Plurality English
Plurality English
1
Contents
Endorsements 6
Section 1: Preface 15
1 Seeing Plural . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Section 2: Introduction 17
2-0 Information Technology and Democracy: a Widening Gulf . 17
2-1 A View From Yushan . . . . . . . . . . . . . . . . . . . . . 49
2-2 The Life of a Digital Democracy . . . . . . . . . . . . . . . . 62
Section 3: Plurality 81
3-0 What is ⿻? . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
3-1 Living in a ⿻ World . . . . . . . . . . . . . . . . . . . . . . 85
3-2 Connected Society . . . . . . . . . . . . . . . . . . . . . . . 98
3-3 The Lost Dao . . . . . . . . . . . . . . . . . . . . . . . . . . 114
2
Section 6: Impact 327
6-0 From ⿻ to Reality . . . . . . . . . . . . . . . . . . . . . . . 327
6-1 Workplace . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
6-2 Health . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
6-3 Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365
6-4 Environment . . . . . . . . . . . . . . . . . . . . . . . . . . 373
6-5 Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
3
This book is open-source and its contents may be freely copied, with or
without attribution. In addition to the primary named authors, dozens
of members of the ⿻ community around the world contributed to the
book, doing most of the total work. These contributors are listed on the
next page and represented in this machine-generated blending of their
faces, tiled by their individual faces. The free online version of this book
at https://www.plurality.net/ will continue to evolve, governed according
to the principles described in this book by this community.
Credits
4
Coming soon after the finalization of the English print edition text.
5
Endorsements
In the vast, boundless expanse of Plurality, each life is a unique and pre-
cious existence…Regardless of how perilous external circumstances may
be…(l)et us take positive action to allow the seeds of shared goodness to
break through the earth and blossom into flowers of empathy, joy and
harmony.
6
— Danielle S. Allen, political philosopher, James Bryan Conant University
Professor at Harvard, MacArthur Fellow, and author of Our Declaration
and Cuz
Plurality reads like optimistic sci-fi, already happening in real life! Can
democracies around the world follow in Taiwan’s footsteps to upgrade
free society for the digital age? Fingers crossed for a happy ending.
With wit, erudition and optimism, Audrey Tang and her collaborators ar-
gue that we can harness digital technology to confront authoritarianism,
and that we can do so by leaning into, rather than shying away from, the
principles of an open society.
— Anne Applebaum, winner of the Pulitzer Prize and author of The Twi-
light of Democracy and Red Famine
Glen and Audrey lead a team offering a master class in how to harness
advanced computation to augment rather than replace human social and
economic systems, simultaneously showing and telling us how digital
technology can make the world dramatically more cooperative and
productive.
7
Mathematics, and named by Science as the most influential computer sci-
entist in the world in 2016.
What would the world be like if our dearest dreams in the social
justice…movement had come to pass? (They) offer radical yet prag-
matic solutions to…reinventing democracy…(to) truly serve the
people…Some…have …been implemented, serving as a beacon …to
make real change.
— Stav Shaffir, leader of the Israeli Social Justice protests that inspired
“Occupy” and youngest woman Member of the Knesset
For too long, diversity and technology have been used as swords by the
forces of secularization. Remarkably, in the skilled hands of these au-
thors, they are here reforged into a shield for the faithful.
8
former member of the United States Commission on International Reli-
gious Freedom and informal advisor to Fmr. US President Donald Trump
— Claudia López Hernández, former Mayor and first woman mayor of Bo-
gotá, Colombia and highest ever LGBT elected official in the Global South
Audrey Tang and Glen Weyl’s project will be effective and meaningful in
helping Taiwan (and other countries) move in the direction of a new social
democracy.
I find it exhilarating to read the rules to new games and imagine the world
that they build; I get that excitement here, but the game is global affairs
9
and the way communities work together. Fantastic!
— Jaron Lanier, inventor of Virtual Reality, author of Who Owns the Fu-
ture? and The Dawn of the New Everything and Microsoft’s Office of the
Chief Technology Officer Prime Unifying Scientist (OCTOPUS)
At last, we have a book that centers plurality – both in theory and in prac-
tice. This is a much-needed guide for developing new strategies to navi-
gate the relationship between technology and democracy, and for think-
ing beyond the usual Western frame.
Read the first chapters on the and can’t recommend it enough. I used
to be an avid reader, but now I’m usually bored w books; however, this
one grabbed my attention again. It’s super necessary so we don’t have
this apocalyptic macho idea of the future. It’s in our hands, btw.
10
(P)opulists globally use technology to divide nations…Plurality invites a
new journey where we can indeed use technology to reclaim that space in
world of canceling to become more connected, and bring back our sense
of humanity, UBUNTU as we say in Africa.
Here in lucid and non-technical prose is a sweeping vision for how to in-
tegrate so much of what we’ve learned about technology and society in
the past decades to remake the future of democracy, from someone who
is actually doing it on the ground.
— Alex “Sandy” Pentland, Inaugural Academic Head of the MIT Media Lab
and founding father of Computational Social Science and Data Science
(A) remarkable book which provides accessible, deep and novel insights
into the way in which technology has, is, will and should shape our lives.
It draws on a wealth of evidence to provide a powerful case in favour of
promoting plurality…It holds important lessons for all of us.
11
approach this challenge not simply in … politics…but also offer valuable
insights on…technology, economics, and beyond.
In an era of anxiety and division, Glen Weyl and Audrey Tang provide a
rare, grounded vision for how technology and democracy can harmonize,
and propel us to a better future.
(T)his book…places Taiwan at the center of the world. Will it be the ful-
crum of conflict or…apex of a…democratizing revolution of peace, hu-
manity, and technology? This is our century’s question. Tang, Weyl, and
their collaborators have written a guide to finding the answer.
12
It is a delight to finally see a vision for the future of human progress so
clearly grounded in its past. With Plurality, we have a framework for
building the engines that harness the abundant energy latent in human
diversity to power the next hundred years of economic growth.
13
Army
14
Section 1: Preface
1 Seeing Plural
“In order to carry out a positive action we must develop here
a positive vision… It is under the greatest adversity that there
exists the greatest potential for doing good, both for oneself
and others.” — Dalai Lama XIV
The advent of the internet unfurled the world. Beginning in the 1960s, this
new technology created unprecedented possibilities to tie distant commu-
nities together across space and time. Knowledge transcended borders,
spreading instantaneously across languages and cultures.
15
Every culture, akin to a river, tells its own tale. We see the river of democ-
racy as a conduit of hope. As its waters wane, we must replenish it.
This book, a surging communal effort, is one attempt to restore the flow
– and with it, hope.
7.
16
Section 2: Introduction
“We are being lied to…told that technology takes our jobs, re-
duces our wages, increases inequality, threatens our health,
ruins the environment, degrades our society, corrupts our chil-
dren, impairs our humanity, threatens our future, and is ever
on the verge of ruining everything.” — Marc Andreessen, “The
Techno-Optimist Manifesto”3 , 2023
17
tralized top-down control and turbo-charged atomized polarization and
financial capitalism. Both outcomes are corrosive to the values of demo-
cratic pluralism. It is little surprise, then, that technology is widely seen
as one of the greatest threats to democracy and as a powerful tool for both
external authoritarians and those who would subvert democracies from
within.
In this book, we hope to show that this tragic conflict is avoidable and that,
properly conceived, technology and democracy can be powerful and nat-
ural allies. However, it is no accident that arguments in this direction
evoke eye-rolling in many quarters. A gulf of grievance and distrust be-
tween the two sides of this divide has developed over the last decade and
will not easily be laid to rest. Only by fully acknowledging and embracing
the legitimate concerns and critiques of both sides of this conflict shall
we have a chance to see its root cause and seek to transcend it. Thus, we
begin by drawing out these grievances with a generous spirit, accepting
critiques that have raised broad concerns even when they are imperfectly
supported by the available evidence. Trying to reconcile these extreme di-
vergences offers an opportunity to raise the ambition of democratic tech-
nology.
18
Technology’s attack on democracy
The last decade of information technology has threatened democracy in
two related yet opposite ways. As Daron Acemoglu and James A. Robinson
famously argued, free democratic societies exist in a “narrow corridor”
between social collapse and authoritarianism4 . From both sides, infor-
mation technologies seem to be narrowing the corridor, squeezing the
possibility of a free society.
On the one hand, technologies (e.g., social media, cryptography and some
other financial technology) are seen to be breaking down the social fabric,
heightening polarization, eroding norms, undermining law enforcement
and accelerating the speed and expanding the reach of financial markets
to the point where they are unaccountable to democratic polities. We
shall call these threats “anti-social”. On the other hand, technologies (e.g.,
machine learning, foundation models, the internet of things) are increas-
ing the capacity for centralized surveillance, the ability of small groups
of engineers to set patterns in systems that shape the rules of social life
for billions of citizens and customers and reduce the scope for people to
meaningfully participate in shaping their lives and communities. We will
call these threats “centralizing”. Both threats strike at the heart of democ-
racy, which, as Alexis de Tocqueville famously highlighted in Democracy
in America, depends on deep and diverse, non-market, decentralized so-
cial and civil connections to thrive5 .
The antisocial threat from recent technologies has social, economic, legal,
political, and existential faces.
19
• Economically, the geographic, temporal and multiemployer flexibil-
ity facilitated by the internet and increasingly by telecommuting
have expanded opportunities for many workers in developing
countries or who fit poorly in traditional labor markets. Yet they
have largely been unmatched by the emergence of appropriate
labor market institutions (such as unions and labor regulations)
that allow workers to share in the potential benefits of these ar-
rangements. Thus, they have tended to raise workplace precarity
and contribute to the “hollowing-out” of the middle class in many
developed countries7 .
20
regulatory regimes intended to mitigate these harms9 . While
innovations surrounding housing finance leading up to the 2008
financial crisis were some of the most important examples, perhaps
the most extreme (if more contained) case has been the recent
activity around digital “crypto” assets and currencies. Given their
mismatch for existing regulatory regimes, they have offered perva-
sive opportunities for speculation, gambling, fraud, regulatory and
tax evasion, and other anti-social activities10 .
21
of information. This has dramatically eroded the sphere of private
life, making an increasing range of information publicly available.
While such transparency might in principle have a range of social ef-
fects, the power to process and make sense of such information has
increasingly concentrated in the hands of corporations and firms
that have a combination of privileged access to the information and
the capital to invest in large scale statistical models (viz. “AI”) to
make these data actionable. Furthermore, because these models im-
prove greatly with access to more data and capital, societies where
central actors have access to very large pools of both have tended
to pull ahead in the perceived “AI race”, putting pressure on all so-
cieties to allow such concentration of informational power to com-
pete12 . Together, these forces have normalized unprecedented sys-
tems of surveillance and centralized control over information flow.
22
atheist, highly educated, etc.). This has challenged the core tenets of
democratic legal regimes that aim to represent the will of the broad
society they govern13 .
23
tal income and market power and the increasing authority of small
groups of engineers have made it easier for authoritarian regimes to
manipulate or seize the “commanding heights” of the economy and
society when they wish16 .
24
Democracies’ hostility to technology
Yet the hostilities have been far from one-sided. Democracies have, by
and large, returned this hostility, viewing technology increasingly as a
monolithic. Where once the public sector in democratic countries was
the global driving force behind the development of information technol-
ogy (e.g. the first computers, the internet, global positioning satellites),
today most democratic governments are focused instead on constraining
its development and are failing to respond to both opportunities and chal-
lenges it creates.
This failure has manifested in four ways. First, public opinion in demo-
cratic countries and their policymakers are increasingly hostile to large
technology companies and even many technologists, a trend commonly
called the “techlash”. Second, democratic countries have significantly re-
duced their direct investment in the development of information technol-
ogy. Third, democratic countries have been slow to adopt technology in
public sector applications or that require significant public sector par-
ticipation. Finally, and relatedly, democratic governments have largely
failed to address the areas where most technologists believe public par-
ticipation, regulation, and support are critical to technology advancing in
a sustainable way, focusing instead on more familiar social and political
problems18 .
18
European Commission published a study on the impact of open source software (OSS).
Strict control of data in the EU has led to a lack of competition and innovation, as well as
an increased risk of the market. However, we can see more investments in OSS in response
to the steps of innovation in many eastern European countries. If the West fails to main-
tain and keep its investment in digital tech, it will experience huge losses in the future.
For instance, we see the importance of digital OSS in the war between Ukraine and Russia.
For more on Europe’s digital position, see “Open Technologies for Europe’s Digital Decade,”
OpenForumEurope, n.d, https://openforumeurope.org/.
25
**
Figure 2-0-A. The rise of the Techlash. Source: Google nGram Viewer19
**
26
Regulators in both the EU and US have responded with a range of actions,
including dramatically increased antitrust scrutiny of leading technology
companies, a series of regulatory interventions in Europe including the
General Data Protection Regulation and the trio of the Data Governance
Act, the Digital Markets Act and the Digital Services Act. All these actions
have clear policy rationales and could well be part of a positive technol-
ogy agenda. However, the combination of negative tone, relative discon-
nection from naturally allied developments in technology and general
reticence on the part of commentators and policymakers in developed
democracies to articulate a positive technology vision has created an im-
pression of an industry under siege.
Perhaps the clearest quantitative mark for this declining proactive public
interest in information technology has been falling public expenditures
on research and development (R&D) as a share of gross domestic prod-
uct (GDP), especially in information technology. In the great majority
of developed democracies, public sector research and development ex-
penditure as a share of GDP has been declining in recent decades even
as business spending on R&D has dramatically expanded and spending
by the PRC (People’s Republic of China) government has dramatically in-
creased as a share of GDP and focused on information technology.21 Fig-
ure B shows the example of the US.
21
See Fredrik Erixon, and Björn Weigel, The Innovation Illusion: How so Little Is Cre-
ated by so Many Working so Hard, (New Haven: Yale University Press, 2017) and Robert
Gordon, The Rise and Fall of American Growth: The U.S. Standard of Living since the
Civil War, (Princeton; Oxford Princeton University Press, 2017). See also Carl Benedikt,
and Michael Osborne, “The Future of Employment: How Susceptible Are Jobs to Com-
puterisation,” The Oxford Martin Programme on Technology and Employment, 2013.
https://www.oxfordmartin.ox.ac.uk/downloads/academic/future-of-employment.pdf. Erik
Brynjolfsson, and Andrew McAfee, The Second Machine Age: Work, Progress, and Prosper-
ity in a Time of Brilliant Technologies, (New York: W.W. Norton & Company, 2014). Calestous
Juma. Innovation and Its Enemies: Why People Resist New Technologies. (New York: Oxford
University Press, 2019). Paul De Grauwe, and Anna Asbury. The Limits of the Market: The
Pendulum between Government and Market. Oxford: Oxford University Press, 2019. For
data sources, see “Gross Domestic Spending on R&D,” 2022. https://data.oecd.org/rd/gross-
domestic-spending-on-r-d.htm.; OECD. “OECD Main Science and Technology Indicators,”
OECD, March 2022. https://web-archive.oecd.org/2022-04-05/629283-msti-highlights-march-
2022.pdf.; and “R&D Expenditure,” Eurostat, n.d., https://ec.europa.eu/eurostat/statistics-
explained/index.php?title=R%26D_expenditure&oldid=590306.
27
**
Figure 2-0-B. The decline over time in government funding for research
and development and its eclipse by the private sector. Source: National
Center for Science and Engineering Statistics22
**
While the original internet was almost entirely developed by the public
and academic sectors (see Chapter “The Lost Dao” below) and based
on open standards, the “Web 2.0” wave that dominated the late first
two decades of the new millennium and the recent movements around
“web3” and decentralized social technologies have received virtually
22
Gary Anderson and Francisco Moris, “Federally Funded R&D Declines as a
Share of GDP and Total R&D”, National Center for Science and Engineering Statis-
tics NSF 23-339 (Alexandria, VA: National Science Foundation, 2023) available at
https://ncses.nsf.gov/pubs/nsf23339/.
23
See Julien Mailland and Kevin Driscoll, Minitel: Welcome to the Internet (Cambridge, MA:
MIT Press, 2017). For example, even public interest open source code is mostly invested in
by private actors, though recently the US Government has made some efforts to support that
sector with the launch of code.gov.
28
no public financial support, as governments in democratic countries
struggle to explore the potential of digital currencies, payments, and
identity systems. While many of the most fundamental advances in
computing arose from democratic governments during World War II and
the Cold War, today governments have played virtually no role in the
breakthroughs in “foundation models” that are revolutionizing computer
science. In fact, OpenAI Founders Sam Altman and Elon Musk report
having initially sought government funding and only having turned
to private, profit-driven sources after being repeatedly turned down;
OpenAI went on to develop the Generative Pretrained Transformer (GPT)
models that have increasingly captured the public’s imagination about
the potential of AI.24 Again, this contrasts sharply with authoritarian
regimes, like the PRC and the United Arab Emirates, that have laid out
and to a large extent successfully deployed ambitious public information
technology strategies, including developing their own cutting-edge
competitors to GPTs.25
29
mance on 5G, the latest generation of mobile connectivity, is more dra-
matic: a range of surveys find Saudi Arabia and the PRC consistently in
the top 10 best-covered jurisdictions by 5G, far above their income levels.
30
source software and other commons-based public goods like Wikipedia
have become critical public resources in the digital age; yet governments
have consistently failed to support them and have even discriminated
against them relative to other charities (for example, open source
software providers generally cannot be tax-exempt charities). While
authoritarian regimes plow ahead with plans for Central Bank Digital
Currencies, most democratic countries are only beginning explorations.
31
nologies require regulatory change to be sustainable. Labor law misfits
geographically and temporally flexible work empowered by technology.
Copyright is far too rigid to deal with the attribution of value to data inputs
to large AI models. Blockchains are empowering new forms of corporate
governance that securities laws struggle to make sense of and are often
put into legal jeopardy.
Yet while bold experiments with new visions of the public sector are
more common in autocracies, there is an element far more fundamental
to democracy itself: the mechanisms of public consent, participation,
and legitimation, including voting, petitioning, soliciting citizen feedback
and so forth. Voting in nearly all democracies occurs for major offices
once every several years according to rules and technologies that have
been largely unchanged for a century. While citizens communicate
instantaneously across the planet, they are represented in largely fixed
geographic configurations at great expense with low fidelity. Few mod-
ern tools of communication or data analysis are regular parts of the
democratic lives of citizens.
At the same time, autocracies have increasingly harnessed the latest dig-
ital innovations to empower their regimes of surveillance (for good and
ill) and social control. For example, the PRC government has widely used
facial recognition to monitor population movements, has encouraged the
adoption of its Digital Yuan and other surveilled digital payments (while
cracking down on more private alternatives) to facilitate financial surveil-
lance, and has even worked on developing a comprehensive “social credit
score” that would track a wide range of citizen activities and condense
them to a single and widely-consequential “rating”.31 For several years,
the Russian government has been using facial recognition to determine
who is participating in protests and detain them after the fact, allowing it
to remove dissenters on a large scale with much lower risks to the regime
or its police forces.32 These techniques have intensified and have also
31
See, for, instance, John, Alun, Samuel Shen, and Tom Wilson. “China’s Top Reg-
ulators Ban Crypto Trading and Mining, Sending Bitcoin Tumbling.” Reuters, Septem-
ber 24, 2021, https://www.reuters.com/world/china/china-central-bank-vows-crackdown-
cryptocurrency-trading-2021-09-24/. See also Bernhard Bartsch, Martin Gottske, and
Christian Eisenberg, “China’s Social Credit System,” n.d., https://www.bertelsmann-
stiftung.de/fileadmin/files/aam/Asia-Book_A_03_China_Social_Credit_System.pdf.
32
Gleb Stolyarov, and Gabrielle Tétrault-Farber, “ ‘Face Control’: Russian Police Go Digital
against Protesters,” Reuters, February 11, 2021, https://www.reuters.com/article/us-russia-
32
been used to enforce war conscription since the full-scale invasion of
Ukraine in February 2022.33 In some sense, democracy is being left be-
hind by technology as much by its neglect of technology, compared to
many authoritarian states’ eager willingness to embrace it for their own
ends, as by any anti-democratic tendencies of technology itself.
Science fiction shows the astonishing range of futures the human mind is
capable of imagining. In many cases, these imaginings are the foundation
of many of the technologies that researchers and entrepreneurs end up
developing. Some of these correspond to the directions we have seen tech-
nology take recently. In his 1992 classic, Snow Crash, Neal Stephenson
imagines a future where most people have retreated to live much of their
lives in an immersive “metaverse”.34 In the process they undermine the
engagement necessary to support real-world communities, governments,
and the like, making space for mafias and cult leaders to rule and develop
weapons of mass destruction. This future closely corresponds to elements
of the “antisocial” threats to democracy from technology we discussed
above. Stephenson and other writers further extend these possibilities,
which have had a profound effect in shaping technology development;
for example, Meta Platforms is named after Stephenson’s metaverse. Sim-
ilar examples are possible for the tendency of technology to concentrate
politics-navalny-tech-idUSKBN2AB1U2. See also Mark Krutov, Maria Chernova, and Robert
Coalson, “Russia Unveils a New Tactic to Deter Dissent: CCTV and a ‘Knock on the Door,’
Days Later,” Radio Free Europe/Radio Liberty, April 28, 2021, https://www.rferl.org/a/russia-
dissent-cctv-detentions-days-later-strategy/31227889.html.
33
Anastasiia Kruope, “Russia Uses Facial Recognition to Hunt down Draft Evaders,” Human
Rights Watch, October 26, 2022, https://www.hrw.org/news/2022/10/26/russia-uses-facial-
recognition-hunt-down-draft-evaders.
34
Neal Stephenson, Snow Crash (New York: Bantam, 1992).
33
power through creating “superintelligences” as in the fiction of Isaac Asi-
mov and Ian Banks, the predictive futurism of Ray Kurzweil and Nicholas
Bostrom, and films like Terminator and Her.35
But these possibilities are both very different from each other and are far
from the only visions of the technological future to be found in sci-fi. In
fact, some of the most prominent science fiction shows very different pos-
sibilities. Two of the most popular sci-fi television shows of all time, The
Jetsons and Star Trek, show futures where, respectively, technology has
largely reinforced the culture and institutions of 1950s America and one
where it has enabled a post-capitalist world of diverse intersecting alien
intelligences (on which more below). But these are two among thousands
of examples, from the post-gender and post-state imagination of Ursula Le
Guin to the post-colonial futurism of Octavia Butler. All suggest a dizzying
range of ways technology could coevolve with society36 .
But science fiction writers are not alone. The primary theme of the field
of Science and Technology Studies, including the philosophy, sociology,
and history of science, has been the contingency and possibility inher-
ent in the development of science and technology and the lack of any
single necessary direction for their evolution37 . These conclusions have
been increasingly accepted in social sciences, like political science and
35
Isaac Asimov, I, Robot (New York: Gnome Press: 1950). Ian Banks, Consider Phlebas
(London: Macmillan, 1987). Ray Kurzweil, The Age of Spiritual Machines (New York: Viking,
1999). Nicholas Bostrom, Superintelligence (Oxford, UK: Oxford University Press, 2014).
36
Ursula K. LeGuin, The Dispossessed: An Ambiguous Utopia (New York: Harper & Row,
1974). Octavia E. Butler, Wild Seed (New York: Doubleday, 1980). Marge Piercy, Woman
on the Edge of Time (New York: Knopf, 1976). Karl Schroeder, “Degrees of Freedom” in Ed
Finn and Kathryn Cramer eds. Hieroglyph: Stories & Visions for a Better Future (New York:
William Morrow, 2014). Karl Schroeder, Stealing Worlds (New York: Tor Books, 2019) An-
nalee Newitz, The Future of Another Timeline (New York: Tor Books, 2019). Cory Doctorow,
Walkaway (New York: Tor Books, 2017). Malka Older, Infomocracy (New York: Tor Books,
2016). Naomi Alderman, The Power, (New York:Viking, 2017) Cixin Liu, The Three-Body Prob-
lem (New York: Tor Books, 2014) Paolo Bacigalupi, The Windup Girl (New York: Start Pub-
lishing LLC, 2009). Neal Stephenson, The Diamond Age (New York: Spectra, 2003). William
Gibson, The Peripheral (New York: Berkley, 2019).
37
Jacques Ellul, The Technological Society (New York: Vintage Books, 1964). Paul Hoch,
Donald MacKenzie, and Judy Wajcman, “The Social Shaping of Technology,” Technology and
Culture 28, no. 1 (January 1987): 132 https://doi.org/10.2307/3105489. Andrew Pickering,
“The Cybernetic Brain: Sketches of Another Future,” Kybernetes 40, no. 1/2 (March 15, 2011)
https://doi.org/10.1108/k.2011.06740aae.001. Deborah Douglas, Wiebe E. Bijker, Thomas P.
Hughes, and Trevor Pinch, The Social Construction of Technological Systems: New Directions
in the Sociology and History of Technology (Cambridge, Massachusetts: MIT Press, 2012),
available at: https://www.jstor.org/stable/j.ctt5vjrsq. Charles C. Mann, 1491: New Revelation
of the Americas Before Columbus (New York: Knopf, 2005).
34
economics, that traditionally viewed technology progress as fixed and
given. Two of the world’s leading economists, Daron Acemoglu and Si-
mon Johnson, have recently published a book that argues that the direc-
tion of technological progress is a key target for social policy and reform
while documenting the historical contingencies that led to the directions
of technology we have seen in the past38 .
Perhaps the most striking illustration comes from comparing the ways
technology has advanced across countries today. Where once leading
thinkers predicted the power of technology to sweep away social differ-
ences, today the technological systems of powers great and sometimes
small define their competing social systems as much as their formally
stated ideologies: the PRC surveillance regime looks like one technolog-
ical future, while the Russian hacking networks seem another, the grow-
ing space of web3-driven communities a third, the mainstream Western
capitalist countries on which we have focused a fourth and the heteroge-
neous digital democracies of India, Estonia, and Taiwan something else
entirely that we will explore in depth below. Also possible, largely along
the web3 community-driven approach, is an African model that could
be built on open source and interoperability, reflective of the communal
inclination of many African cultures. Far from converging, technology
seems to be proliferating possible futures.
While there are many ways to describe the choices democratic societies
have made about technology, perhaps the most concrete and easiest to
quantify are the investments realized. These show clear choices about
technological paths that Western liberal democracies (and thus most of
the financial capital in the world) have made about investments in the
future of technology, many are of quite recent origin. While these have
recently been driven primarily by the private sector, they reflect earlier
priorities set by governments that are in many ways just beginning to
filter through to private sector applications.
38
Daron Acemoglu and Simon Johnson, Power and Progress: Our Thousand-Year Struggle
over Technology and Prosperity (New York: PublicAffairs, 2023).
35
Beginning with recent trends in the increasingly well-measured venture
capital industry, the last decade has seen a dramatic and overwhelming
focus of venture capital within the high technology sector into artificial
intelligence and cryptocurrency-adjacent “web3” technologies. Figure C
displays data on private investment in AI collected by NetBase Quid and
charted by Stanford’s Center for Human-Centered Artificial Intelligence’s
2022 AI Index Report, showing its explosive growth over the course of the
2010s, growth that has come to dominate private technology investment;
Figure D shows the same (over a different period and quarterly) for the
web3 space based on data from Pitchbook.
**
Figure 2-0-C. Private investment in AI over the last seven years. Source:
NetBase Quid via 2023 AI Index Report39
**
39
Nestor Maslej, Loredana Fattorini, Erik Brynjolfsson, John Etchemendy, Katrina Ligett,
Terah Lyons, James Manyika, Helen Ngo, Juan Carlos Niebles, Vanessa Parli, Yoav Shoham,
Russell Wald, Jack Clark, and Raymond Perrault, “The AI Index 2023 Annual Report,” AI
Index Steering Committee, Institute for Human-Centered AI, Stanford University, Stanford,
CA, April 2023.
36
**
Figure 2-0-D. Time trend in crypto VC deals and investment. Source: Na-
tional Venture Capital Association and Pitchbook40
**
37
**
**
Furthermore, these investments are not just choices that could have been
made differently; they are quite recent and were made very differently
immediately prior. These investments are reflected in the canonical tech-
nologies of the last few decades. Artificial intelligence was heralded as a
coming revolution throughout much of the 1980s, as reflected in Figure E
showing the relative frequency of this phrase in English books as tracked
by Google Ngrams. Yet the defining technology of the 1980s was quite
opposite: the personal computer that made computing a complement to
individual human creativity. The 1990s were haunted by Stephenson’s
science fictional imagination of the possibilities of escapist virtual worlds
and atomizing cryptography, the connective tissue of the internet swept
the world, ushering in an unprecedented age of communication and co-
operation. Mobile telephony in the 2000s, social networking in the 2010s,
and the scaffolding of remote work in the 2020s…none of these have fo-
cused on either cryptographic hypercapitalism or artificial superintelli-
gence. This reflects, with an extensive lag, the shift in investments made
by public sector research funders away from supporting these technolo-
gies and towards investment in cryptography and artificial intelligence,
as we discuss and document in “The Lost Dao” below, driven by a variety
of (geo)political factors.
38
Ideologies of the twenty-first century
If the path of technology is not predetermined and instead can be signifi-
cantly shaped by collective choices regarding investment, how should we
think about the flexibility we have as a society in choosing among possi-
ble directions? How much scope is there for choice and what do these
look like?
One useful analogy for thinking about choice over directions a society
might take is ideologies. It is “common sense” that different societies
have chosen or might choose to organize themselves in terms of differ-
ent (combinations of) ideologies: communism, capitalism, democracy,
fascism, theocracy, etc. Each of these incorporates strengths and weak-
nesses, appeals to some more than to others, and coheres and prescribes
to differing degrees. There may be configurations of these ideologies that
simply do not work or require specific historical and social conditions.
While a bit less familiar than the linear and progressive story about tech-
nology that is most common today, this perspective is very far from origi-
nal. It is a recurring theme in literature, scholarship, and even entertain-
ment. One striking example is the series of computer games Civilization
created by Sid Meier, in which the player charts a course for a people
from prehistory to the future. A defining characteristic of the game is the
diversity of possible technological paths and the way these interact with
social systems a society may adopt.
The latest entry in the series, Civilization VI, and specifically the “Gather-
ing Storm” expansion pack for it, illustrates our argument quite elegantly.
In that game, the “Information Era” features a choice among three ideolo-
gies: “Synthetic Technocracy,” “Corporate Libertarianism”, and “Digital
Democracy”, with corresponding strengths, weaknesses, and connections
to technological development. While the names for each of these are a bit
39
awkward and we shorten them below, we will argue in what follows that
they do a good job describing in broad strokes, like Communism, Fascism
and Democracy in the 20th century, the great techno-ideological debate
of our time.
The first and most widely expressed vision of the future of technology to-
day centers around Artificial Intelligence (AI) and the way social systems
will have to adapt to it; it is captured by the Civilization VI “Synthetic Tech-
nocracy” category, or Technocracy for short.
Leading exponents of this view in Silicon Valley are Altman and his men-
tor Reid Hoffman and until recently Altman’s OpenAI co-founder Elon
Musk. The view is also popular in the PRC, where it has been advanced by
Jack Ma, economist Yu Yong-Ding and even by the PRC’s official New Gen-
eration Artificial Intelligence Development Plan with a strong reliance on
the Marxist idea of “central planning”. It also appears throughout science
fiction, particularly the work of authors mentioned above like Asimov,
42
Sam Altman, “Moore’s Law for Everything”, March 16, 2021
https://moores.samaltman.com/.
40
Banks, Kurzweil and Bostrom. Bostrom’s latest book, Deep Utopia: Life
and Meaning in a Solved World, is perhaps the purest expression of this
view.43 Leading organizations aligned with this perspective include Ope-
nAI, DeepMind, and other advanced artificial intelligence projects. The
political campaigns of Andrew Yang in the United States helped bring this
perspective to the mainstream of politics and technocratic ideas show up
in toned-down forms in much of the thought of the “tech left”, including
commentators like Ezra Klein, Matthew Yglesias, and Noah Smith.
A second view is much less common in the mainstream media but has
been a dominant theme in the community that has built around Bitcoin
and other cryptocurrencies and in various related internet communities;
it is captured by the Civilization VI “Corporate Libertarianism” category,
which we will abbreviate to “Libertarianism” below.
41
Perhaps partly because it is less mainstream than Technocracy, lib-
ertarianism has a much clearer intellectual canon and set of leaders.
The Sovereign Individual by James Dale Davidson and Lord William
Rees-Mogg, the writings of Curtis Yarvin under the pen name Mencius
Moldbug, The Network State by Balaji Srinavasan and Bronze Age Mindset
are widely read and cited in the community.46 Venture capitalist Peter
Thiel is widely seen as the central intellectual leader, along with others
(such as the authors mentioned) whom he has funded or promoted the
work of.
42
Stagnation and inequality
These two ideologies have, to a significant extent though often in mod-
erated form, dominated public imagination about the future of technol-
ogy in most liberal democracies and thus shaped the direction of technol-
ogy investment for most of the last half-century. While the Technocratic
story sounds fresh and related to recent progress in AI, related discus-
sions around AI were almost as fever pitched as far back as the 1980s, as
illustrated by Figure E. While the recent discussions around web3 tech-
nologies have raised its profile, Libertarianism was arguably at its peak
in the 1990s, with John Perry Barlow’s “Declaration of the Independence
of Cyberspace”, Stephenson’s novels and the publication of The Sovereign
Individual.
The radical promises of these visions led many to anticipate dramatic eco-
nomic and productivity growth from information technology, as well as
the waves of privatization, deregulation and tax cuts that went along with
them in most liberal democracies beginning roughly half a century ago.
Yet these promises are far from bearing fruit and economic analysis in-
creasingly suggests these directions for technology may play a key role in
explaining that failure.
**
43
**
To make matters worse, this period of stagnation has also been one of
dramatically rising inequality, especially in the United States. Figure G
shows average income growth in the US by income percentile during the
Golden Age and Great Stagnation respectively. During the Golden Age,
income growth was roughly constant across the distribution, but trailed
off for top-income earners. During the Digital Stagnation, income growth
was higher for higher earners and only exceeded the average level during
the Golden Age for those in the top 1%, with even smaller groups earning
the great majority of the overall much lower income gains.
**
44
Rise of Income and Wealth Inequality”48
**
What has gone so wrong in the last half-century compared to the one be-
fore? Economists have studied a range of factors, from the rise of market
power and the decline of unions to the progressively greater challenge of
innovating when so much has already been invented. But increasing ev-
idence focuses on two factors closely tied to the influence of technocracy
and libertarianism respectively: the shift in the direction of technological
progress towards automation and away from labor augmentation and the
shift in the direction of policy away from proactively shaping industrial
development and relations and towards an assumption that “free markets
know best”.
45
**
**
Of course, the last half century has hardly been devoid of technological
breakthroughs that have genuinely brought about positive, if uneven and
50
Ibid.
51
Eric Posner, Glen Weyl, and Vitalik Buterin, Radical Markets: Uprooting Capitalism and
Democracy for a Just Society, (Princeton: Princeton University Press, 2019).
52
Thomas Philippon, The Great Reversal: How America Gave up on Free Markets, (Cam-
bridge, Massachusetts: The Belknap Press Of Harvard University Press, 2019); Jonathan
Tepper, The Myth of Capitalism: Monopolies and the Death of Competition, New York: Harper
Business, 2018).
46
sometimes fraught, transformations. Personal computers empowered un-
precedented human creativity in the 1980s; the internet allowed com-
munication and connection across previously unimaginable distances in
the 1990s; smartphones integrated these two revolutions and made them
ubiquitous in the 2000s. Yet, it is striking that none of these most canoni-
cal innovations of our time fit neatly into the Technocratic or Libertarian
stories. They were clearly all technologies that augmented human creativ-
ity, often called “intelligence augmentation” or IA, rather than AI.53 Yet
neither were they envisioned primarily as tools to escape existing social
institutions; they facilitated rich communication and connection rather
than market transactions, private property, and secrecy. As we will see,
these technologies emerged from a very different tradition than either of
these two. Thus, even the few major technological leaps in this period
were largely independent of or in contrast to these visions.
47
Barometer.55
These concerns have spilled out more broadly to a general loss of faith in
a range of social institutions. The fraction of Americans expressing high
confidence in several leading institutions (including organized religions,
federal governments, public schools, media, and law enforcement) has
fallen to roughly half its level when such surveys began, around the end
of the Golden Age in most cases.56 Trends in Europe are more moderate
and the global picture is uneven, but the general trend towards declining
55
According to the 2021 Edelman Trust Barometer, only 57% of global respondents trust
technology as a reliable source of information. This represents a decline of 4 points from the
previous year’s survey. A 2020 survey by Pew Research Center found that 72% of Americans
believe that social media companies have too much power and influence over the news that
people see. Additionally, 51% of respondents said they were very or somewhat concerned
about the role of technology in political polarization. A 2019 survey by the Center for the Gov-
ernance of AI at the University of Oxford found that only 33% of Americans believe that tech
companies are generally trustworthy. In a 2020 survey of 9,000 people in nine countries,
conducted by Ipsos MORI, only 30% of respondents said that they trust social media compa-
nies to behave responsibly with their data. These data points suggest that there is a growing
sense of skepticism and concern about the role of technology in society, including its im-
pact on democracy. See Richard Wike, Laura Silver, Janell Fetterolf, Christine Huang, Sarah
Austin, Laura Clancy, and Sneha Gubbala. “Social Media Seen as Mostly Good for Democ-
racy across Many Nations, but U.S. Is a Major Outlier,” Pew Research Center, December
6, 2022, https://www.pewresearch.org/global/2022/12/06/social-media-seen-as-mostly-good-
for-democracy-across-many-nations-but-u-s-is-a-major-outlier/. Pew Research shows ordi-
nary citizens see social media as both a constructive and destructive component of political
life, and overall most believe it has actually had a positive impact on democracy. Across the
countries polled, a median of 57% say social media has been more of a good thing for their
democracy, with 35% saying it has been a bad thing. There are substantial cross-national
differences on this question, however, and the United States is a clear outlier: Just 34% of
U.S. adults think social media has been good for democracy, while 64% say it has had a bad
impact. In fact, the U.S. is an outlier on a number of measures, with larger shares of Ameri-
cans seeing social media as divisive. See OAIC, “Australian Community Attitudes to Privacy
Survey 2020 Prepared for the Office of the Australian Information Commissioner by Lon-
ergan Research,” 2020, https://www.oaic.gov.au/__data/assets/pdf_file/0015/2373/australian-
community-attitudes-to-privacy-survey-2020.pdf. Many consumer respondents to a recent
Australian survey (58%) admitted they do not understand what firms do with the data
they collect, and 49% feel unable to protect their data due to a lack of knowledge or
time, as well as the complexity of the processes involved (OAIC, 2020). “Twitter, Face-
book, YouTube, and Instagram are critical in disseminating the rapid and far-reaching
spread of information,” a systematic review by WHO explains. See World Health Orga-
nization, “Infodemics and Misinformation Negatively Affect People’s Health Behaviours,”
September 1, 2022. https://www.who.int/europe/news/item/01-09-2022-infodemics-and-
misinformation-negatively-affect-people-s-health-behaviours–new-who-review-finds. The
repercussions of misinformation on social media include such negative effects as “an in-
crease in erroneous interpretation of scientific knowledge, opinion polarization, escalat-
ing fear and panic or decreased access to health care”. See Janna Anderson, and Lee
Rainie, “Concerns about Democracy in the Digital Age,” Pew Research Center, February 21,
2020. https://www.pewresearch.org/internet/2020/02/21/concerns-about-democracy-in-the-
digital-age/.
56
Gallup, “Confidence in Institutions,” n.d., https://news.gallup.com/poll/1597/confidence-
institutions.aspx.
48
institutional confidence in democratic countries is widely accepted.57
57
United Nations Department of Economic and Social Affairs, “Trust in
Public Institutions: Trends and Implications for Economic Security,” n.d.,
https://social.desa.un.org/publications/trust-in-public-institutions-trends-and-implications-
for-economic-security. See also Marta Kolczynska, Paul-Christian Bürkner, Lau-
ren Kennedy, and Aki Vehtari, “Modeling Public Opinion over Time and Space:
Trust in State Institutions in Europe, 1989-2019,” SocArXiv, August 11, 2020.
https://doi.org/10.31235/osf.io/3v5g7.
58
This is an alternate interpretation of 中華民國 (lit. “amidst” “cultures” “citizens” “na-
tion”), usually translated as “Republic of China”.
49
Standing at the summit of East Asia’s highest peak, Yushan (Jade Moun-
tain), one can not only look down on Taiwan, but also feel how this small,
mountainous island nation is a global crossroad. Located at the junction
of the Eurasian and Pacific tectonic plates, Taiwan’s geological fault line
yearly pushes it up, even as it also regularly causes earthquakes against
which rigorous building code protect inhabitants. In the same way, the
clash of Taiwan’s diverse culture, history and values has built a prosper-
ous and innovative society, while pro-social digital innovation has man-
aged to protect it from polarization.
Taiwan’s ability to achieve among the world’s lowest fatality rates with-
out any lockdowns during the Covid crisis — while maintaining among
the fastest economic growth rates in the world — show the results of the
plural spirit of Taiwan’s information society. Whether it’s a map of masks
or a social safety distance, these are all manifestations of technologies for
collaborative diversity, deeply rooted in daily life.61
Place of convergence
One etymology of Taiwan’s name is from the indigenous word “Taivoan”,
meaning “place of convergence”. Taiwan has arguably been a launching
point for long-distance cooperation longer than anywhere on earth, being
believed to be the starting point for the journeys of thousands of miles by
Polynesian voyagers in the second millennium BCE.62 The story of this
island and its people, influenced by indigenous cultures, colonial powers,
and political ideologies from the region and world, centers on the ongoing
59
“Billing Profile Information,” Central Election Commission, n.d,
https://db.cec.gov.tw/ElecTable/Election?type=President.
60
Joseph Liu, “Global Religious Diversity,” Pew Research Center, April 4, 2014.
https://www.pewresearch.org/religion/2014/04/04/global-religious-diversity/.
61
“Tracking Covid-19 Excess Deaths across Countries,” The Economist, October 20, 2021.
https://www.economist.com/graphic-detail/coronavirus-excess-deaths-tracker.
62
Peter Bellwood, Man’s Conquest of the Pacific: the Prehistory of Southeast Asia and Ocea-
nia (Oxford, UK: Oxford University Press, 1979).
50
conflict and co-creation between different notions of what this place is
and what it can be. This raucous and rich clash has poured out a unique
form of democracy forged by a history of constant upheaval.
Two dramatic personal experiences of the lead authors of this book il-
lustrate this unique cultural and political setting. On March 18, 2014, a
group of students frustrated by the substance and process of a new trade
deal with Beijing and inspired by the global “Occupy” movement climbed
over the fence surrounding the legislature building. A similar occupation
of the American legislative Capitol almost seven years later lasted only a
few hours and yet is one of the most divisive events in American history.
In contrast, the “Sunflower” (318) occupation lasted more than a hundred
times as long (more than 3 weeks) and yet the demands of the protesters
were eventually largely accepted as a consensus; the movement led to a
change of government and the rise of new political parties.
Perhaps most importantly, the movement led to a deeper and more last-
ing shift in politics, as the government at the time gained respect for the
movement and ministers invited younger “reverse mentors” to help them
learn from youth and civil society. One particularly proactive such minis-
ter, one of the world’s first ministers in charge of digital participation, Ja-
clyn Tsai recruited one of us to begin our journey of public service. Even-
tually this led to her taking that role in 2016 and in 2022 becoming the
first Minister of Digital Affairs.
Almost a decade after these events, the other primary author of this
book visited to witness the general election held January 13, 2024,
which launched a “year of elections” in which more people than in any
previous year will vote and followed hot on the heels of the “year of AI”,
when generative models like GPT burst into the public consciousness.
Many expect these models to turbocharge information manipulation
and interference by authoritarian actors. This election seemed a test
case, with a more concerted, better-funded adversary focused on a small
population than anywhere in the world.63 Walking the streets of Taipei
on the eve of that election, he saw no shortage of divisions for such
attacks to exploit. At the rally of the ruling Democratic Progressive Party
63
“Disinformation in Taiwan: International versus Domestic Perpetrators,” V-Dem, 2020.
https://v-dem.net/weekly_graph/disinformation-in-taiwan-international-versus
51
(DPP) he found not a single official flag, only placards of the island, the
party’s signature green color and occasional rainbow flags . At the
rally of the opposition Kuomintang (KMT or Nationalist) party, he saw
only the flag of the Republic of China (ROC) . It made him imagine
how much more extreme the divisions of his American home would be if
Democrats waved a historical British flag and Republicans the stars and
stripes.
Yet, despite these extreme divides and harnessing the technologies de-
veloped partly as a result of the Sunflower movement, the January 13
election has become a positive model to the world, with the candidate of
the party opposed by the authoritarian adversary outperforming opinion
polls, calm prevailing after the election and a largely consensual outcome
being reached across the society. This capacity to harness technology and
social organization to channel widely divergent attitudes towards shared
progress was most sharply manifested in the decade of work following
the Sunflower movement. Yet it has far deeper historical roots, roots that
come from different starting points and converge on this fateful decade
of digital democracy.
52
should be the center of determining its own future. To make sense of
these divides, we must therefore trace briefly both the history of this
island and of the ROC government.
The island’s history is replete with war, rebellion, colonizers, and national
independence narratives at every turn. Like many islands in the South
China Sea, indigenous peoples in Taiwan encountered larger imperial
powers, such as the Spanish, the Japanese, and the Dutch, through colo-
nial expansion. By the seventeenth century, the Dutch settled in the south-
ern part of the island while the Spanish settled in the northern region;
both of these settlements were ports intended for trade, while much of
the island remained inaccessible due to terrain and indigenous peoples
violently opposing colonial control.64
South China Sea merchants (or pirates, depending on how you encoun-
tered them), all hailing from Japan, China, and Southeast Asia, also settled
on the island or used the ports. In 1662, Zheng Chenggong, or Koxinga, in
open rebellion against the newly established Qing dynasty (1644-1911),
forcibly removed the Dutch from their seat of power in the southern re-
gion and continued his campaign against the Qing from Taiwan.65 By
1683, the Zheng family-led rebellion was defeated, and Taiwan came nom-
inally under the control of the Qing.
Little more than two hundred years later, in 1895, Qing dynasty’s defeat in
the Sino-Japanese war set in motion two sequences of events that would
define the modern history of Taiwan. First, Qing ceded Taiwan and its
immediately surrounding islands to Japan, marking the beginning of a
half-century of Japanese colonial rule in Taiwan. Second, this defeat fu-
eled the rise of a nationalist movement that created the ROC.66 We must
follow each of these strands as they diverge.
53
was in turn suppressed at the cost of 12,000 lives in a 36,000-square-
kilometer island. During Japanese colonial rule, the policy of “dōka”
(assimilation) once again attempted to incorporate the Taiwanese into
the Japanese cultural and linguistic system. The policy in the Japanese
Empire acted to thoroughly integrate language, governmental structure,
urban construction, and the education of Taiwan’s elite and intelligentsia
with Japan’s, including bringing many to Japan for education.
Despite the enormous efforts and funds invested by the Japanese empire,
Taiwan’s resistance and identity remained. Different ethnic groups
were considered more or less “civilized”; the less civilized a group of
people was, the harsher and more violent the Japanese government
was, thus creating fundamentally different experiences for indigenous,
Taigi and Hakka people under Japanese control.67 The rise of the global
anti-colonial movement and the Taishō democratic reforms within Japan
at the beginning of the 20th century provided intellectuals and activists
in Taiwan with the ideological foundation for self-determination. Local
elections held in 1935 that included a small fraction of property-owning
men as electors provided a first taste of democratic participation at least
to Taiwanese elites, encouraging the pursuit of greater autonomy and
expression.68
Tridemism
Across the Taiwan strait, a young, American-educated, Christian doctor
and activist, Sun Yat-Sen, was similarly influenced in a revolutionary
democratic direction by Qing’s defeat at Japan’s hands, but for a very
different reason. Concluding that the dynasty was unreformable, Sun
and his “Revive China Society” led a series of unsuccessful uprisings that
forced him into exile in Japan, where he (like the Taiwanese elites sent to
Japan to be educated) absorbed nascent democratic reform. Drawing on
these Japanese, Christian and American influences as well as Confucian
traditions, Sun articulated his Three Principles of the People in 1905,
laying the foundation of the “Tridemism” that would become the official
67
Jeffrey Jacobs, Democratizing Taiwan, (Boston: Brill, 2012), 22.
68
Ashley Esarey, “Overview: Democratization and Nation Building in Taiwan” in Taiwan in
Dynamic Transition: Nation Building and Democratization, edited by Thomas Gold, (Seattle:
University of Washington Press, 2020), 24
54
philosophy (and national anthem) of the ROC.
Harnessing these ideas, Sun built international support from foreign al-
lies and expatriates around the world that eventually allowed him and
his allies to overthrow the Qing in 1911 and found the ROC in 1912. De-
spite this initial success, internal conflict quickly forced him again into
exile and then back to take part in a civil war. In 1919, he managed to
marshal his forces and found the modern KMT.
That year he also met another crucial influence on the ideas of the
ROC, a disciple of Henry George who was visiting China partly to see
how George’s ideas might play out on a social scale. John Dewey was
perhaps the most respected American philosopher and among the most
respected educators and philosophers of democracy globally. Dewey’s
“pragmatic” theory of democracy (translated by his Chinese student Hu
Shih as “experimentalism”), which we will discuss in greater detail in
the next part of this book, resonated with the uncertain and exploratory
atmosphere of early ROC.
On the one hand, this fluid, experimental and emergent approach shared
much with Taoist traditions popular among democratic opponents of
69
“Flag of China (1912–1928),” n.d. Wikimedia Commons,
https://commons.wikimedia.org/wiki/File:Flag_of_China_(1912%E2%80%931928).svg.
55
Qing and warlord monarchy.70 On the other hand, unlike many more
imperialistic foreign observers, Dewey advocated the ROC following
its own path of “collaborative problem solving” as the axis of modern
experimental model schools. This led Dewey to become something of a
bridge between the ROC and the West, especially the US, giving over 200
lectures in China while writing monthly columns on his experiences for
emerging outlets such as The New Republic. In the process, he helped
forge a deep and enduring connection between the ROC and the US.
Postbellum Taiwan
In 1949, having been defeated by Communists, Chiang and two million
ROC soldiers and civilians relocated to Taiwan, declaring it the home of
“free China”, while simultaneously imposing martial law on the eight mil-
lion native, primarily Taigi- and Hakka-speaking population that came to
be known as the “White Terror”. Acting as dictator, Chiang positioned
the ROC to the world as the true representatives of China. Internally, peo-
70
Richard Shusterman, “Pragmatism and East‐Asian Thought,” Metaphilosophy 35, no. 1-2
(2004): 13, https://www.academia.edu/3125320/Pragmatism_and_East_Asian_Thought.
71
Yet, to the extent they did address it, Mao supported Taiwan as an independent commu-
nist state much as he hoped for Korea and Vietnam, while Chiang (almost as an afterthought)
requested the return of Taiwan after the war along with other territories formerly occupied
by Japan, including Manchuria.
56
ple in Taiwan experienced a violent outsider government, one that had
swiftly taken control of the island and began to suppress any sign of Tai-
wanese identity systematically and ruthlessly.72
At the same time, the government whose official ideology was Tridemism
began sowing many seeds of social reform that would eventually sprout
into democratic movements in Taiwan. Given his lack of ties to the island
and its local elites, Chiang was able to impose the Rural Land Reform,
including a rent reduction to 37.5% in 1949, the release of public land in
1951 and the breaking up of large estates in the 1953 policy of “land to
the tiller”. This was extended to impose a Georgist land value tax in 1977,
the details of which we will describe later. Together, as many scholars
have argued, these reforms laid an egalitarian economic foundation that
proved critical to Taiwan’s later social and economic development.73
57
Together these influences fostered the development of a robust civil and
cooperative sector in Taiwan (which we collectively call the Third Sec-
tor), critical to its industrial and political future. Furthermore, the con-
stitutional and historical focus on trade, as well as public investment in
export-supporting infrastructure, propelled Taiwan’s rise. By the 1970s,
Taiwan became a major supplier of components for advanced Western
technologies.
Coming of democracy
The 1960s, parallel to the American Civil Rights movement, saw an out-
burst of demands against the KMT and Chiang Kai-Shek for Taiwan’s in-
dependence and a truly democratic government. Taiwan-born National
Taiwan University Professor Peng Ming-min (1921-2022) and two of his
students, Hsieh Tsung-min and Wei Ting-chao, circulated the Taiwan Self-
Salvation Manifesto, which called for a freed and independent Taiwan,
decrying the ROC as an illegitimate government.76 Though this moment
ended with Peng’s exile, the manifesto sparked a national conversation
that further spurred democratic advocates to demand access to national
elections.
The United Nations was central to the ROC’s early identity under the White
Terror as it was not only one of the founding members of the UN, but also
the only Asian permanent member of the Security Council. This promi-
nent international role was the leading irritant to the People’s Republic
75
“John Dewey and Free China,” Taiwan Today, January 1, 2003,
https://taiwantoday.tw/news.php?unit=12.
76
Ryan Dunch, and Ashley Esarey, Taiwan in Dynamic Transition: Nation-Building and De-
mocratization, (Seattle: University Of Washington Press, 2020), 28.
58
of China (PRC) regime, preventing it from participating in international
affairs and leading the CCP to change its position from initially supporting
Taiwanese independence to an ideological focus on conquering Taiwan.
However, as the US sought to contain its failures in Vietnam, President
Richard Nixon secretly pursued accommodation with the PRC, including
supporting an Albanian-sponsored Resolution 2758 by the General Assem-
bly on October 25, 1971 that transferred recognition of “China” from the
ROC to the PRC, finally culminating in Nixon’s visit to PRC in 1972. As
a result, the ROC “withdrew” from the UN, transforming its identity and
international standing.
59
successor Chiang Ching-Kuo. The liberalization of Taiwan under the
younger Chiang in the 1980s created an environment where democratic
action, protests, essays, songs, and art reflected the growing belief for
general elections. Those who called for democracy were still in exile or
jailed, but their relatives and friends began to run for local and national
political offices.77
Yet despite this deep and persistent division that fueled the Sunflower
movement, the overlapping consensus between these perspectives is
striking:
1. Pluralism: Both the Blue and Green stories share a strong emphasis
on pluralism. For Blue, it’s about fusing both contemporary and tra-
ditional culture (exemplified by the National Palace Museum) and
77
Ryan Dunch, and Ashley Esarey, Taiwan in Dynamic Transition: Nation-Building and De-
mocratization, (Seattle: University Of Washington Press, 2020), 31.
78
Jeffrey Jacobs, Democratizing Taiwan, (Boston: Brill, 2012), 62.
60
the Tridemist tradition of pluralism, while highlighting ROC’s role
as a cultural inheritor and leader; while the Greens focus on the di-
versity of those who have settled in Taiwan, including the indige-
nous peoples, Japanese, Hokkien, Hakka, Westerners, and new im-
migrants.
2. Diplomatic nuance: To navigate the challenging relationship with
the PRC, both have had to embrace a range of complex and nuanced
public positions around the security posture of the US and other al-
lies, the meaning of ROC and Taiwan, as well as the concept of “in-
dependence”.
3. Democratic freedom: The ideas of “democracy” and “freedom” are
core to both ideologies. For Greens, these ideas are the core of Tai-
wan’s rallying cries overcoming both the White Terror and PRC au-
thoritarianism. To Blues, these ideas are core to Tridemism and
thus, in their eyes, qualities that a ROC leadership must focus on.
4. Anti-authoritarianism: Both are deeply concerned about growing
authoritarianism in the PRC, especially in the last decade with the
failure of the “One Country, Two Systems” formula in Hong Kong.
5. Export-orientation: Both parties celebrate success as a commercial
exporter and also see the ability to export ideas and culture as cen-
tral to the future. For Blues this focuses more on influencing the
PRC to be more like Taiwan, while for Greens it focuses on gaining
respect in the “free world” that Taiwan needs to defend itself.
In addition to this ideological overlap, the two sides have both benefited
from and been immersed in the central role the island has come to play
in the global electronics industry. As the center of the semiconductor and
smartphone supply chain, while also having the fastest internet in the
world79 , no country is more thoroughly immersed in the digital world
than Taiwan.
61
2-2 The Life of a Digital Democracy
When we see “internet of things,”
let’s make it an internet of beings.
When we see “virtual reality,”
let’s make it a shared reality.
When we see “machine learning,”
let’s make it collaborative learning.
When we see “user experience,”
let’s make it about human experience.
When we hear “the singularity is near” —
let us remember: The Plurality is here.
Illustrations
g0v
62
for the same website, hosting them at g0v.tw. These “forked” versions of
government websites often ended up being more popular, leading some
government ministers, like Simon Chang to begin “merging” these designs
back into government services.
**
**
63
versity of participants (usually a majority non-technical and with nearly
full gender parity), the orientation towards civic problems rather than
commercial outcomes and the close collaboration with a range of civic or-
ganizations. These features are perhaps best summarized by the slogan
“Ask not why nobody is doing this. You are the ‘nobody’!”, which has led
the group to be labeled the “nobody movement”. They are also reflected
in a Venn diagram commonly used to explain the movement’s intentions
shown in Figure A. As we will note below, a majority of the initiatives we
highlight grew out of g0v and closely aligned projects.
Sunflower
While g0v gained significant public attention and support even in its ear-
liest years, it burst most prominently onto the public scene during the
Sunflower Movement we described above. Hundreds of contributors in
the g0v community were present during the occupation of the Legisla-
tive Yuan (LY), aiding in broadcasting, documenting and communicating
civic actions. Livestream-based communication sparked heated discus-
sion among the public. Street vendors, lawyers, teachers, and designers
rolled up their sleeves to participate in various online and offline actions.
Digital tools brought together resources for crowdfunding, rallies, and in-
ternational voices of support.
On March 30, 2014, half a million people took to the streets in the largest
demonstration in Taiwan since the 1980s. Their demands, thus formu-
lated, for a review process prior to the passage of the Cross-Straits Ser-
vices Trade Agreement was accepted by LY Speaker Wang Jin-pyng on
April 6, about three weeks after the start of the occupation, leading to
its dispersal soon thereafter. The contributions of g0v to both sides and
the resolution of their tensions led the sitting government to see the merit
in g0v’s methods and in particular cabinet member Jaclyn Tsai recruited
one of us as a youth “reverse mentor” and began to attend and support
g0v meetings, putting an increasing range of government materials into
the public domain through g0v platforms.
64
towards the Green camp, as well as the establishment of a new political
party by the Sunflower leaders, the New Power Party, including leading
Taiwanese rock star Freddy Lim. Together, these events significantly
added to the momentum behind g0v and led to one of our appointment
as Minister without Portfolio responsible for open government, social
innovation and youth participation.
65
**
**
66
As a decentralized, citizen-led community, vTaiwan is also a living organ-
ism that naturally evolves and adapts as citizen volunteers participate
in various ways. The community’s engagement experienced a downturn
following the onset of the COVID-19 pandemic, which interrupted face-
to-face meetings and led to decreased participation. The platform faced
challenges due to the intensive volunteering effort required, the absence
of mandates for governmental responses, and its somewhat narrow fo-
cus. In response to these challenges, vTaiwan’s community has sought
to find a new role between the public and the government and extend
its outreach beyond the realm of Taiwanese regulation in recent years.
A significant effort to revitalize vTaiwan was its collaboration with Ope-
nAI’s Democratic Input to AI project in 2023. Through partnerships with
Chatham House and the organization of several physical and online delib-
erative events centered on the topic of AI ethics and localization, vTaiwan
successfully integrated local perspectives into the global discourse on AI
and technology governance. Looking ahead to 2024, vTaiwan plans to en-
gage in deliberations concerning AI-related regulations in Taiwan and be-
yond. In addition to Polis, vTaiwan is constantly experimenting with new
deliberation and voting tools, integrating LLMs for summarization. The
vTaiwan community remains committed to democratic experimentation
and finding consensus among the public for policymaking. The earlier
experience of vTaiwan outside of government also inspired the design of
the official Join platform, which is actively used by citizens as a means of
proposing issues and ideas to the government.
67
Hackathons, coalitions and quadratic signals
More recently, this practice has been extended beyond developing techni-
cal solutions to envisioning of alternative futures and production of me-
dia content to support this through “ideathons”. It has also gone beyond
symbolic support to awarding real funding to valued projects (such as
around agricultural and food safety inspections) using an extension of
Quadratic Voting to Funding as we discuss in our Social Markets chapter.
68
Pandemic
The best documented example and the one most consistent with the previ-
ous examples was the “Mask App”. Given previous experience with SARS,
masks in Taiwan were beginning to run into shortages by late January,
when little of the world had even heard of Covid-19. Frustrated, civic
hackers led by Howard Wu developed an app that harnessed data that the
government, following open and transparent data practices harnessed
and reinforced by the g0v movement, to map mask availability. This al-
lowed Taiwan to achieve widespread mask adoption by mid-February,
even as mask supplies remained extremely tight given the lack of a global
production response at this early stage.
Another critical aspect of the Taiwanese response was the rigorous use of
testing, tracing and supported isolation to avoid community spread of the
disease. While most tracing occurred by more traditional means, Taiwan
was among the only place that was able to reach the prevalence of adop-
tion of phone-based social distancing and tracing systems necessary to
make these an important and effective part of their response. This was, in
turn, largely because of the close cooperation facilitated by PDIS between
government health officials and members of the g0v community deeply
concerned about privacy, especially given the lack in Taiwan of an inde-
pendent privacy protection regime, a point we return to below. This led
to the design of systems with strong anonymization and decentralization
features that received broad acceptance.
69
Information integrity
Yet perhaps the single most important digital contributor to Taiwan’s pan-
demic response was its ability to rapidly and effectively respond to mis-
information and deliberate attempts to spread disinformation. This “su-
perpower” has extended, however, well beyond the pandemic and been
critical to the successful elections Taiwan has held during a time when a
lack of information integrity has challenged many other jurisdictions.
Central to those efforts, in turn, has been the g0v spin-off project “Cofacts,”
in which participating citizens rapidly respond to both trending social me-
dia content and to messages from private channels forwarded to a public
comment box for requested response. Recent research shows that these
systems can typically respond faster, equally accurately and more engag-
ingly to rumors than can professional fact checkers, who are much more
bandwidth constrained.81
The technical sophistication of Taiwan’s civil sector and its support from
the public sector have aided in other ways as well. This has allowed
organizations like MyGoPen and private sector companies like Gogolook
to develop and, with public support, rapidly spread chatbots for private
messaging services like Line that make it fast and easy for citizens to
anonymously receive rapid responses to possibly misleading informa-
tion. Government leaders’ close cooperation with such civil groups has
allowed them to model and thus encourage policies of “humor over
rumor” and “fast, fun and fair” responses. For example, when a rumor
began to spread during the pandemic that there would be a shortage of
toilet paper created by the mass production of masks, Taiwan’s Premier
Su Tseng-chang famously circulated a picture of himself wagging his rear
to indicate it had nothing to fear.
Together these policies have helped Taiwan fight off the “infodemic”
without takedowns, just as it fought of the pandemic without lock-
downs. This culminated in the January 13, 2024 election we mentioned
above, in which a PRC campaign of unprecedented size and AI-fueled
sophistication failed to polarize or noticeably sway the election.
81
Andy Zhao and Mor Naaman, “Insights from a Comparative Study on the Variety, Ve-
locity, Veracity, and Viability of Crowdsourced and Professional Fact-Checking Services”,
Journal of Online Trust and Safety 2, no. 1. https://doi.org/10.54501/jots.v2i1.118.
70
Other programs
While these are some of the most prominent examples of Taiwanese dig-
ital democratic innovation, there are many other examples we lack the
space to discuss in detail but will briefly list here.
71
9. Open parliament: Taiwan has become a leader in the global “open
parliament” movement, experimenting with a range of ways to
make parliamentary procedures transparent to the public and
experimenting with innovative voting methods.
10. Digital diplomacy: Based on these experiences, Taiwan has become
a leading advisor and mentor to democracies around the world con-
fronting similar challenges and with similar ambitions to harness
digital tools to improve participation and resilience.
Furthermore, this work sufficiently won the confidence of both the public
and the government that in August 2022 Taiwan created a Ministry of
Digital Affairs, elevating one of us from Minister without Portfolio to lead
this new ministry.
Decade of accomplishment
While this is an interesting set of programs, one might naturally inquire
about evidence of their efficacy. Tracing causal impacts precisely for so
many projects is obviously an arduous task beyond our scope here. But
at very least it is reasonable to ask how Taiwan has performed overall
on the range of challenges that has so troubled most liberal democracies
in the last decades. We consider each categories of these in turn. Un-
fortunately, the quality of analysis and comparison possible is not all it
could be given the complex geopolitics around Taiwan’s international sta-
tus meaning that many standard international comparators choose not to
include it in their data.
Economic
While the economic lens of Taiwan’s performance is far from the most im-
portant, it is one of the easier to quantify and provides a useful baseline
for understanding the starting point for the rest. In one sense, Taiwan is
an upper-middle income country, like much of Europe, with a Gross Do-
mestic Product (GDP) per capita of $34,000 per person in 2024 according
to the International Monetary Fund (IMF).82 However, prices are much
82
“GDP per Capita, Current Prices,” International Monetary Fund, n.d.,
https://www.imf.org/external/datamapper/NGDPDPC@WEO/ADVEC/WEOWORLD/TWN/CHN.
72
lower in Taiwan on average than in almost any other rich country; mak-
ing this adjustment (which economists call “purchasing power parity”)
makes Taiwan the second richest country on average other than the US
with more than 10 million people in the world. Furthermore, as we dis-
cuss below, most sources suggest that Taiwan is much more equal than
the US, which means it is likely the country of that size with the highest
typical living standards in the world. Thus Taiwan is best thought of as
among the absolute most developed economies in the world, rather than
as a middle-income country.
The sectoral focus of Taiwan’s economy stands out as well. While per-
fectly comparable data are hard to come by, Taiwan is almost certainly
the most digital export-intensive economy in the world, with exports of
electronics and information and communication products accounting for
roughly 31% of the economy, compared to less than half that fraction in
other leading technology exporters such as Israel and South Korea.83 This
fact is best known to the world for what it reflects: that most of the world’s
semiconductors, especially the most advanced ones, are manufactured in
Taiwan and Taiwan is also a major both manufacturer and domicile for
manufacturers of smartphones such as Foxconn.
Taiwan is also unusual among rich countries in its relatively low tax take;
according to the Asia Development Bank, Taiwan collected only 11% of
GDP in taxes compared to 34% on average in the Organization of Eco-
nomic Cooperation and Development (OECD) club of rich countries.84 Re-
latedly, Taiwan ranked 4th in the world in the Heritage Foundation’s Eco-
nomic Freedom Index.85
1. Growth: Taiwan has averaged real GDP growth of 3% over the last
decade, compared to less than 2% for the OECD, a bit over 2% for the
US and 2.7% for the world overall.86
83
“Exports,” Trading Economics, n.d., https://tradingeconomics.com/country-list/exports.
84
“Key Indicators Database,” Asian Development Bank, n.d.,
https://kidb.adb.org/economies/taipeichina; “Revenue Statistics 2015 - the United States,”
OECD, 2015, https://www.oecd.org/tax/revenue-statistics-united-states.pdf.
85
“Index of Economic Freedom.” The Heritage Foundation, 2023.
https://www.heritage.org/index/.
86
“GDP Growth (Annual %),” World Bank, 2023. https://data.worldbank.org/indicator/ny.gdp.mktp.kd.zg;
73
2. Unemployment: Taiwan has averaged an unemployment rate of just
under 4% steadily in the last decade, compared to an OECD average
of 6%, a US average of 5% and a world average of around 6%.
3. Inflation: While inflation has spiked and wildly fluctuated around
the world including almost all rich countries, Taiwan’s inflation rate
has remained relatively steady the last decade in the 0-2% range,
averaging 1.3% according to the IMF.
4. Inequality: The last decade has seen significant debate about meth-
ods in calculating inequality statistics. Using more traditional meth-
ods, Taiwan’s Survey of Family Income and Expenditure has found
that Taiwan’s Gini Index of inequality (ranging from 0 for perfectly
equal to 1 for perfectly unequal) has been steady at around .28 for
the last decade, placing it around the level of Austria on the lower
end of global inequality and far lower than the roughly .4 of the
US. Other analyses, using innovative but controversial administra-
tive approaches pioneered by economists including Emmanuel Saez,
Thomas Piketty, and Gabriel Zucman show Taiwan’s top 1% income
share at 19%, not far behind the US at 21% and well above a coun-
try like France at 13%. However, even in these data, Taiwan’s top
1% share has fallen by about a tenth in the last decade, while in
both France and the US it has risen by a similar proportion. Fur-
thermore, a number of studies have recently argued these methods
tend to find higher inequality in countries and time periods with
lower and less progressive taxes as they rely on tax administration
data and struggle to fully account for induced avoidance.87 Given
Taiwan’s dramatically lower tax take than either the US or France,
it seems likely that if these issues apply anywhere, they would lead
to a substantial overstatement of Taiwanese inequality.88
Putting these facts together, what is notable is that Taiwan’s economic per-
formance has been strong and fairly egalitarian or at least not becoming
“GDP per Capita, Current Prices,” International Monetary Fund, n.d.,
https://www.imf.org/external/datamapper/NGDPDPC@WEO/ADVEC/WEOWORLD/TWN/CHN.
87
Gerald Auten, and David Splinter, “Income Inequality in the United States: Using Tax
Data to Measure Long-Term Trends,” Journal of Political Economy, November 14, 2023.
https://doi.org/10.1086/728741.
88
The most interesting statistic we woudl like to report on is labor’s share of income and
its trends in Taiwan. However, to our knowledge no persuasive and internationally compa-
rable study of this exists. We hope to see more research on this soon.
74
more unequal despite its wealth and extreme tech-intensity. As we docu-
mented above, economists have widely blamed the role of technology for
many recent economic woes, including slow growth, unemployment and
rising inequality. In the world’s most tech-intensive economy, this seems
not to be the case.
Social
75
trast, is far more diverse with a roughly equal mix of followers of four dis-
tinct religious traditions: folk religion, Taoism, Buddhism, Western and
minority religions, with about an equal proportion as each of these being
non-believers.93 At the same time, while there has been some shift among
these groups, there has hardly been any significant increase in non-belief
or non-practicing in Taiwan in the past decades.94
Political
Taiwan is widely recognized both for the quality of its democracy and
its resilience against technology-driven information manipulation.
Several indices, published by organizations such as Freedom House95 ,
the Economist Intelligence Unit96 , the Bertelsmann Foundation and
V-Dem, consistently rank Taiwan as among the freest and most effective
democracies on earth.97 While Taiwan’s precise ranking differs across
these indices (ranging from first to merely in the top 15%), it nearly
always stands out as the strongest democracy in Asia and the strongest
democracy younger than 30 years old; even if one includes the wave of
post-Soviet democracies immediately before this, almost all are less than
half Taiwan’s size, typically an order of magnitude smaller. Thus Taiwan
is at least regarded as Asia’s strongest democracy and the strongest
young democracy of reasonable size and by many as the world’s absolute
strongest. Furthermore, while democracy has generally declined in
every region of the world in the last decade according to these indices,
Taiwan’s democratic scores have substantially increased.
In addition to this overall strength, Taiwan is noted for its resistance to po-
larization and threats to information integrity. A variety of studies using
a range of methodologies have found that Taiwan is one of the least politi-
cally, socially and religiously polarized developed countries in the world,
93
“2022 Report on International Religious Freedom: Taiwan,” American Institute in Tai-
wan, June 8, 2023, https://www.ait.org.tw/2022-report-on-international-religious-freedom-
taiwan/#:~:text=According%20to%20a%20survey%20by.
94
“Religion in Taiwan,” Wikipedia, Wikimedia Foundation, January 12, 2020.
https://en.wikipedia.org/wiki/Religion_in_Taiwan.
95
“Freedom in the World,” Freedom House, 2023, https://freedomhouse.org/report/freedom-
world.
96
“Democracy Index 2023,” Economist Intelligence Unit, n.d.,
https://www.eiu.com/n/campaigns/democracy-index-2023.
97
“Democracy Indices,” Wikipedia, Wikimedia Foundation, March 5, 2024.
https://en.wikipedia.org/wiki/Democracy_indices#:~:text=Democracy%20indices%20are%20quantitative%20and..
76
though some have found a slight upward trend in political polarization
since the Sunflower movement.98 This is especially true in affective polar-
ization, the holding of negative or hostile personal attitudes towards po-
litical opponents, with Taiwan consistently among the 5 least affectively
polarized countries.
Legal
Taiwan’s legal-political system has also distinguished itself for its ability
to adapt to inclusively resolve long-standing social conflicts. In 2017, the
98
Laura Silver, Janell Fetterolf, and Aidan Connaughton, “Diversity and Di-
vision in Advanced Economies,” Pew Research Center, October 13, 2021,
https://www.pewresearch.org/global/2021/10/13/diversity-and-division-in-advanced-
economies/.;
99
Adrian Rauchfleisch, Tzu-Hsuan Tseng, Jo-Ju Kao, and Yi-Ting Liu, “Taiwan’s Public Dis-
course about Disinformation: The Role of Journalism, Academia, and Politics,” Journalism
Practice 17, no. 10 (August 18, 2022): 1–21, https://doi.org/10.1080/17512786.2022.2110928.
100
Fin Bauer, and Kimberly Wilson, “Reactions to China-Linked Fake News: Ex-
perimental Evidence from Taiwan,” The China Quarterly 249 (March 2022): 1–26.
https://doi.org/10.1017/S030574102100134X.
101
“Crime Index by Country,” Numbeo, 2023, https://www.numbeo.com/crime/rankings_by_country.jsp.
102
“Taiwan: Crime Rate,” Statista, n.d, https://www.statista.com/statistics/319861/taiwan-
crime-rate/#:~:text=In%202022%2C%20around%201%2C139%20crimes.
77
Constitutional Court ruled that the government must pass a law to legalize
same-sex marriage within two years. After the failure of a referendum on
a straightforward same-sex marriage proposal in 2018, the government
found a creative way to respond to the interests of all sides. Many who
opposed same-sex marriage were concerned that because of traditions
of extended families being bound together by marriage, family members
opposing the practice could be forced to participate. At the same time,
most young people who planned to take advantage of the new provision
had more individualistic, partner-based visions of marriage and had no
desire to bind their families either, leading the government to pass a le-
galization bill that exempted kin from the same-sex marriage process.
Existential
Crises come rarely and with low probability. It is thus hard to know how
well Taiwan might perform in avoiding or mitigating one. However, per-
haps the closest one can reach for is an emergency that did occur: the
Covid-19 pandemic. As noted above, Taiwan was widely seen as among
the best if not the very best performing country in the world during this
episode and here we discuss the quantitative reasons for this esteem.
78
impressively during the “post-crisis” phase following mid-2021, during
which vaccine availability and uptake were the most critical components
of response and challenges with domestic vaccine production and distri-
bution led to significant loss of life in the coming years. Taiwan still had
among the lowest death rates and best economic performance reliably
measured by a rich jurisdiction of significant size, but its exceptional
leadership early in the pandemic did not fully persist after the crisis
phase. This may indicate that the cohesion and civic engagement fostered
by crises (like Sunflower and the Pandemic) allow Taiwan to respond
more effectively than anywhere in the world, but that additional care
and focus is needed to ensure these efforts are institutionalized and
sustainable, an important direction for the future we discuss further
below.
In short, while like all countries it has key limitations, Taiwan deserves a
leading place among global exemplars that it is too rarely afforded. Ad-
miration for Scandinavian countries is a constant refrain on the left in
the West, as is praise for Singapore on the right. While all these jurisdic-
104
“Net Zero Tracker,” Energy & Climate Intelligence Unit, 2023.
https://eciu.net/netzerotracker.
105
“2022 EPI Results,” Environmental Performance Index, 2022, https://epi.yale.edu/epi-
results/2022/component/epi.
106
Drew DeSilver, “Turnout in U.S. Has Soared in Recent Elections but by Some Mea-
sures Still Trails that of Many Other Countries.” Pew Research Center, November
1, 2022. https://www.pewresearch.org/short-reads/2022/11/01/turnout-in-u-s-has-soared-in-
recent-elections-but-by-some-measures-still-trails-that-of-many-other-countries/.
107
“Taiwan Country Report Report,” BTI Transformation Index, n.d., https://bti-
project.org/en/reports/country-report/TWN.
79
tions have important lessons and in fact many important points of over-
lap with Taiwan, few places offer the breadth of promise in addressing
today’s leading challenges that Taiwan does and appeal across the typical
divides as it does. As an economically free, vibrantly participatory liberal
democracy Taiwan both has something to offer all points on the political
spectrum of the West and holds arguably the most compelling example
available to those looking to leapfrog the practices of increasingly ailing
Western democracies. This is especially true given its starting point: with-
out abundant natural resources or strategic position, in a fragile geopolit-
ical setting, with a deeply divided rather than homogeneous and robust
sized population and only democratizing a few decades ago, rising from
abject poverty in less than a century.
80
Section 3: Plurality
3-0 What is ⿻?
“Action, the only activity that goes on directly between men
without the intermediary of things or matter, corresponds to
the human condition of plurality, to the fact that men, not Man,
live on the earth and inhabit the world.” - Hannah Arendt, The
Human Condition, 1958108
The increasing tensions between democracy and technology and the way
that, starting from such extreme divisions, Taiwan seems to have over-
come them naturally raises a question: is there a more broadly applica-
ble lesson on how technology and democracy can interact to be gleaned?
We usually think of technology as something that inexorably progresses,
while democracy and politics as the static choice between different com-
108
Hannah Arendt, The Human Condition, (Chicago: University of Chicago Press, 1958).
109
Danielle Allen, “Chapter 2: Toward a Connected Society,” in In Our Compelling Interests,
(Princeton: Princeton University Press, 2017), https://doi.org/10.1515/9781400881260-006.
110
“View Section: 2020-10-07 Interview with Azeem Azhar,” SayIt,
https://sayit.pdis.nat.gov.tw/2020-10-07-interview-with-azeem-azhar#s433950, 2020.
81
peting forms of social organization. Taiwan’s experience shows us that
more options may be available for our technological future, making it
more like politics, and that one of these may involve radically enhanc-
ing how we live together and collaborate, progressing democracy much
like we do technology. It also shows us that while social differences may
generate conflict, using appropriate technology, they may also be a fun-
damental source of progress.
82
**
**
83
fine both our personal identities and our collective organiza-
tion. We identify this concept with Hannah Arendt and especially
her book, The Human Condition, where she labels Plurality as the
most fundamental element of the human condition. We identify this
descriptive element of Plurality especially with the Universal Coded
Character (unicode) ⿻ which captures its emphasis on the intersec-
tional, overlapping nature of identity for both groups and individ-
uals. Furthermore, in the next chapter, Living in a ⿻ World, we
highlight that this description applies not merely to human social
life, but, according to modern (complexity) science, to essentially all
complex phenomena in the natural world.
2. Normative: Diversity is the fuel of social progress and while
it may explode like any fuel (into conflict), societies succeed
largely to the extent they manage to instead harness its poten-
tial energy for growth. We identify this concept with philosopher
Danielle Allen’s ideal of “A Connected Society” and associate it with
the rainbow elements that form at the intersection of the squares in
the elaborated ⿻ image on the book cover and in the figure above.
While Allen has given perhaps the clearest exposition of these ideas,
as we explore in The Lost Dao they are deeply rooted in a philosoph-
ical tradition including many of the American thinkers who deeply
influenced Taiwan, such as Henry George and John Dewey.
3. Prescriptive: Digital technology should aspire to build the en-
gines that harness and avoid conflagration of diversity, much
as industrial technology built the engines that harnessed phys-
ical fuel and contained its explosions. We identify this concept by
the use by one of us, beginning in 2016, of the term Plurality to refer
to a technological agenda. We associate it even more closely with the
use in her title (as Digital Minister) of the traditional Mandarin char-
acters 數位 (pronounced in English as “shuwei”) which, in Taiwan,
mean simultaneously “plural” when applied to people and “digital”
and thus capture the fusion of the philosophy arising in Arendt and
Allen with the transformative potential of digital technology. In the
last chapter of this section, Technology for Collaborative Diversity,
we argue that, while less explicit, this philosophy drove much of the
development of what has come to be called the “internet”, though
because it was not sufficiently articulated it has been somewhat lost
84
since. A primary goal of the rest of the book is to clearly state this
vision and thus help it become the alternative it should be to the
Libertarian, Technocratic and stagnant democratic stories that dom-
inate much discussion today.
Given this rich definition and the way it blends together elements from
traditional Mandarin and various English traditions, throughout the rest
of the book we use the Unicode ⿻ to represent this idea set in both noun
form (viz. to stand in for “Plurality”) and in the adjective form (viz. to
stand in for 數位).
None of these existing words perfectly captures this idea set, and thus, in
some cases, one might simply say “overlap” or “overlapping” to describe
it literally. The rest of the book describes more deeply the content, vision
and ambition of ⿻.
85
and houses and moved from place to place. Because more
complex and intense intellectual efforts mean a fuller and
richer life. They mean more life. Life is an end in itself, and
the only question as to whether it is worth living is whether
you have enough of it. — Oliver Wendell Holmes, 1900112
86
These approaches have achieved great successes. Newtonian mechanics
explained a range of phenomena and helped inspire the technologies of
the industrial revolution. Darwinism is the foundation of modern biology.
Economics has been the most influential of the social sciences on public
policy. And the Church-Turing vision of “general computation” helped
inspire the idea of general-purpose computers that are so broadly used
today.
87
can be seen as ideological caricatures, they can also be understood in sci-
entific terms as ever-present threats to complexity.
Essentially every complex system, from the flow of fluids to the devel-
opment of ecosystems to the functioning of the brain, can exhibit both
“chaotic” states (where activity is essentially random) and “orderly” states
(where patterns are static and rigid). There is almost always some param-
eter (such as heat or the mutation rate) that conditions which state arises,
with chaos happening for high values and order for low values. When
the parameter is very close to the “critical value” of transition between
these states, when it sits on what complexity theorists call the “edge of
chaos”, complex behavior can emerge, forming unpredictable, develop-
ing, life-like structures that are neither chaotic nor orderly but instead
complex.116 This corresponds closely to the idea we highlighted above of
a “narrow corridor” between centralizing and anti-social, Technocratic
and Libertarian threats that we have highlighted above.
As such, ⿻ can take from science the crucial importance of steering to-
wards and widening this narrow corridor, a process complexity scientists
call “self-organizing criticality”. In doing so, we can draw on the wisdom
of many sciences, ensuring we are not unduly captured by any one set of
analogies.
Mathematics
Nineteenth century mathematics saw the rise of formalism: being precise
and rigorous about the definitions and properties of mathematical struc-
tures that we are using, so as to avoid inconsistencies and mistakes. At the
beginning of the 20th century, there was a hope that mathematics could
be “solved”, perhaps even giving a precise algorithm for determining the
truth or falsity of any mathematical claim.117 20th century mathematics,
on the other hand, was characterized by an explosion of complexity and
uncertainty.
88
early 20th century, most notably Gödel’s theorem, showed that
there are fundamental and irreducible ways in which key parts
of mathematics cannot be fully solved. Similarly, Alonzo Church
proved that some mathematical problems were “undecidable” by
computational processes.118 This dashed the dream of reducing all
of mathematics to computations on basic axioms.
• Computational complexity: Even when reductionism is feasible
in principle/theory, the computation required to predict higher-
level phenomena based on their components (its computational
complexity) is so large that performing it is unlikely to be practically
relevant. In some cases, it is believed that the required computation
would consume far more resources than could possibly be recov-
ered through the understanding gained by such a reduction. In
many real-world use cases, the situation can often be described as a
well-studied computational problem where the “optimal” algorithm
takes an amount of time growing exponentially in the problem size
and thus rules of thumb are almost always used in practice.
• Sensitivity, chaos, and irreducible uncertainty: Many even rel-
atively simple systems have been shown to exhibit “chaotic” behav-
ior. A system is chaotic if a tiny change in the initial conditions trans-
lates into radical shifts in its eventual behavior after an extended
time has elapsed. The most famous example is weather systems,
where it is often said that a butterfly flapping its wings can make
the difference in causing a typhoon half-way across the world weeks
later.119 In the presence of such chaotic effects, attempts at predic-
tion via reduction require unachievable degrees of precision. To
make matters worse, there are often hard limits to how much pre-
cision is feasible known as “the Uncertainty Principle”, as precise
instruments often interfere with the systems they measure in ways
that can lead to important changes due to the sensitivity mentioned
previously.
• Fractals: Many mathematical structures have been shown to have
similar patterns at very different scales. A good example of this is
the Mandelbrot set, generated by repeatedly squaring then adding
118
Alonzo Church, “A note on the Entscheidungsproblem”, The Journal of Symbolic Logic 1,
no. 1: 40-41.
119
James Gleick, Chaos: Making a New Science (New York: Penguin, 2018).
89
the same offset to a complex number. These illustrate why breaking
structures down to atomic components may obscure rather than il-
luminate their inherently multi-scale structure.
**
**
Physics
In 1897, Lord Kelvin infamously proclaimed that “There is nothing new
to discover in physics now.” The next century proved, on the contrary, to
be the most fertile and revolutionary in the history of the field.
90
clidean geometry and Newtonian dynamics of colliding billiard balls
as a guide to understanding the physical world at large scales and
fast speeds. When objects travel at large fractions of the speed of
light, very different rules start describing their behavior.
• Quantum mechanics and string theory similarly showed that
classical physics is insufficient at very small scales. Bell’s Theorem
demonstrated clearly that quantum physics cannot even be fully
described as a consequence of probability theory and hidden
information: rather, a particle can be in a combination (or “super-
position”) of two states at the same time, where those two states
cancel each other out.
• “Heisenberg’s Uncertainty Principle”, mentioned above, puts a
firm upper limit on the precision with which the velocity and posi-
tion of a particle can even be measured.
• The three body problem, now famous after its central role in Liu
Cixin’s science-fiction series, shows that an interaction of even three
bodies, even under simple Newtonian physics, is chaotic enough
that its future behavior cannot be predicted with simple mathe-
matical problems. However, we still regularly solve trillion-body
problems well enough for everyday use by using seventeenth-
century abstractions such as “temperature” and “pressure”.
91
Global corporations powered unprecedented communications and intel-
ligence by harnessing their understanding of quantum physics to pack
ever-tinier electronics into the palms of their customers’ hands. The burn-
ing of wood and coal by millions of families has become the cause of
ecological devastation, political conflict, and world-spanning social move-
ments based on information derived from microscopic sensors scattered
around the world.
Biology
If the defining idea of 19th century macrobiology (concerning advanced
organisms and their interactions) was the “natural selection”, the defin-
ing idea of the 20th century analog was “ecosystems”. Where natural se-
lection emphasized the “Darwinian” competition for survival in the face
of scarce resources, the ecosystem view (closely related to the idea of “ex-
tended evolutionary synthesis”) emphasizes:
92
other organisms and help sustain them in turn, exemplifying entan-
glement, and relationality.122
• Epigenetics: We have discovered that genetics codes only a portion
of these behaviors, and “epigenetics” or other environmental fea-
tures play important roles in evolution and adaptation, showing the
multi-level and multidimensional causation inherent even to molec-
ular biology.
This shift was not simply a matter of scientific theory. It led to some of the
most important changes in human behavior and interaction with nature
of the twentieth century. In particular, the environmental movement and
the efforts it created to protect ecosystems, biodiversity, the ozone layer,
and the climate all emerged from and have relied heavily on this science
of “ecology”, to the point where this movement is often given that label.
Neuroscience
Modern neuroscience started in the late 19th century, when Camillo
Golgi, Santiago Ramón y Cajal, and collaborators isolated neurons and
their electrical activations as the fundamental functional unit of the
brain. This analysis was refined into clear physical models by the work
of Alan Hodgkin and Andrew Huxley, who built and tested on animals
their electrical theories of nervous communication. More recently, how-
ever, we have seen a series of discoveries that put chaos and complexity
theory at the core of how the brain functions:
93
by repeated co-firing, is perhaps one of the most elegant illustrations
of the idea of “relationality” in science, closely paralleling the way
we typically imagine human relationships developing
• Study of artificial neural networks: As early as the late 1950s, re-
searchers beginning with Frank Rosenblatt built the first “artificial
neural network” models of the brain. Neural networks have become
the foundation of the recent advances in “artificial intelligence”. Net-
works of trillions of nodes, each operating on fairly simple principles
inspired by neurons of activation triggered by crossing a threshold
determined by a linear combination of inputs, are the backbone of
the “foundation models” such as BERT and the GPT models.
94
While we do not have the space to review it in detail, a rich literature
provides quantitative and social scientific evidence for the explanatory
power of the ⿻ perspective 125 . Studies of industrial dynamics, of social
and behavioral psychology, of economic development, of organizational
cohesion, and much else, have shown the central role of social relation-
ships that create and harness diversity126 . Instead, we will pull out just
one example that perhaps will be both the most surprising and most re-
lated to the scientific themes above: the evolution of scientific knowledge
itself.
95
knowledge discovery process.128 Furthermore, they discover that a de-
centralized scientific community, made up of mostly independent, non-
overlapping teams that use a variety of methods and draw upon a broad
spectrum of earlier publications, tends to yield more reliable scientific
knowledge. In contrast, centralized communities marked by repeated col-
laborations and restricted to a limited range of approaches from previous
129 130
studies are likely to generate less reliable outcomes It also finds
strong connections between research team size and hierarchy with the
types of findings (risky and revolutionary v. normal science) developed
and documents the increasingly dominant role of teams (as opposed to in-
dividual research) in modern science.131 Although the largest innovations
tend to arise from a strong grounding in existing disciplines deployed in
unusual and surprising combinations 132 133 134 , it illustrates that most in-
centive structures used in science (based e.g. on publication quality and
citation count) create perverse incentives that limit scientific creativity.
These findings have led to the development of new metrics in scientific
communities that can reward innovations and offset these biases, creat-
ing a more ⿻ incentive set.135
Science policy research that directly accounts for and enhances ⿻ in sci-
ence demonstrates advantages for both the rigor of existing knowledge
and the discovery of novel insights. When more distinct communities and
their approaches work to validate existing claims, those independent per-
spectives ensure their findings are more robust to rebuttal and revision.
128
Andrey Rzhetsky, Jacob Foster, Ian Foster, and James Evans, “Choosing Experiments to
Accelerate Collective Discovery,” Proceedings of the National Academy of Sciences 112, no. 47
(November 9, 2015): 14569–74. https://doi.org/10.1073/pnas.1509757112.
129
Valentin Danchev, Andrey Rzhetsky, and James A Evans, “Centralized Scientific
Communities Are Less Likely to Generate Replicable Results.” ELife 8 (July 2, 2019),
https://doi.org/10.7554/elife.43094.
130
Alexander Belikov, Andrey Rzhetsky, and James Evans, “Prediction of robust scientific
facts from literature,” Nature Machine Intelligence 4.5 (2022): 445-454.
131
Lingfei Wu, Dashun Wang, and James Evans, “Large teams develop and small teams
disrupt science and technology,” Nature 566.7744 (2019): 378-382.
132
Yiling Lin, James Evans, and Lingfei Wu, “New directions in science emerge from dis-
connection and discord,” Journal of Informetrics 16.1 (2022): 101234.
133
Feng Shi, and James Evans, “Surprising combinations of research contents and contexts
are related to impact and emerge with scientific outsiders from distant disciplines,” Nature
Communications 14.1 (2023): 1641.
134
Jacob Foster, Andrey Rzhetsky, and James A. Evans, “Tradition and Innovation in Scien-
tists’ Research Strategies,” American Sociological Review 80.5 (2015): 875-908.
135
Aaron Clauset, Daniel Larremore, and Roberta Sinatra, “Data-driven predictions in the
science of science,” Science 355.6324 (2017): 477-480.
96
Moreover, when building analytic models based on ⿻ principles by sim-
ulating the diversity we see in the most ⿻ scientific ventures, discoveries
exceed those produced by normal human science.136
A future ⿻?
But these cannot be the only paths forward. ⿻ science has shown us the
power of harnessing a ⿻ understanding of the world to build physical
technology. We have to ask what a society and information technology
built on an analogous understanding of human societies would look like.
136
Jamshid Sourati, and James Evans, “Accelerating science with human-aware artificial
intelligence,” Nature Human Behaviour 7.10 (2023): 1682-1696.
97
Luckily, the twentieth century saw the systematic development of such a
vision, from philosophical and social scientific foundations to the begin-
nings of technological expression.
98
institutions that instantiated the idea hardly scratched the surface of what
democracy required. Norbert Wiener coined the term “cybernetics” for
a field studying such rich interactive systems. By perceiving the limits of
the box of modernity they highlighted even as they helped construct it,
these pioneers helped us imagine a social world outside it, pointing the
way towards a vision of a Connected Society that harnesses the potential
of collaboration across diversity.
Limits of Modernity
Private property. Individual identity and rights. Nation state democracy.
These are the foundations of most modern liberal democracies. Yet they
rest on fundamentally monist atomist foundations. Individuals are the
atoms; the nation state is the whole that connects them. Every citizen
is seen as equal and exchangeable in the eyes of the whole, rather than
part of a network of relationships that forms the fabric of society and in
which any state is just one social grouping. State institutions see direct,
unmediated relationships to free and equal individuals, though in some
cases federal and other subsidiary (e.g. city, religious or family) institu-
tions intercede.
Property
Simple and familiar forms of private property, with most restrictions and
impositions on that right being imposed by governments, are the most
common form of ownership in liberal democracies around the world.
Most homes are owned by a single individual or family or by a single land-
lord who rents to another individual or family. Most non-governmental
collective ownership takes the form of a standard joint stock company
governed by the principle of one-share-one-vote and the maximization of
shareholder value. While there are significant restrictions on the rights
of private property owners based on community interests, these over-
99
whelmingly take the form of regulations by a small number of govern-
mental levels, such as national, provincial/state and local/city. These prac-
tices are in sharp contrast to the property regimes that have prevailed
in most human societies throughout most of history, in which individual
ownership was rarely absolutely institutionalized and a diversity of “tra-
ditional” expectations governed how possessions can rightly be used and
exchanged. Such traditional structures were largely erased by modernity
and colonialism as they attempted to pattern property into a marketable
“commodity”, allowing exchange and reuse for a much broad set of pur-
poses than was possible within full social context.138
Identity
100
dren’s sports teams to medical care providers. These abstract representa-
tions enabled people to navigate the world not based on “who they know”
or “where they fit” in a tight social world but as who they are in an ab-
stracted universal sense relative to the state. This “WEIRD” (Western Ed-
ucated Industrialized Rich Democratic) universalism thus broke with the
social embedding of identity while thereby “freeing” people to travel and
interact much more broadly using modern forms of identification issued
by governments like passports and national identity cards. While other
critical credentials, such as educational attainment are more diverse, they
almost uniformly conform to a limited structure, implying one of a small
number of “degrees” derived from courses with a particular “Carnegie
unit” structure (in theory, 120 hours spent with an instructor), in con-
trast to the broad range of potential recognition that could be given to
learning attainment as illustrated in Figure A. In short, just as modernity
abstracted ownership private property, removing it from its many social
entanglements, it also abstracted personal identity from the social anchor-
ing that limited travel and the formation of new relationships.
**
**
Voting
101
or single-member districts), checks-and-balances (mutli- v. unicameral
legislatures, parliamentary v. presidential) and degrees of federalism
vary and recombine in a diverse ways. However both in popular imagi-
nation and in formal rules, the idea that numerical majorities (or in some
cases supermajorities) should prevail regardless of the social composi-
tion of groups is at the core of how democracy is typically understood.141
Again this contrasts with decision-making structures throughout most of
the world and most of history, including ones that involved widespread
and diverse representation by a range of social relationships, including
family, religious, relationships of fealty, profession, etc.142 We again see
the same pattern repeated: liberal states have “extracted” “individuals”
from their social embedding to make them exchangeable, detached
citizens of an abstracted national polity.
102
tems inhibited innovation when outsiders and industrialists found it im-
possible to navigate a thicket of local customs, private property cleared
a path to development and trade by reducing those who could inhibit
change. Administrators of the social welfare schemes that transformed
government in the twentieth century would have struggled to provide
broad access to pensions and unemployment benefits without a single,
flat, clear database of entitlements. And reaching subtle compromises
like those that went into the US Constitution, much less ones rich enough
to keep up with the complexity of the modern world, would have likely
undermined the possibility of democratic government spreading.
In fact these institutions were core to what allowed modern, wealthy, lib-
eral democracies to rise, flourish and rule, making what Joseph Heinrich
calls the “WEIRDest people in the world”. Just as the insights of Newto-
nian mechanics and Euclidean geometry gave those civilizations the phys-
ical power to sweep the earth, liberal social institutions gave them the so-
cial flexibility to do so. Yet just as the Euclidean-Newtonian worldview
turned out to be severely limited and naïve, ⿻ social science was born by
highlighting the limits of these atomist monist social systems.
103
• Tridemism, which, as we saw above in our chapter A View from
Yushan, had its economic leg firmly founded in Georgism;
• and the game Monopoly, which originated as an educational device
“The Landlord’s Game”, to illustrate how an alternate set of rules
could avoid monopoly and enable common prosperity.146
George wrote on many topics helping originate, for example, the idea of
a secret ballot. But he became most famous for advocating a “single tax”
on land, whose value he argued could never properly belong to an indi-
vidual owner. His most famous illustration asked readers to imagine an
open savannah full of beautiful but homogeneous land on which a settler
arrives, claiming some arbitrarily chosen large plot for her family. When
future settlers arrive, they choose to settle close to the first, so as to enjoy
company, divide labor and enjoy shared facilities like schools and wells.
As more settlers arrive, they continue to choose to cluster and the value
of land rises. In a few generations, the descendants of the first settler find
themselves landlords of much of the center of a bustling metropolis, rich
beyond imagination, through little effort of their own, simply because a
great city was built around them.
The value of their land, George insisted, could not justly belong to that
family: it was a collective product that should be taxed away. Such a tax
was not only just, it was crucial for economic development, as highlighted
especially by later economists including one of the authors of this book.
Taxes of this sort, especially when carefully designed as they were in Tai-
wan, ensure property owners must use their land productively or allow
others to do so. The revenue they raise can support shared infrastructure
(like those schools and wells) that gives value to the land, an idea called
the “Henry George Theorem”. We return to all these points in our chapter
on Social Markets.
104
Given this is a book about technology, an elegant illustration is the San
Francisco Bay Area, where both authors and George himself lived parts
of their lives and which has some of the most expensive land in the world.
To whom does the enormous value of this land belong?
• Certainly not to the homeowners who simply had the good fortune
of seeing the computer industry grow up around them. Then
perhaps to the cities in the region? Many reformers have argued
these cities, which are in any case fragmented and tend to block
development, can hardly take credit for the miraculous increase in
land values.
• Then to the US? But of course the software industry and internet are
global phenomena.
• Then to the world in general? Beyond the essential non-existence of
a world government that could meaningfully receive and distribute
the value of such land, abstracting all land value to such heights is
a bit of an abdication: clearly many of the entities above are more
relevant than simply “the entire world” to the value of the software
industry; if we followed that path, global government would end up
managing everything simply by default.
To make matters yet more complex, the revenue earned on the property
is but one piece of what it means to own. Legal scholars typically describe
147
AnnaLee Saxenian, The New Argonauts: Regional Advantage in a Global Economy (Cam-
bridge, MA: Harvard University Press, 2007).
105
property as a bundle of rights: of “usus” (to access the land), “abusus” (to
build on or dispose of it) and “fructus” (to profit from it). Who should
be able to access the land of the Bay Area under what circumstances?
Who should be allowed to build what on it, or to sell exclusive rights to
do so to others? Most of these questions were hardly even considered
in George’s writing, much less settled. In this sense, his work is more a
helpful invitation to step beyond the easy answers private property offers,
which is perhaps why his enormously influential ideas have only been
partly implemented in a small number of (admittedly highly successful)
places like Estonia and Taiwan.
The world George invites us to reflect on and imagine how to design for
is thus one of ⿻ value, one where a variety of entities, localized at differ-
ent scales (universities, municipalities, nation states, etc.) all contribute
to differing degrees to create value, just as networks of waves and neu-
rons contribute to differing degrees to the probabilities of particles being
found in various positions or thoughts occurring in a mind. And for both
justice and productivity, property and value should belong, in differing
degrees, to these intersecting social circles. In this sense, George was a
founder of ⿻ social science.
106
Georg Simmel and the intersectional (in)dividual
**
107
Figure 3-2-B. Georg Simmel. Source: Wikipedia, public domain.
**
In his view, humans are deeply social creatures and thus their identities
are deeply formed through their social relations. Humans gain crucial
aspects of their sense of self, their goals, and their meaning through par-
ticipation in social, linguistic, and solidaristic groups. In simple societies
(e.g., isolated, rural, or tribal), people spend most of their life interact-
ing with the kin groups we described above. This circle comes to (pri-
marily) define their identity collectively, which is why most scholars of
simple societies (for example, anthropologist Marshall Sahlins) tend to
favor methodological collectivism.150 However, as we noted above, as so-
148
Georg Simmel, Soziologie: Untersuchungen Über Die Formen Der Vergesellschaftung,
Prague: e-artnow, 2017.
149
Miloš Broćić, and Daniel Silver, “The Influence of Simmel on American Sociol-
ogy since 1975,” Annual Review of Sociology 47, no. 1 (July 31, 2021): 87–108,
https://doi.org/10.1146/annurev-soc-090320-033647.
150
Marshall Sahlins, Stone Age Economics (Chicago: Aldine-Atherton, 1972).
108
cieties urbanize social relationships diversify. People work with one cir-
cle, worship with another, support political causes with a third, recreate
with a fourth, cheer for a sports team with a fifth, identify as discrim-
inated against along with a sixth, and so on. These diverse affiliations
together form a person’s identity. The more numerous and diverse these
affiliations become, the less likely it is that anyone else shares precisely
the same intersection of affiliations.
As this occurs, people come to have, on average, less of their full sense
of self in common with those around them at any time; they begin to feel
“unique” (to put a positive spin on it) and “isolated/misunderstood” (to put
a negative spin on it). This creates a sense of what he called “qualitaitive
individuality” that helps explain why social scientists focused on complex
urban settings (such as economists) tend to favor methodological individ-
ualism. However, ironically as Simmel points out, such “individuation”
occurs precisely because and to the extent that the “individual” becomes
divided among many loyalties and thus dividual. Thus, while methodolog-
ical individualism (and what he called the “egalitarian individualism” of
nation states we highlighted above that it justfied) takes the “(in)dividual”
as the irreducible element of social analysis, Simmel instead suggests that
individuals become possible as an emergent property of the complexity
and dynamism of modern, urban societies.
Thus the individual that the national identity systems seek to strip away
from the shackles of communities actually emerges from their growth,
proliferation and intersection. As a truly just and efficient property
regime would recognize and account for such networked interdepen-
dence, identity systems that truly empower and support modern life
would need to mirror its ⿻ structure.
109
terest groups. The critical pathway to creating such new circles was the
establishment of places (e.g. workman’s halls) or publications (e.g. work-
ing men’s newspapers) where this new group could come to know one
another and understand, and thus to have things in common they do not
have with others in the broader society. Such bonds were strengthened
by secrecy, as shared secrets allowed for a distinctive identity and culture,
as well as the coordination in a common interest in ways unrecognizable
by outsiders.151 Developing these shared, but hidden, knowledge allows
the emerging social circle to act as a collective agent.
In his 1927 work that defined his political philosophy, The Public and its
Problems, John Dewey (who we meet in A View from Yushan) considered
the political implications and dynamics of these “emergent publics” as he
called them.152 Dewey’s views emerged from a series of debates he held, as
leader of the “democratic” wing of the progressive movement after his re-
turn from China with left-wing technocrat Walter Lippmann, whose 1922
book Public Opinion Dewey considered “the most effective indictment of
democracy as currently conceived”.153 In the debate, Dewey sought to re-
deem democracy while embracing fully Lippmann’s critique of existing
institutions as ill-suited to an increasingly complex and dynamic wold.
110
Markets fail because these technologies create market power, pervasive
externalities (such as “network externalities”), and more generally ex-
hibit “supermodularity” (sometimes called “increasing returns”), where
the whole of the (e.g. railroad network) is greater than the sum of its parts;
see our chapter on Social Markets. Capitalist enterprises cannot account
for all the relevant “spillovers” and to the extent they do, they accumu-
late market power, raise prices and exclude participants, undermining
the value created by increasing returns. Leaving these interdependen-
cies “to the market” thus exacerbates their risks and harms while failing
to leverage their potential.
111
such mirrors is to perceive a new form of interdependence (e.g. solidarity
among workers, the carbon-to-global-warming chain), explain it to those
involved by both word and deed, and thereby empower a new public to
come into existence. Historical examples are union leaders, founders of
rural electricity cooperatives, and the leaders who founded the United
Nations. Once this emergent public is understood, recognized, and em-
powered to govern the new interdependence, the role of the mirror fades
away, just as Washington returned to Mount Vernon.
112
networks”.154 The word was drawn from a Greek analogy of a ship di-
rected by the inputs of its many oarsmen.
Across all of these authors, we see many common threads. We see appre-
ciation of the ⿻ and layered nature of society, which often shows even
greater complexity than other phenomena in the natural sciences: while
154
Norbert Wiener, Cybernetics, Or Control and Communication in the Animal and the Ma-
chine (Paris: Hermann & Cie, 1948).
155
Norbert Wiener, Human Use of Human Beings (Boston: Houghton Mifflin, 1950).
113
an electron typically orbits a single atom or molecule, a cell is part of one
organism, and a planet orbits one star, in human society each person, and
even each organization, is part of multiple intersecting larger entities, of-
ten with no single of them being fully inside any other. But how might
these advancements in the social sciences translate into similarly more
advanced social technologies? This is what we will explore in the next
chapter.
⿻ launches
This was the mission pursued by the younger generation that followed in
Wiener’s lead but had a more human/social scientific background. This
156
J.C.R. Licklider, “Computers and Government” in Michael L. Dertouzos and Joel Moses
eds., The Computer Age: A Twenty-Year View (Cambridge, MA: MIT Press, 1980)
114
generation included a range of pioneers of applied cybernetics such as
the anthropologist Margaret Mead157 (who heavily influenced the aesthet-
ics of the internet), W. Edwards Deming158 (whose influence on Japanese
and to a lesser extent Taiwanese inclusive industrial quality practices we
saw above) and Stafford Beer159 (who pioneered business cybernetics and
has become something of a guru for social applications of Wiener’s ideas
including in Chile’s brief cybernetic socialist regime of the early 1970s).
They built on his vision in a more pragmatic mode, shaping technologies
that defined the information era. Yet the most ambitious and systemic
impact of this work was heralded by a blip moving across the sky in Octo-
ber 1957, a story masterfully narrated by M. Mitchell Waldrop in his The
Dream Machine, from which much of what follows derives.160
The launch by the Soviet Union of the first orbital satellite was followed
a month later by the Gaither Committee report, claiming that the US had
fallen behind the Soviets in missile production. The ensuing moral panic
forced the Eisenhower administration into emergency action to reassure
the public of American strategic superiority. Yet despite, or perhaps be-
cause of, his own martial background, Eisenhower deeply distrusted what
he labeled America’s “military industrial complex”, while having bound-
less admiration for scientists.161 He thus aimed to channel the passions of
the Cold War into a national strategy to improve scientific research and
education.162
While that strategy had many prongs, a central one was the estab-
157
Fred Turner, The Democratic Surround: Multimedia and American Liberalism from World
War II to the Psychedelic Sixties (Chicago: University of Chicago Press, 2013).
158
While we do not have space to pursue Deming’s or Mead’s stories in anything like the
depth we do the development of the internet, in many ways the work of these two pioneers
parallels many of the themes we develop and in the industiral and cultural spheres laid the
groundwork for ⿻ just as Licklider and his disciples did in computation. UTHSC. “Deming’s
14 Points,” May 26, 2022. https://www.uthsc.edu/its/business-productivity-solutions/lean-
uthsc/deming.php.
159
Dan Davies, The Unaccountability Machine: Why Big Systems Make Terrible Decisions -
and How The World Lost its Mind (London: Profile Books, 2024).
160
M. Mitchell Waldrop, The Dream Machine (New York: Penguin, 2002).
161
Katie Hafner and Matthew Lyon, Where the Wizards Stay up Late: The Origins of the
Internet (New York: Simon & Schuster, 1998).
162
Dickson, Paul. “Sputnik’s Impact on America.” NOVA | PBS, November 6, 2007.
https://www.pbs.org/wgbh/nova/article/sputnik-impact-on-america/.
115
lishment, within the Department of Defense, of a quasi-independent,
scientifically administered Advanced Research Projects Agency (ARPA)
that would harness expertise from universities to accelerate ambitious
and potentially transformative scientific projects with potential defense
applications.
While ARPA began with many aims, some of which were soon assigned to
other newly formed agencies, such as the National Aeronautics and Space
Administration (NASA), it quickly found a niche as the most ambitious gov-
ernment supporter of ambitious and “far out” projects under its second
director, Jack Ruina. One area was to prove particularly representative
of this risk-taking style: the Information Processing Techniques Office led
by Joseph Carl Robnett (JCR) Licklider.
Licklider hailed from a different field still from the political economy of
George, sociology of Simmel, political philosophy of Dewey and mathe-
matics of Wiener: “Lick”, as he was commonly known, received his PhD
in 1942 in the field of psychoacoustics. After spending his early career de-
veloping applications to human performance in high-stakes interactions
with technology (especially aviation), his attention increasingly turned to
the possibility of human interaction with the fastest growing form of ma-
chinery: the “computing machine”. He joined the Massachusetts Institute
of Technology (MIT) to help found Lincoln Laboratory and the psychol-
ogy program. He moved to the private sector as Vice President of Bolt,
Beranek and Newman (BBN), one of the first MIT-spin off research start-
ups.
116
These visions turned out to arrive at precisely the right moment for ARPA,
as it was in search of bold missions with which it could secure its place
in the rapidly coalescing national science administration landscape. Ru-
ina appointed Lick to lead the newly-formed Information Processing Tech-
niques Office (IPTO). Lick harnessed the opportunity to build and shape
much of the structure of what became the field of Computer Science.
While Lick spent only two years at ARPA, they laid the groundwork for
much of what followed in the next forty years of the field. He seeded
a network of “time sharing” projects around the US that would enable
several individual users to directly interact with previously monolithic
large-scale computing machines, taking a first step towards the age of per-
sonal computing. The five universities thus supported (Stanford, MIT, UC
Berkeley, UCLA and Carnegie Mellon) went on to become the core of the
academic emerging field of computer science.
This project bore fruit in a variety of ways, both immediately and longer-
term. Engelbart quickly invented many foundational elements of per-
https://groups.csail.mit.edu/medg/people/psz/Licklider.html.
164
“Douglas Engelbart Issues ‘Augmenting Human Intellect: A
Conceptual Framework’ : History of Information,” October 1962.
https://www.historyofinformation.com/detail.php?id=801.
165
J.C.R. Licklider, “Memorandum For: Members and Affiliates of the Intergalac-
tic Computer Network”, 1963 available at https://worrydream.com/refs/Licklider_1963_-
_Members_and_Affiliates_of_the_Intergalactic_Computer_Network.pdf.
117
sonal computing, including the mouse, a bitmapped screen that was a
core precursor to the graphical user interface and hypertext; his demon-
stration of this work, six short years after Lick’s initial funding, as the
“oNLine system” (NLS) is remembered as “the mother of all demos” and
a defining moment in the development of personal computers.166 This
in turn helped persuade Xerox Corporation to establish their Palo Alto
Research Center (PARC), which went on to pioneer much of personal com-
puting. US News and World Report lists four of the five departments Lick
funded as the top four computer science departments in the country.167
Most importantly, after Lick’s departure to the private sector, the Inter-
galactic Computer Network developed into something less fanciful and
more profound under the leadership of his collaborator, Robert W. Tay-
lor.
A network of networks
Taylor and Lick were naturally colleagues. While Taylor never completed
his PhD, his research field was also psychoacoustics and he served as
Lick’s counterpart at NASA, which had just split from ARPA, during Lick’s
leadership at IPTO. Shortly following Lick’s departure (in 1965), Taylor
moved to IPTO to help develop Lick’s networking vision under the lead-
ership of Ivan Sutherland, who then returned to academia, leaving Tay-
lor in charge of IPTO and the network that he more modestly labeled the
ARPANET. He used his authority to commission Lick’s former home of
BBN to build the first working prototype of the ARPANET backbone. With
momentum growing through Engelbart’s demonstration of personal com-
puting and ARPANET’s first successful trials, Lick and Taylor articulated
their vision for the future possibilities of personal and social computing in
their 1968 article “The Computer as a Communication Device”, describing
much of what would become the culture of personal computing, internet
and even smartphones several decades later.168
By 1969, Taylor felt the mission of the ARPANET was on track to success
and moved on to Xerox PARC, where he led the Computer Science Labora-
166
Engelbart, Christina. “Firsts: The Demo - Doug Engelbart Institute.” Doug Engelbart
Institute, n.d. https://dougengelbart.org/content/view/209/.
167
https://www.usnews.com/best-colleges/rankings/computer-science-overall
168
J.C.R. Licklider and Robert Taylor, “The Computer as a Communication Device” Science
and Technology 76, no. 2 (1967): 1-3.
118
tory in developing much of this vision into working prototypes. These
in turn became the core of the modern personal computer that Steve
Jobs famously “stole” from Xerox to build the Macintosh, while ARPANET
evolved into the modern internet.169 In short, the technological revolu-
tions of the 1980s and 1990s trace clearly back to this quite small group
of innovators in the 1960s. While we will turn to these more broadly-
known later developments shortly, it is worth lingering on the core of the
research program that made them possible.
At the core of the development of what became the internet was replac-
ing centralized, linear and atomized structures with ⿻ relationships and
governance. This happened at three levels that eventually converged in
the early 1990s as the World Wide Web:
All three ideas had their seeds at the edges of the early community Lick
formed and grew into core features of the ARPANET community.
119
entrenched.
Despite the apparent threat it posed to that private interest, packet switch-
ing caught the positive attention of another organization that owed its
genesis to the threat of devastating attacks: ARPA. At a 1967 conference,
ARPANET’s first program manager, Lawrence Roberts, learned of packet
switching through a presentation by Donald Davies, who concurrently
and independently developed the same idea as Baran, and drew on
Baran’s arguments that he soon learned of to sell the concept to the team.
Figure A shows the decentralized logical structure of early ARPANET that
resulted
**
**
120
democratic and pluralistic media and developed into. an artist. Follow-
ing these early experiences, he devoted his life beginning in his early
20s to the development of “Project Xanadu”, which aimed to create a
revolutionary human-centered interface for computer networks. While
Xanadu had so many components that Nelson considered indispensable
that it was not released fully until the 2010s, its core idea, co-developed
with Engelbart, was “hypertext” as Nelson labeled it.
While Engelbart and Nelson were lifelong friends and shared many simi-
lar visions, they took very different paths to realizing them, each of which
(as we will see) held an important seed of truth. Engelbart, while also
a visionary, was a consummate pragmatist and a smooth political oper-
ator, and went on to be recognized as the pioneer of personal comput-
ing. Nelson was an artistic purist whose relentless pursuit over decades
of Xanadu embodying all of his seventeen enumerated principles buried
his career.
121
faces and networking protocols proliferated, retreated from the pursuit
of perfection. Engelbart, and even more his colleagues across the project,
instead began to develop a culture of collegiality, facilitated by the com-
munication network the were building, across the often competing uni-
versities they worked at. The physical separation made tight coordina-
tion of networks impossible, but work to ensure minimal inter-operation
and spreading of clear best practices became a core characteristic of the
ARPANET community.
122
nents were made available to broader populations, businesses like Apple
and Microsoft began to make cheaper and less user-friendly machines
available broadly. Struggling to commercialize its inventions, Xerox al-
lowed Apple Co-Founder Steve Jobs access to its technology in exchange
for a stake, resulting in the Macintosh’s ushering in of modern personal
computing and Microsoft’s subsequent mass scaling through their Win-
dows operating system. By 2000, a majority of Americans had a personal
computer in their homes. Internet use has steadily spread, as pictured in
Figure B.
**
Figure 3-3-B. Population share with internet access over time in the world
and various regions. Source: Our World in Data.174
**
174
World Bank, “World Development Indicators” December 20, 2023 at
https://datacatalog.worldbank.org/search/dataset/0037712/World-Development-Indicators.
123
The internet and its discontents
And much as it had developed in parallel from the start, the internet grew
to connect those personal computers. During the late 1960s and early
1970s, a variety of networks grew up in parallel to the largest ARPANET,
including at universities, governments outside the United States, interna-
tional standards bodies and inside corporations like BBN and Xerox. Un-
der the leadership of Kahn and Cerf and with support from ARPA (now
renamed DARPA to emphasize its “defense” focus), these networks began
to harness the TCP/IP protocol to inter-operate. As this network scaled,
DARPA looked for another agency to maintain it, given the limits of its
advanced technology mission. While many US government agencies took
their hand, the National Science Foundation had the widest group of sci-
entific participants and their NSFNET quickly grew to be the largest net-
work, leading ARPANET to be decommissioned in 1990. At the same time,
NSFNET began to interconnect with networks in other wealthy countries.
One of those was the United Kingdom, where researcher Tim Berners-Lee
in 1989 proposed a “web browser”, “web server” and a Hypertext Mark-
Up Language (HTML) that fully connected hypertext to packet-switching
and made internet content far more available to a broad set of end users.
From the launch of Berners-Lee’s World Wide Web (WWW) in 1991, inter-
net usage grew from roughly 4 million people (mostly in North America)
to over 400 million (mostly around the world) by the end of the millen-
nium. With internet start-ups booming in Silicon Valley and life for many
beginning its migration online though the computers many now had in
their home, the era of networked personal computing (of “The Computer
as a Communication Device”) had arrived.175
In the boom and bust euphoria of the turn of the millennium, few people
in the tech world paid attention to the specter haunting the industry, the
long-forgotten Ted Nelson. Stuck on his decades-long quest for the ideal
networking and communication system, Nelson ceaselessly warned of the
insecurity, exploitative structure and inhumane features of the emerging
WWW design. Without secure identity systems (Xanadu Principles 1 and
3), a mixture of anarchy and land-grabs by nation states and corporate
actors would be inevitable. Without embedded protocols for commerce
175
Licklider and Taylor, op. cit.
124
(Xanadu Principles 9 and 15), online work would become devalued or
the financial system controlled by monopolies. Without better structures
for secure information sharing and control (Xanadu Principles 8 and 16),
both surveillance and information siloing would be pervasive. Whatever
its apparent success, the WWW-Internet was doomed to end badly.
The wider internet adoption spread, the the less relevant such complaints
appeared. Government did not end up playing as central of a role as
he imagined, but by 2000 most of the few commentators who were even
aware of his warnings assumed we were surely on the path of Lick’s sce-
nario 2. Yet in a few places, concern was growing by late in the first decade
of the new millennium. Virtual reality pioneer Jaron Lanier sounded the
176
Licklider, “Comptuers and Government”, op. cit.
125
alarm in two books You are Not a Gadget and Who Owns The Future?, high-
lighting Nelson’s and his own version of Lick’s concerns about the future
of the internet.177 While these initially appeared simply an amplification
of Nelson’s fringe ideas, a series of world events that we discuss in the In-
formation Technology and Democracy: a Widening Gulf above eventually
brought much of the world around to seeing the limitations of the inter-
net economy and society that had developed, helping ignite the Techlash.
These patterns bore a striking resemblance to Lick and Nelson’s warnings.
The victory of the internet may have been far more Pyrrhic than it at first
seemed.
It was the warning signs that motivated Lick to put pen to paper in 1980 as
the focus of ARPA (now DARPA) shifted away from support for network-
ing protocols towards more directly weapons-oriented research. Lick saw
this resulting from two forces on opposite ends of the political spectrum.
On the one hand, with the rise of “small government conservatism” that
would later be labeled “neoliberalism”, government was retreating from
proactively funding and shaping industry and technology. On the other
hand, the Vietnam War turned much of the left against the role of the de-
fense establishment in shaping research, leading to the Mansfield Amend-
ments of 1970, 1971 and 1973 that prohibited ARPA from funding any re-
search not directly related to the “defense function”.178 Together these
were redirecting DARPA’s focus to technologies like cryptography and ar-
tificial intelligence that were seen as directly supporting military objec-
tives.
Yet even if the attention of the US government had not shifted, the internet
177
Jaron Lanier, You Are Not a Gadget: A Manifesto (New York: Vintage, 2011) and Who
Owns the Future? (New York: Simon & Schuster, 2014).
178
Phil Williams, “Whatever Happened to the Mansfield Amendment?” Survival: Global
Politics and Strategy 18, no. 4 (1976): 146-153 and “The Mansfield Amendment of 1971” in
The Senate and US Troops in Europe (London, Palgrave Macmillan: 1985): pp. 169-204.
126
was quickly growing out of its purview and control. As it became an in-
creasingly global network, there was (as Dewey predicted) no clear public
authority to make the investments needed to deal with the socio-technical
challenges needed to make a network society a broader success. To quote
Lick
The declining role of public and social sector investment left core
functions/layers that leaders like Lick and Nelson saw for the internet
(e.g. identity, privacy/security, asset sharing, commerce) to which we
return below absent. While there were tremendous advances to come in
both applications running on top of the internet and in the WWW, much
of the fundamental investment in protocols was wrapping up by the time
of Lick’s writing. The role of the public and social sectors in defining and
innovating the network of networks was soon eclipsed.
Into the resulting vacuum stepped the increasingly eager private sector,
flush with the success of the personal computer and inflated by the
stirring celebrations of Reagan and Thatcher. While the International
Business Machines (IBM) that Lick feared would dominate and hamper
the internet’s development proved unable to key pace with technological
change, it found many willing and able successors. A small group of
telecommunications companies took over the internet backbone that
the NSF freely relinquished. Web portals, like America Online and
127
Prodigy came to dominate most Americans’ interactions with the web, as
Netscape and Microsoft vied to dominate web browsing. The neglected
identity functions were filled by the rise of Google and Facebook. Absent
digital payments were filled in by PayPal and Stripe. Absent the proto-
cols for sharing data, computational power and storage that motivated
work on the Intergalactic Computer Network in the first place, private
infrastructures (often called “cloud providers”) that empowered such
sharing (such as Amazon Web Services and Microsoft Azure) became the
platforms for building applications.179
Flashbacks
Yet faded dreams have a stubborn persistence, nagging throughout a day.
While Lick passed away in 1990, many of the early internet pioneers lived
to see their triumph and tragedy.
179
Ben Tarnoff, Internet for the People: The Fight for Our Digital Future (New York: Verso,
2022).
128
**
**
129
Nodes of light
This open, non-profit collaborative project has become the leading global
resource for reference and broadly shared factual information.180 In
contrast to the informational fragmentation and conflict that pervades
much of the digital sphere that we highlighted in the introduction,
Wikipedia has become a widely accepted source of shared understand-
ing. It has done this through harnessing large-scale, open, collaborative
self-governance.181 Many aspects of this success are idiosyncratic and
attempts to directly extend the model have had mixed success; trying
to make such approaches more systematic and pervasive is much of
our focus below. But the scale of the success is quite remarkable.182
Recent analysis suggests that most web searches lead to results that
prominently include Wikipedia entries. For all the celebration of the
commercial internet, this one public, deliberative, participatory, and
roughly consensual resource is perhaps its most common endpoint.
180
In fact, researchers have studied reading patterns in terms of time spent by users across
the globe. Nathan TeBlunthuis, Tilman Bayer, and Olga Vasileva, “Dwelling on Wikipedia,”
Proceedings of the 15th International Symposium on Open Collaboration, August 20, 2019,
https://doi.org/10.1145/3306446.3340829, (pp. 1-14).
181
Sohyeon Hwang, and Aaron Shaw. “Rules and Rule-Making in the Five Largest
Wikipedias.” Proceedings of the International AAAI Conference on Web and Social Media 16
(May 31, 2022): 347–57, https://doi.org/10.1609/icwsm.v16i1.19297 studied rule-making on
Wikipedia using 20 years of trace data.
182
In an experiment, McMahon and colleagues found that a search engine with Wikipedia
links increased relative click-through-rate (a key search metric) by 80% compared to a
search engine without Wikipedia links. Connor McMahon, Isaac Johnson, and Brent Hecht,
“The Substantial Interdependence of Wikipedia and Google: A Case Study on the Relation-
ship between Peer Production Communities and Information Technologies,” Proceedings of
the International AAAI Conference on Web and Social Media 11, no. 1 (May 3, 2017): 142–
51, https://doi.org/10.1609/icwsm.v11i1.14883. Motivated by this work, an audit study found
that Wikipedia appears in roughly 70 to 80% of all search results pages for “common” and
“trending” queries. Nicholas Vincent, and Brent Hecht, “A Deeper Investigation of the Im-
portance of Wikipedia Links to Search Engine Results,” Proceedings of the ACM on Human-
Computer Interaction 5, no. CSCW1 (April 13, 2021): 1–15, https://doi.org/10.1145/3449078.
130
The concept of “Wiki,” from which Wikipedia derives its name, comes
from a Hawaiian word meaning “quick,” and was coined by Ward Cun-
ningham in 1995 when he created the first wiki software, WikiWikiWeb.
Cunningham aimed to extend the web principles highlighted above of hy-
pertextual navigation and inclusive ⿻ governance by allowing the rapid
creation of linked databases.183 Wikis invite all users, not just experts, to
edit or create new pages using a standard web browser and to link them
to one another, creating a dynamic and evolving web landscape in the
spirit of ⿻.
131
tions underlying standard economic analysis.186
**
**
OSS has expanded across various internet and computing sectors, even
earning support from formerly hostile companies like Microsoft, now
owner of leading OSS service company GitHub and employer of one of
186
Yochai Benkler, “Coase’s Penguin, Or, Linux and the Nature of the Firm,” n.d.
http://www.benkler.org/CoasesPenguin.PDF.
187
GitHub Innovation graph at https://github.com/github/innovationgraph/
188
World Bank, “Population ages 15-64, total” at https://data.worldbank.org/indicator/SP.POP.1564.TO.
189
Department of Household Registration, Ministry of the Interior, “Household Registration
Statistics in January 2024” at https://www.ris.gov.tw/app/en/2121?sn=24038775.
132
the authors of this book. This represents the practice of ⿻ on a large
scale; emergent, collective co-creation of shared global resources. Com-
munities form around shared interests, freely build on each other’s work,
vet contributions through unpaid maintainers, and “fork” projects into
parallel versions in case of irreconcilable differences. The protocol “git”
supports collaborative tracking of changes, with platforms like GitHub
and GitLab facilitating millions of developers’ participation. This book
is a product of such collaboration and has been supported by Microsoft
and GitHub.
133
Yet, as we highlighted above, Lanier carried forward not only the cultural
vision of the computer as a communication device; he also championed
Nelson’s critique of the gaps and failings of what became the internet. He
particularly emphasized the lack of base layer protocols supporting pay-
ments, secure data sharing and provenance and financial support for OSS.
This advocacy combined with the emergence of (pseudonymous) Satoshi
Nakamoto’s invention of the Bitcoin protocol in 2008 to inspire a wave of
work on these topics in and around “web3” communities that harnesses
cryptography and blockchains to create shared understanding of prove-
nance and value.192 While many projects in the space have been influ-
enced by Libertarianism and hyper-financialization, the enduring con-
nection to original aspirations of the internet, especially under the leader-
ship of Vitalik Buterin (who founded Ethereum, the largest smart contract
platform), has inspired a number of projects, like GitCoin and decentral-
ized identity, that are central inspirations for ⿻ today as we explore be-
low.
Finally and perhaps most closely connected to our own paths to ⿻ have
been the movements to revive the public and multisectoral spirit and
ideals of the early internet by strengthening the digital participation of
governments and democratic civil society. These “GovTech” and “Civic
Tech” movements have harnessed OSS-style development practices to im-
prove the delivery of government services and bring the public into the
process in a more diverse range of ways. Leaders in the US include Jen-
nifer Pahlka, founder of GovTech pioneer Code4America, and Beth Si-
192
Satoshi Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System” at
https://assets.pubpub.org/d8wct41f/31611263538139.pdf.
134
mone Noveck, Founder of The GovLab.193
135
Estonia, as well as adopting elements of digitized democratic participa-
tion. Singapore has the most ambitious Georgist-style policies on earth
and harnesses more creative ⿻ economic mechanisms and fundamen-
tal protocols than any other jurisdiction. South Korea has invested ex-
tensively in both digital services and digital competence education. New
Zealand has pioneered internet-based voting and harnessed civil society
to improve public service inclusion. Iceland has harnessed digital tools
to extend democratic participation more extensively than any other juris-
diction. Kenya, Brazil and especially India have pioneered digital infras-
tructure for development. We will return to many of these examples in
what follows.
Yet none of these have institutionalized the breadth and depth of ⿻ ap-
proaches to socio-technical organization across sectors that Taiwan has.
It is thus more challenging to take these cases as broad national exam-
ples on which to found imagination of what ⿻ could mean to the world
if it could scale up to bridge the divides of nation, culture and sector and
forming both the infrastructural foundation and the mission of global dig-
ital society. With that anchoring example and additional hope from these
other cases, we now turn to painting in greater depth the opportunity a
⿻ global future holds.
136
Section 4: Freedom
137
She envisions harnessing her phone’s might,
Buying magical potions, adventuring through the night.
Internet founder JCR Licklider (Lick) saw a far wider range of fundamen-
tal protocols as foundational to a network society than have thus far been
manifest in internet protocols. Yet his analysis was more a laundry list
than a philosophical analysis. To articulate a clear vision of the founda-
tions of a ⿻ society, in this chapter we draw on the definitional concepts
of ⿻ to outline what these protocols should consist of and the role they
should play socially. Then, in the rest of this part of the book, we system-
atically explore these, the limits to their implementation today and how
they might be more fully achieved.
138
Rights as foundation of democracy
Rights are a ubiquitous feature underpinning democratic life. Most sim-
ply imagined, democracy (etymologically “rule of the people”) is a system
of government, of collective decision-making by the people, rather than
a set of actions a government takes towards its people. Yet evolving from
its ancient Athenian origins, shaped by Enlightenment philosophy and
forged through revolution, democracy came to also enshrine a set of fun-
damental freedoms and rights. While these “rights” have varied across
democracies in both time and space, broad patterns are not only identi-
fiable but have formed the foundation of documents such as the United
Nations Universal Declaration of Human Rights (UDHR), including equal-
ity, life, liberty, personal security, speech, thought, conscience, property,
association—to name a few. While there are important debates around
the edges of these principles, in broad outlines they define and defend
core aspects of the nearly universal characteristics of human behavior as
highlighted by leading anthropologists like Nicholas Christakis.197 These
include what Christakis calls the “social suite”, the nearly universal ten-
dency of humans to have a sense of personal identity, to form familial re-
lationships as well as long-term friendships, for these to form the basis of
broader cooperative social networks and groups towards which members
are “biased”, to have differentiated trust within these networks based on
relationships and capacities and to learn from each other.
139
they cannot coordinate to contest decisions by those in power. If they can-
not seek livelihood through a diversity of economic interactions (for ex-
ample, because they are enslaved either by the state or a private master),
we should expect their expressed politics to obey their masters, not their
inner voice. Without rights, elections become shams.
Almost all democracies share a focus, and expect others to share a focus,
on the preservation of some strongly overlapping set of such rights of
speech and association as basic preconditions for democratic function-
ing. For example, Scandinavian countries have emphasized the impor-
tance of what might be called “positive freedom of speech,” namely that
every citizen regardless of means has a viable path for their voice to be
heard, whereas others such as the US, emphasize “negative freedom of
speech,” that no one may impede through government intervention the
expression of a view. Some societies (e.g. in Europe) tend to emphasize the
importance of privacy as a fundamental right necessary for civil society
to exist independently of the state and thus for politics to be possible. Oth-
ers (e.g. in Asia) tend to emphasize rights of assembly and association as
more central to democratic function. Despite these variances, the under-
lying assumption of rights of speech and association is that they protect
agency, so citizens may have the autonomy to form and advance associa-
tions for their common interests, so these common interests can be heard
199
Richard Evans, The Coming of the Third Reich (New York: Penguin, 2005).
200
Steven Levitsky, Competitive Authoritarianism: Hybrid Regimes after the Cold War (Cam-
bridge, UK: Cambridge University Press, 2012).
140
politically.
Rights are also often aspirations and goals, rather than fixed and attain-
able realities. Much of the history of the US is a drama about the fulfill-
ment of founding aspirations to equality that were long denied.202 Many
positive rights (e.g. a quality education, decent housing) are outside the
capacity or mandate of governments, especially in developing countries,
to immediately deliver but nonetheless are testaments to the deepest as-
pirations of a people.203
201
Hurst Hannum, “The Status of the Universal Declaration of Human Rights in National
and International Law” Georgia Journal of International and Comparative Law 25, no. 287
(1995-1996): 287-397.
202
Jill Lepore, These Truths: A History of the United States (New York: Norton, 2018).
203
Jamal Greene, How Rights Went Wrong: How our Obsession with Rights is Tearing Amer-
ica Apart (Boston: Mariner, 2021).
141
Operating systems as the foundation of applications
Operating systems (OSs) are a ubiquitous feature underpinning digital
life. Almost every digital interaction you have had depends on an un-
derlying OS. Linux is the most ambitious and successful open-source soft-
ware project of all time. Windows, produced by one of our employers,
is another ubiquitous piece of software. iOS and Android power most
smartphones.
OSs roughly define the possibility space for applications that run on them.
There are basic traits in terms of performance, appearance, speed, ma-
chine memory usage—to name a few—that applications running on a par-
ticular OS share and must respect to work on that platform. For example,
iOS and Android allow for touch interfaces, while earlier smartphones
(like the Blackberry or Palm) relied on styluses or keyboard entry. Even
today, iOS and Android apps have different looks, feels and performance
characteristics. Applications are coded for one (or possibly multiple) of
these platforms, drawing on the processes built into the OS to determine
what their application can and cannot do, what it has to build bespoke
and what it can rely on underlying processes for.
Boundaries are rarely sharp. While Macintosh was the first mass-market
computer with a graphical user interface (GUI) OS
142
**
**
143
expectations they can have about other applications, defining the terrain
of the easily possible.
OSs also defend their integrity in a variety of ways; while security patches
are the sharpest and most adversarial, they coexist with developer ed-
ucation, the building of a broad ecosystem of developer support, the
gradual development of customer usage and expectations, and more.
Applications built on an OS not only support its internal development
but also facilitate updates and even new OSs that can enhance or even
rival the original OS. And while different OSs differ and compete, they
share many common affordances. They at least partially attempt to
allow cross-development and both backward and forward compatibility,
so that applications designed for previous versions continue to work and
that applications are “future proof” to new generations, thereby ensuring
users access to a wide range of applications.
OSs are almost always works-in-progress. They aim to support and foster
functionality they are incompletely able to support. From these repeated
attempts, they recursively learn to offer better support. For example, the
first prominent audio “smart assistant” released (such as Apple’s Siri and
Amazon’s Alexa) were often comically low quality; quality improved over
time with user participation through the systems themselves, enabling
more profound oral functions over time in these operating systems.
205
Gretchen McCulloch, Because Internet: Understanding the New Rules of Language (New
York: Riverhead Books, 2019).
144
⿻ foundations
Systems of rights and OSs have many common traits: they serve as foun-
dations for democratic societies and applications that run on top of them,
have background conditions assumed in their processes, require special
defense and protection to ensure the integrity of a system, and nonethe-
less, are often at least partly aspirational and incompletely fulfilled, at
times in tension internally. And while they are often backed by powerful
enforcement mechanisms, they are also part of a diffuse culture in ad-
dition to sharply defined institutions and code.206 Beyond these general
parallels, however, there are two aspects of both rights and OSs that are
particularly important and distinctive to a ⿻ perspective, which we will
draw out and contrast to Libertarian and Technocratic approaches.
Dynamism
145
Thus, our understanding of free speech, once considered the primary ex-
pression of a right that ensures citizens can freely form and build sup-
port for political positions, is being challenged as a result of information
technology. This assumption was founded on an environment where in-
formation was scarce and thus its suppression was one of the more ef-
fective ways to avoid voices being heard. The present environment is
different: information is abundant and attention scarce. Thus it is often
easier for adversaries who seek to suppress or censor inconvenient views
(attacking the foundations of democracy) to simply flood the information
commons with distractions and spam, rather than try to suppress dissi-
dents and unwanted content (documented dramatically by the research
of Gary King, Jennifer Pan and Molly Roberts).209 Under such attacks, en-
suring diverse, relevant and genuine content is surfaced for attention is
the challenge, not (only) preventing literal censorship. We suspect our
protections around free speech will need to evolve correspondingly and
discuss pathways to ensure this happens below.
Yet dynamism is not desirable for its own sake, nor should it be used in a ⿻
vision to subsume the entire structure in the pursuit of some total ultimate
goal. Instead, dynamism is an emergent property of adaptive systems dis-
covering their future while renewing and improving their ability to con-
tinue to adapt in the future, self-organizing to the “edge of chaos” where
complexity thrives and grows. OSs and rights can and should evolve to
support the applications and democracies that run on top of it, rather than
collapsing to an external will—whether it be the narrow profit interest of
a company or some national interest.
146
protect at least as vigorously the rights of corporate entities and their con-
tractual arrangements, and rights to collective bargaining. Similarly, OSs
protect the interactions between applications and users, as much as ap-
plications and users separately. Thus, while some elements of a system
of rights or OSs may be thought of as protecting or servicing individual
users, there is nothing inherently individualistic about them. Similarly,
speech, as a form of communication, necessarily involves more than one
party. Whether within OSs or in “the public square,” the viability of a com-
munication network depends on the collective participation and consent
of its many willing applications, users, and groups.
147
tached from both other rights and any social or cultural context from
which they emerged. Rights belong exclusively to atomic individuals, and
technical systems ought to insulate these rights as thoroughly and com-
pletely from any change or social intrusion as possible. On the other
hand, Technocracy is rooted in the notion of an “objective,” “utility” or
“social welfare” function that technical systems are designed to “align to”
and maximize. Where Libertarians see rights as absolute, unambiguous,
static, and universal, the Technocrats deem them as mere obstacles, or
encumbrances, in the pursuit of a definable social good.
⿻ freedom
However skeptical one may be of a future immersed in digitally simulated
worlds (sometimes called “metaverses”), few would deny that many peo-
ple live large parts of their lives online these days. In that growing part
of our lives, what we do, say, and trade is constrained by the possibilities
offered by the technologies that network us together—and thus weave
our social fabric. The protocols that connect us thus define our rights
in the digital age, forming the OS on which societies run. Intellectually
and philosophically, the ⿻ tradition we described in our chapter on Con-
nected Society focuses on the need to move beyond the simplistic frame-
works for property, identity and democracy on which liberal democracies
have been built in favor of more sophisticated alternatives that match the
richness of social life. Technologically, the early networking protocols
that provided a governance framework for intercomputer communica-
tion attempted precisely to accomplish this, fusing together the parallel
but distinct ideas of rights and OSs. Here, interpersonal networking OSs
aimed to provide the fundamental capacities to participants needed to
support a ⿻ conception of rights.
148
**
**
149
The project of constructing shared digital protocols to reflect these is
in nascent stages, as we highlighted in our chapter The Lost Dao and
as increasingly accepted by many leading civil actors.211 Most of the
natural, fundamental affordances of networking are not available to
most people even in wealthy countries as basic parts of the online
experience. There is no widely adopted, non-proprietary protocol for
identification212 that protects rights to life and personhood online, no
widely adopted non-proprietary protocols for the ways we communicate
213 214 215
and form groups online that allows free association, no widely
adopted non-proprietary protocols for payments to support commerce
on real-world assets and no protocols for the secure sharing of digital
assets like computation, memory216 and data217 that would allow rights
of property and contract in the digital world. Many of these services
are almost all controlled and often quasi-monopolized by nation-state
governments or more often by private corporations. And even the basic
conception of networks that lies behind most approaches to addressing
these challenges is too limited, ignoring the central role of intersecting
communities. If rights are to have any meaning in our digital world, this
has to change.
150
Gaia-X data-sharing framework in Europe, the development of a variety
of digital-native currencies and payment systems and most prominently
growing investment in “digital public infrastructure” as exemplified by
the “India stack” developed in the country in the last decade. These efforts
have been underfunded, fragmented across countries and ideologies and
in many cases limited in ambition or misled by Technocratic or Libertar-
ian ideologies or overly simplistic understanding of networks. But they
together represent a proof of concept that a more systematic pursuit of
⿻ is feasible. In this part of the book, we will show how to build on these
projects, invest in their future and accelerate our way towards a ⿻ future.
Her nearly defunct phone loaded a page with a few straightforward ques-
tions.
“Do you grant the common asylum system the consent to request a yes/no
answer of…”
She swiftly affixed her signature on the screen. Her phone then began dis-
playing pertinent information to assist her in responding to the questions
151
accurately.
The list goes on. She recalled the lively scenes of children frolicking in
the schoolyard, the mentors who inspired her to grace the stage with con-
fidence, and the countless late nights spent collaborating with her dedi-
cated colleagues.
The official’s desk illuminated with green lights, approving her applica-
tion based on the collected affirmations and her proven history.
Just as the most fundamental human rights are those to life, personhood
and citizenship, the most fundamental protocols for a ⿻ society are those
that establish and protect participant identities. It is impossible to secure
any right or provide any service without a definition of who or what is
entitled to these. Without a reasonably secure identity foundation, any
voting system, for example, will be captured by whoever can produce the
152
most false credentials, degenerating into a plutocracy. There is a famous
New Yorker cartoon from 1993 “On the Internet, nobody knows you’re a
dog”, so famous it has its own Wikipedia page; to the extent this is true,
we should expect attempts at online democracy to, quite literally, go to the
dogs.218 This is dramatized in many “Web3” communities that have relied
heavily on pseudonymity or even anonymity and have thus often been
captured by the interests of those with access to physical and financial
resources.219
Thus, identity systems are central to digital life and gate access to most on-
line activities: social media accounts, electronic commerce, government
services, employment and subscriptions. What each of these systems can
offer depends intimately on how richly it can establish user identity. Sys-
tems that can only determine that a user is a person will not, for example,
be able to offer free benefits without ensuring that person has not already
signed up for this offer. Systems that can determine a user is unique but
nothing else can only offer services that can legally and practically be
made available to every person on the planet.220 Given the ease of at-
tacks online, only what can be established about a person can securely
exist there.
At the same time, many of the simplest ways to establish identity para-
doxically simultaneously undermine it, especially online. A password is
often used to establish an identity, but unless such authentication is con-
ducted with great care it can reveal the password more broadly, making it
useless for authentication in the future as attackers will be able to imper-
sonate them. “Privacy” is often dismissed as “nice to have” and especially
useful for those who “have something to hide”. But in identity systems,
the protection of private information is the very core of utility. Any useful
identity system has to be judged on its ability to simultaneously establish
and protect identities.
To see how this challenge plays out, it is important to keep in mind the
several interlocking elements of identity systems:
218
Peter Steiner, “On the Internet, nobody knows you’re a dog” The New Yorker July 5, 1993.
219
Vitalik Buterin, “On Nathan Schneider on the Limits of Cryptoeconomics”, September
26, 2021 at https://vitalik.eth.limo/general/2021/09/26/limits.html.
220
Puja Ohlhaver, Mikhail Nikulin and Paula Berman, “Compressed
to 0: The Silent Strings of Proof of Personhood”, 2024 available at
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4749892.
153
• Creation: Enrolling in an identity system involves establishing an
account and getting assigned an identifier. Different types of sys-
tems have different requirements for enrollment related to how con-
fident the system owner is in the identifying information presented
by an individual (called Levels of Assurance)221 .
• Access: To access the account on an ongoing basis, the participant
uses a simpler process, such as presenting a password, a key or a
multi-factor authentication.
• Linkage: As the participant engages with the systems that their ac-
count gives them access to, many of their interactions are recorded
and form part of the record that constitutes the system’s understand-
ing of them, information that can later be used for other account
functions.
• Graph: Among these data that accumulate about a user, many are in-
teractive with other accounts. For example, two users may harness
the system to exchange messages or participate together in events.
These create data that belong to multiple accounts and thus a “social
graph” of connections.
• Recovery: Passwords and keys get lost or stolen and multi-factor au-
thentication systems break down. Most identity systems have a way
to recover lost or stolen credentials, using secret information, access
to external identity tokens or social relationships.
• Federation: Just as participants creating an account draw on (often
verified) information about them from external sources, so too do
most accounts—allowing the information contained in them to be
at least partially used to create accounts in other systems.222
154
cause of the fundamental role of identity, it connects to and entangles
with other fundamental protocols and rights, especially rights of associa-
tion that we focus on in the next chapter.
• Birth certificates.
• Certificates of enrollment in public programs, often with an asso-
ciated identification number (such as Social Security for pensions
and taxes in the US or the Taiwanese National Health Insurance pro-
gram).
• Licenses for the use of potentially hazardous tools, such as automo-
biles or firearms.
• Unified national identification cards/numbers/databases in some
countries.
• Passports for international travel, which constitute perhaps the
widest system of identification given its implicit international fed-
eration. While these systems vary across countries, they generally
share several notable features:
155
private sector entities. This widespread use meant people’s activities
across many different contexts could be profiled. In the late 1960s
and early 1970s concerns were raised about these practices224 and
a series of laws were passed limiting the ability of agencies within
the federal government to share data between agencies and limited
the usage of the SSN in the private sector.225 Since then the federal
government has been working to reduce SSN usage and is actively
considering alternatives.226
3. They are typically issued based on narrow signals of identity, trac-
ing back to other government-issued documents, usually at root a
birth certificate that is itself dependent only on the signature of a
single doctor. Occasionally these are supplemented by infrequent
in-person appearance. However, they are often backstopped by ar-
duous legal procedures if there are persistent disputes over an iden-
tity.
156
across jurisdictions. For all these reasons, existing physical (paper or
plastic) government-issued IDs are in an increasingly precarious position
and offer quite an unattractive trade-off between establishment and
protection.
157
SSO provider.
There are two other important classes of entities that collect a lot of iden-
tity information or attributes about people. They share many of these
characteristics but are not digital platform SSO systems and they do not
have a direct relationship with the people about whom they collect in-
formation: advertising, data brokers, credit-scoring and national secu-
rity agencies (who develop dossiers on people for both general surveil-
lance and their own screening purposes for employees who agree to be
screened to get clearances to do their work).
They similarly rely on rich signals, with high integrity and fairly broad
use, but without the public legitimacy of more standard government iden-
tities. These data collection systems thus stand on the opposite end of
the trade-off spectrum from government identities. They are far better
at providing a rich profile about people, however they operate largely in
the shadows because their “all-seeing” nature is socially illegitimate and
vests a great deal of power in a few hands.
158
grounding of government-issued IDs.
In a different direction entirely from this spectrum are smaller, more di-
verse, and more local identity systems, in both more traditional contexts
and digitally native contexts. Examples of these are explored by Kaliya
Young in her book Domains of Identity:230
These identities are the most ⿻ of all we have discussed and have the
least common characteristics. They share a few features precisely related
to their fragmentation and heterogeneity: 1. These systems are highly
fragmented, currently have limited interoperability, are rarely federated
or connected and thus tend to have a very limited scope of application.
231
Emerging standards such as Verifiable Credentials are seeking to ad-
dress this challenge. 2. At the same time, these sources of identification
are often experienced as the most natural, appropriate and non-invasive.
They seem to arise from the natural course of human interactions, rather
than from top-down mandates or power structures. They are viewed as
highly legitimate, and yet not as a definitive or external source of “legal”
230
Kaliya “Identity Woman” Young, Domains of Identity: A Framework for Understanding
Identity Systems in Contemporary Society (London: Anthem Press, 2020).
231
Verifiable Credentials Data Model v1.1 W3C Recommendation 03 March 2022
https://www.w3.org/TR/vc-data-model/
159
identity, often being seen as pseudonymous or otherwise private. 3. They
tend to record rich and detailed, personal information, but in a narrow
context or slice of life, clearly separated from other contexts. As a result,
they have strong potential recovery methods based on personal relation-
ships. 4. They tend to have a poor digital user experience; either they
are not digitized at all, or the process of managing the digital interface is
unfriendly to non-technical users.
While these examples are perhaps most marginal to digital identity, they
are also perhaps most representative of its systemic state. Digital identity
systems are heterogeneous, generally quite insecure, only weakly inter-
operable and have limited functionality while allowing entities with con-
centrated power to engage in extensive surveillance and breaking norms
of privacy that in many cases they were established to protect. This prob-
lem is increasingly widely recognized, leading to focus in many technol-
ogy projects on overcoming it.
160
a photo taken, each iris scanned and shared all ten fingerprints. The new
enrollees had the information associated with their identities checked
against the database to see if they had already been enrolled. If unique,
they were issued an Aadhaar number which was sent to them in the mail
on a card. India’s Unique Identification Authority (UIDAI).233 Through
special entities that have capabilities to do authentication against the
database provides authentication services - people who are interacting
with government services were able to assert an Aadhaar number and
then presented a fingerprint that was sent into the system and a yes/no
answer was returned on authentication.
Subsequently, the Indian Supreme Court limited the extent to which the
system can be used by the private sector.234 Nonetheless, Aadhaar has
enrolled more than 99% of the Indian population because enrollment
agents were paid to maximize enrollment across the country. The gov-
ernment has also made Aadhaar a key part of social service provisioning
including a monthly ration that over 800 million people get monthly and
has also pushed to link Tax ID numbers (called PANs). It is believed that
Aadhaar achieved some of the most impressive mixes of scale, inclusion
of marginalized communities and security of any identity scheme in the
world. The Aadhaar model has inspired the development of the Modu-
235
lar Open-Source Identity Platform (MOSIP) and its adoption in Asia
(e.g. Philippines, Sri Lanka) and Africa (e.g. Uganda, Morocco, Ethiopia).
To date, they have enrolled 100 million people. The MOSIP platform has
created a decentralized identity module, Inji236 , that gives those who de-
ploy it the ability to issue verifiable credentials into the wallets of resi-
dents/citizens enrolled in a given national system.
161
Using a propriety “orb”, they have scanned the irises of several million
people, almost exclusively in developing countries, to date. Harnessing
cryptography, they “hash” these scans so that they cannot be viewed or
recovered, but any future scan can be checked against them to ensure
uniqueness. They use this to initialize an account that they deposit units
of a cryptocurrency into. Their mission is to ensure that, as GFMs be-
come increasingly capable of imitating humans, there remains a secure
foundation for identity that could be used, for example, to distribute an
equal “universal basic income” to every person on the planet or to allow
participation in voting and other universal rights.
Despite this strong interest in these broad biometric systems, they have
important limits on their ability to establish and protect identities. Link-
ing such a wide variety of interactions to a single identifier associated
with a set of biometrics from a single individual collected at enrollment
(or registration) forces a stark trade-off. On the one hand, if (as in Aad-
haar) the administrators of the program are constantly using biometrics
for authentication, they become able to link or see activities to these done
by the person who the identifier points to, gaining an unprecedented ca-
pacity to surveil citizen activities across a wide range of domains and,
potentially, to undermine or target the identities of vulnerable popula-
tions.238 Activists have raised concerns over this issue have been repeat-
edly raised in relation to the status of the Muslim minority in India.
162
some other attributes like educational or employment credentials at a
company, etc.) this extreme preservation of privacy undermines most
of the utility of the system. Furthermore, such systems place a great bur-
den on the technical performance of biometric systems. If eyeballs can,
sometime in the future, be spoofed by artificial intelligence systems com-
bined with advanced printing technology, such a system may be subject
to an extreme “single point of failure”.240 In short, despite their important
capacity for inclusion and simplicity, biometric systems are too reductive
to establish and protect identities with the richness and security required
to support ⿻.
Starting from a very different place, another set of work on identity has
reached a similar challenging set of trade-offs. Work on “decentralized
identity” grew from many of the concerns about digital identity we have
highlighted above: fragmentation, lack of natural digital infrastructure,
issues with privacy, surveillance and corporate control. A key founding
document was Microsoft identity architect Kim Cameron’s “Laws of Iden-
tity” 241 , which emphasized the importance of user control/consent, min-
imal disclosure to appropriate parties, multiple use cases, pluralism of
participation, integration with human users and consistency of experi-
ence across context. Kim Cameron worked on developing the cardspace
242 243
system while at MSFT and this became the InformationCard stan-
dards. These did not get market adoption in part because they were too
early - smartphones were not widely adopted yet and the idea that this
device could hold a wallet for people.
163
individuals “ownership” over identities, rooted in “public” data reposito-
ries such as blockchains, and create standardized formats for a variety
of entities to issue digital credentials referencing these identifiers.
Despite these common challenges, the details of these schemes vary dra-
matically, however. On one extreme, advocates of “verifiable credentials”
(VCs) prioritize privacy and the ability of users to control which of the
claims about them are presented at any time. On the other extreme, ad-
vocates of “soulbound tokens” (SBTs) or other blockchain-centric identity
systems emphasize the importance of credentials that are public commit-
ments to e.g. repay a loan or not produce further replicas of a work of art
and thus require that the claims be publicly tied to an identity. Here,
again, in both the challenges around recovery and the DID/VC-SBT de-
bate we see the unattractive trade-off between establishing and protect-
ing identities.
Identity as an intersection
Is there a way past this seemingly irreconcilable conflict, ensuring the
secure establishment and strong protection of identity without central-
ized surveillance? The natural answer draws on the tradition of ⿻ we
described in Connected Society and The Lost Dao: harnessing the ⿻
nature of identity and the potential of network architectures. Just as
packet switching reconciled and actually connected decentralization
and performance and hypertext reconciled speed with a diversity of
pathways through text, it seems increasingly plausible that, with the right
mix of experimentation and standards building, a ⿻ approach to identity
core/.
164
could reconcile the goals of establishing and protecting identities.
The basic idea can be understood perhaps most easily by contrast to bio-
metrics. Biometrics (e.g. iris scans, fingerprints, genetic information) is
a detailed set of physical information that uniquely identifies a person
and that in principle anyone with access to that person and appropriate
technology may ascertain. Yet people are not just biological but sociolog-
ical beings. Far richer than their biometric profile is the set of shared
histories and interactions they have with other people and social groups.
These may include biometrics; after all, anytime we meet someone in per-
son we at least partly perceive their biometrics, and they may leave traces
of others behind. But they are far from limited to them. Instead, they en-
compass all behaviors and traits that are naturally jointly observed in the
course of social interactions, including
165
• Comprehensiveness and redundancy: ’Jointly, these data cover al-
most everything meaningful there is to know about a person; the
great majority of what we are is determined by various interactions
and experiences shared with others. For almost anything we might
want to prove to a stranger, there is some combination of people
and institutions (typically many) who can “vouch” for this informa-
tion without any dedicated strategy of surveillance. For example, a
person wanting to prove that they are above a particular age could
call on friends who have known them for a long time, the school
they attended, doctors who verified their age at various times as
well, of course, on governments who verified their age. Such ⿻ at-
tribute verification systems are fairly common: when applying for
some forms of government identification many jurisdictions allow
a variety of attribute-proving methods for addresses including bank
statements, utility bills, leases, etc.
• Privacy: Perhaps even more interestingly, all of these “issuers” of
attributes know this information from interactions that most of us
feel consistent with “privacy”: we do not get concerned about the
co-knowledge of these social facts in the way we would surveillance
by a corporation or government. However, we will be more precise
in the next chapter about the sense in which these (should/could)
approaches allay privacy concerns.
• Progressive authentication: While standard verification by a single
factor allows the user to gain confidence in the attested fact/attribute
equal to their confidence in the verifying party/system, such ⿻ sys-
tems allow a wide range of confidence to be achieved by drawing on
more and more trusted issuers of attributes. This allows adaptation
to a variety of use cases based on the security they require.
• Security: ⿻ also avoids many of the problems of a “single point of
failure”. The corruption of even several individuals and institutions
only affects those who rely on them, which may be a very small part
of society, and even for them, the redundancy described above im-
plies they may only suffer a partial reduction in the verification they
can achieve. This is particularly important given the potential risks
(as mentioned above) to e.g. biometric systems from advances in AI
and printing technology. Given the basis of other verification meth-
ods above are much more diverse (a range of communicative acts,
166
physical encounters, etc.) the chances of these all failing based on a
particular technological advance are far less likely.
• Recovery: This approach also offers a natural solution to one of the
most challenging problems above: the recovery of lost credentials.
As noted there, recovery typically relies on interactions with a sin-
gle, powerful entity that can investigate the validity of a claim to an
account; alternatives based on giving individuals full “ownership”
are usually highly susceptible to hacking or other attacks. Yet a natu-
ral alternative would be for individuals to rely on a group of relation-
ships allowing, for example, 3 of 5 friends or institutions to recover
their key. Such “social recovery” has become the gold standard in
many Web3 communities and is increasingly being adopted even
by major platforms such as Apple.246 As we will explore in a later
chapter, more sophisticated approaches to voting could make such
an approach even more secure by ensuring that distinct parts of an
individual’s network who are unlikely to cooperate against her in-
terest would together be able to recover her credentials, something
we call “community recovery”.247
The above benefits are remarkable when compared to the trade-offs de-
scribed above. But essentially they are fairly simple extensions of the ben-
efits we discussed in The Lost Dao that ⿻ structures generally have over
more centralized ones, the benefits that motivated the move to packet
switching architectures for communications networks in the first place.
This is why some of the leading organizations seeking to achieve a future
like this, such as the Trust over IP Foundation, draw tight analogies to the
history of the creation of the internet protocols themselves. There are of
course many technical and social challenges in making such a ⿻ system
work:
167
itself.
• Complexity: Managing and processing trust and verification rela-
tionships with such a diversity of individuals and institutions is
beyond the capacity of most people or even institutions. Yet there
are several natural approaches to addressing this complexity. One
is to harness the growing capacity of GFMs, trained to adapt to the
relationships and context of the individual or institution using the
model, to extract meaning from such diverse signals; we discuss
this possibility extensively in a later chapter on Adaptive Adminis-
tration. Another approach is to limit the number of relationships
any individual or institution has to manage and rely on either
institutions of medium size (e.g. medium businesses, churches, etc.)
that play intermediary roles (which Jaron Lanier and one of us
have called “mediators of individual data or MIDs) or on”friends
of friends” relationships (which we call “transitive trust”) which
are known to connect, within a small number of links (roughly
six), almost any two people on earth.248 We will discuss the appeal,
trade-offs and compatibility between these two approaches below.
• Trust at a distance: Another closely related problem is that many
of the natural verifiers for strangers we meet may be people who
we do not know ourselves. Here again, some combination of using
transitive trust and MIDs as we discuss shortly is natural. Currency,
as we will discuss in a later chapter of this part of the book, may also
play a role here.
• Privacy: Finally, while most people would feel comfortable with
the recording of information from the natural flow of social events
above, the sharing of it for verification could pose important privacy
issues. Such information is meant to stay in the natural flow of so-
cial life and a great deal of care is required to ensure any use of it
for identity verification does not violate these norms of “contextual
integrity”. Addressing this challenge is the focus of the next chapter,
as we discuss at the end of this one.
248
Jaron Lanier and E. Glen Weyl, “A Blueprint for a Better Digital Society” Harvard
Business Review: Big Idea Series (Tracked) September 28, 2018: Article 5 available at
https://hbr.org/2018/09/a-blueprint-for-a-better-digital-society. Duncan J. Watts and Steven
H. Strogatz, “The Collective Dynamics of ‘Small World’ Networks” Nature 393 (1998): 440-
442.
168
⿻ identity
How can we manage the complexity and social distance involved in ⿻
identity systems? We will return in a future chapter to the potential role
of GFMs. Focusing instead on firmly network-based approaches, the two
natural strategies correspond to the two types of networks that in The
Lost Dao we recounted internet pioneer Paul Baran imagining: “decen-
tralization” (also called “polycentrism”, which we will use), where there
are many verifiers of significant size but not so many as to create over-
whelming complexity, or “distribution”, where there are few larger-scale
verifiers and we instead use transitive trust to span social distances.249
A basic heuristic that is useful to keep in mind in considering all these
possibilities is the “Dunbar number”. This is the number (usually around
150) of people that an anthropologist, Robin Dunbar, argued people could
maintain stable relationships with absent significant information technol-
ogy.250 Whatever the precise number is, it seems clear most people cannot
manage more than a few hundred relationships, evaluation of reputation,
etc. without significant technological assistance.
Yet this number would clearly be far smaller than the population size,
249
Cameron, op. cit.
250
R.I.M. Dunbar, “Neocortex Size as a Constraint on Group Size in Primates”, Journal of
Human Evolution 22, no. 6 (1992): 469-493.
169
perhaps around 100,000, the number with the property that goes into 10
billion 100,000 times. This would be vastly more ⿻ than our current iden-
tity landscape, allowing a far better trade-off between autonomy/control
and functionality/security. But is even more possible?
170
ilar number of relationships with other issuers, every issuer would have
a direct relationship with every other issuer. Two degrees of separation
could do far more, allowing millions of issuing organizations to thrive un-
der the same logic that can leverage the attributes from other issuers to
do verification. Thus a mixture of transitive trust and polycentrism can
quite easily allow, even without any of the magic of GFMs we discuss be-
low, a highly ⿻, and thus both functional and private, identity landscape.
171
ing and implementing the right of personhood must simultaneously bol-
ster the freedom of association and the dual challenge of establishing and
protecting associations parallels those in the identity context.
Amidst the chaos, the hope of an entire nation rested on a group of hack-
ers. They were the last bastions of defense, the last guardians. This decen-
tralized group convened a hackathon aptly named “Guard.” Faisal was
one of them. In a world in chaos, the group’s unwavering determination
and skill had made them a beacon of hope.
As Faisal entered the “Guard” interface, it seemed just like any other on-
line chatroom. The anonymity was palpable, as no one spoke or even
typed a message. All that could be seen were silent avatars represent-
ing participants. But the difference lay in its secure foundation, which
stopped anyone in the room from showing its contents to those outside
while ensuring everyone there had heard exactly what was said in this
last bastion of hope.
The host, the only voice in the silent room, began, “Several introductions
and ground rules are about to show on your screen. Each of you will be
asked questions to confirm your presence.” A warning followed, high-
172
lighting the risk of expulsion for non-compliance or suspicion.
Soon, a virtual Roman soldier appeared on screen, laying out the grand
vision of “Guard”—to construct a decentralized defense system for the dig-
ital city. Faisal quickly went through the questions, and upon returning to
the main room, found that only half of the initial participants remained.
This filtering process seemed to break the ice, as the room came alive with
chatter.
Wasting no time, the guardians began their mission. Faisal, with his exper-
tise, was naturally drawn to the power grid security group. But their con-
versation was interrupted by a sudden ring. Faisal picked up the phone,
and the voice from the other side rushed, “Have you gotten anything? We
need the rest of the power grids down.”
The urgency in the voice was palpable. Faisal replied, “I can’t find a se-
cretive way in. The security is covered by the protocols. I can formally
request access, but everyone must agree.” He continued, “If even one par-
ticipant objects, I might receive a copy, but I won’t be able to discern if it’s
authentic.”
“Is there no way to duplicate the original code?” the voice asked, desper-
ation evident.
173
No individual has ever, alone, made political, social or economic change.
Collective efforts, through political parties, civic associations, labor
unions and businesses, are always necessary. For ⿻, these and other
less formal social groupings are just as fundamental as individuals are
to the social fabric. In this sense, associations are the Yin to the Yang of
personhood in the most foundational rights and for the same reason are
the scourge of tyrants. Again, to quote De Tocqueville, “No defect of the
human heart suits [despotism] better than egoism; a tyrant is relaxed
enough to forgive his subjects for failing to love him, provided that they
do not love one another.” Only by facilitating and protecting the capacity
to form novel associations with meaningful agency can we hope for
freedom, self-government and diversity.
174
of the internet has actually threatened some of the core features of free
association. As Lick and Taylor emphasized, forming an association or
community requires establishing a set of background shared beliefs, val-
ues and interests that form a context for the association and communica-
tion within it. Furthermore, as emphasized by Simmel and Nissenbaum,
it also requires protecting this context from external surveillance: if indi-
viduals believe their communications to their association are being mon-
itored by outsiders, they will often be unwilling to harness the context of
shared community for fear their words will be misunderstood by those
these communications were no intended for.
Associations
How do people people form “an organization of persons sharing a com-
mon interest”? Clearly, a group of people who simply happen to share an
interest is insufficient. People can share an interest but have no aware-
ness of each other, or might know each other and have no idea about
their shared interest. As social scientists and game theorists have recently
175
emphasized, the collective action implied by “organization” requires a
stronger notion of what it is to have an “interest”, “belief” or “goal” in
common. In the technical terms of these fields, the required state is what
they call (approximate) “common knowledge”.
176
lates to political power.260
177
same as those of the individuals that are part of that group (on average):
group beliefs and goals are common beliefs and goals of that group. In
this sense, the freedom to create associations can be understood as the
freedom to create common beliefs and goals. Yet creating associations is
not enough. Just as we argued in the previous chapter that protecting se-
crets is critical to maintaining individual identity, so too associations must
be able to protect themselves from surveillance, as should their common
beliefs become simply the beliefs of everyone, they cease to be a separate
association just as much as an individual who spills all her secrets ceases
to have an identity to protect. As such, privacy from external surveillance
or internal over-sharing is just as critical as is establishing associations to
their freedom.
But purely public spaces have important limitations: they do not allow
groups to form their views and coordinate their actions outside the
broader public eye. This may undermine their cohesion, their ability
to present a united face externally, and their ability to communicate
effectively harnessing an internal context. This is why associations so
often have enclosed gathering places open only to members: to allow
the secrecy that Simmel emphasized as critical to group efficacy and
264
Pragmatist political philosophy Richard Rorty wrote “We can urge the construction of a
world order whose model is a bazaar surrounded by lots and lots of exclusive private clubs.”
Richard Rorty, “On ethnocentrism: A reply to Clifford Geertz” Michigan Quarterly Review 25,
no. 3 (1986): 533.
178
cohesion.265 The crucial question we thus face is how systems of network
communication can offer the brave new world of “communities of inter-
est” these same or even more effective affordances to create protected
common beliefs.
Establishing context
To the extent parks and squares are the site of protest and collective
action, we might well search for a digital public square, a function
many platforms have purported to serve.266 Sites on the original World
Wide Web offered unprecedented opportunities for a range of people
to make their messages available. But as Economics Nobel Laureate
Herbert Simon famously observed, this deluge of information created a
paucity of attention.267 Soon it became hard to know if, who and how
one was reaching an audience with a website and proprietary search
systems like Google. Proprietary social networks like Facebook and
Twitter became the platforms of choice for digital communication, but
only partly addressed the issue as they had limited (and usually pay-for)
affordances for understanding audiences. The digital public square had
become a private concession, with the CEO of these companies proudly
declaring themselves the public utility or public square of the digital
age while surveilling and monetizing user interactions through targeted
advertising.268
179
which rapidly gained attention after the acquisition of Twitter (now
X under his leadership) by Elon Musk. Philanthropist Frank McCourt
has invested heavily in Project Liberty269 and its Decentralized Social
Networking Protocol as another, blockchain-based foundation for decen-
tralized networking. While it is hard to predict exactly which of these
will flourish, how they will consolidate and so forth, the recent struggles
of X combined with the diversity of vibrant activity in this space suggests
the likelihood of cooperation and convergence on some open protocol
for usable digital publication.
Yet publicity is not the same as the creation of community and association.
Posting online resembles much more the distribution of a pamphlet than
the holding of a public protest. It is hard for those seeing a post to know
who and how many others are consuming the same information, and cer-
tainly to gauge their views about the same. The post may influence their
beliefs, but it is hard for it to create common beliefs among an identifi-
able group of compatriots. Features that highlight virality and attention
of posts may help somewhat, but still make the alignment of an audience
for a message far coarser than what is possible in physical public spaces.
Yet even such community among machines does not directly imply it
among the people operating these machines. This problem (from the
perspective of creating community) is exacerbated by the financial
incentives for maintaining blockchains, which lead most participants,
motivated by financial gain, to run “validator” software rather than
269
Frank McCourt, and Michael Casey, Our Biggest Fight: Reclaiming Liberty, Humanity, and
Dignity in the Digital Age, (New York: Crown, 2024).
270
Joseph Y. Halpern and Rafael Pass “A Knowledge-Based Analysis of the Blockchain Pro-
tocol” (2017) available at https://arxiv.org/abs/1707.08751.
180
monitor activity directly. This also implies those participating are likely
to be whoever can profit, rather than those interested in common, non-
commercial action. Nonetheless one can imagine, as we will below, DLTs
being an important component of a future infrastructure of association.
Protecting context
If establishing context is primarily about creating strong social notions of
publicity, protecting context is about strong social notions of privacy. And,
just as with technologies of publicity, those of privacy have primarily been
developed in a more atomistic monist direction than in ones that support
⿻ sociality.
The field of cryptography has long studied how to securely and pri-
vately transmit information. In the canonical “public key cryptography”
scheme, individuals and organizations publish a public key while pri-
vately holding its controlling counterpart. This allows anyone to send
the holder an encrypted message that can only be decrypted by their
private key. It also allows the key controller to sign messages so that
others can verify the authenticity of the message. Such systems are
the foundation of security on the internet and throughout the digital
world, protecting email from spying, and allowing end-to-end encrypted
messaging systems like Signal and digital commerce.
Building on top of this foundation and branching out from it, a number
of powerful privacy-enhancing technologies (PETs) have been developed
in recent years. These include:
181
tained while allowing secure verification of election results.271
• Unforgeable and undeniable signatures- These allow key controllers
to sign statements in ways that cannot be forged without access to
the key and/or cannot be denied except by claiming the key was com-
promised.272 For example, parties entering into a (smart) contract
might insist on such digital signatures just as physical signatures
that are hard to forge and hard to repudiate are important for ana-
log contracts.
• Confidential computing- This solution to similar problems as above
is less dependent on cryptography and instead accomplishes similar
goals with “air gapped” digital systems that have various physical
impediments to leaking information.
• Differential privacy- This measures the extent to which disclosures
of the output of a computation might unintentionally leak sensitive
information that entered the calculation.273 Technologists have de-
veloped techniques to guarantee such leaks will not occur, typically
by adding noise to disclosures. For example, the US Census is legally
required both to disclose summary statistics to guide public policy
and keep source data confidential, aims that have recently been
jointly satisfied using mechanisms that ensure differential privacy.
• Federated learning- Less a fundamental privacy technique than a so-
phisticated application and combination of other techniques, feder-
ated learning is a method to train and evaluate large machine learn-
ing models on data physically located in dispersed ways.274
182
to the identity and recovery questions we discussed in the previous
chapter. Second, almost all cryptography in use today will break and
in many cases its guarantees be undone by the advent of quantum
computers, though developing quantum-resistant schemes is an active
area of research.
Yet a basic limitation of almost all this work is the focus on protecting com-
munication from external surveillance rather than from internal over-
sharing. Preventing external snooping is obviously the first line of de-
fense, but anyone who followed the saga of US National Security Agency
leaker Edward Snowden knows that internal moles and leaks are one of
the most important threats to information security. While military intel-
ligence is the most dramatic example, the point stretches much further,
especially in the internet age. Increasingly common phishing attacks rely
on social engineering, not the ability of the attacker to “crack the code.”
As highlighted in works ranging from danah boyd’s classic study It’s Com-
plicated to Dave Eggers’s book and film The Circle, the ease of credibly
sharing digital information has made the danger of over-sharing a con-
stant threat to privacy.275
The basic problem is that while most cryptography and regulation treat
privacy as about individuals, most of what we usually mean when we talk
about privacy relates to groups. After all, there is almost no naturally
occurring data that pertains to exactly a single individual. Let’s revisit
some of the examples of the social life of data from the previous chapter.
183
diseases.
• Communications and financial data: communications and transac-
tions are by their nature multiparty and thus have multiple natural
referents.
• Location data: few people spend much of their time physically dis-
tant from at least some other person with whom they have common
knowledge of their joint location at that moment.
• Physical data: There are many data that are not personal to anyone
(e.g. soil, environmental, geological). One of the only truly individ-
ualistic data are the bureaucratically created identifying numbers
created as part of identity schemes deliberately for the purpose of
being individualistic, and even these actually pertain not to the indi-
vidual alone but to her relationship to the issuing bureaucracy.
184
authenticity only to a single recipient while appearing potentially forged
to everyone else.277 Such an approach is only useful for information that
cannot be independently verified: if someone over-shares a community
password, DVPs are not of much use as unintended recipients can quickly
check if the password works.
⿻ publics
If properly combined in a new generation of networking standards, a com-
bination of these tools could give us the capacity to move beyond the su-
perficial traditional divide between “publicity” and “privacy” to empower
true freedom of association online. While we usually think of publicity
and privacy as a one-dimensional spectrum, it is easy to see that another
dimension is equally important.
This example illustrates why “privacy” and “publicity” are far too simplis-
277
Markus Jakobsson, Kazue Sako and Russell Impagliazzo, “Designated Verifier Proofs and
Their Appliations”, Advances in Cryptology–EUROCRYPT ’96 (1996): 143-154.
185
tic concepts to describe the patterns of co-knowledge that underpin free
association. While any simple descriptor will fall short of the richness we
should continue to investigate, a more relevant model may be what else-
where we have called “⿻ publics”. ⿻ publics is the aspiration to create
information standards that allow a diverse range of communities with
strong internal common beliefs shielded from the outside world to coex-
ist. Achieving this requires maintaining what Shrey Jain, Zoë Hitzig and
Pamela Mishkin have called “contextual confidence”, where participants
in a system can easily establish and protect the context of their communi-
cations.278
186
of common knowledge than present ledgers.
Furthermore, all the space around these topics is suffused with work on
standards: for cryptography, blockchains, open communications proto-
cols like Activity Pub, etc. It therefore does not require great stretches
to imagine these standards converging on a dynamically evolving but
widely accepted technical notion of an “association” and therefore
broadly observed standards enabling associations online to form and
preserve themselves. Such a future could enshrine a right to digital
freedom of association.
187
“privacy” is at the core of the integrity of identity systems yet concerns
usually labeled as such are more appropriately connected to the diversity
of contexts an individual navigates rather than privacy in an individual-
istic sense. Thus, the right to freedom of association and the right to the
integrity of personhood are inseparable: if it is our entanglement in a di-
versity of social groups that creates our separateness as a person, it is only
by protecting the integrity of that diversity that separate personhood is
possible. And, of course, because groups are made up of people, the oppo-
site is true as well: without people with well-articulated identities, there
is no way to create groups defined by common knowledge among these
persons.
Amidst the seasoned attendees was Zvi, standing out with an air of nov-
elty. New to town and having only recently taken up a teaching position
at the local school, he was keen to mingle and partake in community fes-
tivities. Grasping a bag of chips he intended to share, he joined the queue,
absorbing the unique spirit of the evening.
188
“Thank you for your street art contributions,” a voice echoed from the
front. Zvi turned his attention to the ticketing booth. Charity event? I
wasn’t aware, he thought, slightly puzzled.
“I would love us to watch Rogue Stardust.” Zvi craned his neck and caught
sight of a familiar face, a student from his school, proudly flaunting her
school hoodie.
A gentle, elderly voice responded, “I’d prefer Whispers in the Void and
The Last Alchemist, if you don’t mind.”
“Thank you for your contributions, ma’am.” the man at the booth re-
sponded, his tone courteous.
Soon, it was Zvi’s turn. The man at the booth had an aura of tranquility,
reminiscent of a seasoned surfer. His warm smile was contagious.
“Good evening, sir! If you’d like, you can tap your phone here to share
your community experiences. It’s completely optional but a nice way for
us to acknowledge everyone’s contributions to our town,” the attendant
offered, gesturing towards a small, unobtrusive screen on the counter.
Zvi, intrigued yet cautious, queried, “And what happens if I do? Just curi-
ous about privacy and all.”
“Of course, privacy is key. This device simply displays public community
messages and thank-you notes on our local community app. It’s the same
info anyone can see on the app. Think of it as a digital way of saying
thanks and sharing positive vibes,” the attendant explained, his tone re-
assuring.
Smiling at the warm messages, Zvi replied, “That’s a nice touch. Makes
189
you feel part of something special.”
“Exactly! And as a part of our community, you get to suggest a movie for
tonight. What would you like to add to the lineup?” the attendant asked,
his eyes twinkling with friendliness. “Also, thank you for taking the time
to help my sister’s child after school that day; it truly made a difference
for her family.”
Beneath a sky speckled with stars, against a backdrop laden with memo-
ries, Zvi watched as his cherished film began to play. In this moment, he
was enveloped by the profound sense of community—where he was not
merely a spectator, but an integral thread woven into the vibrant tapestry
of collective memories and experiences.
Yet, in many ways, the relatively rapid success of these efforts is a symp-
tom of what is so disappointing about their progress so far. Cash is per-
haps one of the “dumbest” technologies of the pre-digital era: it is a sin-
190
gle, homogeneous substance transmitted between roughly anonymous,
abstracted accounts. While it has proven far harder to replicate this ba-
sic function, and thus recent advances are important, this is not a rev-
olutionary technique enabled by digital technology as, for example, hy-
pertext improved on what had been possible in previous writing. In this
chapter, we will summarize progress thus far, discuss the limitations of
traditional money compared to higher aspirations for commerce online,
and discuss ways to build on recent advances to allow a more ⿻ vision of
digital commerce.
Traditional payments
While the early history of money has been the subject of a great deal of
recent research, to which we will return below, most people associate the
idea with currency in the form of tokens or notes that pass from one hand
to another and view other forms of money as abstractions of this more ba-
sic concept. This form of “money of exchange” dates back to the early civ-
ilizations of Babylon, India and China and in the first millennium BC was
increasingly based on precious metals like bronze, silver and gold.281 The
durability, scarcity and wide belief in the value of these metals facilitated
broad acceptance of them in payment for a range of goods and services.
191
While the obvious dangers of a bank run this creates are not a topic we
have space to focus on here, they created a natural role for “central banks”
to help control this process of money creation and avoid banking col-
lapses.
192
leadership of Dee Hock, the first CEO of Visa, allowing reduced transac-
tion time, with magnetic strips easing processing. In 1976, all BankAmeri-
card licensees united themselves under the common brand Visa, orga-
nized as a bank consortium to manage networks of agreements between
banks. During the 1980s, electronic merchant terminals allowed for in-
creasingly wider and faster acceptance of the cards, further accelerated
in the 2000s when chips and PINs were widely added.
Until roughly the last decade, this constellation covered most trans-
actions. A mix of cash and payment cards were used for small value
transactions in physical proximity and wires were used to send money
abroad, while larger value transactions flowed primarily over ACHs
and to a lesser extent wires and cheques. All these systems predate the
accept the card.
286
“Global Payment Systems Survey (GPSS),” World Bank, January 26, 2024.
https://www.worldbank.org/en/topic/financialinclusion/brief/gpss#:~:text=The%20Global%20Payment%20Systems%20Survey%
287
Susan Scott, and Markos Zachariadis, The Society for Worldwide Interbank Financial
Telecommunication (Swift): Cooperative Governance for Network Innovation, Standards, and
Community, (New York, NY: Routledge), pp. 1, 35, doi:10.4324/9781315849324.
288
Martin Arnold, “Ripple and Swift Slug It out over Cross-Border Payments,” Financial
Times, June 6, 2018, https://www.ft.com/content/631af8cc-47cc-11e8-8c77-ff51caedcde6.
193
emergence of the internet and none of them match its reach, pace or
flexibility: payment cards were traditionally cumbersome and insecure
to use online, cash irrelevant and ACHs far too slow (typically 3 days).
Unsurprisingly, therefore, Lick, Tim Berners-Lee, Nelson and others
believed a native payment system was one of the core features missing
from the early development of the Internet. The last decade and a half
has seen a variety of attempts to address this lacuna.
**
**
One of the first and the most attention-grabbing of these was the emer-
gence of Bitcoin in 2008 and later a range of other “cryptocurrencies”
in the 2010s.289 These systems used DLTs, like those we discussed in the
289
Satoshi Nakamoto, “Bitcoin: A Peer-To-Peer Electronic Cash System” (2008)
at https://assets.pubpub.org/d8wct41f/31611263538139.pdf. Vitalik Buterin,
“A Next-Generation Smart Contract and Decentralized Application Platform”
(2014) at https://finpedia.vn/wp-content/uploads/2022/02/Ethereum_white_paper-
194
last chapter, paired with internally generated financial structures to cre-
ate a validated substrate for tracking transactions. First, instead of an
identity system based on accounting for human participants, they used
protocols to prove control over some resource (such as “proof of work”
protocols based on solving a puzzle that requires access to powerful com-
puters) to protect against predatory participants. This created an effec-
tive financial screen for participation. On the other hand, they rewarded
“honest” participants (those whose recording of transactions matches oth-
ers’) with “coins” created by including transactions to their own accounts.
The ledger was otherwise openly available to any participant, creating a
global, purely financial ledger with pseudonymous accounts that allowed
individual people to potentially have many different identitifiers.
The early success of Bitcoin inspired attention and interest for at least
three reasons:
195
Yet while holding and trading of currency has become a defining image
for many people in recent decades, the accounts above and below suggest
this may be a bit of an anomaly in human history. As highlighted by media
scholar Lana Swartz in New Money, commerce has depended more on the
communication of, and the partially local accounting for, obligations.290
It is thus perhaps not terribly surprising that some of the most widely
adopted innovations in payments in the last decade have taken the form
of changes to processing and account transfers, rather than the creation
of “currency” per se.
Seeking to bring these services at lower cost and more inclusively espe-
cially in markets incompletely served by these US and PRC-based services,
several major developing-world governments have created publicly sup-
ported instant payment services, including Singapore’s FAST system in
2014, Brazil’s Pix system in 2020 and India’s Unified Payments Interface
in 2016. Even the US has followed with FedNow in 2023. While there are
still significant impediments to international inter-operation, there is an
increasing consensus that the immediate gap in making instant payments
290
Lana Swartz, New Money: How Payment Became Social Media (New Haven, CT: Yale Uni-
versity Press, 2020).
291
Today’s PayPal was a merger of the original PayPal with X.com, founded by Elon Musk,
Harris Fricker, Christopher Payne and Ed Ho, the name of which is now being revived by
Musk as the successor to Twitter.
196
online and in person through digital channels has been met.
After all, financial transactions can never be purely private: they always
292
Kenneth S. Rogoff, The Curse of Cash (Princeton, NJ: Princeton University Press, 2016).
293
Alyssa Blackburn, Christoph Huber, Yossi Eliaz, Muhammad S. Shamim, David Weisz,
Goutham Seshadri, Kevin Kim, Shengqi Hang and Erez Lieberman Aiden, “Cooperation
Among an Anonymous Group Protected Bitcoin during Failures of Decentralization” (2022)
at https://arxiv.org/abs/2206.02871.
197
involve several parties and are at least partly detectable by others in a
community where the inflow of transactions affects the economic envi-
ronment. The goal, then, is not privacy as much as it is contextual in-
tegrity: ensuring that this information stays within the affected commu-
nity unless it is having important and widely recognized spillover effects
on other communities (precisely what fiduciary duties, financial and busi-
ness ethics and, when necessary, law enforcement is meant to capture).
And, if it is, it is the community’s responsibility to either ensure their
culture is not supporting such externally harmful activity or to defend
their right to support it if the external claim is unjust.294 The essence of
⿻ “checks and balances” is that the communities involved must become
partly aware and involved in such external surveillance, rather than it
being asymmetrically and externally imposed.
198
money, societies engaged in a range of mutually beneficial collaboration
under norms of reciprocity.295 These were rarely quantified in terms of
formal “value” and followed a range of logics beyond simple bilateral fa-
vor trading. For example, the community services of a hunter for a village
or an elder might put the community in general in their “debt”, making
gifts to them customary. The richness and diversity of these traditions
made their quantification unnatural, but also hard to extend beyond the
Dunbar number we discussed in the Identity and Personhood chapter of
roughly 150 close associates.
199
having to assemble the full group. Yet the role of money in avoiding the
need for such “trading cycles” is dated: in fact, economists today regularly
use “trading cycles” algorithms directly in a variety of contexts without
relying on money, given that modern computation makes them cheap to
perform.296
Furthermore, the very economic theory that typically justified the rele-
vance of money confirms this intuition, when applied to social reality.
Under certain well-studied conditions, money held by individuals suffices
to track value creation. But these conditions require that all goods are
private (everything can be consumed by one individual and others’ con-
suming it prevents them from doing so) and production is “submodular”,
296
Alvin E. Roth, Tayfun Sönmez and M. Utku Ünver, “Kidney Exchange”, Quarterly Journal
of Economics 119, no. 2 (2004): 457-488.
200
meaning that combining a group of people or assets produces less than
the sum of what they could produce separately (the whole is less than the
sum of the parts). If, on the other hand, consumption is at least partly
social and production may be super-modular, money is a poor or even
hopeless way to keep track of value.
Of course, these systems are not entirely separate from the commercial
sphere: reputations for leadership, nobility, or skill can (sometimes) be
monetized by, for example, advertising against or charging for access to
the person holding the prestige or by using trust to establish a commer-
cial enterprise harnessing it. But none of these conversions are simple
or linear, and, in fact, if one is seen to directly “sell” one’s social stand-
ing such as “selling out” or “corruption”, it can quickly undermine that
standing. Clearly, therefore, the simplest ideas of “sales” and “conver-
297
Divya Siddarth, Matthew Prewitt, and Glen Weyl, “Supermodular,” The Collective Intel-
ligence Project, 2023. https://cip.org/supermodular.
201
sion” are not effective ways to allow money to inter-operate with these
other “symbolic media”. This makes money nearly useless as a way to
quantify, make transparent and scale these other systems. The question,
then, is how more ⿻ systems of value might overcome this limitation, a
question to which we now turn.
⿻ money
While there has been a great deal of excitement about the decentraliza-
tion of cryptocurrencies, there is an important sense in which any cur-
rency that aspires to universality is inherently highly centralized: it cre-
ates trust and cooperation by everyone ascribing value to the same thing.
A more ⿻ approach can, as in our Identity and Personhood chapter, fol-
low either a decentralized/polycentric or distributed structure in a way
that roughly parallels our ideas there.
202
book. We used it to measure contributions and to allow contributors to
make collective decisions on prioritizing and approving changes to the
text in a manner we will discuss later in this book. However, we did not
use some of the most sophisticated potential approaches, harnessing the
tools from the last chapter. For example, in the future community curren-
cies might be recorded on contextually integral chains that make it hard
for currency holders to use the currencies more broadly by preventing
them from showing others outside the community how much they hold.
Of course, this will only be possible with the support of widely adopted
protocols, ones that facilitate the formation and validation of community
ledgers extending those discussed in the previous chapter and/or ones
that facilitate long-distance, networked transmission of trust and “debt”
in the way TCP/IP did packets of information. These are the aspirations
of open source and internet working committees like the aforementioned
Trust Over IP Foundation and start-up ventures like Holochain. Beyond
301
Nicole Immorlica, Matthew O. Jackson and E. Glen Weyl, “Verifying Identity as a Social In-
tersection” (2019) at https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3375436. E. Glen
Weyl, Kaliya Young (Identity Woman) and Lucas Geiger, “Intersectional Social Data”, Radi-
calxChange Blog (2019) at https://www.radicalxchange.org/media/blog/2019-10-24-uh78r5/.
203
the important work of establishing basic, high-quality digital native pay-
ments systems, it is this next generation of truly networked and ⿻ sys-
tems of commercial trust systems that can underpin the ⿻ markets and
cooperation we discuss in much of the rest of this book.
Commerce in a ⿻ society
Establishing trust, credit and value across long social distances lies at the
core of both the identity systems we described previously and the sys-
tems of contracting and asset use that we focus on in the next chapter.
Identity systems are about trusting/credit claims made by someone about
a third party. Anyone who accepts an arbitrary number of such claims
from someone they do not know well exposes themselves to potentially
devastating attacks. On the other hand, accepting some claims about rel-
atively unimportant matters from a less trustworthy source is not too
risky. The trust established by a network of verifiers in an identity sys-
tem is thus quantitative and thus depends on the quantification of trust,
and consequences for betraying this trust, in networks, precisely the sort
of system we described here. At the same time, these systems clearly de-
pend on the technologies of identity and association we developed in the
previous chapters, to underpin the definition and information structures
of the communities and people who form the network of commercial re-
lationships described here. And, as we will now explore, all are critical
to joint use, contracting over and enterprise harnessing the critical as-
sets of the digital age: computation, storage and data. These ideas should
be of particular interest to African communities in which trust-based ⿻
and open-source social systems, interacting with mobile and digital tech-
nologies, indigenously invented the concept of mobile money, and set the
pace for Africa’s burgeoning fintech industries302 even as the continent
grapples with identification system gaps303 .
302
Omoaholo Omoakhalen, “Navigating the Geopolitics of Inno-
vation: Policy and Strategy Imperatives for the 21st Century
Africa,” Remake Africa Consulting, 2023, https://remakeafrica.com/wp-
content/uploads/2023/12/Navigating_the_Geopolitics_of_Innovation.pdf.
303
“The State of Identification Systems in Africa.” World Bank Group, 2017,
https://openknowledge.worldbank.org/server/api/core/bitstreams/5f0f3977-838c-5ce3-
af9d-5b6d6efb5910/content.
204
4-4 Property and Contract
Dear Vasana Gamers,
1. Power Up with Your Device and unleash Your Hero’s Potential: Tap
into the power of your device to fuel your Yusha’s adventures. By
harnessing the computing power of your local device, you refill your
Yusha’s energy bar. Your real-world tech usage recharges your hero,
bridging your daily life with your in-game exploits.
2. Your World, Your Battlefield: Venture into the real world to shape
your virtual domain. As you explore new physical locations, your de-
vice captures the topography, transforming it into a dynamic, magi-
cal world within the game. This means your real-world adventures
directly expand the game’s virtual territory, for all players.
205
adventures.
Join the ranks of Vasana’s adventurers where fantasy and reality blend
into an epic saga. When you invest not just your time, but also the com-
puting resources of your device, the physical effort exerted in traversing
the real world, and the genuine intent to forge authentic connections,
the world of Yusha transforms into a realm that is profoundly immersive
and interactive. This convergence of digital and physical efforts brings
the game’s environment to life, enriching the gaming experience with a
unique depth and realism that encourages a deeper sense of engagement
and community among players.
Most large-scale cooperation today takes place through the pooling of as-
sets into entities that are considered chartered as corporations, including
limited liability partnerships, civic organizations, religious organizations,
trade associations, unions, and of course, for-profit stock corporations.
Their legal basis is in contractual arrangements that govern a sharing of
assets (real, intellectual, human and financial) in a common undertaking
towards a shared purpose. Even the simplest, most common, and smallest
scale contracts, such as rental agreements, involve the sharing of assets
across people.
206
A core aim of Lick’s “Intergalactic Computer Network” was to facilitate the
sharing of digital assets, such as computation, storage and data. And, in
some ways, such sharing is the heart of today’s digital economy, with “the
Cloud” providing a vast pool of shared computation and storage and the
wide range of information shared online forming the foundation of the
generative foundation models (GFMs) that are sweeping the technology
industry. Yet for all the success of this work, it is confined to limited slices
of the digital world and controlled by a small group of highly profitable,
for-profit entities based in at most a handful of countries, creating both
tremendous waste of opportunity and concentration of power. The dream
that the internet could enable broad and horizontal asset sharing remains
a dream.
We will focus on three categories that are most ubiquitous: storage, com-
putation and data. Yet there are many other examples that intersect with
these and have many related challenges, including the electromagnetic
304
Kate Crawford, Atlas of AI (New Haven, CT: Yale University Press, 2022). Mary Gray,
and Siddhath Suri. Ghost Work: How to Stop Silicon Valley from Building a New Global Un-
derclass. (Boston: Houghton Miffilin Harcourt, 2019).
207
spectrum, code, names and other addresses (e.g. Uniform Resource Lo-
cator/URLs), “physical” space in virtual worlds and non-fungible tokens
(NFTs).
Storage, computation and data lie at the core of essentially every online
interaction. Anything that occurs online persists from one moment to the
next only because of the data it depends on being stored somewhere. The
occurrences themselves are embodied by computations being performed
to determine the outcome of instructions and actions. And the input and
output of every operation are data. In this sense, storage acts roughly
like land in the real economy, computation acts something like fuel and
data acts like human inputs (sometimes called labor) and artifacts people
create and reuse (sometimes called capital).
While land, fuel, labor and capital are often treated as homogeneous
“commodities”, as social theorist Karl Polanyi famously argued this is
a simplifying fiction.305 Storage, computation and especially data are
heterogeneous, tied to places, people and cultures and these connections
affect both their performance characteristics and the social impacts and
meanings of using them in a digital economy and society. While these
challenges are significant for fictitious commodities “in real life”, in
some ways they are even more severe for digital assets and at the very
least societies have had far less time to jointly adapt economic and social
structures around them. These challenges are among the key inhibitors
to a functional digital system of sharing, property and contract.
208
for related military applications. This was also a natural extension of the
“time-sharing” systems that were one of the first projects Lick funded and
aimed to allow a semblance of what would become the “personal com-
puting” experience in the era of large mainframe computers by allowing
many users to share access to a larger machine’s capacity. In this sense,
the internet began, above all, as a platform for precisely the sort of large-
scale computational resource sharing that we focus on in this chapter.307
Much of the limited computation power then available was wasted in idle
307
Waldrop, The Dream Machine, op. cit.
209
time and the feedback desired by users did not require a full machine
at every desk. Instead, every user could have a basic display and input
station (“client”) connected via a network to a central machine (“server”)
whose time they shared, a set-up first pioneered a few years earlier in
the Plato project at the University of Illinois Urbana-Champagne as a
computer-based teaching system.308 This allowed ARPANET members,
such as Douglas Engelbart, to simulate a future of personal computing in
the era of the mainframe.
210
the prevalent waste even in cloud infrastructure. Data are even more
extreme; while these are even harder to quantify, the experience of any
data scientist suggests that the overwhelming majority of desperately
needed data sits in organizational or jurisdictional silos, unable to power
collaborative intelligence or the building of GFMs.
Asset sharing may have important implications for values such as na-
tional security and the environment. Waste of resources effectively re-
duces the supply of semiconductors that national security policies have
aimed at maximizing and, like any waste, increases the demand for envi-
ronmental resources per unit of output. However, it is important to bear
in mind that the sources of energy employed by distributed devices and
their efficiency in converting this energy to computation may in some
cases be lower than those of cloud providers, making it important to pair
improvements to digital asset sharing with the greening of the consumer
electrical grid. Perhaps the most important implication of digital asset
sharing for security may be increased interdependence between partici-
pants in these sharing networks which may bring them into tighter geopo-
litical alignment, especially given the requisite alignments of privacy and
collaboration regulations.
The key reason why this silent crisis is a bit less surprising than the fig-
ures suggest is that these purely digital assets are comparatively new.
Societies have had thousands if not tens of thousands of years to experi-
ment with various social organizational systems to provide for the needs
of the people within them 310 . The origins of our contemporary systems of
310
David Graeber and David Wengrow, The Dawn of Everything: A New History of Humanity,
(New York: Farrar, Straus And Giroux, 2021). In this book, the authors explore a vast range
of political creativity and flexibility surrounding how humans have organized themselves
in the last 100,000 years.
211
property (rental systems, capital management), labor, and practices that
311
involve the abstract representation of value (with deeds, documents
issued to people, supply chain transactions, and money) can be traced to
certain social-psychological qualities that arose after 1000 years of cul-
tural practices. The ban on cousin marriages in Christian Europe led to
the emergence of people who were free to form new institutions and re-
constitute how property was held which created new types of democratic
312
institutions that didn’t exist before . There have been decades to fig-
ure out how to efficiently rent cars and increasingly harness digital tools
to improve the sharing of these assets (e.g. ride and house-sharing plat-
forms). Digital assets, especially those in the hands of large groups of
non-technical people, date back only a few decades. A vital task before
us, then, is to determine the crucial social and technical barriers to utiliz-
ing digital assets with the same effectiveness we have come to expect of
physical assets.
One way to consider what stands in the way of computational asset shar-
ing is to consider the areas where it has been relatively successful and
draw out the differences between these domains and those where it has
thus far mostly failed. To do so, we will run through the three areas of
focus above: storage, computation and data.
212
the storage market PL also created the Filecoin system to allow commer-
cial transactions and incent users to store as much of the entire network’s
data as they can. Yet even IPFS has been a limited success for “real-time”
storage, where files need to be stored to allow their rapid access from
many places around the world. It thus seems to be the relative simplicity
of “deep” storage (think of the equivalent of the “public storage” spaces
provided as a commodity service in real life) that has allowed IPFS to sur-
vive.
The more complicated challenge of optimizing for latency has been han-
dled overwhelmingly by large corporate “cloud” providers such as Mi-
crosoft Azure, Amazon Web Services Google Cloud Platform and Sales-
force. Most of the digital services familiar to consumers in the developed
world (remote storage of personal files across devices, streaming of audio
and video content, shared documents, etc.) depend on these providers.
They are also at the core of most digital businesses today, with 60% of busi-
ness data being stored in proprietary clouds and the top two proprietary
cloud providers (Amazon and Microsoft) capturing almost two-thirds of
the market.313
Yet even beyond the drawbacks of this space being controlled by a few
for-profit companies, these cloud systems have achieved, in many ways,
far less than the visionaries like Lick imagined.
First, heralds of the “cloud era” such as the Microsoft team that helped
persuade the company to pursue the opportunity saw many of the gains
from the cloud arising from more efficient resource sharing across ten-
ants and applications to ensure full utilization.314 Yet, in practice, most of
the gains from the cloud have come from physical cost savings of data cen-
ters co-located with abundant power sources and efficiently maintained,
rather than from meaningful cross-tenant resource-sharing as few cloud
providers have effectively facilitated this kind of market and few cus-
tomers have found ways to make sharing resources work for them.
313
Josh Howarth, “34 Amazing Cloud Computing Stats” Exploding Topics, Febru-
ary 19 2024 at https://explodingtopics.com/blog/cloud-computing-stats. Felix Richter,
“Amazon Maintains Cloud Lead as Microsoft Edges Closer” Statista February 5, 2024
at https://www.statista.com/chart/18819/worldwide-market-share-of-leading-cloud-
infrastructure-service-providers/
314
Rolf Harms, and Michael Yamartino, “The Economics of the Cloud,” 2010,
https://news.microsoft.com/download/archived/presskits/cloud/docs/The-Economics-of-
the-Cloud.pdf.
213
More dramatically, the cloud has largely been built in new data centers
around the world, even as most available computation and storage
remains severely underutilized in the pockets and on the laps and desks
of personal computer owners around the world. Furthermore, these
computers are physically closer and often more tightly networked to
the consumers of computational resources than the bespoke cloud data
centers…and yet the “genius” of the cloud system has systematically
wasted them. In short, despite its many successes, the cloud has to a
large extent involved a reversion to an even more centralized version of
the “mainframe” model that preceded the time-sharing work Lick helped
support, rather than a realization of its ambitions.
Yet even these limited successes have been far more encouraging than
what has been achieved in data sharing. The largest-scale uses of data to-
day are either extremely siloed not just within corporate or institutional
boundaries but even highly subdivided by privacy policies within these or
otherwise based on the ingestion of publicly available data online without
even the awareness, much less consent, of the data creators. The leading
example of the latter is the still-undisclosed data sets on which the GFMs
were trained. The movement to allow data sharing even for clear public
interest cases, such as public health or the curing of diseases, has been
held out for years under a variety of names and yet has made very little
progress either in the private sector or in open standards-based collabo-
rations.
Impediments to sharing
What lessons can we glean from these failures about the impediments
to more effective sharing of digital assets? From the fact that data shar-
ing has failed most spectacularly, and storage sharing has struggled most
with issues around data sharing, a natural hypothesis is that related issues
214
may lie at the core of many of these problems. After all, related challenges
reoccur in all these domains. Much of the structure of IPFS and the chal-
lenges it faces relate to maintaining data privacy while allowing storage
far from the person or organization seeking to maintain this privacy. A
central advantage of the cloud providers has been their reputation for
security and privacy of customer data while allowing those customers to
share it across their devices and perform large-scale computations on it.
215
simplest “quick fixes” for this problem (in terms of privacy regulations
and cryptography) so misfitting that they impede progress more than they
facilitate it.
216
possible benefits of data sharing – which involve taking advantage of new
technical affordance to convey information to distant parties all around
the world – are also the most dangerous and ungovernable. The poten-
tial market is therefore paralyzed. If we cannot address these problems
with conventional contracts, our ideal spheres of information sharing will
end up matching the shape of our associations – meaning we need better
maps of our associative connections, and, as discussed elsewhere, better
assurances against information leakage even from trusted communities.
Of course, these are far from the only problems besetting digital asset
sharing: optimizing for latency, mapping security measures, appropri-
ately standardizing units of compute and other such technical obstacles
are also significant. But the challenges created by the lack of clear and
meaningful standards (both legal and technical) for protecting data while
it is shared spill out into almost every aspect of scalable digital coopera-
tion. While no deductive analysis can substitute for the social experimen-
tation and evolution that will be needed to reach such standards, we can
highlight some of the components and efforts that seem likely to address
the central tensions above and thus should become important to social
exploration if we are going to get past the current barriers to digital asset
sharing.
⿻ property
The first and simplest issue to address is standards for performance and
security for computational asset sharing. When users store their data or
entrust a computation to others, they need assurances that their data will
not be compromised by a third party and that the computation will be
performed according to their expectations, that their data will be retriev-
able by themselves or their customers with an expected distribution of
latency by people in various places etc. Currently, these sorts of guaran-
tees are central to the value propositions of the cloud providers. Because
there are no standards that can easily be met by a broad set of individuals
and organizations offering computational services, these powerful com-
panies dominate the market. An analogous example is the introduction
of Hypertext Transfer Protocol Secure (HTTPS), which allowed a range of
web hosting services to meet security criteria that give web content con-
217
sumers confidence that they can access data from that website without
being maliciously surveilled. Such standards could naturally be paired
with standardized formats for searching, requesting, and matching on ad-
ditional performance and security features.
218
and produced by only a limited range of companies, however, these lend
themselves more to control by a trusted central entity than diffuse collab-
oration.
All these techniques have fallen somewhat behind the speed, scale and
power of the development of GFMs. For example, differential privacy
focuses mostly on the literal statistical recoverability of facts, whereas
GFMs are often capable of performing “reasoning” as a detective would,
inferring for example someone’s first school from a constellation of only
loosely related facts about later schools, friendships, etc. Harnessing the
capacity of these models to tackle these technical challenges and deriv-
ing technical standard definitions of data protection and attribution, es-
pecially as models further progress, will be central to making data collab-
oration sustainable.
317
Pan Wei Koh and Percy Liang, “Understanding Black-Box Predictions via Influence Func-
tions”, Proceedings of the 34th International Conference on Machine Learning, 70 (2017): 1885-
1894
219
Yet many of the challenges to data collaboration are more organizational
and social than purely technical. As we noted earlier, interests in data are
rarely individual as almost all data are relational. Even beyond this most
fundamental point, there are many reasons why organizing data rights
and control at the individual level is impractical including:
• Social leakage: Even when data do not directly arise from a social in-
teraction, they almost always have social implications. For example,
because of the shared genetic structure of relatives, something like
a 1% statistical sample of a population allows the identification of
any individual from their genetic profile, making the preservation
of genetic privacy a profoundly social undertaking.
• Management challenges: it is nearly impossible for an individual
alone to understand the implications, both financial and personal,
of sharing data in various ways. While automated tools can help,
these will be made or shaped by social groups, who will need to be
fiduciaries for these individuals.
• Collective bargaining: The primary consumers of large data sets are
the largest and most powerful corporations in the world. The bil-
lions of data creators around the world can only achieve reasonable
terms in any arrangement with them, and these companies could
only engage in good faith negotiations if data creators act collec-
tively.
220
organization, such as the contributors of open-source code that is being
used to train code-generation models, authors of fan fiction and writers
of Reddit pages may need to organize their own forms of collective repre-
sentation.
Once they develop and spread sufficiently, data collaboration tools, orga-
nizations and practices may become sufficiently familiar to be encoded
in common sense and legal practice as deeply as “property rights” are,
though as we noted they will almost certainly have to take a different form
than the standard patterns governing private ownership of land or the or-
ganization of a joint-stock corporation. They will, as we noted, need to in-
clude many more technical and cryptographic elements, different kinds
of social organizations with a greater emphasis on collective governance
and fiduciary duties and norms or laws protecting against unilateral dis-
closure by a member of a MIDs (analogous to prohibitions against unilat-
eral strikebreaking against unions). These may form into a future version
of “property” for the digital world, but one much more attuned to the ⿻
character of data.
⿻ real property
Achieving ⿻ property will be a challenge, but it is instructive to remem-
ber that many property rights systems in other realms are contested and
in flux. In some ways, the deeply social character of data sets it apart from
real-world assets, and therefore our existing modes of designing prop-
erty rights and contractual systems are not readily applied to data. But
in other ways, the deeply social character of data accentuates, through its
221
unfamiliarity, many of the ways traditional property systems are them-
selves ill-suited to managing real assets today.
We take one step away from the purely digital asset world and look to
two examples of digitally-related assets whose property rights regimes
are changing rapidly. These two examples are the electromagnetic spec-
trum and namespaces on the internet.
222
has been that today, most people reach websites through search engines
rather than direct navigation. These engines usually list sites associated
with a given name based on a variety of (mostly not publicly disclosed)
signals of their relevance to users as well as including some paid adver-
tisements that are auctioned in real-time.325 While relevance algorithms
are something of a black box, a reasonable first mental model for them
is the original “PageRank” algorithm of Google founders Sergey Brin and
Larry Page, which ranked pages based on their “network centrality”, a
notion related to the network-based voting systems we will discuss in our
326
chapter on ⿻ Voting below. Thus, to a first blush, we can think of the de
facto property regime of Internet namespaces today as being a combina-
tion of collective direction towards the interest of browsers (rather than
domain owners) combined with a real-time auction for domain owners.
Both are a far cry from traditional property systems.
This is not, of course, to suggest that any of this is ideal and certainly not
socially legitimate. These systems have been largely designed far from
the public eye, without public understanding by teams of technocratic
engineers and economists. Few even recognize that they operate much
less believe they are appropriate.327 On the other hand, they respond to
real challenges in creative ways, and the issues they address stretch well
beyond the narrow domains to which they have been applied thus far.
Addressing holdout problems and spectrum sharing is central to allowing
digital development that is broadly demanded by the public and viewed
as central to even issues of national security. Similar holdout issues per-
vade the redevelopment of urban spaces and the building of common in-
frastructure, and much land currently held as private property could be
made into shared spaces like parks (or vice-versa).
Treating name spaces as private property makes little sense, given that
325
Benjamin Edelman, Michael Ostrovsky and Michael Schwarz, “Internet Advertising and
the Generalized Second-Price Auction: Selling Billions of Dollars Worth of Keywords”, Amer-
ican Economic Review 97, no. 1: 242-259
326
Sergey Brin and Lawrence Page, “The Anatomy of a Large-Scale Hypertextual Web
Search Engine”, Computer Systems and ISDN Systems 30, no. 1-7: 107-117.
327
In fact, authors of this book have been prominent critics of these designs for these
reasons. Zoë Hitzig, “The Normative Gap: Mechanism Design and Ideal Theories of Jus-
tice”, Economics and Philosophy 36, no. 3: 407-434. Glen Weyl, “How Market Design
Economists Helped Engineer a Mass Privatization of Public Resources”, Pro-Market May 28,
2020 at https://www.promarket.org/2020/05/28/how-market-design-economists-engineered-
economists-helped-design-a-mass-privatization-of-public-resources/.
223
those who happen to own a name that is contested (e.g. “ABC.com”) may
be domain squatters, legacy owners serving a limited audience, fraud-
sters exploiting a brand, etc. While some of the stability and signal of
importance from owners’ willingness to pay offered by property rights
are clearly important, the systems used by search engines achieve this
in arguably a better balance by explicitly accounting for the public in-
terest in stability and the real-time demands from those who would pay
for the namespace than does a simple private property system. Again,
these issues show up frequently in “real world” domains from trademarks
and other intellectual property to the ownership of antiquities and his-
toric locations in cities. It only takes a slight stretch of imagination to
see how, if they combine with far better public engagement, education
and advocacy, the innovative alternatives to property that evolved and
are evolving in the digital realm might help us rethink property systems
more broadly in a ⿻ direction, a theme we will explore in greater depth
in our Social Markets chapter below.
4-5 Access
Lucy: Hello, this is Lucy from Château du Soleil Couchant out of Bordeaux.
Lucy: Certainly. There’s been skepticism among local vineyards about the
224
efficacy of hail cannons, but the latest generation has been scientifically
validated to disrupt hailstorm formation. Hail is a longstanding menace
to our crops. To be effective, we need widespread adoption of these sys-
tems. We’re initiating a pilot program to build trust locally, but a gov-
ernance system akin to what helped the Wine Trade Association resolve
their differences would be invaluable.
Municipal Rep: Great. I’ve just configured the platform based on our dis-
cussion and launched it at www.bordeauxhailcannon.assoc. A detailed
changelog has been dispatched to you. Should you need further modifica-
tions, please let me know.
Lucy: I certainly will. Could you also send over some advice or common
hurdles that others have faced?
Lucy: That sounds perfect, thank you. I’ll review the changelog and get
back to you by tomorrow.
Long before the rise of the internet, access to information had always
been a crucial part of human civilization: as Sir Francis Bacon put it cen-
turies ago, “knowledge is power”. In today’s information age, and even
more in the future we describe in this book, the literal truth in this dic-
tum is ever more present. While the previous chapters of this part focus
on the aspects of digital life that ensure human rights, these mean noth-
225
ing to human life unless every human can securely and faithfully access
this world we imagine. In this chapter, we will explore what making such
access a fundamental right must mean.
We are not interested in mere access, but access with integrity. If the infor-
mation some receive is accurate and others corrupted, it is worse than if
the latter had no access at all. Democracy depends on a populace that can
fully participate: every voice is critical. While, as we have emphasized
above, different communities make sense of the pattern of facts differ-
ently. But this diversity of perspective must come founded on underlying
common access to uncorrupted input data if it is to contribute to a ⿻ fu-
ture. We all can and must make our own meanings of life, but we are de-
nied our equal right to do so if some of us receive manipulated versions
of the inputs to the global information commons.
In simple terms, we must ensure that everyone has equal access to contex-
tually complete information; otherwise, it can become worthless or even
a harmful weapon. This imperative is not solely driven by digital technol-
ogy; it also requires a collective, universal, and inclusive digital alliance,
supported by a democratic structure. In today’s era, where internet ac-
cess is considered a digital human right, the spirit of ⿻ flows seamlessly
across the globe, much like the ancient concept of ‘dao.’ This spirit is wo-
ven from zeros and ones, continuously expanding our ‘internet of beings’
and integrating with societal structures in ways that combine democratic
governance with collaborative technology. Thus, ‘access’ signifies not just
technological availability but also contributes to the realization of every-
one’s innate vision, naturally fostering trust, mutual respect, and safety.
Next, we will clarify the current status of internet access, countries’ efforts
towards access, as well as our expectations for the digital environment
226
and prospects for future development.
Yet, these positive outcomes are not widespread. Digital disparity exem-
plifies social polarization, particularly between rural and urban areas.
Prior to the pandemic, 76% of urban households around the world had ac-
cess to home internet, which was nearly double the 39% in rural regions.
The pandemic has intensified public attention on such disparities as more
areas of life — from work and education to socializing — have moved
online. The International Telecommunication Union (ITU) reports that
in 2020 alone, 466 million people used the internet for the first time.328
While the number and global penetration of internet users have contin-
ued to grow, multifaceted inequalities in access remain. These contribute
to a wide range of economic, political, and social inequities.
227
their efforts to illuminate the dark and tricky corners existing on the inter-
net, watching out for each other. Of course, this issue touches upon global
social structures and cultural diversity. Fortunately, we no longer need to
cross oceans as De Tocqueville did to learn from the valuable experiences
of different countries in building digital democracy and sustainable devel-
opment. To safeguard and establish a safer and more open digital access
environment, there are two important courses of action:
If we can advance these two fundamental rights, the other rights de-
scribed in this part of the book can reach into the lived experience of
all people and serve as a substrate not just of collective intelligence
“online”, but in the daily lives of everyone across the world. As we have
highlighted throughout the book, many public services and social inter-
actions in today’s digital environment seem overshadowed by capitalism.
Nowadays, “internet access is a human right.” is nearly a consensus
among democracies. What remains is to untangle the complications
between democracy and internet access.
228
signals to each other and share essential sugars, water, carbon, nitrogen,
and phosphorus.330
229
zens to access government services and real-time information. Diia has
shown the world how digital technology can break down long-standing
corruption. This year, Estonia launched its latest app “mRiik,” largely in-
spired by the Ukrainian app Diia.332
332
Note Ukraine’s readiness to share its code and UX/UI design methods with Estonia
(see Igor Sushon, “Estonia Launches the State Application MRiik, Built on the Basis of the
Ukrainian Application Diia,” Mezha, January 19, 2023, https://mezha.media/2023/01/19/diia-
mriik/.https://mezha.media/2023/01/19/diia-mriik/)”
230
Section 5: Democracy
231
have described with other as a “⿻ Management Protocol”.333 All this
was recorded on a distributed ledger through an open-source protocol,
GitRules, grounded on open-source participation rather than financial
incentives. Contentious issues were resolved through tools we discuss
in the Augmented Deliberation chapter below. The book has been
translated and copy-edited by the community augmented by many of
the cross-linguistic and subcultural translation tools we discuss in our
Adaptive Administration chapter.
To support the financial needs of the book during the publication process,
we harnessed several of the tools we describe in the Social Markets chap-
ter. We hope to harness technologies from the Immersive Shared Reality
chapter to communicate and explore the ideas from the book with audi-
ences around the world.
For all these reasons, as you read this book you are both learning about
the ideas and evaluating them on their merits and at the same time ex-
periencing what they put into practice, can create. If you are inspired by
that content, especially critically, we encourage you to contribute to the
living and community managed continuations of this document and all its
translations by submitting changes through a git pull request or by reach-
ing out to one of the many contributors to become part of the community.
We hope as many criticisms of this work as possible will be inspired by
the open-source mantra “so fix it!”
While a human rights operating system is the foundation, the point of the
system for most people is what is built on top of it. On top of the bedrock
of human rights, liberal democratic societies run open societies democra-
cies, and welfare capitalism. On top of operating systems, customers run
productivity tools, games, and a range of internet-based communication
media. In this chapter, we will illustrate the collaboration technologies
that can be built on the foundation of ⿻ social protocols of the previous
section.
While we have titled this section of the book “democracy”, what we plan to
333
Tobin South, Leon Erichsen, Shrey Jain, Petar Maymounkov,
Scott Moore and E. Glen Weyl, “Plural Management” (2024) at
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4688040.
232
describe goes well beyond many conventional descriptions of democracy
as a system of governance of nations. Instead, to build ⿻ on top of funda-
mental social protocols, we must explore the full range of ways in which
applications can facilitate collaboration and cooperation, the working of
several entities (people or groups) together towards a common goal. Yet
even these phrases miss something crucial that we focus on the power
that working together has to create something greater than the sum of
what the parts could have created separately.
This chapter, which lays out the framework for the rest of this part of the
book, will highlight why collaboration across diversity is such a funda-
334
Divya Siddarth, Matt Prewitt and Glen Weyl, “Beyond Public and Private: Collective Pro-
vision Under Conditions of Supermodularity” (2024) at https://cip.org/supermodular.
335
David Ricardo, On the Principles of Political Economy and Taxation, (London: John Mur-
ray, 1817).
233
mental and ambitious goal. We then define a spectrum of domains where
it can be pursued based on the trade-off between depth and breadth of col-
laboration. Next, we highlight a framework for design in the space that
navigates between the dangers of premature optimization and chaotic ex-
perimentation. Yet harnessing the potential of collaboration across diver-
sity also holds the risk of reducing the diversity available for future col-
laboration. To guard against this we discuss the necessity of regenerating
diversity. We round out this chapter by describing the structure followed
in each subsequent chapter in this part.
While novel in a certain sense, this is also one of the oldest and most
universally resonant of all human ideas. All life depends on survival
and reproduction, and cooperation across difference is critical to both:
336
The analogy here is even tighter than it might seem at first. What is usually called “en-
ergy” is actually “low entropy”; a uniformly hot system has lots of “energy” but this is not
actually useful. All systems for producing “energy” work by harnessing this low entropy
(“diversity”) to produce work; such systems also have the advantage of avoiding “uncon-
trolled” releases of heat through explosions (“conflict”). There is thus a quite literal and
direct analogy between ⿻’s goal of harnessing social low entropy and industrialism’s goal
of harnessing physical low entropy.
234
avoiding deadly conflict, but also reproduction that requires the unlike
to come together, especially if inbreeding is to be avoided. Perhaps the
most universal feature of religions around the world and across history
have been their celebration of those who have achieved peace and coop-
eration across difference.
235
• Profession: Most people spend a large portion of their lives working
and define important parts of their identities by a profession, craft
or trade.
• Organizations: People are members of a range of organizations, in-
cluding their employers, civic associations, professional groups, ath-
letic clubs, online interest groups etc.
• Ethno-linguistics: People speak a range of languages and identify
themselves with and/or are identified by others with a “ethnic”
groups associated with these linguistic groupings or histories of
such linguistic associations, and these are organized by historical
linguists into rough phylogenies.
• Race, caste and tribe: Many societies feature cultural groupings
based on real or perceived genetic and familial origins that partly
shape collective self- and social perceptions, especially given the
legacies of severe conflict and oppression based on these traits.
• Ideology: People adopt, implicitly or explicitly, a range of political
and social ideologies organized according to schema that themselves
differ greatly across social context (e.g. “left” and “right” are key di-
mensions in some contexts, while religious or national origin divides
may be more important in others).
• Education: People have a range of kinds and levels of educational
attainment.
• Epistemology/field: Different fields of educational training structure
thought. For example, humanists and physical scientists typically
approach knowledge differently.
• Gender and sexuality: People differ in physical characteristics asso-
ciated with reproductive function and in social perception and self-
perception associated with these, as well as in their patterns of inti-
mate association connected to these.
• Abilities: People differ greatly in their natural and acquired physical
capabilities, intelligence, and challenges.
• Generation: People differ by age and life experiences.
• Species: Nearly all the above has assumed that we are talking exclu-
sively about humans, but some of the technologies we will discuss
may be used to facilitate communication and collaboration between
humans and other life forms or even the nonbiological natural or
spiritual worlds, which is obviously richly diverse internally and
236
from human life.
Yet, if history teaches anything, it is that for all its potential, collabora-
tion across diversity is challenging. Social differences typically create
divergences in goals, beliefs, values, solidarities/attachments, and cul-
ture/paradigm. Simple differences in beliefs and goals alone are the
easiest to overcome by sharing information or agreeing to disagree,
many differences in beliefs can be bridged and with common under-
standing of objective circumstances, compromises on goals are fairly
straightforward. Values are more challenging, as they involve things that
both sides will be reluctant to compromise over and tolerate.
But the hardest differences to bridge are typically those related to systems
of identification (solidarity/attachment) of meaning-making (culture). Sol-
idarity and attachment relate to the others to which one feels allied or
sharing in a “community of fate” and interests, groups by which one de-
fines who and what one is. Cultures are systems of meaning-making that
allow us to attach significance to otherwise arbitrary symbols. Languages
are the simplest example, but all kinds of actions and behaviors carry dif-
fering meaning depending on cultural contexts.340
Solidarity and culture are so challenging because they stand in the way
not of specific agreements about information or goals but of communica-
tion, mutual comprehension, and the ability to regard someone else as a
partner capable and worthy of such exchange. While they are in an ab-
stract sense related to beliefs and values, solidarities and culture in prac-
tice precede these in human development: we are aware of our family
and those who will protect us and learn to communicate long before we
consciously hold any views or aim for any goals. Being so foundational,
they are the hardest to safely adjust or change, usually requiring shared
life-shaping experiences or powerful intimacy to reform.
237
peril. Bridging differences for collaboration often erodes them, harness-
ing their potential but also reducing that potential in the future. While
this may be desirable for protection against conflict, it is an important cost
to the productive capacity of diversity in the future. The classic illustra-
tion is the way that globalization has both brought gains from trade, such
as diversifying cuisine, while at the same time arguably homogenizing
culture and thus possibly reducing the opportunity for such gains in the
future. A critical concern in ⿻ is not just harnessing collaboration across
diversity but also regenerating diversity, ensuring that in the process of
harnessing diversity it is also replenished by the creation of new forms of
social difference. Again, this is analogous to energy systems which must
ensure that they not only harvest but also regenerate the sources of their
energy to achieve sustainable growth.
One rough way to think about quantifying the differences between these
interaction modes is in terms of the information theoretical concept of
bandwidth. Capitalism tends to reduce everything to a single number
(scalar) of money. Intimacy, on the other hand, typically not only im-
merses all senses but goes beyond this to touch “proprioception” (also
known as kinesthesia), the internal sensations of one’s own body and
238
being that neuroscientists believe constitute a majority of all sensory in-
put.341 Intermediate modalities lie between, activating structured forms
of symbols or limited sets of sense.
The natural trade-off, however, that is the reason capitalism has not been
superseded by universal intimacy is that high bandwidth communication
is challenging to establish among large and diverse groups. Thinner and
shallower collaboration scales more easily. While the simplest notion of
scale is the number of people involved, this is shorthand. Breadth is best
understood in terms of inclusion across lines of social and cultural dis-
tance rather than simply large numbers of people. For example, deep col-
laboration may well be easier among a large extended family, physically
co-located and sharing a language and religion than among a handful of
people scattered around the world, speaking different languages, etc.
**
341
Uwe Proske and Simon C. Gandevia, “The Proprioceptive Senses: Their Roles in Signaling
Body Shape, Body Position and Movement, and Muscle Force”, Physiological Review 92, no.
4: 1651-1697.
239
Figure 5-0-A. The trade-off between breadth of diversity and depth of col-
laboration represented as points along a production possibilities frontier
**
We can see there being a full spectrum of depth and breadth, representing
the trade-off between the two. Economists often describe technologies by
“production possibilities frontiers” (PPF) illustrating the currently possi-
ble trade-offs between two desirable things that are in tension. In Figure
A, we plot this spectrum of cooperation as such a PPF, grouping different
specific modalities that we study below into broad categories of “commu-
nities” with rich but narrow communication, “states” with intermediate
on both and “commodities” with thin but broad cooperative modes. The
goal of ⿻ is to push this frontier outward at every point along it, as we
have illustrated in these seven points, each becoming a technologically
enhanced extension.342
But for all the debate between the proponents of “deliberative” and “elec-
toral” democracy, it is important to note that these are just two points
along a spectrum (both mostly within the “state” category) and far from
even representing the endpoints of that spectrum. As rich as in-person de-
liberations can be, they provide nowhere near the depth of sharing, con-
342
This tripartite division of modes of exchange into communities, state, and commodities
is inspired by Kojin Karatani, The Structure of World History: From Modes of Production
to Modes of Exchange (Durham, NC: Duke University Press, 2014). Karatani’s aspiration to
achieve the return of community at a broader scale can be seen as an ambitious example of
⿻.
240
nection and building of common purpose and identity that the building of
committed teams (as in e.g. the military) and long-term intimate relation-
ships do. And while voting can allow hundreds of millions to have a say
on a decision, it has never cut across social boundaries in any way close to
what impersonal, globalized markets do everyday. All these forms have
trade-offs and the very diversity of the ways in which we have historically
navigated them and the ways in which these have improved overtime
(e.g. the advent of video conferencing) should be a source of hope that
concerted development can radically improve these trade-offs, allowing
richer collaboration across a broader diversity of social differences than
in the past.
One of the worst such evils is papering over the richness and diversity of
the world. Perhaps the archetypal example is conclusions about the opti-
mality of markets in neoclassical economics, which depend on extremely
343
Randall Hyde, “The Fallacy of Premature Optimization” Ubiquity February, 2009 avail-
able at https://ubiquity.acm.org/article.cfm?id=1513451.
241
simplistic assumptions and have often been used to short-circuit attempts
to discover systems for social resource management that deal with prob-
lems of increasing returns, sociality, incomplete information, limited ra-
tionality, etc. As will become evident in the coming chapters, we know
very little about how to even build social systems that are sensitive to
these features, much less even approximately optimal in the face of them.
This shows why the desire to optimize, chasing some simple notion of the
good, often seduces us away from the aspirations of ⿻ as much as it aids
us in pursuing it. We can be tempted to maximize what is simple to de-
scribe and easy to achieve, rather than anything we are really after.
242
of real-world sociality (viz. collectively determined emergent authority,
social networks and commerce) to the digital world. While these services
have brought many important benefits to billions of people around the
world, we have extensively reviewed above, their many shortcomings
and the dangerous path they have brought the world without a broader
set of public goals to guide them. We must build tools that serve the felt
needs of real, diverse populations, meeting them where they are, and yet
we cannot ignore the broader social contexts in which they sit and the
conflicts that we might exacerbate in meeting those perceived needs.
243
rather than having to fit it into what they can write or draw.344 This al-
lows much greater diversity and much greater common understanding.
Similarly, a key goal of approval voting (where citizens can vote for as
many candidates as they wish and the one with the most votes wins) is to
simultaneously ensure that the elected candidate has very wide general
consensus and enable there to exist a much broader diversity of candi-
dates because voters are not afraid a “third party” will act as a spoiler as
voters can choose both the third party and one of the leading ones.345
Regenerating diversity
Yet, as noted above, even if we manage to avoid these pitfalls and suc-
cessfully bridge and harness diversity, we run the risk, in the process, of
depleting the resource diversity provides. This is possible at any point
along the spectrum and at any level of technological sophistication. In-
timate relationships that form families can homogenize participants, un-
dermining the very sparks of complementarity that ignited love. Building
344
Rajesh P. N. Rao, Andrea Stocco, Matthew Bryan, Devapratim Sarma, Tiffany M.
Youngquist ,Joseph Wu and Chantel S. Prat, “A Direct Brain-to-Brain Interface in Humans”
PLOS One 9, no. 11: e111322 at https://doi.org/10.1371/journal.pone.0111332.
345
Steven J. Brams and Peter C. Fishburn, “Approval Voting”, American Political Science
Review 72, no. 3: 831-847.
244
political consensus can undermine the dynamism and creativity of party
politics.346 Translation and language learning can undermine interest in
the subtleties of other languages and cultures.
None of this is inevitable and of course there are many stories of inter-
sections that undermine diversity. But this range of possibilities gives
hope that with careful attention to the issue, it is possible in many cases
to design approaches to collaboration that renew the diversity that pow-
ers them.
346
Nancy L. Rosenblum, On the Side of the Angels: An Appreciation of Parties and Partisan-
ship (Princeton, NJ: Princeton University Press, 2010).
347
Claude Lévi-Strauss, The Elementary Structures of Kinship, (Boston: Beacon Press, 1969).
348
This concept is often erroneously attributed to the work of G.W.F. Hegel, but actually
originates with Johann Gottlieb Fichte and was not an important part of Hegel’s thought.
Johann Gottlieb Fichte, “Renzension des Aenesidemus”, Allgemeine Literatur-Zeitung 11-12
(1794).
245
Infinite diversity in infinite combinations
In this part of the book, we will (far from exhaustively) explore a range of
approaches to collaboration across difference and how further advances
to ⿻ can extend and build on them. Each chapter will begin, as this one
did, with an illustration of technology near the cutting edge of what is
possible that is in use today. It will then describe the landscape of ap-
proaches that are common and emerging in its area. Next it will high-
light the promise of future developments that are being researched, as
well as risks these tools might pose to ⿻ (such as homogenization) and
approaches to mitigating them, including by harnessing tools described
in other chapters. We hope that the wide range of approaches we high-
light draws out not just the substance of ⿻, but also the consistency of its
approach with its substance. Only a ⿻ complementary and networked
directions can support the development of a ⿻ future.
246
The Park of Aging is a poignant example of proprioceptive, post-symbolic
communication, where participants receive information through an inti-
mate, sensorial experience beyond merely interpreting words and sym-
bols, utilizing all sensemaking of the body; the Park immerses partici-
pants in the sensations of being old, unlocking the first-hand experience
of the deteriorating senses, including seeing and hearing words and sym-
bols.
247
Intimacy today
Post-symbolic communication, a term coined by Jaron Lanier , ventures
beyond the realm of language and symbols to explore the potential for
direct and immersive shared experience by harnessing all senses, includ-
ing proprioception.350 Our first experience of non-verbal communica-
tion is in the natal womb; the synchronization of heartbeats between a
mother and her unborn child, especially when the mother breathes rhyth-
mically, suggests an intrinsic communication pathway.351 As we develop,
humans convey information nonverbally through body language, facial
expression, tone, touch, laughter, crying, facial blood flow and smell. Bio-
chemical messengers can convey emotional states and trigger responses
in others, often unconsciously. For instance, research has shown that hu-
man sweat contains compounds that, when detected by others, can con-
vey stress or fear, influencing the receiver’s perception and behavior.352 .
We also see glimpses of the post-symbolic potential in long-established
practices of intimacy among humans:
248
other’s actions and work as a cohesive unit, relying on signals
communicated through sound, movement, and hand gestures. This
synchrony is somewhere between dance and combat, also fueled
by common purpose.
• Romantic intimacy: through touch, eye contact, and emotional vul-
nerability, partners create a unique, shared experience. Attention to
the internal experience of a partner is critical to a successful bond,
building proprioceptive empathy that demands perhaps the deepest
mutual trust and understanding humans are capable of.
• Religious experience: in mystical practices like Sufism, participants
collectively engage in rituals like whirling and chanting. These
shared spiritual practices engage the senses in the same way, and
create a sense of unity and connection with something greater than
oneself, fostering community not just among people, but with a
greater spiritual presence.
• Yoga: in a yoga class, practitioners move together through sequences
of poses, guided by the rhythm of their breath. Despite the individ-
ual nature of the practice, there is a collective harmony in the move-
ments and the shared goal of health and peace, as well as a heighten-
ing nervous system through stretches and poses. This shared phys-
ical and meditative experience fosters a sense of communal energy
and focus.
249
patterns of thought and perception, opening alternative narratives
to make sense. Users often report experiencing deep introspective
insights, a sense of oneness with the universe, confronting deep-
seated emotions and memories, or communication with seemingly
non-embodied forms of consciousness.
• Prayer: Similarly, through prayer, contemplation, or participation
in religious rituals, individuals open communication to something
beyond their sensory experience. Whether through a feeling of di-
vine presence or an internal sense of clarity and peace, these ex-
periences can be deeply impactful and transformative, and foster
a greater connection to themselves and their place in the universe.
Intimate experience today is rich with examples that touch upon the
edges of post-symbolic communication. From physiological signals to
chemosignals we are just beginning to learn the non-verbal, information-
dense modes that can synchronize human experience and form the
deepest human bonds between oneself and other humans, groups, and
the universe broadly.
250
• Haptic feedback and homuncular flexibility: Haptic devices provide
tactile sensations, simulating touch and physical interactions in
virtual environments and allowing users to feel and respond to
virtual stimuli as if they were real. Similarly, with homuncular
flexibility, individuals can learn to control virtual bodies that differ
significantly from their own, thereby transcending the limitations
of their physical bodies.354 A leading examples is the near-universal
capacity of humans to “regain” from their evolutionary past a sense
of agency over a tail, given sufficient feedback and control in a
virtual world.355
251
capabilities. However, they also introduce neuroethical challenges
such as moral bio-enhancement (MBE) - the use of biomedical
technology to morally improve humans.
252
fiction or religious practice, becomes a scientific reality, allowing for the
direct transmission of thoughts, feelings, and sensory experiences from
mind to mind. Human relationships evolve into deeper, more meaningful
connections where misunderstandings are a choice and empathy abound.
Children, in this new paradigm, grow not just by learning from others’
words or observing actions but by immersing themselves in the lived ex-
periences of others from any culture or epoch, including their ancestors.
This experiential osmosis accelerates empathy and wisdom, fostering a
society where learning is as much about absorbing direct experiences as
it is about traditional education.
253
by technology companies or governments that distract humanity with
an alternate reality, or simulation. As humans lose touch with the
reality of the physical world, over-reliance on telepathic communica-
tion could lead to the atrophy of traditional communication skills and
cultural practices, with people becoming dependent on direct mental
connections. Furthermore, in a world where the boundaries between
self and other blur, the sanctity of individual thought and experience
could be threatened. High-bandwidth communication could lead to a
homogenization of thoughts and experiences as individual perspectives
merge into collective consciousness, erasing our differences.
254
5-2 Immersive Shared Reality
“Stand up and face the mirror”, the at-first innocent but gradually
more-threatening refrain, echoes through Courtney Cogburn’s 1000 Cut
Journey.360 Simple words that invite the visitor to this immersive-reality
environment to experience life through the eyes, ears, and body of
Michael Sterling, a black man. Small moments of casual racism build to a
crescendo of hopelessness and induce a pervasive sense of helplessness.
Perception, or reality? It depends on whose shoes you’re standing in.
Some may kick off their shoes the moment they remove the VR headset,
but for Michael Sterling, there’s nothing he (or now you) can do to erase
the footprints of direct experience.
255
tions, tomorrow’s potential, and the frontier. It shows how immersive
technologies may facilitate shared experiences that blend physical and
virtual reality, complementing and expanding human experience with
interactions that surpass physical, spatial, and social limitations. Immer-
sive shared reality (ISR) creates spaces where communities may converge
for socialization, gaming, entertainment, and more, facilitating connec-
tions that, while less intense than symbolic communication, are meaning-
ful and emotionally resonant. From virtual reality gatherings that unite
people across the globe, to mass online gaming and virtual music festi-
vals, these digital arenas extend the possibility space of shared human
experience.
Copresence today
Throughout history, of the most meaningful human experiences involve
multisensory copresence. Religious observances often engage many
senses in large groups. Clubs and parties are among the most treasured
entertainment experiences because of their multisensory activation.
Political rallies, group assemblies (whether at schools or for concerts),
collective outings (hiking, sports, etc.) all engage a range of sense.
256
Augmented and Mixed Reality (a.k.a. VR, AR, MR).
**
Figure 5-2-A. Mediated Reality Framework adapted from Mann and Nnlf
(1994). Source: Wikipedia, CC 3.0 BY-SA.
**
ISR can apply to many human interactions. Some of the most common
applications are socialization, gaming, entertainment, sports, and fitness:
257
where the sense of presence is amplified by the immersive, 3D envi-
ronment. Participants experience a sense of togetherness and com-
munity, facilitating connections that, while not as intense as physi-
cal interactions, are still meaningful and emotionally resonant.
• Mass online gaming: Online multiplayer games create expansive
worlds where players collaborate, compete, and strategize together.
Communication is a blend of in-game gestures, strategic planning,
and quick decision-making, often under time pressure. This envi-
ronment nurtures a form of camaraderie and collective intelligence,
as players become attuned to each other’s play styles and tactics and
take common action towards common goals.
• Online religious services: In the digital era, religious gatherings
have expanded into online platforms, allowing congregations to
participate in services and rituals remotely. This form of communal
worship, while lacking the physical closeness of traditional services,
still offers a sense of shared belief, uniting participants in a common
religious experience.
• Virtual music festivals and parties: With the advent of streaming
technology, music festivals and parties have found a new home in
the virtual world through a range of media, from opera in movie the-
aters to VR concert and music festival experiences. Virtual elements
have even become increasingly central to the most prized in-person
music venues, leading to massive investments that integrate digital
and physical experiences ever more closely.
• E-sports tournaments: E-sports have gained immense popularity,
with spectators and players engaging in highly competitive gaming
at a professional level. These events, often streamed to vast audi-
ences, create a shared sense of excitement and allegiance among
fans.
• Remote fitness classes: The rise of online fitness, especially during
the pandemic, has brought people together in pursuit of health and
wellness. Participants engage in synchronized workouts, yoga ses-
sions, or dance classes from their own homes, sharing a common
goal and a sense of group motivation.
• Virtual tourism: travelers can experience remote places, walking
through historic cities or visiting foreign landscapes from the
comfort of their homes. This technology enables travelers to virtu-
258
ally walk through historic cities, marvel at natural wonders, and
immerse themselves in foreign landscapes.
• Immersive artistic experiences: Alongside the rise of remote shared
experience, a new genre of in-person immersive art has developed
and become increasingly prevalent form at the intersection of live
entertainment and museums. Participants jointly explore myster-
ies, escape from puzzles, live in the world of an artist who saw the
world through differently abled eyes, or surround themselves in
worlds of novel tactile and visual sensations that transport them to
new shared understandings of the possible.
259
• Emotional connectivity: Emerging technologies aim to transmit nu-
anced human emotions and physical sensations through VR, using
advanced haptic feedback, biometric sensors, and emotional GFMs.
This could enable users to feel the warmth of a handshake, the pres-
sure of a hug, or even the subtleties of emotional expression con-
veyed through a virtual avatar, deepening connections and empathy
between participants and enabling those with visual or auditory im-
pairments to engage through other senses.
• Massive multi-user online laboratories (MMOLs): Scientists can
collaboratively conduct experiments in a shared virtual labora-
tory. MMOLs could facilitate real-time collaboration on scientific
research and education across the globe, breaking down barriers
to access and enabling a form of immersive, collective discovery.
• Civic Spaces: Digital replicas of civic centers, town halls, and com-
munity spaces where people can gather to discuss, debate, and make
decisions about their communities. These spaces would allow for a
more inclusive and accessible form of civic engagement, enabling
participants to engage in local governance or community planning
processes from anywhere in the world. They would also leverage
our intuitions from real world spaces much more closely than exist-
ing online spaces do, thus helping improve the creation of context
and common understanding online.
• Immersive learning: From virtual field trips to interactive historical
reenactments, educational content will become more immersive, al-
lowing students of all ages to explore and learn in ways that are en-
gaging, memorable, and more impactful than traditional methods.
Such learning can range from deepening connections to historical
experience through immersion to providing vocational training in
a far broader range of high-risk scenarios than is currently possi-
ble.363
• Cross-cultural exchange: Platforms specifically designed to foster
understanding and empathy between diverse cultural groups
by immersing users in the experiences of people from different
363
For example, education of nurses in VR has shown significant potential to accelerate
tactile learning. Jeeyae Choi, Elise C. Thompson, Jeungok Choi, Colette Waddill and Soyoung
Choi, “Effectiveness of Immersive Virtual Reality in Nursing Education”, Nurse Educator 47,
no. 3: E57-E61.
260
backgrounds. Through narratives, rituals, and daily life activities,
these platforms could use VR and AR to bridge cultural divides
and build a global sense of community. For example, language
learning applications use these to immerse users in the linguistic
and cultural background of others. Another example is the Portals
364
Policing Project , which shares the lived experiences of people
with law enforcement in a controlled, yet realistic virtual chamber,
improving understanding and trust on both sides.
• Environmental climate experiences: Interactive simulations that al-
low users to experience the potential impacts of climate change first-
hand. For example, the Tree demonstrates how VR can evoke empa-
thy and compassion for the natural environment by transforming
the user into a rainforest tree and exposing them to the threats of
deforestation and climate change.365
• Therapy: Leveraging the power of VR to create therapeutic environ-
ments, sessions increasingly offer greatly enhanced cognitive behav-
ioral therapy, enabling patients to be exposed in a carefully mod-
ulated way to the sources of phobias, traumatic past experiences,
anxiety-producing social situations and more. Therapy for children
suffering from autism spectrum and attention deficit and hyperac-
tivity disorders is increasingly bearing fruit.366
261
Frontiers of immersive shared reality
As we gaze to the horizon of ISR, the very nature of communal experience
and human connection undergoes a profound metamorphosis. Imagine
stepping into a world where shared virtual spaces are not mere simula-
tions, but extensions of our physical reality, offering experiences that are
as rich and complex as those encountered in the tangible world. In this fu-
ture, ISR technologies enable a fusion of senses, thoughts, and emotions.
At the frontiers of ISR, we are not merely spectators but active partici-
pants in a revolution of multisensory integration.367
262
perience, or potentially beneficial futures to plan to both achieve
them and avoid unintended harm. With affective computing, the
system may adapt to the environment based on the user’s response,
physiology as well as memories or preferences, creating a feedback
loop that heightens awareness and empathy.
• Virtual design studios: Community members, architects, and engi-
neers may come together to co-create the green spaces of tomor-
row to redefine “planning.” Participants virtually touch the bark of
trees slated for planting and inhale the fragrant blossoms intended
for the gardens. Participant feedback can modify the simulation in
real-time, enabling sensorial immersion into different visions for
a project. Harnessing methods from our Augmented Deliberation
chapter below, they could deliberate and see the possibilities for
joint design come to life around them, printing the design on to phys-
ical space only having lived in it together virtually.
• Collective memory palaces: Envision virtual environments where
entire communities can deposit, share, and experience collective
memories and knowledge. These memory palaces serve not only
as repositories of communal wisdom but as spaces where individ-
uals can relive historical events or explore the collective psyche of
humanity, fostering a deeper understanding and connection across
generations. They could also redefine the experience of memorial-
izing collective traumas, allowing them to be told from a variety of
perspectives quickly and flexibly.
• Empathy amplifiers: ISR could allow us to experience the world
through the eyes of another. This direct sharing of experiences
would serve as an empathy amplifier, dissolving prejudices and
fostering a profound sense of unity and understanding among di-
verse groups of people. Envision simulations that allow individuals
to live through the collective experiences of entire communities,
nations, or civilizations, feeling their struggles, joys, and challenges
as their own. This could serve as a powerful tool for education and
conflict resolution, promoting peace on a global scale.
• Global consciousness networks: Imagine a future where people can
connect their consciousness to a global network, sharing thoughts,
emotions, and experiences in a dynamic, evolving stream of collec-
tive awareness. This network would enable a form of communica-
263
tion and connection that goes beyond language, allowing for an un-
paralleled synchronization of human intention and action towards
global challenges.
• Inter-specific communication platforms: Beyond human-to-human
interaction, ISR could extend the boundaries of communication to
include other species as we discuss further in our Environment chap-
ter. By translating non-human languages and experiences into for-
mats we can understand and vice versa, these platforms could fos-
ter an unprecedented level of empathy and cooperation between hu-
mans and other life forms on our planet.
• Digital legacies: ISR could allow individuals to create digital
legacies—entire worlds crafted from their memories, thoughts,
and experiences. These realms would not only serve as a form of
immortality but also as a means for future generations to explore
the lives and insights of their ancestors in a deeply personal and
interactive way.
• Collective creativity spaces: These digital platforms would enable
artists, musicians, writers, and creators of all kinds to collaborate in
real-time, across the globe, in shared virtual spaces. Here, ideas and
inspirations merge in a communal creative flow, leading to art and
innovation that truly represents the collective human spirit, tran-
scending individual capabilities, as we elaborate on further in the
next chapter.
264
work, and entertainment— bringing with them a distinct set of limitations
and ethical concerns. If the Matrix is a dystopia of post-symbolic commu-
nication, a similar and a fitting dystopian parallel can be drawn from Neal
Stephenson’s Snow Crash and the similar but more broadly known Ready
Player One by Ernest Cline, adapted into a film directed by Steven Spiel-
berg.372 In both stories, people retreat into ISR simulations (“the Meta-
verse” for Stephenson, “the OASIS” for Cline) in response to social and
environmental decline, further reinforcing that decline as they abandon
civic engagement in the physical world. These stories illustrate several
risks of ISR:
265
• Corporate control, surveillance, and monopolization: ISR blurs the
lines between public and private, where digital spaces can be simul-
taneously intimate and open to wide audiences or observed by cor-
porate service providers. Unless ISR networks are built according to
the principles of rights and interoperability we emphasized above
and governed by the broader ⿻ governance approaches that much
of the rest of this part of the book are devoted to, they will become
the most iron monopolistic cages we have known.
• Identity and authenticity: The freedom to create and adopt any per-
sonas in ISR sharpens the challenges of authenticity and identity we
have highlighted above. It illustrates the potential for anonymity
and fluid identity in shared immersive realities to complicate trust
and relationships, as well as the possibility of losing one’s sense of
self.
266
“progress prizes” awarded bi-monthly that required participants to
publish their code or research open source, enriching the entire com-
munity’s shared knowledge base. Notable contributions included the
“Volume Cartographer” by Seth Parker and others in Brent Seales’ lab,
and Casey Handmer’s identification of a unique ‘crackle’ pattern forming
letters.373 Youssef Nader later harnessed domain adaptation techniques
on these findings.374 As the competition progressed, its structure fostered
a dynamic where winners not only shared their findings and methodolo-
gies but were also able to reinvest their winnings into enhancing their
equipment and refining their techniques. This environment also proved
fertile for the formation of new collaborations, as exemplified by the
Grand Prize winners.
Artistic expression through media such as music, visual arts, theater, ar-
chitecture, film and even cuisine are among the most powerful and canon-
ical foundations for forming the shared cultures that define social groups.
While not as powerfully engaging as full multisensory shared experience,
they can spread much farther and engage fully one and sometimes more
sensory experiences in a richer way than verbal communication. Today,
373
Stephen Parsons, C. Seth Parker, Christy Chapman, Mami Hayashida and W. Brent Seales,
“EduceLab-Scrolls: Verifiable Recovery of Text from Herculaneum Papyri using X-ray CT”
(2023) at https://arxiv.org/abs/2304.02084. Casey Handmer, “Reading Ancient Scrolls” August
5, 2023 at https://caseyhandmer.wordpress.com/2023/08/05/reading-ancient-scrolls/
374
Youssef Nader, “The Ink Detection Journey of the Vesuvius Challenge” February 6, 2024 at
https://youssefnader.com/2024/02/06/the-ink-detection-journey-of-the-vesuvius-challenge/.
267
the boundaries of geography, expertise, and even audience are dissolv-
ing thanks to a mix of digital tools and platforms that unlock creative
collaboration. This chapter explores how these technologies are foster-
ing a new era of collaborative creation, characterized by unprecedented
accessibility, real-time interaction, and a shared creative space. We will
see how artists, educators, and entrepreneurs can harness the power of
crowdsourcing and online platforms to break down barriers and expand
the creative process. These technologies not only connect individuals but
also foster a shared creative process that is more inclusive, dynamic, and
expansive than ever before.
Cocreation today
Artistic cocreation is nothing new. For thousands of years, musicians,
dancers and actors have formed bands. Some of the most canonical lit-
erary texts such as the Bible, the Bhagavad Gita and the Homerian epics
were all almost certainly written by many hands over generations. Films
sometimes have distractingly long credit rolls for a reason.
Yet early ⿻ technologies that became part of the fabric of the internet,
imagined by people like Ted Nelson as we highlighted in The Lost Dao,
have already transformed the possibilities of collaborative creative prac-
tice and sharing.
268
These platforms support a wide range of creative projects, from soft-
ware development to marketing campaigns, by providing an infras-
tructure for communication, project management, and document
sharing. They exemplify how digital workspaces can enhance pro-
ductivity and foster a sense of community among team members.
• Cloud-based creative software: Adobe Creative Cloud, Autodesk,
and GitHub (which was the primary platform for writing this book)
offer sophisticated tools for designers, engineers, and developers to
work on shared projects simultaneously. This technology allows for
real-time feedback and iteration, reducing the time from concept to
creation and enabling a more fluid and dynamic creative process.
Even more prominently, collaborative word processing software
such as Google docs has enabled real-time collaborative editing by
many people in diverse geographies.
• Open-source projects: Some of the most ambitious creative collabo-
rations take place in open-source co-edited projects like Wikipedia,
where thousands co-create increasingly canonical content. Plat-
forms like GitHub and GitLab facilitate similar codevelopment for
software, while others like Hugging Face allow this for development
of Generative Foundation Models (GFMs). This collaborative model
leverages the collective intelligence of a global community, acceler-
ating innovation and improving software quality through diverse
inputs and perspectives.
• Remote artistic collaborations: Artists and creators use platforms
like Twitch, Patreon, and Discord (the primary collaborative plat-
form we used to discuss this project) to collaborate on projects,
share their creative process, and engage with audiences in real-
time. These platforms enable artists to co-create with other artists
and fans, breaking down the barriers between creator and audience
and fostering a participatory culture around the creative process.
• Educational collaborations: Online non-profit education platforms
like Coursera, edX, and Khan Academy bring together educators and
learners from across the globe. They support collaborative learning
experiences, peer-to-peer feedback, and group projects, making ed-
ucation more accessible and fostering a global learning community.
• Crowdsourced innovation: Platforms like Kickstarter and Indiegogo
enable entrepreneurs to collaborate with the public to fund and re-
269
fine new products and projects. This model of collaboration invites
input and support from a broad audience, validating ideas and en-
suring they meet the needs and desires of potential users.
270
• Synthetic instruments and generative art: The electronic musical
forms that rose to prominence in the 1980s were grounded in the
ability to synthesize a wide range of sound profiles electronically
that in the past would have required elaborate instrumentation or
have been impossible. Today we are seeing the seed of an even
more radical revolution, as GFMs are increasingly being harnessed
by artists to allow a far broader range of people to synthesize a daz-
zling array of experiences. For example, leading artists Holly Hern-
don, Mat Dryhurst and their collaborators have harnessed GFMs to
allow them to sing in the voices of historical figures or others not
present and to allow others to sing in their voices. Artist and musi-
cian Laurie Anderson has used a variety of models to produce texts
that speak to contemporary problems with historical style and wis-
dom. A generation of “generative artists” have explored the inter-
secting creativity embedded in these models to draw out elements of
the collective psyche. In a small way, in this project we have blended
voice samples of many participants to create an audio version read
in our common voice.
• Cross-cultural collaboration: Where once language and cultural
misunderstanding were central barriers to creative collaboration
across widely varying contexts, GFMs are increasingly able to
translate not just languages, but cultural styles, making fusions
increasingly fruitful in music, film, and more.
• Alien art: While GFMs can mimic and automate the way humans
generate ideas, we could instead aspire to generate “alien intelli-
gence” that takes our thought in directions humans are unlikely to
identify, thus generating new fodder for collaboration across diver-
sity.377 For instance, Google DeepMind initially trained AlphaGo
to mimic human strategies in playing Go games. Conversely, their
next version, AlphaGo Zero, was trained solely against other model
adversaries like itself, generating an unfamiliar and disconcerting
yet effective “alien” strategy that surprised many master Go play-
ers. Research demonstrates that interacting with these diverse AI
strategies has increased the novelty and diversity of the human
377
Jamshid Sourati and James Evans, “Complementary artificial intelligence designed to
augment human discovery,” arXiv preprint arXiv:2207.00902 (2022), https://doi.org/10.48550
/arXiv.2207.00902.
271
378
Go-playing population . If such approaches were applied to the
cultural sphere rather than to games, we might find novel artistic
forms emerging to inspire “awe” or resonance in alien machine
intelligences, then feeding back to provoke new artistic forms
among humans, just as the “encounter with the East” was critical to
creating modern art in the West.
• Digital twins and simulation for creative testing: Advanced simula-
tions and digital twin technology will enable creative teams to test
and refine their ideas in virtual replicas of real-world environments.
With digital twins driven by GFMs that accurately mimics human be-
haviors, we could conduct in-silico social experiments at an unprece-
dented speed and scale. For instance, by deploying alternative news
feed algorithms on in-silico social media platforms, where large lan-
guage model (LLM) agents that mimic human social media users in-
teract with one another, we can explore and test the impact of these
alternative algorithms on macro-level social outcomes, such as con-
flicts and polarization.379
272
Frontiers of creative collaboration
The “symphony of minds,” assisted and amplified by technology, is poised
to transcend beyond the mere exchange of ideas and creations to a realm
where collective consciousness redefines creativity.
273
lective imagination and innovation. Yet, as we approach this crescendo of
human potential—where the symphony of collaborative genius reaches
its zenith—we also have to explore its ethical considerations and limita-
tions.
274
heavily on technological interfaces and GFM-driven processes,
potentially leading to a depreciation of human skills and intuition
in the creative process. This over-reliance is at risk of creating a
dependency on technology for social interaction and validation,
raising concerns about the atrophy of traditional creative skills.
4. Digital divide and inequality: In a society stratified by access to tech-
nology and information, the future of creative collaborations could
exacerbate existing inequalities. Those with access to cutting-edge
collaboration platforms will have a distinct advantage over those
without, potentially widening the gap between the technological
haves and have-nots, and monopolizing creativity within echelons
of society that can afford such access.
5. Manipulation, exploitation, and collapse: The potential for ex-
ploitation of creative content and ideas by corporate overreach
is a significant concern. As creative collaborations increasingly
occur within digital platforms owned by corporations, the risk
of intellectual property being co-opted, monetized, or used for
surveillance and manipulation grows, threatening the integrity of
the creative process. By reducing the incentive for creativity, such
traps risk killing the goose of creativity and diversity that lays the
golden eggs of training GFMs in the first place.
6. Erosion of cultural diversity: In a world where creative collabora-
tions are mediated by global platforms, there’s a risk that local cul-
tural expressions and minority voices are overshadowed by domi-
nant narratives. This could lead to a dilution of cultural diversity in
creative outputs, ending in monolithic culture that neutralizes dis-
sent and diversity.
275
els we highlight in what follows. Something that is already beginning to
happen as leading ⿻ artists like Holly Herndon, Joseph Gordon-Levitt and
will.i.am champion not only harnessing GFMs but also ensuring they are
designed to attribute, celebrate and empower creators to live sustainably.
276
**
**
277
by a biased, like-minded cluster of users, the system rewards notes that
are supported by diverse groups of users, correcting biases driven by po-
litical and social fragmentation. This approach leverages alternative so-
cial media algorithms to augment human deliberations, prioritizing con-
tents based on the principle of collaboration across diversity, consistent
with ⿻, to which hundreds of millions of people are currently exposed
each week.383 This platform has been shown to encourage the exploration
of diverse political information, compared to the previous methods of
moderating misinformation 384 .
Conversation today
The oldest, typically richest, and still most common form of conversations
is the “in-person meeting.” Idealized portraits of democracy typically re-
fer to discussions involved in these in-person conversations, such as what
took place among traditional tribes, in the Athenian marketplaces, or in
New England town halls, rather than to votes or media. The recent film,
Women Talking, brilliantly captures this spirit in its portrait of a trauma-
tized community coming to a plan for common action through discussion.
Groups of friends, clubs, students and teachers, all exchange perspectives,
learn, grow, and form a common purpose through in-person talk. In ad-
dition to their interactive nature, in-person interactions often carry ele-
ments of richer, non-verbal communication, as participants share a phys-
ical context and can perceive many non-verbal cues, such as facial expres-
sions, body language, and gestures, from others in the conversation.
383
Stefan Wojcik, Sophie Hilgard, Nick Judd, Delia Mocanu, Stephen Ragain, M.B. Fallin
Hunzaker, Keith Coleman and Jay Baxter, “Birdwatch: Crowd Wisdom and Bridging Algo-
rithms can Inform Understanding and Reduce the Spread of Misinformation”, October 27,
2022 at https://arxiv.org/abs/2210.15723.
384
Junsol Kim, Zhao Wang, Haohan Shi, Hsin-Keng Ling, and James Evans, “Individual mis-
information tagging reinforces echo chambers; Collective tagging does not,” arXiv preprint
arXiv:2311.11282 (2023), https://arxiv.org/abs/2311.11282.
278
The next oldest and most common communicative form is writing. While
far less interactive, writing enables words to travel over much greater
distances and time. Typically conceived as capturing the voice of a sin-
gle “author”, written communications can spread broadly, even globally,
with the aid of printing and translation. They can endure for thousands
of years, allowing for a “broadcast” of messages much farther than am-
phitheaters or loudspeakers can achieve.
One of the most fundamental challenges this variety of forms tries to nav-
igate is the trade-off between diversity and bandwidth.387 On the one
hand, when we attempt to engage individuals with vastly diverse per-
spectives in conversations, the discussions could become less efficient,
lengthy, costly, and time-consuming. This often means that they have
trouble yielding definite and timely outcomes; resulting in the “analysis
paralysis” often bemoaned in corporate settings and the complaint (some-
times attributed to Oscar Wilde) that “socialism takes too many evenings”.
385
“The World Cafe”, The World Café Community Foundation, last modified 2024,
(https://theworldcafe.com/)
386
“Open Space”, Open Space World, last modified 2024, https://openspaceworld.org/wp2/
387
Sinan Aral, and Marshall Van Alstyne, “The diversity-bandwidth trade-off,” American
journal of sociology 117, no. 1 (2011): 90-171.
279
On the other hand, when we attempt to increase the bandwidth and effi-
ciency of conversations, they often struggle to remain inclusive of diverse
perspectives. People engaging in the conversation are often geographi-
cally dispersed, speak different languages, have different conversational
norms, etc. Diversity in conversational styles, cultures and language often
impedes mutual understanding. Furthermore, given that it is impossible
for everyone to be heard at length, some notion of representation is nec-
essary for conversation to cross broad social diversity, as we will discuss
at length below.
Perhaps the fundamental limit on all these approaches is that while meth-
ods of broadcast (allowing many to hear a single statement) have dramat-
ically improved, broad listening (allowing one person to thoughtfully di-
gest a range of perspectives) remains extremely costly and time consum-
ing.388 As economics Nobel Laureate and computer science pioneer Her-
bert Simon observed, “(A) wealth of information creates a poverty of at-
tention.”389 The cognitive limits on the amount of attention an individual
can give, when trying to focus on diverse perspectives, potentially impose
sharp trade-offs between diversity and bandwidth, as well as between
richness and inclusion.
280
390
izen deliberative councils on contentious policy issues.391 It
maintains reasonable legitimacy and flexibility at low cost, but
sacrifices (or needs to supplement with) expertise and has limited
participation.
3. Administration: A set of people are chosen by a bureaucratic
assignment procedure, based on “merit” or managerial decisions
to represent different relevant perspectives or constituencies. This
is used most commonly in business and professional organizations
and tends to have relatively high expertise and flexibility at low
cost, but has lower legitimacy and participation.
281
ical travel distance used to be a severe impediment to deliberation. How-
ever, phone and video conferences have significantly mitigated this chal-
lenge, making various formats of distance/virtual meetings increasingly
common venues for challenging discussions.
Conversation tomorrow
Recent advancements are progressively shifting the dynamics of the
trade-offs, enabling more efficient and networked sharing of rich,
in-person deliberations. Simultaneously, these developments are facili-
tating more thoughtful, balanced, and contextualized moderation within
increasingly inclusive forms of social media, thereby enhancing the
overall quality and reach of these platforms.
282
of the principles of inclusive facilitation into its attention allocation and
user experience. As in X, users submit short responses to a prompt. But
rather than amplifying or responding to one another’s comments, they
simply vote these up or down. These votes are then clustered to highlight
patterns of common attitudes which form what one might call user per-
spectives. Representative statements that highlight these differing opin-
ion groups’ perspectives are displayed to allow users to understand key
points of view, as are the perspectives that “bridge” the divisions: ones
that receive assent across the lines that otherwise divide. Responding to
this evolving conversation, users can offer additional perspectives that
help to further bridge, articulate an existing position or draw out a new
opinion group that may not yet be salient.
283
steer model behavior using Polis.397 OpenAI, the other leading provider
of GFMs today, also worked closely with CIP to run a grant program on
“democratic inputs to AI” that dramatically accelerated research in this
area and on the basis of which they are now forming a “Collective Align-
ment Team” to incorporate these inputs into the steering of OpenAI’s
models.398
284
tent. This approach is closely allied to academic work on “digital human-
ities”, which harnesses computation to understand and organize human
cultural output at scale. Organizations like the Society Library collect
available material from government documentation, social media, books,
television etc. and organize it for citizens to highlight the contours of
debate, including surfacing available facts. This practice is becoming in-
creasingly scalable with some of the tools we describe below by harness-
ing digital technology to extend the tradition described above by extend-
ing the scale of deliberation by networking conversations across different
venues together.
Other more experimental efforts, closely aligned with the techniques dis-
cussed in our Immersive Shared Reality chapter above, aim to enhance
the depth and quality of remote deliberations, aspiring to emulate the
richness and immediacy typically found in in-person interactions. A
recent dramatic illustration was a conversation between Meta CEO Mark
Zuckerberg and leading podcast host Lex Fridman, where both were in
virtual reality able to perceive minute facial expressions of the other.
A less dramatic but perhaps more meaningful example was the Portals
Policing Project, where cargo containers appeared in cities affected by
police violence and allowed an enriched video-based exchange of expe-
riences with such violence across physical and social distance.400 Other
promising elements include the increasing ubiquity of high-quality,
low-cost and increasingly culturally aware machine translation tools and
work to harness similar systems to enable people to synthesize values
and find common ground building from natural language statements.
285
actions, and by utilizing a similar reduction in information transmission,
i.e. to five star rating systems. An effective increase in our ability to trans-
mit and digest information can result in a corresponding increase in our
ability to deliberate on difficult and nuanced social issues.
286
that perspective. In short, collective response systems can play just as im-
portant a role in mapping and evolving conflict dynamically as helping to
navigate it productively.
It may be possible to, in some cases, even more radically re-imagine the
idea of representation. GFMs can be “fine-tuned” to increasingly accu-
287
rately mimic the ideas and styles of individuals.402 One can imagine train-
ing a model on the text of a community of people (as in Talk to the City)
and thus, rather than representing one person’s perspective, it could op-
erate as a fairly direct collective representative, possibly as an aid, com-
plement or check on the discretion of a person intended to represent that
group.
Most boldly, this idea could in principle extend beyond living human
beings as we explore further in our Environment chapter below. In his
classic We Have Never Been Modern, philosopher Bruno Latour argued
that natural features (like rivers and forests) deserve representation
in a “parliament of things”.403 The challenge, of course, is how they
can speak. GFMs might offer ways to translate scientific measures of
the state of these systems into a kind of “Lorax”, Dr. Seuss’s mythical
creature who speaks for the trees and animals that cannot speak for
themselves.404 Something similar might occur for unborn future genera-
tions, as in Kim Stanley Robinson’s Ministry for the Future.405 For better
or worse, such GFM-based representatives might be capable of carrying
out deliberations faster than most humans can follow and might then
convey summaries to human participants, allowing for deliberations
that include individual humans and also allow for other styles, speeds
and scales of natural language exchange.
288
ever far deliberation advances, it cannot substitute for the richer forms
of collaboration we have already discussed.
On the opposite side, talk takes time, even in the sophisticated versions
we describe. Many decisions cannot wait for deliberation to fully run
its course, especially when great social distance must be bridged, which
will generally slow the process. The other approaches to collaboration we
discuss below will address the need for timely decisions typical in many
cases.
Many of the ways in which the slow pace of discussion can be overcome
(e.g. using LLMs to conduct partially “in silico” deliberation) illustrate an-
other important limitation of conversation: other methods are often more
easily made transparent and thus broadly legitimate. The way conversa-
tions take inputs and produce outputs are hard to fully describe, whether
they occur across people or in machines. In fact, one could consider in-
putting natural language to a machine and producing a machine dicta-
tion as just a more sophisticated, non-linear form of voting. But, in con-
trast to the administrative and voting rules we will discuss in the next
two chapters, it might be very hard to achieve common understanding
and legitimacy on how this transformation takes place and thus make it
the basis for common action in the way that voting and markets often
are. Thus, checks on the way deliberations occur and are observed aris-
ing from those other systems are likely to be important for a long time to
come.
289
ping and rough consensus is crucial for common action, so too is the re-
generation of diversity and productive conflict to fuel dynamism and en-
sure productive inputs to future deliberations. Thus, deliberations and
their balance with other modes of collaboration must always attend, as
we have illustrated above, to this stimulus to productive conflict as much
as it does to the resolution of conflict and the mitigation of explosive con-
flict.
290
**
Figure 5-5-A. The results of this work can be seen taking place already.
Source: Courtesy of Microsoft.
**
291
nesses with governments or large corporations. It is also central in the
formation of medium-term relationships between people within a polity
without tight social connections. It governs most of what we think of as
law, property systems, identification, hiring and admissions and most
functions of the “administrative state” and “corporate bureaucracy”.
Administration today
Many of the most consequential junctures of life turn on administrative
outcomes based on information structures (various kinds of “forms”) that
are much thinner than the way we conduct most of our lives. Examples
include:
These structured forms of information allow for “fair”, “just” and “im-
partial” evaluation of potential allocations or choices that are too com-
plex to rely on universally transparent rules, as markets and votes do. To
achieve fairness, these systems often deliberately discard a range of infor-
mation, as dramatically illustrated by the blindness of justice in various
personified representations in European tradition. As scholars since at
292
least pioneering sociologist Max Weber have remarked, to achieve these
twin goals of harnessing richer information than votes or markets while
maintaining fairness, administrative systems employ large “bureaucra-
cies” and much digital processing to evaluate these structured data ac-
cording to rules and procedures.407
The first might be called the problem of “rigidity”, namely that bureau-
cratic rules, by throwing away a lot of detail, lead to outcomes that are
insensitive to important features of specific cases or local circumstances.
Examples range from the mundane to the oppressive and simply ridicu-
lous. Consider:
• Most jurisdictions have speed limits for driving cars to ensure safety.
Yet the safe speed for driving varies dramatically with road, envi-
ronmental and other related conditions. This means that speed lim-
its are, most of the time, either too high or too low for the circum-
stances. Similar logic applies to almost all administrative policy set-
tings, from the prices of goods to the break time allowed workers.
• To obtain most high-paying jobs, people from a diversity of cultures
around the world have to fit their accomplishments and lives into
the format of CVs and transcripts designed to make them legible to
administrative bureaucracies and hiring managers, rather than to
reflect their accomplishments accurately.
• In the late 1990s, a Dutch airliner ended up physically shredding
hundreds of live squirrels that lacked appropriate paperwork for
transiting Schiphol airport. While a particularly gruesome example,
almost anyone who has flown is aware of the rigidity of the bureau-
cratic systems that administer air travel and will thus not be overly
surprised by this outcome.
Yet at the same time as they are rigid, “cold” and “heartless”, an equally
common and opposite complaint about bureaucracies is their “complex-
407
Max Weber, Economy and Society (Somerville, NJ: Bedminster Press, 1968).
408
A forthcoming book provides an excellent study in these pathologies, as well as provid-
ing the squirrel example below. Davies, op. cit.
293
ity”: that they often are inscrutable, hard to navigate (see, for example,
Franz Kafka’s classic work The Castle), full of red tape, and give exces-
sive discretion to apparently arbitrary bureaucrats.409 These problems
are among the most infuriating features of bureaucracies and are a con-
stant source of complaint by libertarians. In fact, they have largely in-
spired many of the ideas about “distributed autonomous organizations”
(DAOs) and “smart contracts” that are intended to escape excessive discre-
tion, as well as leading to the high costs of the legal sector. And yet, clearly
a key reason for such complexity is the need to handle the diversity and
nuance of the cases they must administer. The leading reason, therefore,
that bureaucracies become illegitimate as they try to span a broad range
of social diversity is that, to accommodate this range, they have to become
too complex to function properly. Increasingly, however, digital technolo-
gies are emerging that allow this trade-off to be navigated more elegantly
and thus allow richer cooperation to legitimately span a broader range of
diversity.
294
In sharp contrast to GOFAI, machine learning is a statistical and emergent
approach to classification, prediction, and decisions. Rather than apply-
ing a top-down set of hard-coded rules, the system learns to classify based
on examples, in a probabilistic manner and in ways that often have no
simple explanation. In neural networks, and especially GFMs, there are
often billions or even trillions of “nodes” that receive input from each
other. These nodes then triggering and inputting to other nodes, all co-
alescing to predict an outcome such as the next word or image. Based
on such processes, GFMs have shown remarkable and rapidly improving
ability to realistically reproduce the type of flexible classification, reac-
tion and reasoning humans are often capable of in a rapidly scalable and
largely reproducible way.
295
limited means reduce the imbalance in legal access with corporate
entities that can afford high quality legal services because they care
not just about case outcomes but the precedents they create.410
• Job markets often fall into a “rich get richer” pattern as top employ-
ers often recruit exclusively from elite universities or use job expe-
rience at famous peer firms as a primary indicator of potential, fore-
closing paths to opportunity for many who may have less conven-
tional paths and, perhaps more importantly, forcing everyone inter-
ested in such opportunities down a narrow educational and career
path. Several new human resources platforms (such as HiredScore,
Paradox.ai, Turing and Untapped) aim to expand the breadth and di-
versity of candidates that hiring managers can consider. A leading
challenge is that the limited examples of hiring such diverse candi-
dates in the past can undermine the reliability and flexibility of such
algorithms.
• Many of the most environmentally and culturally rich regions of
the earth are either poorly mapped or mapped in ways that im-
pose the perspective of colonial outsiders, rather than indigenous
peoples who are more attentive to the environment and have long-
existing relationships.411 A variety of groups have harnessed digital
mapping tools and increasingly GFMs to describe such traditional
patterns of rights and assert them against colonial legal systems.
These include Digital Democracy, the Rainforest Foundation US, the
Australian Government’s Indigenous Land and Sea Corporation and
México’s SERVIR Amazonia.412
296
are transparent databases (including distributed ledgers) as illustrated in
a range of cases where these are being used as substrates for refugee iden-
tities by organizations like ID2020 or for land registries in Honduras. Fur-
thermore, the power of GFMs stems less from being “AI” than from their
networked and probabilistic structure, which allows them to adapt to a
greater diversity and ambiguity of inputs. Such structures can also exist
in networks of human relationships, including more adaptive forms of
bureaucracy, packet-switching based trust relationships, etc.
297
historically marginalized and/or academically disinclined ones, often end
up excluded from opportunity by such rigid structures.
Not only could GFMs and other neural networks be mirrored in the
structure of such a system, they might be directly useful to it in allowing
employers to cope with the more complex CVs it would create. GFMs
could also help students navigate the more diverse learning pathways
they would allow and could directly instantiate and produce some of
the relevant badges. Furthermore, technologies of publicity (including
social networks, verifiable credentials, and distributed ledgers) would
likely be critical to achieving trust, credibility and transparency around
such badges. Relatedly, but perhaps more broadly, many practices
of identification and admission to credentialed spaces (clubs, schools,
nations via migration etc.) could rely on a more distributed network of
signals from a variety social relations as we discussed in our Identity
and Personhood chapter if such a range of signals could be meaningfully
processed by more adaptive administrative infrastructure in the future.
Even more ambitiously, it might be possible to one day integrate far more
diverse legal systems into administrative practices. The arrival of moder-
nity and colonialism around the world largely overrode a range of tradi-
tional practices that varied dramatically by geography and culture. Many
of these practices persist informally but jar with formal legal structures
imposed by often distant national governments. These include practices
around gender and sexual relationships, obligations associated with gift
giving, the resolution of familial conflict and obligations, land use and
more. While in some cases there is growing consensus that the aboli-
tion of such traditions is appropriate (e.g. prohibitions on female geni-
tal marking), in many cases laws have “overwritten” traditional practices
more out of convenience than conviction. Traditional practices make it
difficult, for example, for someone from far away to understand how to
acquire land or appropriately intermarry in a community. The some-
times enforced, sometimes cajoled homogenization of cultural practices
has brought some benefits to intermixing and dynamism, but at a great
cost to often ancient and diverse wisdom of cultures.
298
that equally rapid translation across cultural norms may become feasi-
ble. These services in the past have been provided imperfectly and at
great expense by cultural anthropologists and ethnographers. Just as
far cheaper and easier translation may allow a much wider range of
languages to remain viable and attractive to new generations because
of the external interoperability it would allow, far cheaper and easier
translation of norms might make a much broader range of legal and
property practices sustainable. This would reduce the constant burden
of fitting into modernity imposed not just on colonized but also on a
range of “traditional” communities within the developed world, often in
rural areas. It would also greatly enrich the diversity that remains as the
fuel for social growth and progress, as next generations of GFMs learn
from being stretched by these cultural differences to perform ever more
flexibly.
299
for misuse all pose significant dangers.
300
and explore through richer interaction modes, these and other digital sys-
tems hold significant promise of overcoming the simultaneously cold and
arbitrary nature of the world of systems that has been the price of moder-
nity.
5-6 ⿻ Voting
In the best-selling strategy game of all time, Civilization VI, players man-
age a civilization from the birth of the first settlements to the near fu-
ture, competing and sometimes cooperating with other civilizations in a
race to victory through culture, military conquest, diplomatic support,
scientific achievement and/or religious influence. In the game’s widely
adopted and climate change-themed expansion pack “Gathering Storm”,
diplomatic decisions affecting the whole world are decided in a “World
Congress”. Civilizations accumulate “diplomatic favor” from alliances, in-
frastructure, and so forth. They can then spend these to influence global
policies, such as regulation of fossil fuels, controls on nuclear weapons or
immigration rules.
**
301
screen capture from application, by fair use.
**
When voting, countries can choose from a range of options, such as which
civilization will be targeted for closer scrutiny of its actions by the world.
Every civilization gets a single vote for free, but additional votes cost in-
creased diplomatic favor, at an increasing rate. The first additional vote
costs 10 diplomatic favor, the second 20, and so on, as illustrated in Figure
A. There are typically several votes on different issues in a single Congress
and diplomatic favor can be saved across Congresses as well as used for
other purposes such as nominating special issues for consideration. Each
civilization must thus gauge how important each issue is to it. Then “buy”
votes using diplomatic favor just up to the point where the amount they
care matches the increasing cost of having more influence on that issue
compared to the value of saving their favor.
A main theme of this part of the book has been how much broader collab-
orative technologies and democracy are than the institutions we might
usually associate with them. Yet, the formal institutions that most come
to mind when we think about “democracy” are systems for holding votes
and elections. Voting is used throughout not just democratic systems, but
governance regimes more broadly: corporate governance, management
of cooperative housing, book clubs, games etc. It provides a way for a
large and diverse group to, relatively quickly and at relatively low cost,
make a definite decision on a point of disagreement. While the communi-
cation it allows is far thinner than the technologies we have thus far de-
scribed, it can often be a much more broadly inclusive process that leads
to verdicts of the “common will” that are typically thought of as more legit-
417
The Economist, “The Mathematical Method that Could Offer a Fairer Way to Vote”, De-
cember 18, 2021.
302
imate (at least among the usually limited set of those enfranchised) than
the outcomes of markets. In this chapter, we will explore the ways voting
works and fails to work in the settings it is most often applied today, inno-
vations like quadratic voting (QV) that are creating higher-fidelity signals
of the “public will”, and peer into the horizon of ways researchers are re-
imagining how large groups of people can choose their future together.
Voting today
In the most common form of voting, every member of some community
selects one of several mutually exclusive options and the option with the
most votes is selected. Some trace this practice to the ability of a group
with greater numbers to triumph in certain kinds of violent conflicts (such
as phalanx engagements in Ancient Greece), which could be avoided by
tallying the strength of positions. Despite its simplicity, this “plurality
rule” is not a particularly compelling representation of ⿻ in the way we
use it, for several reasons including:
• Ranked choice and approval voting: These two recently popular sys-
tems partially address issue 1. In ranked choice systems, partici-
418
Maurice Duverger, Les Partis Politiques (Paris: Points, 1951).
303
pants rank a number of alternatives, and the decision depends on
this full list in some way. The simplest examples are “run-off” type
systems, where the set of candidates is gradually narrowed and, as
this happens, the top choice of each person for the remaining can-
didates becomes their new vote. In approval voting, voters may
choose as many options as they wish to “approve” and the most ap-
proved option is selected. Both methods clearly have a ⿻ character
both literally in allowing multiple votes and spiritually in allowing
both greater consensus and greater diversity of parties by avoiding
the Duverger “spoiler effect”. However, economics Nobel Laureate
Kenneth Arrow famously proved in his “Impossibility Theorem” that
no system with such simple inputs can generally achieve a “reason-
able” representation of the common will.419
• Weighted voting: In contexts where equality of voters is obviously in-
appropriate, weighted voting schemes are used. Common examples
are “one-share-one-vote” in corporate governance, voting based on
population size in federal and confederal bodies (e.g. the European
Union or United Nations) and voting based on measures of power
(e.g. GDP) in contexts where it is thought important to respect power
differences. These weights are, however, often the subject of signifi-
cant dispute and lead to paradoxes of their own, such as the “51% at-
tack” (also known as “tunneling”) where someone can buy 51% of a
corporation and loot its assets, expropriating the remaining 49%.420
• Federal, proportional and consociational representation: While
voting systems are, as we have discussed above, usually formally
“monistic”, there are important examples of trying to address the
tyranny of the majority this can create. In federal, consociational
and functional systems, sub-units, such as geographies, religions,
ethnic or professional groups, have a status beyond simply their
population and usually receive some kind of special or population-
419
Kenneth J. Arrow, Social Choice and Individual Values (New York, John Wiley & Sons,
1951). See also Kenneth O. May, “A Set of Independent Necessary and Sufficient Conditions
for Simple Majority Decision” 20, no. 4 (1952): 680-684, Allan Gibbard,“Manipulation of
Voting Schemes: A General Result”, Econometrica 41, no. 4 (1973): 587-601 and Mark A.
Sattherthwaite, “Strategy-Proofness and Arrow’s Conditions: Existence and Correspondence
Theorems for Voting Procedures and Social Welfare Functions”, Journal of Economic Theory
10, no. 2 (1975): 187-217.
420
Simon Johnson, Rafael La Porta, Florencio Lopez-de-Silanes and Andrei Shleifer, “Tun-
neling”, American Economic Review 90, no. 2 (2000): 22-27.
304
disproportionate weight intended to avoid oppression by larger
groups. While these systems thus in various ways incorporate ⿻
elements, their design is typically haphazard and rigid, based on
historical lines of potential oppression that may no longer track the
relevant social issues or can entrench existing divides by formally
recognizing them; they thus have become increasingly unpopu-
lar.421 More flexible are systems of “proportional representation”,
where representatives in some body are chosen in proportion to
the votes they receive, helping achieve greater balance, though
often at least partly “kicking the can” of majoritarian tensions down
the road to the decisions of the representative body’s coalition
formation.
⿻ Voting tomorrow
While the above problems seem diverse, they boil down to two questions:
how to appropriately represent degrees and weights of interests and
how to make representation flexible and adaptive. As Nobel Laureate
Amartya Sen famously observed, problems with Arrow’s Theorem vanish
once strength and weight of preference is accounted for, and evidently
weighted voting is all about such issues.422 Representation of subgroups
is challenging as there are strong ⿻ reasons for doing it, yet many
ways of achieving it seem insufficient or overly rigid and prescriptive.
These strike at the core of the problem with the extreme simplicity of
votes: they carry very limited information about voters’ thoughts and
preferences.
305
corporating voting weights. Quadratic voting originates with statistician
(and, unfortunately, eugenicist) Lionel Penrose, father of the prominent
contemporary astrophysicist Roger Penrose. He noted that, when weigh-
ing votes, it is natural, but misleading, to give a party with twice the legit-
imate stake in a decision twice the votes. The reason is that this will typ-
ically give them more than twice as much power. Uncoordinated voters
on average cancel one another out and thus the total influence of 10,000
completely independent voters is much smaller than the influence of one
person with 10,000 votes.423
306
making a geometric (multiplicative) compromise between the intuitions
of weighted and simple voting and by allowing expression of preference
strength across issues and votes but taking the square root of the “weight”
a voter puts on any issues. The former idea is Penrose’s “square-root
voting” rule, approximately used in several elements of governance in
the European Union across member nations. The later is the QV rule
we discussed above and used, for another example, frequently in the
Colorado State Legislature to prioritize spending.
It is important to note, however, that these clean rules are only optimal
when voters are perfectly internally unified and perfectly externally un-
correlated/uncoordinated. ⿻ thinking cautions us against such simplistic
models, encouraging us to perceive the social connections across individ-
uals and organizations, though of course accounting for these within a
voting system requires identity systems that can record and account for
these.
307
Frontiers of voting
The radical and transformative potential of QV and LD suggest ways that
voting systems in the future may be vastly richer than those we are accus-
tomed to. The range of possibilities are nearly endless, but a few promis-
ing ones are useful to illustrate this breadth:
308
ing able to simultaneously vote and predict the outcome of a deci-
sion, being rewarded for a correct decision.428 Such systems may be
particularly useful when there is a large range of proposals or op-
tions: predictions can help bring attention to proposals deserving
attention that voting can then decide on.
• Quadratic liquid democracy: As noted above, a natural way to avoid
the power concentrations that liquid democracy can give rise to is
the use of degressive proportionality. RadicalxChange, a non-profit
advancing ⿻, has implemented a related system for its internal
decision-making.
• Assisted real-time voting: Another commonly discussed idea is that
voting could be made far more frequent and granular if digital assis-
tants could learn to model voters’ perspectives and preferences and
vote on their behalf and subject to their review/auditing.429
Perhaps the most exciting possibilities are now these could combine infi-
nite diversity, infinitely combining to support the infinite combinations
that they help infinite diversity form.
Limits of ⿻ voting
One natural concern, however, about even these highly flexible and adap-
tive approaches to reach a sense of compromise is that the compromise
itself throws the baby of diversity out with the bathwater of conflict. Yet
one of the most interesting properties of systems like eigenvoting or so-
phisticated forms of liquid democracy is the new kinds of coalitions and
representations they might help form. If one-person-one-vote rules orig-
inated from the attempt to avoid conflict by giving the side with greater
support a non-violent way to take power, these systems help diffuse con-
flict based on a more sophisticated theory: that it arises from the con-
sistent reinforcement of existing social divisions by allowing the same
groups to consistently form majorities and minorities. By discounting
support from previously affiliated groups, they avoid reinforcing existing
conflicts, while creating new ones that cut across these lines, hopefully
428
Robin Hanson, “Shall we Vote on Values but Bet on Beliefs?”, Journal of Political Philoso-
phy 20, no. 2: 151-178.
429
Nils Gilman and Ben Cerveny, “Tomorrow’s Democracy is Open Source”, Noema Septem-
ber 12, 2023 at https://www.noemamag.com/tomorrows-democracy-is-open-source/.
309
thereby generating nearly as much diversity as they compromise over,
but in directions that avoid entrenching persistent divides.
Yet despite these strengths, even in its richest form, voting expresses and
determines preferences about decisions already posed by other social pro-
cesses. Some combination of the methods above can completely trans-
form how we understand voting, leaving today’s approaches as far behind
as the computer left the abacus. Yet it would fundamentally undermine
the richness of our humanity to allow this potential to fool us into believ-
ing they can substitute for the need for the richer communication and
codesign we have described in previous chapters. Only in the context of
the creative collaborations, deliberations, imaginations, and administra-
tive systems we have sketched can collective decisions be meaningful.
Nor is it likely that, anytime in the near future, voting systems will stretch
greatly beyond the national boundaries that currently contain them. The
demands of ⿻ identity systems supporting some of the above suggest that
while voting in new transnational configurations is imaginable, systems
of voting are unlikely any time soon to truly reach global legitimacy. To
truly reach that scope of diversity, we have to turn to the re-imagining of
the thinnest of all the substrates for collaboration: market economies.
310
To overcome this, a number of new matching platforms, such as GitCoin
Grants, connect sponsors (small donors and grants) using a “plural fund-
ing” formula that accounts not just for the total funding received, but also
the diversity of its source across individual contributors and connected
social groups. These platforms have become important sources of fund-
ing for OSS, channeling in total more than a hundred million dollars in
funding. This has been especially important to Web3 related projects, in
Taiwan, and in supporting this book. They are also increasingly being ap-
plied to domains (e.g. environment, local business development) outside
OSS.
**
**
311
**
Figure 5-7-B. The project page for the ⿻ book on Gitcoin. As of February
2, 2024, the ⿻ book had received $332.84 in funding from 87 contributors.
Source: Direct screen capture from application, by fair use.
**
312
planet than any other feature of the “rule of law”.430 Since the fall of the
Soviet Union, while national borders have hardly budged and few new
nations have been born, companies like Amazon, Google and Meta have
arguably grown to a position of prominence around the planet exceeding
all but a handful of nation states.
At the same time, for all the elaborate financial and corporate structures
built on top of them, markets are perhaps the most simplistic structure
conceivable as a pattern for human cooperation. While they can be ap-
plied more broadly, as we will see, the argument for their desirability
rests on a vision of bilateral transactions between a buyer-seller pair,
each of which is representative of a sea of similarly situated and thus
equally powerless buyers and sellers, all engaging in a transaction whose
effects are bounded by a predetermined set of private property rights
that avoid any “externalities” on non-transacting parties. Any notion of
emergent, surprising, group level effects, of supermodularity and shared
goods, of heterogeneity, or of diversity of information are bracketed as
“imperfections” or “frictions” that impede the natural, ideal functioning
of markets.
This debate has been at the core of the conflict over capitalism, long before
its ascendancy, as documented by social scientist Albert Hirschman.431
On the one hand, markets have been seen to be almost uniquely univer-
sally “civilizing”, alleviating the potential for conflict across social groups,
and “dynamic”, allowing entrepreneurship to create new forms of large
scale social organization that foster and support (social) innovation.432
On the other hand, markets are poor at supporting the flourishing of other
forms of scaled social interaction. They corrode many of the other tech-
nologies of collaboration we describe. While allowing the creation of
some new forms, they tend to turn these into exploitative, socially irre-
sponsible, and often reckless monopolies. In this chapter we will explore
this paradox and how radical new forms of markets, like those we de-
scribed above, can maintain, and extend this inclusive and dynamic char-
430
Pistor, op. cit.
431
Albert Hirschman, The Passions and the Interests, (Princeton: Princeton University
Press, 1997).
432
Joseph Schumpeter, Capitalism, Socialism and Democracy (New York: Harper & Broth-
ers: 1942). Quinn Slobodian, Globalists: The End of Empire and the Birth of Neoliberalism
(Cambridge, MA: Harvard University Press, 2018).
313
acter while fostering a far more diverse range of rich human collabora-
tion.
Capitalism today
Capitalism is typically understood as a system based on private property
in the means of production, voluntary market-based exchange, and free
and vigorous operation of the profit motive from this starting point.
Global capitalism today (sometimes called “neoliberalism”) features
several interlocking sectors and features, including:
Many textbooks have been written, including some by some of our close
314
friends, on this structure.433 It is hard to doubt that it is one of the most
powerful modes of cooperation humans have ever devised and has been
central to the unprecedented progress in material conditions around the
world in the last two centuries. Furthermore, the most famous theoreti-
cal results in economics are the “fundamental welfare theorems”, which
assert that under certain conditions markets lead selfish individuals “by
an invisible hand” to serve the common good.434 Yet the conditions and
scope of this result are quite circumscribe, which is why capitalism has
so many familiar problems.
**
**
315
This requires that production have “decreasing marginal returns”
or more generally and less formally, that “the whole is less than the
sum of its parts”. Only then can profitable production be consistent
with the principle of, for example, paying workers their marginal
contributions to production; when there are increasing returns, pay-
ing everyone their marginal product yields a loss, as shown in Figure
C. Public goods that benefit a large number of people at little addi-
tional cost and are hard to stop people from using are an extreme
case and economists have long argued that markets dramatically
under-supply these. But even less extreme cases of increasing re-
turns/supermodularity are severely under-provided by capitalism.
Nobel Prizes, among others, to Paul Romer and Paul Krugman for
showing how fundamental these goods are to growth and develop-
ment.435 In short, perhaps the greatest paradox of global capitalism
is that it is at once the largest scale example of collaboration and yet
has trouble precisely supporting the forms of technological collabo-
ration that it heralds.
2. Market power: In some cases where exclusion from shared goods
can be imposed by barriers or violence, funding of such collabora-
tion can be partially alleviated by charging for access. But this tends
to create monopolistic control that concentrates power and reduces
the value created by scaling collaboration, undermining the very col-
laboration it aims to support.
3. Externalities: At the core of John Dewey’s 1927 classic The Public
and its Problems, is recognizing the genius of innovation to create
new forms of interdependence, both for good and ill.436 The motors
of the nineteenth century transformed human life, yet also turned
out to transfigure the environment in unanticipated ways. Radio,
flight, chemicals…all redesigned how we can cooperate, but also cre-
ated risks and harms that previous systems of “property rights” and
rules generally did not account for. The victims (or in some cases
beneficiaries) of these “externalities” are, by construction, not di-
rectly partly to market transactions. Thus, precisely to the extent
435
Paul Krugman, “Scale Economies, Product Differentiation and the Pattern of Trade”,
American Economic Review 70, no. 5 (1980): 950-959. Paul Romer, “Increasing Returns and
Long-Term Growth”, Journal of Political Economy 94, no. 5 (1986):1002-1037.
436
John Dewey, The Public and its Problems, op. cit.
316
that new means of collaboration developed in markets are revolu-
tionary, markets and the corporations they spawn will not directly
involve those affected by their innovations, preventing either their
benefits from being fully tapped or their risks from being mitigated.
4. Distribution: Theoretically, markets are simply indifferent to distri-
bution and “endowments” can be rearranged to achieve desired dis-
tributive goals. But achieving this ideal redistribution faces enor-
mous practical hurdles and thus markets tend to often yield shock-
ingly inegalitarian outcomes, sometimes for reasons fairly divorced
from their alleged “efficiency” benefits. In addition to the direct
concerns these create, they also often help undermine the greater
equality often assumed or harnessed in other collaborative forms
described in previous chapters.
317
effective correctives to corporate power, they have been limited pri-
marily to a traditional model of full-time employment that has strug-
gled to keep pace with the dynamism and internationalism of labor
markets and the diversity of collaboration in the digital age.
3. Eminent domain/compulsory purchase and land/wealth taxes: To
address smaller-scale market power (e.g. over land and specific
pieces of wealth), many jurisdictions have rights of “eminent do-
main” or “compulsory purchase” allowing the forced repurchase of
private property with the support of public authorities, usually with
compensation and subject to judicial review. Some jurisdictions
also charge taxes on land, wealth or inheritance to both reduce
inequality and help increase the circulation of assets away from
those who might monopolize them. While crucial to social equity
and development, these approaches rely heavily on often fragile
administrative processes to reach equitable valuations.
4. Industrial, infrastructure and research policy: To overcome the ten-
dency of markets to underfund public goods and more generally
supermodular collaboration, many governments provide funding
for infrastructure (e.g. transportation, communications, electrifica-
tion), research and development of new technologies and the devel-
opment to scale of new (for the country) industries. While critical to
technical, industrial, and social progress, these investments struggle
to span national borders in the way capitalism does and are often ad-
ministered by bureaucracies with far less information that the par-
ticipants in the fields they support have.
5. Open source, charity and the third sector: A more flexible approach
to similar goals is the “third” or “social” sector efforts including char-
ity and volunteer effort (like the OSS community) that build scal-
able collaboration on a voluntary, non-profit basis. While they are
among the most dynamic forms of scaled collaboration today, these
efforts often struggle to scale and sustain themselves given the lack
of financial support from the most powerful market and govern-
ment institutions.
6. Zoning and regulation: The risk of markets failing to account
for external harms and benefits are generally addressed by
government-imposed restrictions on market activity, usually called
“regulation” at broader levels and “zoning restrictions” on more
318
local levels. Occasionally, especially in environmental matters,
economists’ preferred solutions of “Pigouvian” taxes or tradeable
permits are used. While these restrictions are the central and thus
indispensable way to address externalities, they are beset by all
the limits of rigid, nation-state- (or corresponding local justifica-
tion) based decision-making we discussed above, and given their
economic stakes are often captured/controlled by interest groups
imperfectly aligned to the interests of even the supposedly relevant
public.439
7. Redistribution: Most developed capitalist nations have extensive
systems of taxation of income and commerce that fund, among
other things, social insurance and public welfare schemes that
ensure the availability of a range of services and fiscal support as a
check against extreme inequality. In contrast to the promise of land
and wealth taxes, however, these primary income sources generally
partly impedes the functioning of markets, struggle to extract many
of the most runaway fortunes and only imperfectly correct the
structural ways inequality impedes other forms of collaboration.
The limitations of these solutions are so widely understood that they led
to a significant backlash in many countries beginning in the 1970s, the
so-called “neoliberal reaction”. Yet the limits of markets persist and there
has been a resurgence in the last decade of both of these solutions, but
also of creative attempts to transcend them and avoid many of the trade-
offs they create.
319
nomics subfield of “mechanism design”, which explores these possibili-
ties and has led to many of the creative possibilities that have been de-
ployed in the past decades.
320
quadratic funding may help ensure the turnover of organization
and asset control, they do not directly ensure that organiza-
tions serve rather than exercising illegitimate power over their
“stakeholders”, such as customers and workers. Drawing on the tra-
ditions we described above, there a variety of renewed movements
in recent years to create a “stakeholder” corporation, including
Environmental, Social and Governance principles, the platform
cooperativism, the distributed autonomous organizations (DAOs),
“stakeholder remedies” in antitrust (viz. using antitrust violations
to mandate abused stakeholders have a voice), data unions and
the organization of many of the most important large foundation
model companies (e.g. OpenAI and Anthropic) as partial non-profits
or long-term benefit corporations.445
• Participatory design and prediction markets: Digital platforms and
mechanisms are also increasingly used to allow more dynamic re-
source allocation both within corporations and in connections be-
tween corporations and their customers.446 Examples include ways
for customers to contribute and be rewarded for new product de-
signs, such as in entertainment platforms like Roblox or Lego Ideas,
and prediction markets where stakeholders can be rewarded to pre-
dict company-relevant outcomes like sales of a new product.
• Market design: The field of market design, for which several Nobel
Prizes have recently been awarded, applies mechanism design to
create market institutions that mitigate problems of market power
or externalities created by ignoring the social implications of trans-
actions. Examples include markets for tradable carbon permits, the
auction design examples we discussed in the Property and Contract
chapter above and a number of markets using community curren-
cies or other devices to facilitate market-like institutions in commu-
nities (e.g. education, public housing or organ donation) where using
445
Colin Mayer, Prosperity: Better Business Makes the Greater Good (Oxford, UK: Oxford
University Press, 2019). Zoë Hitzig, Michelle Meagher, André Veig and E. Glen Weyl,
“Economic Democracy and Market Power”, CPI Antitrust Chronicle April 2020. Michelle
Meagher, Competition is Killing us: How Big Business is Harming our Society and Planet -
and What to Do About It (New York: Penguin Business, 2020).
446
See Erich Joachimsthaler, The Interaction Field: The Revolutionary New Way to Create
Shared Value for Businesses, Customers, and Society, PublicAffairs, 2019. See also Gary
Hamel, and Michele Zanini, Humanocracy: Creating Organizations as Amazing as the Peo-
ple inside Them, (Boston, Massachusetts: Harvard Business Review Press, 2020).
321
external currency can severely undermine core values.447
• Economies esteem: Related to these local currency markets are
online systems where various quantitative markers of social es-
teem/capital (e.g. badges, followers, leaderboards, links) partly
or fully replace transferable money as the “currency” of accom-
plishment.448 These can often, in turn, partly interoperate with
broader markets through various monetization channels such as
advertising, sponsorship and crowdfunding.
322
More generally, the result suggests a near limitless potential, like
that realized in a superconducting circuit, for innovation in taxa-
tion/common property and allocation of funds to super-modular
activity, to generate progress.
2. ⿻ property: How can these funds be raised? While partial common
property schemes are an interesting start, they need to be paired
with tools that can recognize and protect common interests in the
way and stability with which land and other assets are used. The
voting systems we described in the previous chapter are a natural
answer here and there may be great potential in ⿻ property sys-
tems that can bring these together, returning much of the value of
a range of wealth to intersecting publics (“fructus”) while also giv-
ing important access (“usus”) and disposal (“abusus”) rights to these
communities.
3. ⿻ funding across boundaries: ⿻ funding can also extend dra-
matically beyond its current bounds, to allocate the resources
thus raised. Two of the most interesting directions are cross-
jurisdictional and inter-temporal. Current international trade
treaties focus primarily on breaking down trade barriers, including
the subsidies that help support supermodular production as we
discussed above. A future form of international economic coop-
eration could assemble matching funds for cross-jurisdictional
economic ventures, harnessing a mechanism like ⿻ funding. One
key advantage of capitalism is that it is one of the few scaled systems
with a significant intertemporal planning component, where com-
panies raise funds for profits that appear distant. One can imagine,
however, even more ambitious inter-temporal economic systems
with matching funds, for example, for institutions that promote
cooperation across generations or with those who are not even
born yet. This might overcome concerns about the lack of long-term
planning, as well as the conservation of valued past institutions, in
many quarters, creating an organic version of a “ministry for the
future”.450
4. Emergent publics: Possibilities are equally promising for how the or-
ganizations thus supported can be made truly accountable to their
450
Robinson, op. cit.
323
stakeholders. Stakeholding of various kinds (as workers, customers,
suppliers, targets of negative externalities like pollution dumping or
misinformation, etc.) could be tracked by harnessing the type of ⿻
identity systems we discussed above. These could then be linked
to participation using voting and deliberation systems like those we
highlighted earlier in ways that are much less demanding on indi-
viduals’ time and attention and able to more quickly reach broadly
legitimate decisions than existing collective governance.451 These
in turn can make truly democratic and ⿻ governance of emergent
publics a realistic alternative to traditional corporate governance.
One could then imagine a future where new democratic entities gov-
erning emerging technologies in ways that are close to as legitimate
as governments emerge as frequently as start-ups, creating a web of
dynamic and legitimate governance.
5. ⿻ management: Internally, it is also increasingly possible to see
past the hierarchical structure that typically dominates corporate
control. The Plural Management Protocol we used to create this
book tracks the types and extent of contributions from diverse
participants and harnesses mechanisms like we have described
above to allow them to prioritize work (which then determines
the recognition of those who address those issues) and determine
which work should be incorporated into a project though a basis
of exerting authority and predicting what others will decide.452
This allows for some of the important components of hierarchy
(evaluation by trusted authorities, migration of this authority based
on performance according to those authorities) without any direct
hierarchical reporting structure, allowing networks to potentially
supplant strict hierarchies.
6. Polypolitan migration policy: It is also increasingly possible to imag-
ine breaking down the stringency of international labor markets
through related mechanisms. As philosopher Danielle Allen has pro-
posed, migration could be conditioned upon endorsement or sup-
port from one or more civil society groups in the receiving country,
451
An interesting first experiment in this direction is being undertaken by the Web3 proto-
col Optimism, which uses a mixture of one-share-one-vote and more democratic methods
in different “houses” to govern its protocol.
452
South et al., op. cit.
324
extending and combining existing practices in countries like Canada
and Taiwan that respectively allow private community-based spon-
sorship and allow a diversity of qualifying pathways for long-term
work permits.453 These could diffuse the stringent control of labor
mobility by nation states while maintaining accountability to avoid
harms or challenges with social integration.
While these only begin to scratch the surface of possibilities, they hope-
fully illustrate how completely markets could be re-conceived harness-
ing ⿻ principles. While the debates over markets and the state often falls
into predictable patterns, the possibilities for moving radically beyond
this simplistic binary are just as broad as for any other area of ⿻.
325
eration, or creative collaboration, while creating market systems (like ⿻
money) that can deliberately insulate these from broader market forces.
Yet despite all their manifest dangers and limitations, those pursuing ⿻
should not wish markets away. Something must coordinate at least coex-
istence if not collaboration across the broadest social distances and many
other ways to achieve this, even ones as thin as voting, carry much greater
risks of homogenization precisely because they involve deeper ties. So-
cially aware global markets offer much greater prospect for ⿻ than a
global government. Markets must evolve and thrive, along with so many
other modes of collaboration, to secure a ⿻ future.
326
Section 6: Impact
The previous parts of this book have sketched lofty visions of transform-
ing a broad range of social systems. Yet however imaginative such fu-
turism is, it can quickly feel impractical, empty, and false if disconnected
from the presently felt needs of real people today and pathways to address
327
these needs while bringing systemic change. Furthermore, much of the
rhetoric so far has focused on broad social systems like “democracy” that,
while inspiring, can often feel distant from the lived experience or scope
of agency of most people.
What allows for peaceful and beneficial, yet dramatic, progress? In her
classic treatise on the topic, social philosopher Hannah Arendt contrasts
the American and French Revolutions.456 The American Revolution, she
argues, grew out of local democratic experiments inspired by migrants
exploring ancient ideals (both from their own past and, as we have re-
cently learned, that of their new neighbors) to build a life together in a
new and often hazardous setting.457 As they traded ideas and built on
related concepts circulating at the time, they came to a broad conclusion
455
Steven Levitsky, and Lucan Way, Revolution and Dictatorship, (Princeton: Princeton Uni-
versity Press, 2022).
456
Hannah Arendt, On Revolution, (New York: Penguin, 1963).
457
David Graeber, and David Wengrow, op. cit.
328
that they had discovered something more general about governance that
contrasted to how it was practiced in Britain. This gave what Arendt calls
“authority” (similar to what in our “Association and ⿻ Publics” chapter
we call “legitimacy”) to their expectations of democratic republican gov-
ernment. Their War of Independence against Britain allowed this author-
itative structure to be empowered in a manner that, for all its inconsis-
tencies, hypocrisies and failures, has been one of the more enduring and
progressive examples of social reform.
The French Revolution, on the other hand, was born of widespread popu-
lar dissatisfaction with material conditions, which they sought to redress
immediately by seizing power, long before they had gained authority for,
or even detailed, potential alternative forms of governance. While this led
to dramatic social upheavals, many of these were quickly reversed and/or
were accompanied by significant violence. In this sense, the French Rev-
olution, while polarizing and widely discussed, failed in many of its core
aspirations. By placing immediate material demands and the power to
achieve them ahead of the process of building authority, the French Rev-
olution burdened the delicate process of building social legitimacy for a
new system with more weight than it could bear. The French Revolution
demanded, and got, bread; the American demanded, and got, freedom.
329
While intuitive, these observations are a significant contrast to the model
of experimentation and innovation increasingly discussed in both the sci-
ence and social science literature on “randomized controlled trials” and
the technology business literature on “blitzscaling”, each of which we
will consider in turn. Randomized controlled trials, derived primarily
from individual, non-transmissible medical and cognitive psychology ap-
plications, focus on the randomized testing of treatments across individ-
uals or other social subgroups leading to an approval and then rapid dis-
bursement of the treatment to all indicated patients as with, for example,
Covid-19 vaccines.459 This literature has become increasingly influential
throughout the social sciences, especially development economics and as-
sociated applied work on poverty alleviation.460 This has encouraged the
spread of a model of “experimentation on” communities, where economic
and design experts construct interventions and test them on communi-
ties that may benefit from them, evaluate them according to often prereg-
istered metrics, and then propagate thus-measured effective treatments
more broadly.
330
ated by communities.
**
**
331
various consumer products took to reach the 100 million user mark,
with a clear downward trend over time, capped by ChatGPT. Such rapid
adoption led to widespread public concern about the potential social
harms from such systems and regulation aimed at avoiding the cycle of
“move fast and break things” and the social backlash that accompanied
comparatively earlier, slower-growing technologies (like ride-hailing
and social media).463
332
This “competitive” effect has some benefits, in spurring adoption by and
spread across communities seeking to harness the benefit of the tools
partly in their rivalry and potentially by doing so creating pressure to
harness and resolve resulting rivalries. But it can also, at best, create ex-
clusion and inequality that undermines the basis of ⿻ freedom and, at
worst, can lead to “arms race” dynamics that undermine the benefits of
new tools and instead turn them into universal dangers.
333
**
**
334
Fertile ground
Let us first consider the question of scale. To realize the benefits of ⿻
technology within a community requires the community to contain at
least a rough approximation of the diversity that technology aims to span.
This differs dramatically across various directions of technology. The
most intimate technologies of post-symbolic communication and immer-
sive shared reality can be powerful even in the smallest communities
and relationships, creating few constraints on scale and diversification
of seeding and thus making it natural to prioritize other criteria above.
At the opposite extreme, voting systems and markets are rarely used in
intimate communities and require significant scale to be relevant, espe-
cially in their socially enriched forms, making entry points far scarcer,
more ambitious, and potentially hazardous.
335
**
**
336
Surveyor’s map
Perhaps the two most prominent sites of experimentation with ⿻ we
have highlighted above are Taiwan and web3 communities. These two
sites share some important characteristics, and yet also sharply diverge
in many ways both in terms of their character and the ⿻ applications
they have focused on. Both are roughly the same size. In 2021, web3
applications (dApps) had about 1.5 million monthly active users, though
only a fraction of these actively participated in the most ⿻-adjacent
services, such as GitCoin. The ⿻ services of all kinds built by the g0v
466
community in Taiwan have reached similar numbers . The types of
diversity in each community, however, are radically different.
While statistics are not entirely reliable, web3 users are spread quite
broadly around the globe according to patterns similar to the internet.
However, users tend to be extremely technically sophisticated, skew
male, very young, and, anecdotally based on our experience in the
space, tend to be atheistic, politically right of center, and ethnically of
European, Semitic and Asian origin.467 Participants in the Taiwanese
digital ecosystem are obviously mostly from Taiwan and thus mostly
of the ethnicities represented there. But they are more diverse in age,
technical background, political perspective and religious background.468
The two ecosystems have also focused on different sides of the spectrum
of ⿻ we discussed in the previous part of the book. Taiwan has focused
primarily on the deeper and narrower applications of ⿻ and the funda-
mental protocols (identity and access) that support these most strongly.
Global web3 communities have focused on the shallower and more inclu-
sive applications and the fundamental protocols (association, commerce
and contract) that most support these.
Both have been critical early testbeds for ⿻, yet measuring them against
our criteria also illustrates their limitations. The Taiwan ecosystem is
466
Friedrich Naumann Foundation. “Examples of Civic Tech Communities-Governments
Collaboration Around The World,” n.d. https://www.freiheit.org/publikation/examples-civic-
tech-communities-governments-collaboration-around-world.
467
a16zcrypto. “State of Crypto 2023.” Https://A16z.Com. Andressen Horowitz, 2023.
https://api.a16zcrypto.com/wp-content/uploads/2023/04/State-of-Crypto.pdf.
468
Austin, Sarah. “Web3 Is About More Than Tech, Thanks to Its Inclusivity.” Entrepreneur,
June 3, 2022. https://www.entrepreneur.com/science-technology/web3-is-about-more-than-
tech-thanks-to-its-inclusivity/425679.
337
larger than required for many of the applications developed there, which
is likely why it has hosted a range of subcommunities (that they often call
“data coalitions”) engaging in more advanced experiments supported by
the broader ecosystem. The Taiwan ecosystem has strong potential for
prestige in Asia and many of the countries typically called democracies,
while the geopolitical conflicts surrounding it create some challenges in
making it a seed for fully equitable global spread. Web3 communities, on
the other hand, may actually be a bit small and homogeneous to allow for
a fully robust test of whether new market institutions can rival the reach
of capitalism. Furthermore, many of the scandals that have plagued the
web3 space endanger its ability to generally serve as a beacon of innova-
tion that can equitably spread.
338
tors, appealing to many who urge us to think beyond human work,
health and idea exchange.
6-1 Workplace
More than a billion people worldwide work outside their homes in formal
organizations with at least a few other people.469 These “workplaces” pro-
duce about 70% of global output and are the first thing most people think
of when they hear “economy”. Just as we consider the vast contribution
of workplaces to the global economy, it is essential to address inefficien-
cies that hinder productivity. U.S. workers spend an average of 31 hours
per month in meetings deemed unproductive, a significant drain on both
time and resources.470 If ⿻ is to help re-imagine the economy, it must
restructure formal work, which we turn to in this chapter.
339
Strong remote teams
The COVID-19 pandemic transformed the world of work, bringing
changes expected for decades to fruition in a year. A leading study by
Barreto et al., for example, found that work from home rose from 5%
of the American workforce to a high above 60%.472 Perhaps the most
extreme manifestation has been the rise of so-called “digital nomads”,
who have harnessed the increasing opportunity for remote work to
travel continuously and work a variety of remote jobs as encouraged by
programs like Sardinia regional program for digital nomads and Estonia
and Taiwan’s e-citizenship and gold cards respectively, that one author
of this book holds. While there has been a substantial return to physical
work since the end of the pandemic, at least a part of the change appears
here to stay; Barreto et al. find that after the pandemic, workers on
average want to work about half the week from home and believe their
productivity is similar or better in that setting. While some studies have
found some evidence of mildly reduced productivity, these effects do not
seem large enough to overcome the persistent demands for hybrid work
styles.473
Yet there is little question that remote work has real downsides. Some
of formal sector work time and can be improved by 25%, this is about 4% of GDP. Stan-
dard economic estimates of the costs of labor search and matching are about 4% of GPD,
similar to the cost spent on human resources; if mitigated by 50% this would raise GDP
by 2% (not to mention significantly dampen the cost of business cycle unemployment). Fi-
nally, most GDP growth (of roughly 2-3% annually globally) has been traced by economists
to technological advance through the research and development of new products, which
is now about 80% in the private sector according to the figures we discussed in the intro-
duction. If the efficiency of this could be increased by a quarter through more flexible in-
trapreneurship, this could raise global GDP growth annually by half a percent. Cameron
Klein, Deborah DiazGranados, Eduardo Salas, Huy Le, Shawn Burke, Rebecca Lyons, and
Gerald Goodwin, “Does Team Building Work?” Small Group Research 40, no. 2 (January
16, 2009): 181–222. https://doi.org/10.1177/1046496408328821. Michael Greenstone, Richard
Hornbeck, and Enrico Moretti, “Identifying Agglomeration Spillovers: Evidence from Win-
ners and Losers of Large Plant Openings,” Journal of Political Economy 118, no. 3 (June 2010):
536–98. https://doi.org/10.1086/653714.
472
Jose Barrero, Nicholas Bloom, and Steven J. Davis. 2023, “The Evolution of Working
from Home,” __Stanford Institute for Economic Policy Research (SIEPR) Working Paper_ no.
23-19 (July 2023): https://siepr.stanford.edu/publications/working-paper/evolution-working-
home.
473
Natalia Emanuel, Emma Harrington, and Amanda Pallais, “The Power of Proximity to
Coworkers: Training for Tomorrow or Productivity Today?” National Bureau of Economic
Research Working Paper no 31880 (November 2023): https://doi.org/10.3386/w31880.
340
of these, such as ensuring work-life balance, avoiding distractions and
unhealthy at-home working conditions, are not easily addressed through
remote collaboration tools. But many others are: lack of organic inter-
actions with colleagues, missing opportunities for feedback or forming
deeper personal connections with colleagues, etc.474 While ⿻ can be used
to address most of these, we will focus on one in particular: the building
of strong and deeply trusting teams.
341
directly-productive activities to build team trust, connection and spirit.
These range from casual lunches to various kinds of extreme team sports,
such as “trust falls”480 , simulated military exercises, ropes courses, etc.
What nearly all these have in common is that they create a shared activ-
ity that benefits from and thus helps develop trust among members, in a
similar manner to the way we discussed shared military service develop-
ing strong and lasting cooperative bonds in the Post-Symbolic Communi-
cation chapter.
342
than by the barriers of physical distance.
343
**
**
344
Difficult conversations
Meetings are a central part of white collar work, consuming on average
approximately a quarter of working time.484 Yet for all the time they
take up, perhaps the greater cost is the meetings that do not happen be-
cause of how burdensome they are. Business leaders frequently misun-
derstand the needs of their customers, the challenges within their teams
and the duplication of work because meeting with the relevant stakehold-
ers would take too long. To make matters worse, many meetings are
quite ineffective, as dominant personalities carry on and the wisdom of
those who are less empowered or assertive is lost. In the realm of white-
collar work, meetings are a notorious time sink, with office employees
dedicating about 18 hours a week on average. This not only represents
approximately $25,000 in annual payroll costs per employee but also en-
compasses meetings that 30% of employees find unnecessary. Moreover,
a reduction in meetings by 40% has been linked to a 71% surge in produc-
tivity, underlining the critical need for streamlining communication.485
Anything that could significantly speed meetings and increase their qual-
ity could transform organizational productivity.486
345
promise to significantly improve this, making it increasingly possible to
have respectful, inclusive and informative asynchronous conversations
that include many more stakeholders.
⿻ practices and tools can also enable more open and inclusive conversa-
tions about the biggest issues facing the organization. Today, the respon-
sibility for setting direction is typically limited to the top of the pyramid.
This simplifies strategy development, but at the cost of resilience and cre-
ativity: if a handful of executives are unwilling to adapt and learn, the
whole organization stalls. And even if executives were all exceptional
visionaries, their combined intellect is unlikely to suffice for the task at
hand. What is instead required is a process that harnesses the ingenuity
of everyone who has a stake in the organization’s success, as highlighted
by W. Edwards Deming‘s work on Total Quality Management.487 Imag-
ine an open conversation that generates tens of thousands of insights and
ideas (for instance around customers’ needs or emerging trends) and uses
collective intelligence to combine, prioritize, and ultimately distill them
into a common point of view about what lies ahead. What are the big
opportunities that can redefine who we are? What are the biggest chal-
lenges we need to tackle head-on? What aspiration truly reflects our com-
mon purpose? By opening the conversation to new voices, encouraging
unorthodox thinking, and fostering horizontal dialogue, it’s possible to
transform a top-down ritual into an exciting, participative quest to define
a shared future.
Beyond office politics, national politics are also increasingly entering and
dividing workplaces, leading some executives to take extreme measures
such as banning political discussions at work.488 A potential alternative to
such stringent restrictions, which may suppress but not resolve tensions
and undermine employee morale, might be to build channels such as the
above to allow thoughtful and inclusive discussions of social issues, espe-
cially those relevant to corporate policies, to take place respectfully and
at scale. Overall, these technologies promise to make workplaces more ef-
ficient, engaging, consensual and harmonious, providing the tools to help
487
W. Edwards Deming, “Improvement of Quality and Productivity through Action by Man-
agement”, National Productivity Review 1, no. 1 (1981): 12-22.
488
Ellen Huet, “Basecamp Follows Coinbase In Banning Politics Talk at Work,” Bloomberg,
April 26, 2021, https://www.bloomberg.com/news/articles/2021-04-26/basecamp-follows-
coinbase-in-banning-politics-talk-at-work. Ibid.
346
achieve the cultural goals many executives strive for.
⿻ hiring
Many businesses and roles have “standard career paths”, recruiting
primarily graduates from a limited number of degree programs, set of
professional backgrounds/experiences, etc. While these businesses often
regret that they thereby exclude many talented and diverse candidates,
recruiting from backgrounds that have lower “hit rates” is often very
costly: it would require them to learn to identify promising resumés
from a broader range of settings, verify accomplishments and credentials
outside of typical channels, send representatives traveling more and
further, understand unfamiliar dimensions of diversity and train those
who may be less prepared for the culture of their organization. The
rigidity created by this hiring process is a leading reason so many are
forced into the narrow paths of learning we highlighted in the previous
chapter.
They also may be able to provide a richer sense of the range of diversity
spanned by a company’s customer base that would be helpful to repre-
sent among employees and help them to empathize and connect with
customers. It could also allow human resource departments to optimize
for diversity in more sophisticated, intersectional ways rather than sim-
ply seeking to match population proportions in salient categories. Re-
mote shared reality experiences can help them hold interactive recruit-
347
ing events in a wider range of venues at lower cost and allow applicants a
deeper sense of the work environment. They can also accelerate the accul-
turation and onboarding processes much as we described in the previous
chapter. In short, these tools can together allow for a future of human re-
sources that reaches a far wider range of talent and allows opportunities
for everyone to shine as the unique intersectional contributors they are.
348
Supporting intrapreneurship
Another effect of traditional hierarchies is that those managed by differ-
ent high-level managers come to form different organizations within the
parent, each with their own cultures, goals and visions. While these in-
ternal distinctions are usually viewed as important to ensuring account-
ability, they are also often viewed as a barrier to organizational cooper-
ation and dynamism, potentially undermining the collaborations needed
to provide common infrastructure and meet the needs (“disruptions”) of
changing political, economic, social and technological environments. For
example, the organization in which one of us works, Microsoft, has some-
times been satirized for its internal organization conflicts and, under the
leadership of its current CEO Satya Nadella has worked to forge a “One
Microsoft” culture to overcome this.490
While much of this has been demonstrated through exemplars of such co-
operation and inspirational leadership, Nadella has also helped establish
some institutions intended to help achieve the organizational equivalent
of the “solidarity and dynamism” we have discussed above. In particular,
one of us had the honor to serve in the Office of Chief Technology Officer
(OCTO) Kevin Scott, whose duties included coordinating cross-company
investments that no one organization would find it in their interest to
take on and stimulating “intrapreneurship”, the building of new business
lines often drawing on expertise across existing organizations.491
349
pany. This was particularly difficult because the intention was for many
of these investments to accrue not directly to the bottom line of an inter-
nal start-up, but to other business lines. Because of this and the structure
of jobs at Microsoft, the typical use of large incentives for eventual success
to compensate for the likelihood of failure are hard to apply. Various or-
ganizations navigate this challenge in different ways; for example, Google
(now Alphabet) has traditionally given employees 20% of their time free
to pursue passion projects for the organization, outside their primary or-
ganizational role.492 Yet this suffers the obvious challenge that individu-
als may pursue idiosyncratic projects that at worst may not be aligned to
the broader mission and at best usually fail to scale as they do not bring
enough people together to cooperate on an ambitious project.
Putting these together, we can imagine a future where remote teams can
form the same strong bonds as in-person teams, where in-person teams
can co-design inclusive workplaces that foster spontaneous connections
while maintaining focus, where meetings are far more efficient and inclu-
sive even when asynchronous, where a far wider range of talent can be
492
Annika Steiber and Sverker Alänge, “A Corporate System for Continuous Innovation: the
Case of Google Inc.”, European Journal of Innovation Management 16, no. 2: 243-264.
350
placed into leading roles. This could create a more inclusive and repre-
sentative workplace where employees can easily collaborate across divi-
sions and with corporate support to overcome hurdles and build the com-
mon infrastructure and new ventures their employer needs to survive
and thrive in a dynamic business environment. In short, it is not hard to
see a future of truly ⿻ workplaces, embracing and harnessing collabora-
tion across a wide range of internal and external diversity to achieve a
more productive and inclusive future.
6-2 Health
In the past 75 years, the human race has added 25 years to global life
expectancy, significantly more than in the previous 10,000 years. These
advances were realized through a monist atomist model of health and
healthcare as we highlighted in our Living in a ⿻ World chapter. Such
models (e.g. ‘tropical medicine’) were developed and refined through
centuries of imperial and colonial governance, but their implementation
worldwide was rapidly accelerated following the formation of the United
Nations. This included achievements like the eradication of smallpox, the
rapid expansion of immunizations including through Gavi the Vaccine
Alliance, the massive expansion of antiretroviral therapy for HIV, and
the recent reductions in maternal mortality through improvements in
skilled birth attendance. Perhaps the most dramatic illustration of this
model was that within two years of the appearance of COVID-19, 70% of
the world’s population had received at least a single vaccine dose.
351
worldwide are severely underdeveloped496 , half of premature deaths are
caused by non-communicable diseases497 costing more than $2 trillion
annually498 , and less than 3% of the world’s population in some countries
has access to basic assistive technologies (wheelchairs, walkers, canes,
prosthetic limbs, eyeglasses, white canes, and hearing aids499 . If we can
address these social and intersubjective threats to health as effectively as
we have the atomistic ones, we can easily add another 20 years to human
life expectancy in the next century.
1. Lack of financing
2. Missing markets
3. Coordination failures
4. Missing communities
5. Non-aligned incentives
6. Lack of enabling services.
496
“Transforming Mental Health for All,” (Geneva: World Health Organisation, 2022),
https://iris.who.int/bitstream/handle/10665/356119/9789240049338-eng.pdf?sequence=1.
497
“Noncommunicable Diseases,” World Health Organization, September 16, 2023,
https://www.who.int/news-room/fact-sheets/detail/noncommunicable-diseases.
498
“Financing NCDs,” NCD Alliance, March 2, 2015, https://ncdalliance.org/why-
ncds/financing-ncds.
499
“Assistive Technology.” World Health Organization: WHO, May 15, 2023.
https://www.who.int/news-room/fact-sheets/detail/assistive-technology.
500
Jennifer Ruger, Health and Social Justice, (New York: Oxford University Press, 2010),
pp. 276.
352
**
Figure 6-2-A. The Relational Concept of Health - Including social and in-
tersubjective aspects of health rather than just the atomistic
**
353
position.502
354
butions, usually not risk-adjusted, from the employer (formerly, from the
guilds, such as the medieval German Knappschaften) and/or from another
actor such as the state. Most health systems in the world predominantly
follow either the social or the national insurance model, although private
health insurance can be found virtually everywhere. Many current cri-
tiques of social health insurance object to i) financing healthcare from a
tax on wages assessed through payroll deductions and ii) limiting entitle-
ment to those who contribute such payments through the formal sector.
Although there is merit in these concerns, it is useful to take a ⿻ perspec-
tive on social health insurance: there is a valid sense in which individuals
who share a profession, or employer, and who therefore tend to share a
common set of beliefs and values, should manifest a sense of solidarity
that is particularly acute.505
355
foster coordination in the joint production of health rather than merely
in its restoration: ‘healthy minds in healthy bodies’ but also healthy per-
sons in healthy families and communities (see Figure A, above). Such a
model, which we might call a “health production society”, would ensure
risk pooling and redistribution but could be much more relevant and ef-
fective at targeting the social determinants of health.
356
it can be forked to whatever use the beneficiary can devise (Figure B).
Although impacts are a causal effect of health services (e.g. a child who
otherwise would have died did not, and then went on to be a parent),
impacts are not the primary intended effect of health services. The
primary intended effect of health services is reducing morbidity or
mortality risk, which as we have seen is an insurance function. Health
services, which produce non-market-traded outcomes (e.g. lives saved
and healthier lives, through the insurance function) and market-traded
and non-market-traded impacts (e.g. more labour to sell and more time
for visits with friends, through the open-source function), thus have an
accounting problem: it is hard to measure the value of outcomes (e.g. the
value of a life saved) but it is often still harder to measure the value of
relevant impacts. Thus, since the full social value of health projects is in
practice never counted, let alone captured or rendered tradeable, many
win-win health investments remain blocked.
**
**
357
For example, the Global Fund claims to have saved 44 million lives over 20
years at a cumulative cost of $55.4 billion in disbursements plus approx-
imately $6 billion in operating costs funded primarily by governments
and philanthropists. Median estimates for the insurance value of a mor-
tality risk reduction of this scale would come in at about $200 trillion dol-
lars, attributing to the Global Fund an (undiscounted) outcomes-based re-
turn on investment (ROI) of over 3000:1. Accordingly, if the Global Fund
could have captured a fraction of the insurance value of the outcomes it
produced, it would be one of the most valuable entities in the world to-
day, and everyone would want to buy its shares. In fact, everyone in the
world already does own non-tradeable shares in the Global Fund, which
pays out regular dividends in the form of reduced rates of disease con-
traction, increased economic growth and the benefits of loved ones living
fuller lives among many other things. The question is how to raise rev-
enue against these implicit, untraded shares to fund investment that can
increase the benefits they pay out.508
358
bundling and trading, it can be made as simple to buy health impact
as carbon credits. Tokens can be reinvested into projects or used to
purchase health services according to a standardized impact model.
Value can be linked to specific projects or aggregated into blocks,
supporting the development of cascading (‘fractal’) health-impact
markets.
359
“5 months” and “yes” were closer to correct. In fact, diverse publics world-
wide largely led government response rather than following it during
February and March of 2020.
360
of health and healthcare, to engage in the co-administration of healthcare
and other health services in accordance with Indigeneous community val-
ues, and to allow for the self-determination of solutions by Indigeneous
peoples. As these experiments remain few and far between, GFMs seem
a promising tool to leverage the large and diffuse bodies of textual data
produced in these initiatives for the purpose of interpreting, criticizing,
reimagining, and eventually redesigning, systems of healthcare adminis-
tration to be more responsive to cultural value systems. As discussed in
our chapter on Augmented Deliberation, “points of view” that are held
(albeit diffusely) by organizations and even entire cultures can be rep-
resented as an “individual” whose “synthetic wisdom” can be queried
in real-time interactions, or who can be tasked with designing incentive-
compatible healthcare and interventions along a non-colonialist model.
361
It would be futile to insist that such devices are not now an integral part
of our (transhuman) personality.510 Common applications of such tech-
nologies exist in the form of mobile health (e.g. text-message alerts, wear-
able devices, contact-tracing tools), telemedicine and telehealth (e.g. vir-
tual fracture clinics)511 , and e-health (e.g. digital health records). It is natu-
ral and obvious that the trend towards further modalities of interactivity,
and higher bit-rate throughput, will have in time important implications
for health, especially for visual, hearing, mobility, self-care, and speech
disorders, notably through Extended Reality (XR) services. Biomedical en-
gineering is already working to connect prosthetic devices at the cellular
level (i.e. bionics)512 , and BCIs hold out the corollary promise of allowing
for such connectivity at cognitive, emotional and experiential levels with,
for example, powerful applications in speech and communication disor-
ders, in the enhancement (or maintenance) of cognitive functions such as
memory and, almost certainly, in novel applications for common mental
disorders such as depression and anxiety, as well as for impulse control
for addictive disorders.
Immersive shared reality (ISR) has thus far primarily been used in
non-interpersonal medical settings, such as to de-risk medical training
for health workers, much as flight simulators do for pilots. It is natural,
however, to imagine the gamification of health-based ISR so as to incent
the learning of complex cognitive, relational, and behavioural skills
(such as self-care, self-insight, and self-management), as well as a suite of
simulated interpersonal applications (see our Immersive Shared Reality
chapter). Similar to the examples cited there, new horizons of simu-
lated and non-simulated social interaction can be opened to those with
disabilities that less immersive, lower-throughput, traditional assistive
technologies cannot address.
510
Donna Haraway, “A Cyborg Manifesto: Science, Technology, and Socialist-Feminism in
the Late Twentieth Century,” in Simians, Cyborgs and Women: The Reinvention of Nature
(New York; Routledge, 1991), pp. 149-181.
511
Gillian Anderson, Paul Jenkins, David McDonald, Robert Van Der Meer, Alec Morton,
Margaret Nugent, and Lech A Rymaszewski, “Cost Comparison of Orthopaedic Fracture Path-
ways Using Discrete Event Simulation in a Glasgow Hospital,” BMJ Open 7, no. 9 (September
2017): e014509, https://doi.org/10.1136/bmjopen-2016-014509.
512
Laurent Frossard, Silvia Conforto, and Oskar Aszmann, “Editorial: Bionics Limb
Prostheses: Advances in Clinical and Prosthetic Care Editorial on the Research Topic
Bionic Limb Prostheses: Advances in Clinical and Prosthetic Care Context Impor-
tance of Residuum Health,” Frontiers in Rehabilitation Sciences 3 (August 18, 2022).
https://doi.org/10.3389/fresc.2022.950481.
362
GFMs and data sharing to assist in diagnosis and treat-
ment
A human radiographer can at the upwards limit view and interpret per-
haps as many one million diagnostic imaging scans during a lifetime of
practice. While this is sufficient to achieve expert status in diagnosing
common conditions, GFMs can fine-tune on datasets orders of magnitude
larger and thus outperform human readers for the diagnosis of rarely
seen conditions. Of course, human beings might specialize in such con-
ditions and dedicate themselves to viewing a collection of many rare im-
ages, but the need for ⿻ technologies then becomes more acute: it seems
impossible to imagine how large diagnostic databases of rare conditions
can be compiled without established data-sharing practices across many
image centres. In this case, too, we see diffuse pockets of diversity that
show ‘affinity’ in terms of markers that cannot be organized into low-
entropy pockets based merely on traditional variables such as place, pro-
fession, or parentage; in these cases, another organizing principle must
be found, and online technologies are the obvious solution. Such tech-
nologies also need to respect privacy and confidentiality, both as a norma-
tive and legal principle. Various forms of privacy-enhancing technologies
(see our chapter Association and ⿻ Publics) such as zero- (or low-) knowl-
edge proofs, allow for specific kinds of information to be reliably shared
without over-sharing, helping enable simultaneous respect for medical
privacy and large-scale data sharing.513
363
data for the patient’s own benefit) and medical research (which requires
patient data for the benefit of others) so as to build in cryptographic prin-
ciples from the foundation is an essential part of the Web3 project, with
important health implications: no doubt some diseases today are still
fatal only because of our failure to build such applications. Extending the
diagnostic example, medical notes of all kinds (e.g. admission, treatment,
discharge) forming a part of a patient’s record are a potentially vast
source of information about care and outcomes that is not only highly
diffuse and unstructured but also virtually unqueryable outside of a
set of specific and restricted medicolegal contexts. If there is a way
to extract weak, or highly confounded, signals as the basis for novel
causal insights, GFMs are perhaps the only technology that might do so.
Variations in medical practice and outcomes should in principle make
it possible to identify and extract the relevant counterfactual, much as
- at the population level - regression discontinuity design does. Such
practices could transform a variety of medical practices, such as making
post-approval regulatory changes far more dynamic and adaptive.
Given the enormous amount of value currently ‘left on the table’ by the
under-production of health, it is critical that ⿻ technologies increasingly
be used to:
364
tion failures, missing communities, misaligned incentives, and lack of en-
abling services) will be overcome, and the dark clouds blocking the path
to another 20 years of healthy life expectancy will dissipate the world
over.
6-3 Media
Immersive and telepathic media experiences promise to transform con-
nection across difference, making the experiences of the marginalized
as palpable to us as those of our neighbors. Collaborative journalism
promises to increase by an order of magnitude the number of citizens
who can meaningfully contribute to shaping our shared narration of his-
tory as it happens. Cryptographic securing of sources can increase free-
dom of the press, the equivalent of moving every country up a category
(viz. from Satisfactory to Good in the Reporters without Borders World
Press Freedom Index) by lessening the trade-offs between source confi-
dentiality and state secrecy. Creating a more ⿻ structure of attention al-
location and business models to support it could at least undo the rise in
affective polarization in many jurisdictions and possibly reduce them to
the levels seen today in the least polarized jurisdictions like Taiwan and
the Netherlands.
365
In particular, we highlight how the coming tide of ⿻ may help increase
empathy across social distance even more dramatically than photogra-
phy and television did; how it could increase by an order of magnitude or
more the number of people who can meaningfully and helpfully partici-
pate in the journalistic process; how it could help restore the level of trust
in media, as well as norms of respect for confidentiality, much of the way
towards what they were at their mid-twentieth-century peak; how they
could undo most of the rises in levels of “affective polarization” (viz. dis-
like across lines of political division) not just within national polities but
across a range of other social organizations; and how it could help restore
sustainable and aligned funding for media. In short, we show how ⿻ can
help address and reverse many of the crises media face today.
366
Yet these are only the first successful forays into an emerging medium.
As shared reality technologies branch out into other senses (smell, touch
and taste), far more complete multisensory connections will be possible
with even more surprising and enlightening results. Brain interfaces will
be transformative in a way that is hard to even describe. The future of
journalism empowering us to know things that are profoundly different
is therefore bright.
Citizen co-journalism
One of the most important trends in the production of journalism in the
internet era has been the rise of so-called “citizen journalism” and the al-
lied “open-source intelligence” movement, both of which aim to empower
a much broader diversity of people than those traditionally employed as
formal journalists or intelligence analysts to document important events
in the world around them. Such journalism has been central to document-
ing many of the most important events in recent years, from terrorist at-
tacks to wars and police abuse. Yet it also faces significant criticism and
social concern over bias, rigor of verification of facts, and legibility and
digestibility.
Yet there are equally clear precedents for how technology could offset
these challenges. Wikipedia has shown the speed and scale at which dis-
tributed participation can produce roughly and broadly consensual ac-
counts of many events, though not quite yet at the speed required of jour-
nalism. Many of the tools we have described above and detail below can
help address challenges of rigorous verification at distance and scale and
rapid achievement of rough and socially contextual consensus that is a
more appropriate frame for thinking about “objectivity”.
367
which GFMs may allow for a new form of coherent, digestible, broadly
traveling and yet authentic community voice. There is a long-standing
tension in journalism between allowing a community to “speak for itself”
(often through quotes or extended descriptions of community practices)
and crafting a compelling narrative digestible to the target audience, and
an even greater one that arises when articles are translated for other au-
diences. GFMs will increasingly allow communities to finesse these trade-
offs, as they can learn from and synthesize the speech patterns of commu-
nity members, incorporate verified facts, and at the same time smoothly
translate to a range of languages and subcultural standards and styles.
This will empower groups of citizens who are not trained as journalists
to convey the important stories they have to tell with precision and clarity
to diverse publics.
Many parts of the above process are naturally facilitated by the tools
we highlight in the “Identity and Personhood” and “Association and ⿻
Publics” chapters. Most of the tools for protecting ⿻ publics could be
applied by organizations to reduce the credibility of documents shared
outside their intended social context. At the same time, zero-knowledge
proofs (ZKPs) based on public credentials could allow sources to remain
confidential even to journalists while proving (elements of) their position
to journalists’ audiences. Yet, absent some reconciliation, such strategies
368
could quickly become an “arms race”, escalating cryptography without
arriving at a better social outcome.
369
of a free press in a democratic society is to clarify to all citizens both
the points of consensus (viz. the “Walter Cronkite effect” of commonly
watched, consensual news) and fact and those of divergence (viz. the “fair-
ness doctrine” and practice of balancing diverging perspectives) to allow
self-government to thrive. While many appreciate what this era achieved
at the national level for one country, the essence of ⿻ is that we live (es-
pecially today) in a much richer and more diverse world, with many loci
of democracy across, between, within and beyond nations. Whatever the
many failings of social media, one thing it has achieved is to allow this
diversity to shape the media ecosystem. How might it do this while still
being pro-social media in the sense of the Hutchins report?
370
thermore, and perhaps most importantly, it would reshape the incentives
of journalists and other creators away from divisive content and towards
stories that bring us together. It is relevant beyond “hard journalism” per
se as many other cultural forms (e.g. music) benefit from audiences who
want to share cultural objects and fandom with others.
⿻ public media
The recommendations of the Hutchins Commission were largely adopted
by leading media outlets as part of the then-prominent campaign for “so-
cial responsibility”, which has recently made a comeback in the form
of commitments to “environmental, social and governance” (ESG) goals
among many companies. Yet a firmer foundation for encouraging such re-
sponsibility would be to align the funding sources of media more closely
with the pro-social design goals above.
371
models, pursued by corporations like Microsoft and Slack, is selling pro-
ductivity software, which often includes social media-like components,
to companies to boost productivity. These companies have no interest in
“engaged” or polarized employees; the goal of the tools is to bring employ-
ees together to accomplish shared goals and adjust to change. A new, pro-
social media model could thus naturally be incubated in such settings and
then sold, in broader social contexts, to other organizations interested in
solidarity and dynamism.
This might play out in a variety of ways, but a simple one would be for par-
ticipants to opt into a set of communities they identify with. Each would
“sponsor” their community members’ use in exchange for the prioritiza-
tion of their members’ attention to the community-relevant content we
discussed above. Users who did not sign up for communities paying suf-
ficiently might have to accept some amount of advertising or pay a sub-
scription fee, and the service could identify from its own patterns com-
munities and approach their leaders to ask for payment. In short, social
media might become a more ⿻ version of public media.
Overall, the examples above show how ⿻ can empower a new pro-social,
519
Kleis Nielsen, Rasmus, and Geert Linnebank, “Public Support for the
Media: A Six-Country Overview of Direct and Indirect Subsidies,” (Ox-
fordshire: Reuters Institute for the Study of Journalism: University of
Oxford, 2011), https://reutersinstitute.politics.ox.ac.uk/sites/default/files/2017-
11/Public%20support%20for%20Media.pdf.
520
“Grants for Religious Media Organizations,” Cause IQ, n.d.,
https://www.causeiq.com/directory/grants/grants-for-religious-media-organizations/.
521
“Advertising Revenue of X (Formerly Twitter) Worldwide from 2017 to 2027,” Statista,
2023, https://www.statista.com/statistics/271337/twitters-advertising-revenue-worldwide/.
372
⿻ media environment: one where we can connect deeply with others
from very different backgrounds, where people come together to tell their
stories in authoritative and verifiable ways without compromising com-
munity or individual privacy and where we come to understand what
unites and divides us in the interests of the dynamism and solidarity of
all our communities.
6-4 Environment
⿻ may be even more core to addressing the most pressing environmen-
tal problems we face, from climate change to biodiversity loss, than even
“green technologies” like clean energy are, because it provides a basis
both for cooperation on developing those technologies and for establish-
ing positive communication with natural features that represents their
interests in social decisions. As such, ⿻ may be central to the survival of
the earth as a human-supporting habitat.
373
escalated as the climate changes. At the beginning of the 21st century,
Nobel laureate Paul Jozef Crutzen proposed the term “Anthropocene” to
recognize this new epoch driven primarily by human influence.522 Biodi-
versity has plummeted; between 2001 and 2014 alone, approximately 173
species vanished—25 times the historical extinction rate. During the 20th
century, some 543 vertebrate species disappeared, an event that would
typically unfold over 10,000 years.523
Of course, we humans are not immune to the effects. Air pollution alone
kills nearly 6.7 million people every year, including half a million infants.
In severely polluted countries, average life expectancy falls by up to six
years.524
374
embraces direct action, extending community values into environmental
care.
This type of citizen science community, which covers air, forest, and river
sensing, is based on the spirit of open-source rainmaking, and also con-
tributes to the “Civil IoT” data coalition, which provides real-time sensing
information updated every 3-5 minutes across the country, serving as a
common ground for activists, and making it easier for ideas to solve prob-
lems to be examined and disseminated.
375
Whanganui in New Zealand, and the Ganga and Yamuna rivers in In-
dia.526 This signifies a shared commitment to preserving these ecosys-
tems for future generations.
376
open-source governance, capital and compute investments, and collab-
oration are key. Through GFMs, we can unlock deeper insights into
our complex natural world. Scientific research and environmental
management benefit from these insights, improving both and potentially
reshaping society, as we have seen in the US National Aeronautics and
Space Administration’s ongoing collaboration with IBM on a Geospatial
Foundation Model based on NASA’s earth observation data, tackling
crucial notions of environmental justice for natural spaces and human
communities alike.527
6-5 Learning
Learning is a lifelong journey universally recognized around the globe. It
begins with the influence of family, culture, and social circles, while the
educational environment is a common collective experience along this
journey. Different background stories shape the diverse communication
languages, cooperation methods, and values in dealing with people and
527
Josh Blumenfeld, “NASA and IBM Openly Release Geospatial AI Foundation
Model for NASA Earth Observation Data”, NASA Earth Data August 3, 2023 at
https://www.earthdata.nasa.gov/news/impact-ibm-hls-foundation-model.
377
things between each other. For example, there are significant differences
between the East and West, especially in the pursuit of knowledge and the
integration of groups. The ⿻ technology of “collaboration across social
differences” stimulates co-creation by bringing together different knowl-
edge inheritance processes from around the world.
To this end, learners can fully explore their own and society’s potential,
avoiding setting boundaries at the starting point. This requires build-
ing an open, non-dogmatic social cognition system, allowing everyone’s
unique talents to find appropriate space for expression without fear of
communication. With the assistance of ⿻ technologies such as machine
translation, shared reality, and cross-border communities like Wikipedia
(3-3 The Lost Dao), the traditional rigid learning paths are supplemented
and challenged, going beyond the scope of traditional classrooms and text-
books.
378
Resilient Learning Systems
The 2022 global reports of PISA532 & ICCS533 point out that Taiwan, Japan,
South Korea, and Lithuania grew against the trend during the pandemic,
and are considered to have resilient education systems534 . One of the out-
standing factors for Taiwan is the diverse co-creation teaching model of
2019 Basic Education Curriculum, which successfully combines physical
and digital learning tools, and regards “spontaneity, interaction, and com-
mon good” as new core values, inspiring a sense of mission towards global
sustainable development535 .
For example, the “Chenyuluoyan” font536 on the cover of this book comes
from the autonomous learning project of two high school students, lever-
aging social networks and related team co-learning. Such independent
creation demonstrates the spirit of open-source collaboration starting
from one’s own interests. The knowledge and creativity in the learning
process shine in open sharing, inspiring more people to participate537 .
379
this process, we often face traditional pressures such as competition,
resource inequality, job insecurity, and civic education gaps.
380
diverse compilation mechanism, making it a multilingual interactive on-
line civic dictionary, demonstrating a global yet localized “collaborative
cataloging” paradigm. It not only supports a broad community writing
space but also serves as a platform for exchanges between different
languages and cultures.
Moedict has prompted the public sector to actively adopt the “Creative
Commons” license543 , contributing value to the development of AI mod-
els like TAIDE in Taiwan544 . Local languages and public knowledge can
be interconnected into collaborative networks. The application of such an
open-source paradigm as “Moedict” established close ties with official ed-
ucational institutions and social innovation organizations a decade ago,
demonstrating the interoperability between open-source co-editing cul-
ture and the formal education system.
Online libraries, Wikipedia, and CC-licensed image and text sharing de-
scribed in (3-3 The Lost Dao) are all valuable global assets comparable to
commons, generated based on open-source collaboration. Like in a vast
world park, works co-created by citizens from different countries and
languages can be understood and actively maintained by more people,
further promoting the democratization of knowledge and filling the gaps
in civic education. These are practical examples of learning evolving to-
wards the ⿻ path and mutually benefiting the public.
381
hundreds and thousands of years, and its development is profoundly
influencing the next generation. However, these biases seem small in the
face of major crises of survival. Only by working together and trusting
each other can we spark new ideas and find innovative solutions never
encountered before.
382
How data transforms into knowledge on the Internet depends on our con-
nections with ourselves, life, the world, and learning. When we lose these
connections, meaning disappears. But through the broad spectrum of
global community networks, we can draw energy and return to reality
to see more future possibilities. We can endlessly create new senses of
learning meaning: learning is both a continuation of past knowledge and
the birth of innovation. Imagine being able to use collaborative skills and
open content to verify information when faced with a lengthy treatise.
In today’s rapidly developing technology, human wisdom will not disap-
pear; instead, it will show greater vitality due to our deep understanding
of knowledge and experience, as well as our diverse use of tools.
In James Carse’s book “Finite and Infinite Games,” he compares life’s jour-
ney to a game, proposing the concepts of finite and infinite games. This
perspective can also be used to compare the core spirit of edutainment:
in the journey of life, do we choose to follow social power, accept the
win-lose model of finite games with established boundaries, and pursue
short-lived victories; or do we choose to be open participants, engaging
in various aspects of creation from interpersonal interactions to cultural
exchanges, experiencing the joy of continuous login?
383
In the book “Imagined Communities,” Benedict Anderson deeply ex-
plores how communication through a common language forms a sense
of national identity. He proposes how the common language in literature
and narrative promotes the formation of community consciousness.
Anderson believes that the formation of national identity is a process of
social construction, mediated through print capitalism—that is, news-
papers and novels—enabling people to imagine themselves as part of
a larger community with shared interests and identities. This process
is similar to the learning environment, where narratives, languages,
and symbols play a crucial role in shaping learners’ identities and sense
of belonging to the community, whether at the local community level,
national level, or on a global scale.
The knowledge and skills learned from group life, such as etiquette in
school, are tools for dealing with people, respecting human rights, under-
standing freedom and diversity, and coping with various situations after
graduation, in the workplace, and in life. This reminds us that learning
546
https://www.youtube.com/watch?v=OBG50aoUwlI
384
is not only a process of knowledge accumulation but also a process of “es-
tablishing identity and a sense of community belonging,” and it is an even
richer intertwined state. For example, the significant contributions of the
Amateur Radio (also known as Ham Radio) community to science, indus-
try, social services, and satellite communications are based on the joy of
learning and a strong sense of community identity.
385
longer a finite game oriented towards results, but an ⿻ infinite game full
of surprises and unleashing potential, in which every participant is an
indispensable co-creator.
386
Section 7: Forward
7-0 Policy
If ⿻ succeeds, in a decade we imagine a transformed relationship among
and across governments, private technology development and open
source/civil society. In this future, public funding (both from govern-
ments and charitable initiatives) is the primary source of financial
support for fundamental digital protocols, while the provision of such
protocols in turn becomes a central item on the agenda of governments
and charitable actors. This infrastructure is developed trans-nationally,
by civil society collaborations and standard setting organizations sup-
ported by an international network of government leaders focused on
these goals. The fabric created by these networks and the open protocols
they develop, standardize, safeguard and become the foundation for
a new “international rules-based order”, an operating system for a
transnational ⿻ society.
Making these a bit more precise opens our eyes to how different such a
future could be. Today, most research and development and the over-
whelming majority of software development occurs in for-profit private
corporations. What little (half a percent of GDP in an average OECD coun-
try) funding is spent on research and development by governments is pri-
marily non-digital and overwhelmingly funds “basic research.” This is in
contrast to open source code and protocols that can be directly be used by
most citizens, civil groups and businesses. Spending on public software
R&D pales by comparison to the several percent of GDP most countries
spend on physical infrastructure.
387
In the future we imagine that governments and charities will ensure we
devote roughly 1% of GDP to digital public research, development, proto-
cols and infrastructure, amounting to nearly a trillion US dollars a year
globally or roughly half of currently global investment in information
technology. This would increase public investment by at least two or-
ders of magnitude and, given how much volunteer investment even lim-
ited financial investment in open source software and other public in-
vestment has been able to stimulate, completely change the character
of digital industries: the “digital economy” would become a ⿻ society.
Furthermore, public sector investment has primarily taken place on a na-
tional or regional (e.g. European Union) level and is largely obscured from
broader publics. The investment we imagine would, like research collab-
orations, private investment, and open source development, be under-
taken by transnational networks aiming to create internationally inter-
operable applications and standards similar to today’s internet protocols.
It would be at least as much a focus for the public as recently hyped tech-
nologies such as AI and crypto.
Of course, a full such embrace would be a process, just as ⿻ is, and would
eventually transform the very nature of governments. Because much of
the book so far has gestured at what this would mean, in this chapter
we instead focus on a vision of what might take place in the next decade
to achieve the future we imagined above. While the policy directive we
sketch is grounded in a variety of precedents (such as ARPA, Taiwan, and
to a lesser extent India) that we have highlighted above, it does not di-
rectly follow any of the standard models employed by “great powers” to-
day, instead drawing, combining and extending elements from each to
388
form a more ambitious agenda than any of these are today pursuing. To
provide context, we therefore begin with a stylized description of these
“models” before drawing lessons from historical models. We describe
how these can be adapted to the global scope of today’s transnational net-
works, how such investments can be financially supported and sustained,
and finally the path to building the social and political support these poli-
cies will need, on which the next chapter focuses.
Digital empires
The most widely understood models of technology policy today are
captured by legal scholar Anu Bradford in her Digital Empires.547 In
the US and the large fraction of the world that consumes its technology
exports, technology development is dominated by a simplistic, private
sector-driven, neoliberal free market model. In People’s Republic of
China (PRC) and consumers of its exports, technology development is
steered heavily by the state towards national goals revolving around
sovereignty, development and national security. In Europe, the primary
focus has been on regulation of technology imports from abroad to
ensure they protect European standards of fundamental human rights,
forcing others to comply with this “Brussels effect”. While this trichotomy
is a bit stereotyped and each jurisdiction incorporates elements of each
of these strategies, the outlines are a useful foil for considering the
alternative model we want to describe.
The US model has been driven by a broad trend widely documented since
the 1970s for government and the civil sector to disengage from the econ-
omy and technology development, focusing instead on “welfare” and na-
tional defense functions.548 Despite pioneering the ARPANET, the US pri-
vatized almost all further development of personal computing, operating
systems, physical and social networking and cloud infrastructure.549 As
the private monopolies predicted by J.C.R. Licklider (Lick) came to fill
these spaces, US regulators primarily responded with antitrust actions
547
Anu Bradford, Digital Empires: The Global Battle to Regulate Technology (Oxford, UK:
Oxford University Press, 2023).
548
Daniel Yergin and Joseph Stanislaw, The Commanding Heights: The Battle for the World
Economy (New York: Touchstone, 2002).
549
Tarnoff, op. cit.
389
that, while influencing market dynamics in a few cases (such as the Mi-
crosoft actions) were generally understood as too little too late.550 In par-
ticular, they are understood as having allowed monopolistic dominance
or tight oligopoly to emerge in the search, smartphone application, cloud
services and several operating systems markets. More recently, American
antitrust regulators under the leadership of the “New Brandeis” move-
ment have doubled down on the primary use of antitrust instruments
with limited success in court and have seen the challenges of emerging
monopolies only expand in the market for chips and generative founda-
tion models.551
The primary rival model to the US has been the PRC, where the Central
Committee of the Chinese Communist Party (CCP) has drafted a series
of Five-Year plans that have increasingly in recent years directed a
variety of levers of state power to invest in and shape the direction
of technology development.552 These coordinated regulatory actions,
party-driven directives to domestic technology companies and primarily
government-driven investments in research and development have
dramatically steered the direction of Chinese technology development in
recent years away from commercial and consumer applications towards
hard and physical technology, national security, chip development and
surveillance technologies. Investment that has paralleled the US, such
as into large foundation models, has been tightly and directly steered
by government, ensuring consistency with priorities on censorship and
monitoring of dissent. A consistent crackdown on business activity not
forming part of this vision has led to a dramatic fall in activity in much of
the Chinese technology sector in recent years, especially around financial
technology including web3.
In contrast to the US and the PRC, the European Union (EU) and United
Kingdom (UK) have (despite a few notable exceptions) primarily acted
550
Licklider, “Comptuers and Government”, op. cit. Thomas Philippon, The Great Reversal
(Cambridge, MA: Harvard University Press, 2019).
551
Lina Khan, “The New Brandeis Movement: America’s Antimonopoly Debate”, Jour-
nal of European Competition Law and Practice 9, no. 3 (2018): 131-132. Akush
Khandori, “Lina Khan’s Rough Year,” New York Magazine Intelligencer December
12, 2023 at https://nymag.com/intelligencer/2023/12/lina-khans-rough-year-running-the-
federal-trade-commission.html.
552
Central Committee of the Chinese Communist Party, 14th Five-Year Plan, March 2021;
translation available at https://cset.georgetown.edu/publication/china-14th-five-year-plan/.
390
as importers of technical frameworks produced by these two geopolitical
powers. The EU has tried to harness its bargaining power in that role,
however, to act as a “regulatory powerhouse”, intervening to protect the
interests of human rights that it fears the other two powers often ignore
in their race for technological supremacy. This has included setting the
global standard for privacy regulation with their General Data Protection
Regulation, taking the lead on regulation of generative foundation models
(GFMs) with their AI Act, and helping shape the standards for competitive
marketplaces with a series of recent ex-ante competition regulations in-
cluding the Digital Services Act, the Digital Markets Act and the Data Act.
While these have not defined an alternative positive technological model,
they have constrained and shaped the behavior of both US and Chinese
firms who seek to sell into the European market. The EU also aspires to
tight interoperability across the markets they serve, often leading to copy-
cat legislation in other jurisdictions.
391
**
**
Together these add up to a model where the public sector’s primary role
is active investment and support to empower and protect privately comple-
mented but civil society-led, technology development whose goal is proac-
tively building a digital stack that embodies in protocols principles of hu-
man rights and democracy.
392
for public participation in selecting the top 20 teams. This elevates
the event beyond a mere competition, transforming it into a powerful
coalition-building platform for civil society leadership. For instance,
environmental groups focused on monitoring water and air pollution
saw their contributions gain national prominence through the Civil IoT
project — backed by a significant investment of USD $160 million —
showcasing how the Taiwan model effectively amplifies the impact and
reach of grassroots initiatives.
393
Yet while these technology hubs have become the envy and aspiration
of (typically unsuccessful) regional development and industrial policy
around the world, it is critical to remember how fundamentally differ-
ent the aspirations underpinning Lick’s vision were from those of his
imitators.
394
While Lick’s approach mostly played out at universities, given they were
the central locus of the development of advanced computing at the time, it
contrasted sharply with the traditional support of fundamental, curiosity-
driven research of funders like the US National Science Foundation. He
did not offer support for general academic investigation and research,
but rather to advance a clear mission and vision: building a network of
easily accessible computing machines that enabled communication and
association over physical and social distance, interconnecting and shar-
ing resources with other networks to enable scalable cooperation.
Yet while dictating this mission, Lick did not prejudge the right com-
ponents to achieve it, instead establishing a network of “coopetitive”
research labs, each experimenting and racing to develop prototypes of
different components of these systems that could then be standardized
in interaction with each other and spread across the network. Private
sector collaborators played important roles in contributing to this de-
velopment, including Bolt Beranek and Newman (where Lick served
as Vice President just before his role at IPTO and which went on to
build a number of prototype systems for the internet) and Xerox PARC
(where many of the researchers Lick supported later assembled and
continued their work, especially after federal funding diminished). Yet,
as is standard in the development and procurement of infrastructure
and public works in a city, these roles were components of an overall
vision and plan developed by the networked, multi-sectoral alliance that
constituted ARPANET. Contrast this with a model primarily developed
and driven in the interest of private corporations, the basis for most
personal computing and mobile operating systems, social networks and
cloud infrastructures.
As we have noted repeatedly above, we need not only look back to the
“good old days” for ARPANET or Taiwan for inspiration. India’s develop-
ment of the “India Stack” has many similar characteristics.554 More re-
cently, the EU has been developing initiatives including European Digital
Identityand Gaia-X. Jurisdictions as diverse as Brazil and Singapore have
experimented successfully with similar approaches. While each of these
initiatives has strengths and weaknesses, the idea that a public mission
554
Vivek Raghavan, Sanjay Jain and Pramod Varma, “India Stack—Digital Infrastructure as
Public Good”, Communications of the ACM 62, no. 11: 76-81.
395
aimed at creating infrastructure that empowers decentralized innovation
in collaboration with civil society and participation but not dominance
from the private sector is increasingly a pattern, often labeled “digital
public infrastructure” (DPI). To a large extent, we are primarily advocat-
ing for this approach to be scaled up and become the central approach
to the development of global ⿻ society. Yet for this to occur, the ARPA
and Taiwan models need to be updated and adjusted for this potentially
dramatically increased scale and ambition.
A new ⿻ order
The key reason for an updated model is that there are basic elements of
the ARPA model that are a poor fit for the shape of contemporary digital
life, as Lick began realizing as early as 1980. While it was a multisectoral
effort, ARPA was centered around the American military-industrial com-
plex and its collaborators in the American academy. This made sense in
the context of the 1960s, where the US was one of two major world pow-
ers, scientific funding and mission was deeply tied to its stand-off with
the Soviet Union and most digital technology was being developed in the
academy. As Lick observed, however, even by the late 1970s this was al-
ready becoming a poor fit. Today’s world is (as discussed above) much
more multi-polar even in its development of leading DPI. The primary
civil technology developers are in the open source community, private
companies dominate much of the digital world and military applications
are only one aspect of the public’s vision for digital technology, which in-
creasingly shapes every aspect of contemporary life. To adapt, a vision of
⿻ infrastructure for today must engage the public in setting the mission of
technology through institutions like digital ministries, network transna-
tionally and harness open source technology, as well as redirecting the
private sector, more effectively.
396
decision-making processes that will shape their future.” Military technoc-
racy cannot be the primary locus for setting the agenda if ⿻ is to achieve
the legitimacy and public support necessary to make the requisite invest-
ments to center ⿻ infrastructure. Instead we will need to harness the full
suite of ⿻ technologies we have discussed above to engage transnational
publics in reaching an overlapping consensus on a mission that can mo-
tivate a similarly concerted effort to IPTO’s. These tools include ⿻ com-
petence education to make every citizen feel empowered to shape the ⿻
future, cultural institutions like Japan’s Miraikan that actively invite cit-
izens into long-term technology planning, ideathons where citizens col-
laborate on future envisioning and are supported by governments and
charities to build these visions into media that can be more broadly con-
sumed, alignment assemblies and other augmented deliberations on the
direction of technology and more.
397
istries offer a more fitting platform for initiating international missions
that involve the public and civil society. As digital challenges become cen-
tral to global security, more nations are likely to appoint digital ministers,
fostering an open, connected digital community.
Yet national homes for ⿻ infrastructure constitute only a few of the poles
holding up its tent. There is no country today that can or should alone be
the primary locus for such efforts. They must be built as at least interna-
tional and probably transnational networks, just as the internet is. Digital
ministers, as their positions are created, must themselves form a network
that can provide international support to this work and connect nation-
based nodes just as ARPANET did for university-based nodes. Many of the
open source projects participating will not themselves have a single pri-
mary national presence, spanning many jurisdictions and participating
as a transnational community, to be respected on terms that will in some
cases be roughly equal to those of national digital ministries. Consider,
for example, the relationship of rough equality between the Ethereum
community and the Taiwanese Ministry of Digital Affairs.
398
While there is no necessary path from such interactions to broader de-
mocratization, it would also be an important mistake to miss the oppor-
tunity to expand the scope of interoperation in areas where it is possible
while waiting for full government-to-government alignment. In her book
A New World Order, leading international relations scholar Anne-Marie
Slaughter sketched how such transnational policy and civil networks will
increasingly complement and collaborate with governments around the
world and form a fabric of transnational collaboration.558 This fabric
or network could be effective than current international bodies like the
United Nations. As such we should expect (implicit) support for these kind
of initiatives to be as important to the role of digital ministries as are their
direct relationships with one another.
Some of the transnational networks that will form the key complements to
digital ministries may be academic collaborations. Yet the element of the
digital ecosystem most neglected by governments today is not academia,
which still receives billions of dollars of research support. Instead it is
the largely ignored world of open source and other non-profit, mission-
driven technology developers. As we have extensively discussed, these
already provide the backbone of much of the global technology stack. Yet
they receive virtually no measurable financial support from governments
and very little from charities, despite their work belonging (mostly) fully
to the public domain and their being developed mostly in the public in-
terest.
399
and persuasiveness that differs in kind from the ideal user experience.
While public support for academic research is crucial and in some ar-
eas academic projects can contribute to ⿻ infrastructure, governments
and charities should not primarily look to the academic research sector.
And while academic research receives hundreds of billions of dollars in
funding globally annually, open source communities have likely received
less than two billion dollars in their entire history, accounting for known
sources as we illustrate in Figure B. Many of these concerns have been
studied and highlighted by the “decentralized science” movement.559
**
Furthermore, open source communities are just the tip of the iceberg in
terms of what may be possible for public-interested, civil society-driven
technology development. Organizations like the Mozilla and Wikimedia
Foundations, while primarily interacting with and driving open source
559
Sarah Hamburg, “Call to Join the Decentralized Science Movement”, Nature 600, no. 221
(2021): Correspondence at https://www.nature.com/articles/d41586-021-03642-9.
560
Jessica Lord, “What’s New with GitHub Sponsors”, GitHub Blog, April 4, 2023
at https://github.blog/2023-04-04-whats-new-with-github-sponsors/. GitCoin im-
pact report at https://impact.gitcoin.co/. Kevin Owocki, “Ethereum 2023 Fund-
ing Flows: Visualizing Public Goods Funding from Source to Destination” at
https://practicalpluralism.github.io/. Open Collective, “Fiscal Sponsors. We need you!”
Open Collective Blog March 1, 2024 at https://blog.opencollective.com/fiscal-sponsors-we-
need-you/. Optimism Collective, “RetroPGF Round 3”, Optimism Docs January 2024 at
https://community.optimism.io/docs/governance/retropgf-3/#. ProPublica, “The Linux
Foundation” at https://projects.propublica.org/nonprofits/organizations/460503801.
400
projects, have significant development activities beyond pure open
source code development that have made their offerings much more
accessible to the world. Furthermore, there is no necessary reason why
public interest technology need inherit all the features of open source
code.
401
reform with which Dewey was closely associated did not simple out-
compete privately created power generation, but instead sought to bring
them under a network of partially local democratic control through
utility boards. Many leaders in the tech world refer to their platforms as
“utilities”, “infrastructure” or “public squares”; it stands to reason that
part of a program of ⿻ digital infrastructure will be reforming them so
they truly act as such.
⿻ regulation
To allow the flourishing of such an ecosystem will depend on reorienting
legal, regulatory and financial systems to empower these types of orga-
nizations. Tax revenue will need to be raised, ideally in ways that are
not only consistent with but actually promote ⿻ directly, to make them
socially and financially sustainable.
Yet laws are also at the center of defining what types of structures can
exist, what privileges they have and how rights are divided between
different entities. Open source organizations now struggle as they aim
to maintain simultaneously their non-profit orientation and an inter-
national presence. Organizations like the Open Collective Foundation
were created almost exclusively for the purpose of allowing them to
do so and helped support this project, but despite taking a substantial
cut of project revenues was unable to sustain itself and thus is in the
402
process of dissolving as of this writing. The competitive disadvantage
of Third-Sector technology providers could hardly be starker.562 Many
other forms of innovative, democratic, transnational organization, like
Distributed Autonomous Organizations (DAOs) constantly run into legal
barriers that only a few jurisdictions like the State of Wyoming have just
begun to address. While some of the reasons for these are legitimate
(to avoid financial scams, etc.), much more work is needed to establish
legal frameworks that support and defend transnational democratic
non-profit organizational forms.
Other organizational forms likely need even further support. Data coali-
tions that aim to collectively protect the data rights of creators or those
with relevantly collective data interests, as we discussed in our Property
and Contract chapter, will need protection similar to unions and other col-
lective bargaining organizations that they not only do not have at present
but which many jurisdictions (like the EU) may effectively prevent them
from having, given their extreme emphasis on individual rights in data.
Just as labor law evolved to empower collective bargaining for workers,
law will have to evolve to allow data workers to collectively exercise their
rights in order to avoid either their being disadvantaged relative to con-
centrated model builders or so disparate as to offer insuperable barriers
to ambitious data collaboration.
403
them.563 New rules like these will build on the reforms to property rights
that empowered the re-purposing of radio spectrum and should be devel-
oped for a variety of other digital assets as we discussed in our Property
and Contract chapter.
404
support worker, supplier, environmental counterparty and customer
voice and steer concentrated asset holders who might otherwise have
systemic monopolistic effects towards employing similar tools.
⿻ taxes
However, rules, laws and regulations can only offer support to positive
frameworks that arise from investment, innovation and development.
Without those to complement, they will always be on the defense, play-
ing catch up to a world defined by private innovation. Thus public and
multisectoral investment is the core they must complement and making
such investments obviously requires revenue, thus naturally raising the
question of how it can be raised to make ⿻ infrastructure self-sustaining.
While directly charging for services largely reverts to the traps of the pri-
vate sector, relying primarily on “general revenue” is unlikely to be sus-
tainable or legitimate. Furthermore, there are many cases where taxes
can themselves help encourage ⿻. It is to taxes of this sort that we now
turn our attention.
The digital sector has proven one of the most challenging to tax, because
many of the relevant sources of value are created in a geographically
ambiguous way or are otherwise intangible. For example, data and net-
works of collaboration and knowhow among employees at companies, of-
ten spanning national borders, can often be booked in countries with low
corporate tax rates even if they mostly occur in jurisdictions with higher
rates. Many free services come with an implicit bargain of surveillance,
leading neither the service nor the implicit labor to be taxed as it would
be if this price were explicit. While recent reforms to create a minimum
corporate tax rate agreed by the G20 and Organization for Economic Co-
operation and Development are likely to help, they are not tightly adap-
tive to the digital environment and thus will likely only partly address the
challenge.
Yet while from one side these present a challenge, on the other hand they
offer an opportunity for taxes to be raised in an explicitly transnational
way that can accrue to supporting ⿻ infrastructure rather than, in a fairly
arbitrary way, to wherever the corporation may chose to domicile. Ideally
University of Chicago Law Review 81, no. 1 (2014): 241-272.
405
such taxes should aim to satisfy as fully as possible several criteria:
1. Directly ⿻ (D ⿻): Digital taxes should ideally not merely raise rev-
enue, but directly encourage or enact ⿻ aims themselves.566 This
ensures that the taxes are not a drag on the system, but actually part
of the solution.
2. Jurisdictional alignment (JA): The jurisdictional network in which
taxes are and can naturally be raised should correspond to the juris-
diction that disposes of these taxes. This ensures that the coalition
required to enact the taxes is similar to that required to establish the
cooperation that disposes of the revenue.
3. Revenue alignment (RA): The sources of revenue should correspond
to the value generated by the shared value created by the use of the
revenue, ensuring that those disposing of the revenue have a natural
interest in the success of their mission. It also ensures that those
who pay for the tax generally benefit from the goods created with it,
lessening political opposition to the tax.
4. Financial adequacy (FA): The tax should be sufficient to fund the re-
quired investment.
406
1. Concentrated computational asset tax: Application of a progressive
(either in rate or by giving a generous exemption) common own-
ership tax to digital assets such as computation, storage and some
kinds of data.567
2. Digital land tax: Taxing the commercialization or holding of scarce
of digital space, including taxes on online advertising, holding of
spectrum licenses and web address space in a more competitive way
and, eventually, taxing exclusive spaces in virtual worlds.568
3. Implicit data/attention exchange tax: Taxes on implicit data or at-
tention exchanges involved in “free” services online, which would
otherwise typically accrue labor and value added taxes.
4. Digital asset taxes: Common ownership taxes on pure-digital assets,
such as digital currencies, utility tokens and non-fungible token.
5. Commons-derived data tax: Profits earned from models trained on
unlicensed, commons-derived data could be taxed.
6. Flexible/gig work taxes: Profits of companies that primarily employ
“gig workers” and thus avoid many of the burdens of traditional la-
bor law could be taxed.569
407
to maximize that value, achieving RA.
Of course, these are just first suggestions and much more analysis and
imagination will help expand the space of possibilities. However, given
that these examples line up fairly closely with the primary business mod-
els in today’s digital world (viz. cloud, advertising, digital asset sales, etc.)
it seems plausible that, with a bit of elaboration, they could be used to
raise a significant fraction of value flowing through that world and thus
achieve the FA necessary to support a scale of investment that would fun-
damentally transform the digital economy.
408
Sustaining our future
To embody ⿻, the network of organizations that are supported by such
resources cannot be a de novo monolithic global government. Instead it
must be ⿻ itself both in its structure and in its connection to existing fora
to realize the commitments of ⿻ to uplift diversity and collective coop-
eration. While we aspire to basically transform the character of digital
society, we cannot achieve ⿻ if we seek to tear down or undermine exist-
ing institutions. Our aim should be, quite the reverse, to see the building
of fundamental ⿻ infrastructure as a platform that can allow the digital
pie to dramatically expand and diversify, lifting as many boats as possible
while also expanding the space for experimentation and growth.
409
the ARPANET founders, ⿻ in its structure and governance. More than
anything, what needs to be done is build the public understanding of and
engagement with this work necessary to uplift, defend and support it.
Organizing change
Of course, achieving that is an enormous undertaking. The ideas dis-
cussed in this chapter, and throughout this book, are deeply technical and
even the fairly dry discussion here barely skims the surface. Very few will
deeply engage even with the ideas in this book, much less the much far-
ther ranging work that will need to be done both in the policy arena and
far beyond it in the wide range of research, development and deployment
work that policy world will empower.
It is precisely for this reason that “policy” is just one small slice of the
work required to build ⿻. For every policy leader, there will have to be
dozens, probably hundreds of people building the visions they help ar-
ticulate. And for each one of those, there will need to be hundreds who,
while not focused on the technical concerns, share a general aversion to
the default Libertarian and Technocratic directions technology might oth-
erwise go and are broadly supportive of the vision of ⿻. They will have
to understand it at more of an emotive, visceral and/or ideological level,
rather than a technical or intellectual one, and build networks of moral
support, lived perspectives and adoption for those at the core of the policy
and technical landscape.
For them to do so, ⿻ will have to go far beyond a set of creative technolo-
gies and intellectual analyses. It will have to become a broadly under-
stood cultural current and social movement, like environmentalism, AI
and crypto, grounded in a deep, both intellectual and social, body of fun-
damental research, developed and practiced in a diverse and organized
set of enterprises and supported by organized political interests. The path
there includes, but moves far beyond, policymakers to the world of ac-
tivism, culture, business and research. Thus we conclude by calling on
each of you who touches any of these worlds to join us in the project of
making this a reality.
410
7-1 Conclusion
This book describes a vision for the future of technology and society that
we hope is ambitious and serious enough to be real competitor to, but will
be more attractive to most readers than, that developed by Libertarians
and Technocrats. If we are right and you share that vision, join us in the
movement for ⿻.
411
Yet, technology has also clearly driven us apart and suppressed our dif-
ferences. Business models based on a fight for attention have prioritized
outrage over curiosity, echo chambers over shared understanding, and
proliferated mis- and disinformation. The rapid spread of information
online, out of context and against our privacy expectations, has too often
eroded our communities, driven out our cultural heritage and created a
global monoculture. As a new generation of technologies including GFMs,
Web3 and augmented reality spreads through our lives, it promises to rad-
ically increase technology’s effects, good and bad.
Some would seek to avoid this choice by slamming on the breaks, decel-
erating technological progress. Yet, while of course some directions are
unwise and there are limits to how rapidly we should proceed into the un-
known, the dynamics of competition and geopolitics makes simply slow-
ing progress unlikely to be sustainable. Instead, we face a choice of direc-
tions more than velocity.
Should we, as Libertarians like Peter Thiel, Marc Andreesen and Balaji
Srinavasan would have us do, liberate individuals to be atomistic agents,
free of constraints or responsibilities? Should we, as Technocrats like Sam
Altman and Reid Hoffman would have us do, allow technologists to solve
our problems, plan our future and distribute to us the material comfort
it creates?
We say, loudly and clearly, neither! Both chaos and top-down order are
the antitheses not just of democracy and freedom, but of all life, complex-
ity and beauty in human society and nature. Life and ⿻ thrive in the nar-
row corridor on the “edge of chaos”. For life on this planet to survive and
thrive, it must be the central mission of technology and politics to widen
this corridor, to steer us constantly back towards that edge of chaos where
growth and ⿻ are possible. That is the aspiration and the imperative of
⿻.
412
the life is the third way beyond rigid order and chaos. It is a movement we
have perhaps three to five years to set in motion. Within that time frame,
a critical mass of the technology that people and companies use every
day will have become deeply dependent on “AI” and “the metaverse”. At
that point, we won’t be able to reverse the fait accompli that Technocracy
and Libertarianism have generated for us. But between now and then,
we can mobilize to re-chart the course: toward a relationship-centered,
empowering digital democracy in which diverse groups of people, pre-
cisely because they do not agree, are able to cooperate and collaborate to
constantly push our imaginations and aspirations forward.
Promise of ⿻
Over the last half century, most Western liberal democracies have learned
to be helpless in the face of technology. They are intrigued by it and alter-
nately delighted and frustrated by it, but tend to assume that it emerges
inexorably, like modernity itself, instead of as the sum of the choices of
small groups of engineers. Most citizens in these polities do not believe
“we the people” have any ability, much less any right, to influence the
direction of the platforms that are the operating system of our lives.
But we do have the right, and even the duty, to demand better. Some tech-
nology pulls us apart and flattens our differences; other technology brings
us together and celebrates them. Some fuels our resentment and obedi-
ence, some helps us find interdependence. If we mobilize to demand the
latter, ⿻ technologies that are designed to help us collaborate across dif-
ference, we can re-engineer that operating system.
We see our opportunity to act across three horizons: the immediate, the
413
intermediate, and the transformative.
Immediate horizon
Some of this change is ripe for action today. Anyone reading this book
can explain, recommend and tell its stories to friends and help spread
various surrounding media content. Anyone can adopt a range of tools
already widely available from meetings in immersive shared reality to
open source tools for making collective decisions with their communities.
Cultural leaders, artists, journalists and other communicators can tell the
stories of the ⿻ movement, like Oscar-winner Director Cynthia Wade and
Emmy-winning Producer Teri Whitcraft are doing in a forthcoming docu-
mentary. They can incorporate ⿻ in their creative practice, as this book
did and as we saw Mat Dryhurst and Holly Herndon doing. They can
immerse citizens in constructive imagining of a more ⿻ future, like Mi-
raikan in Tokyo does.
414
Intermediate horizon
Policy leaders can form political platforms and perhaps even political par-
ties around comprehensive ⿻ agendas. Regulators and civil servants can
deeply embed ⿻ into their practices, improving public engagement and
speeding the loop of input. Employees of international and transnational
organizations can begin to reform their structure and practices to har-
ness ⿻ and to substantively embody ⿻, moving away from “international
trade” to substantive, supermodular international cooperation and stan-
dards setting.
Academics and researchers can form new fields of inquiry around ⿻ and
harnessing ⿻ to empower these new collaborations bridging fields like
sociology, economics and computer science. They can invent disciplines
that regularly train experts in ⿻, teach a new generation of students to
employ ⿻ in their work and forge closer relationships with a variety of
415
communities of practice to shorten the loop from research ideation to
practical experimentation.
Transformative horizon
For those of you with even more expansive vision, we have spent a good
deal of this book articulating the kinds of truly transformative ⿻ that
could ultimately rewire the way humans communicate and collaborate.
This ambition goes to the root of the ⿻ movement’s insight—that person-
hood, the core unit of democracy, is not merely atomistic or “monistic,”
but is also defined by social relationships – and it therefore gives rise to a
broader conception of rights, going beyond individual rights to recognize
⿻ concepts of affiliation, commerce, property, and other building blocks
of our society. All these will require fundamental rewriting of a range of
technical infrastructures, social relationships and organizing institutions.
Such change cannot come directly, but instead must follow a gradual pro-
cess of transformation, occurring in a range of social sectors that build on
one another. To be truly ⿻, these will need to engage and empower peo-
ple across many lines of difference, which will in turn require that they
understand and can articulate what they want from their future. Cultural
creation, like those we have discussed above, will have to increasingly
manifest ⿻ in its form and substance to make this possible. This can cre-
ate broad public understanding and expectation of public steering of the
direction of technology and diverse social participation its design.
416
relationship to each other and private entities and in their policy agenda
the creation of ⿻.
Such policies and practices can in turn allow the development of novel
technologies basically different, dramatically expanding the scope of
the Third Sector and allowing the constant emergence of new social
and democratic enterprise transnationally. These emergent enterprises
can then take on an increasing range of responsibilities legitimately,
given their democratic accountability, and blur the lines of responsibility
usually assumed for nation states, building a new ⿻ order.
Such enterprise can thus rely on new institutions of research and teach-
ing that will cross disciplinary boundaries and the boundaries between
knowledge creation and deployment, engaging deeply with such emerg-
ing social enterprises. That educational sector will continually produce
new technologies that push the boundaries of ⿻, helping build the basis
of new social enterprises and forming a base of ideas which will in turn
support the progress of cultural imagination on which this all rests.
Thus together culture, politics and activism, business and technology and
research can form a mutually reinforcing virtuous circle: imagination
drives action, which confirms the worth of imagination strengthening
it further. This is why, whatever field you find yourself in, you have a
chance to contribute to this truly transformative horizon, by being part
of building that virtuous cycle, pushing momentum upwards by reinforc-
ing others doing the same in other social sectors. There is no best or most
important path to ⿻, because ⿻ is ⿻ and only succeeds by building on
and proliferating the tremendous diversity of ways we all form part of
networks of support and interdependence.
Mobilization
This is why, of course, there can be no top-down, one-size-fits-all path to
⿻. What there can be, however – and soon, if this book has its intended
effect – are intersecting circles of people, linked together in groups and
individuals loosely federated across the globe, who are committed to ⿻
over its foils: Libertarianism and Technocracy. In charting a third course,
pluralists are committed to technology strengthening and diversifying re-
lationships, rather than tearing them down, and regenerating diversity,
417
not fostering conformity. Relationships and the love, loss, adversity and
achievement are what makes life, not the violence of the jungle mani-
fested in books like The Lord of the Flies or the optimization of undiffer-
entiated data points.571
This book is just one part of a great tapestry. One author of this book, for
example, is also Executive Producer of a forthcoming documentary (men-
tioned above) about the life of another, which we suppose will reach a
far broader audience than this book can; together we have founded an-
other institution to network academics working on ⿻, obviously a much
narrower audience. While these are just a couple of examples, they illus-
trate a crucial broader point: for 1000 people to be deeply involved (say
in writing the book), they will need each 100 that will read it and they in
turn will need each 100 who know about it and are supportive of the gen-
eral idea. Thus to succeed we need people at wide levels of engagement
in mutually supportive relationships.
If 1000 people are deeply enough involved with this book to speak about
it publicly, 10,000 are part of the community and actively contribute,
100,000 deeply digest the material, 1 million buy or download it, 10
million consume an hour of media content around it, 100 million see
a film or other entertaining treatment of a related theme and 1 billion
know about and are sympathetic to the aims, we will reach our 2030
goals.
Pluralists are in every country in the world, every sector of the economy.
Connect, affiliate, rally, mobilize … and join us, in the deliberate and com-
571
William Golding, The Lord of the Flies (London: Faber and Faber, 1954).
418
mitted movement to build a more dynamic and harmonious world and
let us free the future, together.
419