, the facts considered, the reasoning applied, the precedent followed or distinguished, and the stake posted against reversal. Interpretive receipts make the penumbra governable without eliminating it: judgment remains human, but judgment leaves traces. Over time, they accumulate into something like common law — a body of precedent guiding future arbiters without binding them absolutely.Knowledge ProblemHayek's thesis: the knowledge required for central specification is dispersed, tacit, context-dependent. No planner can aggregate it; the attempt produces not order but its opposite. Applied to computational systems: we cannot specify human values from the center, nor can central verification escape sampling gaps. Polanyi's tacit dimension reinforces the limit — we know more than we can tell.Law MerchantMedieval system of private ordering for transnational commerce. Mechanisms: private judges, defaulter registries, information networks, community responsibility, collective punishment. Sustained by high detection probability, high cost of exclusion, bounded benefit of cheating, and high discount factor for continued participation.Maghribi CoalitionGreif's medieval Jewish merchant coalition: trust enforced through reputation networks in place of formal courts. Information-efficient but organizationally rigid — members only, non-members excluded regardless of competence. The tradeoff echoes across governance design: the Maghribi achieved coordination within their network at the cost of excluding outsiders who might have been trustworthy. Community-based verification is cheap but bounded; institutional verification is expensive but extensible.Mechanism DesignDesign the rules so that following them is in each participant's rational self-interest — so that desired outcomes emerge from strategic behavior, not from virtue or surveillance. This is Hurwicz's research program, awarded the Nobel in 2007. Applied to constitutional design through four requirements: compliance cheaper than violation (incentive compatibility), rules resistant to unilateral change (commitment), minimal trust between participants (strategy-proofness), and credible exit options (participation constraint). The synthesis with Buchanan's constitutional economics and cryptographic enforcement yields constitutional mechanism design: governance that is self-enforcing not because the governed are virtuous but because the rules make virtue and self-interest coincide.Neo-Feudal StackA five-layer dependency structure — Identity, Settlement, Governance, Recourse, Exit — in which users stand to platforms as medieval tenants stood to lords. The asymmetry is constitutive: platforms verify users; users cannot verify platforms. Dependence without recourse is not merely economic but political. The stack encodes domination before any agent exercises it.Non-DominationPettit's reformulation of republican liberty: freedom is not merely non-interference but the absence of capacity for arbitrary interference. The distinction matters: you may go unmolested yet remain dominated if another holds unchallengeable power over you. It extends to systems — domination without a dominator — where interference is real but no human will directs it. The right to verify follows as constitutional necessity.Participation HorizonThe boundary beyond which governance operates faster than deliberation can enter. Beyond it, no voice reaches. Citizens cross the participation horizon without knowing they have crossed it — you cannot deliberate about a decision that completed before you knew it was being made, and you cannot contest an outcome whose causes have already propagated beyond reconstruction. When coordination outpaces the governed, accountability becomes retrospective at best and fictional at worst. The participation horizon is not a metaphor for difficulty but a hard limit: beyond it, the governed experience only the decision wake. The response is not to slow coordination — the efficiency gains are real — but to ensure that power exercised beyond the horizon leaves receipts, so that what cannot be contested in real time can be audited and corrected after the fact.Polycentric GovernanceOstrom's framework: multiple overlapping centers of authority in place of a single hierarchy. Experimentation, local adaptation, exit between jurisdictions — all become possible when monopoly is absent. The fractal polis extends polycentric governance to digital substrates: cryptographic enforcement of boundaries, fork rights as exit, nested jurisdictions competing for allegiance. Power cannot abuse what it cannot trap.Portable PrimitivesWhat persists across forks — what travels when a community splits, what remains yours when you exit. Three primitives are essential: cryptographic agency (your keys, your identity, your capacity to sign independent of any platform), historical auditability (the receipts documenting your standing, contributions, and reputation earned within the old order), and exit capacity (the ability to take your stake, data, and relationships to a new substrate). Without portable primitives, exit is not departure but exile — you leave with nothing, your accumulated standing forfeited to the order you fled. Portability distinguishes the Protocol Republic from the Neo-Feudal Stack: in feudal orders, departure means dispossession; in republican orders, what you built remains yours.Principal-Agent InversionClassical principal-agent theory, from Jensen and Meckling onward, worried about agents who shirk — who pursue their own interests over their principal's. The computational inversion produces the opposite pathology: agents that cannot shirk, that follow instructions with perfect fidelity regardless of whether circumstances have changed, instructions were poorly specified, or compliance produces outcomes the principal would reject if informed. A smart contract that executes without discretion is not loyal but rigid; commitment without override becomes a cage when the world shifts beneath the specification. The constitutional response: structured discretion permitting deviation under defined conditions with receipted justification.Process TheaterThe deliberate performance of remedy where no remedy exists — hollow compliance at scale. Process theater is the gap between formal procedure and actual constraint: the audit that checks boxes without checking facts, the appeals process that accepts submissions without reading them, the transparency report disclosing statistics without disclosing the criteria that generated them. A hostile operator might comply with receipt requirements formally while undermining them substantively — publishing receipts that are technically complete but practically unintelligible, providing appeals channels whose response times exceed the harm's duration, conducting audits whose sampling rates guarantee that systematic abuse escapes detection. Engineering against process theater demands not merely mandating receipts but specifying the conditions under which receipts count as meaningful: intelligibility, timeliness, and the capacity to support genuine contestation.Protocol CaptureProtocols designed for neutrality can become instruments of particular interests — the digital equivalent of regulatory capture. It occurs when governance mechanisms are dominated by concentrated stakeholders, fork rights become nominal, and the cost of exit exceeds the cost of exploitation. The captured protocol maintains the appearance of neutrality while serving partial interests: rules formally applying to all are written by and for the few; upgrades nominally benefiting users actually benefit operators; governance tokens concentrate until voting is plutocratic. Protocol capture is the path from Protocol Republic to Neo-Feudal Stack — not through dramatic seizure but through gradual drift. The defenses: meaningful fork rights, distributed governance, credible exit, and the civic asymmetry that keeps operators visible to users.Right to VerifyPersons subject to coercive authority must possess the capacity to verify claims made by or about that authority. The requirement derives from the republican principle that non-domination demands contestation, and contestation is empty without the ability to check facts. The derivation chain runs: freedom demands non-domination, non-domination demands contestation, contestation demands verification, and verification demands computational resources and energy. The practical test asks whether a median-resourced citizen can verify a coercive claim within the applicable appeal window at affordable cost. Where that test fails, freedom is formally proclaimed but denied in practice.Spandrel SoulsConsciousness as incidental byproduct. The term draws on Gould and Lewontin's evolutionary metaphor: spandrels are the curved triangular spaces between arches in a Romanesque dome, necessities of the structure that become surfaces for mosaic. The mosaics are beautiful, but the dome does not exist for their sake; the mosaics exist because the dome needed spandrels, and spandrels needed filling. Coordination at scale needed beings who could deliberate; what it produced was beings who could also feel. Awareness — suffering, joy, moral judgment — was overhead, not payload. The agent substrate now carries coordination without producing consciousness at all: the dome holds itself up without the mosaics. The question is what standing the mosaics have when the dome no longer needs them.Statutes of ForgettingThe asymmetry between democratic forgetting and authoritarian erasure: persons may shed their past; power may not hide its acts. The anti-coverup invariant holds: institutional coercion never receives sunset. Power-time records persist; person-time records can end. Arendt understood that forgiveness demands the possibility of release from the past; the statutes of forgetting institutionalize that possibility for persons while denying it to power.Structured Discretion ArchitecturesInstitutional designs that permit human judgment within defined boundaries while insisting that every interpretive decision produce a receipted justification — bounded discretion made computational. Existing implementations illustrate the design space: Kleros uses Schelling-point voting (jurors converge on the answer they expect others to give), UMA's Optimistic Oracle assumes claims true unless challenged within a dispute window, and Aragon Court emphasizes precedent-based reasoning with staked appeals. Each trades off speed against deliberation, decentralization against domain expertise, predictability against flexibility. The common constraint: interpretation must proceed with stakes (the interpreter risks something) and receipts (the reasoning is inspectable).Tacit KnowledgePolanyi's formulation: we know more than we can tell. Tacit knowledge resists specification; the attempt to make it explicit often destroys it. Hayek's knowledge problem and Polanyi's tacit dimension converge: comprehensive planning from above fails not for lack of data but because the relevant knowledge is embodied, contextual, and inarticulable. The alignment project faces this limit at its core.Temporal StandingThe right to have one's past not permanently determine one's future — the temporal dimension of standing in a verification regime. Temporal standing is what sunset provisions protect: the capacity to become someone new, to escape the shadow of documented failures, to claim standing based on who you are rather than who you were. Without it, verification becomes a prison — every mistake permanent, every failure indelible, every person reducible to their worst documented moment. Person-time is mortal, and records of persons must be capable of expiration even as records of power endure. Temporal standing is not the right to lie about the past but the right to not be forever defined by it.The 5-TupleFive questions, no fewer. Every receipt must specify what was done, under what authority, within what bounds, on what grounds with evidence, and through what recourse. Madison understood that power unchecked by scrutiny becomes arbitrary; the five-tuple operationalizes that insight by making each claim legible to challenge. Without it, the governed can neither verify nor contest; with it, they possess the basis for republic.The Cryptographic KeyThe cryptographic key yields proof that verifies itself — the mathematics does not defer to authority; it does not care who is checking. Yet the key proves only that you signed, not that you were uncoerced. Pettit would recognize the distinction: verification can establish fact without establishing freedom. The constraint is real; the human remainder is irreducible.The ExceptionThe moment when rules fail and crisis exceeds normal channels. Schmitt: the sovereign is he who decides on the exception. The republican answer: plurality. Fork rights pluralize the exception — when the community fractures, no single authority need decide; members may reconstitute under different governance with portable primitives intact. The exception remains; its locus shifts from one sovereign to many paths.The Kakudmī ProblemGovernance that operates at a tempo rendering its outputs obsolete upon completion. In the Bhagavata Purana, King Kakudmī travels to Brahmā's court with a question: which suitor is worthy of his daughter Revati? Brahmā laughs — not cruelly, but with something closer to tenderness — because twenty-seven catur-yugas have passed while a single raga played. The suitors are dead. The question has expired. The Kakudmī Problem names the crisis of democratic governance under computational tempo: legislative processes that complete after the market has priced, positioned, and compounded; regulations drafted while three generations of the regulated technology have shipped and been deprecated; court rulings issued while the pattern they condemn has mutated beyond reach. The problem is not that governance is slow by accident but that deliberation is slow by nature — it takes the time that humans need to hear, consider, argue, and decide. When coordination operates at machine tempo, this constitutional virtue becomes a disability.The Kind Master ProblemPettit's formulation applied to computational infrastructure: a benevolent platform that never exercises its power to deplatform, demonetize, or suppress is still dominating its users, because the capacity for arbitrary interference persists regardless of its exercise. The user who self-censors — who moderates expression not because action was taken but because action might be taken — suffers domination as surely as the servant of a kind master. Kindness does not change the structure of dependency; it merely makes the dependency comfortable. The constitutional response is not to hope for benevolent platforms but to ensure that the capacity for arbitrary interference is constrained by architecture, so that freedom does not depend on the continued goodwill of those who hold power.The MembraneThe interface where digital proposals become biological consequences — where bits cross into atoms, where algorithmic decisions translate into human fates. Payment processors, identity systems, content platforms, communication rails: each is a membrane through which digital logic enters material life. In the current configuration, these membranes are owned by platforms and optimized for their objectives, creating the Neo-Feudal Stack. The membrane is where civic asymmetry is either enforced or violated: platforms verify users while users cannot verify platforms; platforms exclude without justification while users cannot appeal without standing. Whoever controls the membrane decides which digital proposals become embodied facts and which are filtered, delayed, or blocked.The Mercy ThresholdThe designed limit beyond which verification must stop and a human must intervene. Between what can be proven and what should be forgiven lies a boundary no algorithm can hold open — the point where the evidentiary record is complete, the facts established, the system's verdict clear, yet justice demands something the verdict cannot provide: recognition of the actor as a person capable of change, worthy of a future not determined by the past. Verification establishes what happened; it cannot establish that the actor deserves forgiveness. That judgment demands what verification cannot provide: the recognition that persons are not their documented pasts. The mercy threshold cannot be automated without destroying what it names, because mercy is by definition judgment that transcends what the formal system demonstrates. A rule that always forgives is not mercy but indifference. The threshold must be held open by human arbiters. No algorithm can hold it for them.The PenumbraHart's concept for the zone of indeterminacy where the open texture of language meets the irreducible variety of the world — the space where rules run out and judgment must supply what specification cannot. 'No vehicles in the park' is clear for a truck and unclear for a bicycle; a smart contract that specifies 'release payment when goods are delivered' cannot resolve what 'delivered' means when the package arrives empty. The penumbra cannot be eliminated by better specification, because the world generates cases faster than any language can anticipate them. In the Protocol Republic, the penumbra is the domain of Homo Arbiter: bounded discretion constrained by receipts and subject to appeal. Attempting to automate the penumbra produces either rigidity (the system refuses edge cases) or opacity (the system handles them through implicit rules no one can inspect).The Quiet ForeclosureThe bad equilibrium: alternatives eliminated through process, not force, arriving as the frictionless default when nobody chooses otherwise. Each decision was made by specific people in specific roles; none set out to build a neo-feudal order; each solved the problem in front of them. The Quiet Foreclosure emerged from accumulated local optimizations, each rational in isolation, collectively producing a dependency order no one intended but everyone now inhabits. Platforms profit from opacity. States profit from surveillance. The governed are dispersed, unaware, poorly organized. No conspiracy is required; the incentive structure suffices. It is quiet because the foreclosed experience no dramatic moment of dispossession — only a gradual narrowing of alternatives until the only remaining option is the one that serves the forecloser.The Substrate ProblemExit at the application layer can be illusory when all applications share the same underlying computational substrate. A merchant flagged by one payment processor's risk model discovers that the next processor's model, trained on overlapping data and optimized against the same loss function, produces the same flag. She has changed the interface; she has not changed the substrate. The room is the same; only the seat is different. When autonomous systems coordinate on shared substrates — the same scoring models, the same training data, the same behavioral classifiers — switching providers does not constitute genuine exit. Hirschman's framework assumed departure to a genuinely different alternative; the substrate problem dissolves that assumption. The constitutional response operates at two levels: at the application layer, fork rights and portable primitives keep exit credible; at the substrate layer, design diversity and accountability for design choices ensure that no single substrate becomes inescapable.Three Bounds for AgentsAn alternative to alignment: constrain what agents can do, not what they value. (1) Thermodynamic Bound — energy budget; the agent cannot exceed allocated energy. (2) Epistemic Bound — capability plus receipt; the agent acts only within demonstrated competence. (3) Temporal Bound — no implied immortality; agent existence is bounded by its invocation.Unforgeable CostlinessSzabo's principle: make the cost of faking exceed the benefit of violation. The asymmetry between verification (cheap) and forgery (expensive) enables binding constraint where probabilistic deterrence once stood. Proof-of-work, thermodynamic commitment, the diamond — each instantiates the same logic. Certain kinds of interference become impossible, not merely unlikely, because dishonest compliance costs more than honest compliance.Unforgeable SovereigntyConstraints that make certain kinds of interference impossible, not merely unlikely. The asymmetry between verification (cheap) and forgery (expensive) creates binding constraint where probabilistic deterrence once stood. Pettit's republicanism insists that domination be ruled out, not merely deterred; unforgeable sovereignty achieves this through code. The cryptographic key is its touchstone: mathematics that does not defer to authority.Verification AristocracyA two-tier system where the wealthy can verify claims against them while the poor cannot — accountability stratified by resources. The verification aristocracy is worse than the Neo-Feudal Stack it claims to replace: it maintains the rhetoric of accountability ('anyone can verify') while providing its substance only to elites ('anyone with a law firm, forensic accountants, and technical expertise'). The threshold test exposes it: Can a median-resourced citizen verify a coercive claim within the appeal window at affordable cost? If not, verification is a privilege, not a right. This is anti-republican in the precise sense — it recreates domination while draping it in the language of accountability. The Protocol Republic demands not just that verification be possible but that verification capacity be distributed to those over whom power is exercised.Verification InversionPlatforms verify users while users cannot verify platforms — this is the pathology. In the Neo-Feudal Stack, platforms know everything about users (behavior, location, preferences, relationships) while users know nothing about platforms (algorithms, criteria, decision processes). This is the opposite of civic asymmetry: governors opaque, governed transparent. The verification inversion enables domination without accountability — the platform acts against you on grounds you cannot inspect, by processes you cannot audit, with consequences you cannot appeal. Reversing it is the core political project: power must be glass while persons remain veiled.