6. GENETIC TAKEOVER | A More Cooperative World
Previous chapter: IMPROVE COOPERATION | Information, Money, Rights, Contracts, and Privacy
Co-Evolve, Cooperate, and Compete
How might we transition into a more cooperative world from our paper world, in which printed contracts dominate, alongside checks as the second most preferred way to pay bills?
How cities are built, how people self-organize, and what kind of society they organize into is largely based on how the economics of defense and attack evolve with technological progress. Law, for instance, evolved to deal with problems as they arose using the level of technology that was available to people at the time. Today’s legal systems evolve by competing on at least three axes. First, on how well they insulate us from underlying rules of biology, such as violence. Second, on how well they create rules for their own survival, such as capitalism vs. communism. Third, on how well they insulate us from their own dynamics, such as separation of powers to allow for watchers being watched.
The invention of cryptography technology, coupled with worldwide networks, changes the economics of defense and attack of today’s legal systems. This change is greater than going from the bow and arrow to the gun. Once again, society will have to self-organize around this change to reach a new equilibrium.1 Where will we settle? Cryptocommerce with its perfect realization of a neutral framework of rules can provide secure arrangements. But we still rely on the legal system to insulate us from the rules of biology. Both systems will co-adapt, each constraining the other without either one emerging as dominant.
Let’s look at two popular positions in cyber debates: Let’s call one perspective legal absolutism. It states that human law, enforced by governments via their monopoly on violence, will remain the dominant point of reference. In its most exaggerated form, this perspective holds that anything legislatable has the upper hand. It amounts to denying reality in the face of technological advance, comparable to trying to legislate that pi equals 3.
Let’s call the other perspective code absolutism. It states that code is law, which will take over the legal system and displace all of human law. This ideal is unrealistic, because the people who write code and the computer hardware that runs it are in government-controlled physical space. As long as governments deploy legal systems with strong public support, many computer systems will enforce existing law.
Rather than seeing the crypto or legal absolutism caricatures as attainable goals, they are better regarded as side constraints on the evolution of real systems.
We can borrow the term genetic takeover from biology to describe such an alternative transition. A phenotype, highlighted in green, evolves through a new genotypic representation, G2, gradually emerging within an older one, G1. The dominant system’s features provide context and constraints influencing what is viable in the new system that grows within it. The evolving phenotype now has entirely novel qualities, i.e. here it is spiky, rather than smooth.2
Let’s imagine a world in which fences were not invented, but property rights were. People keep records of where boundaries lie; some can hire guards to protect their land and use the court system to prosecute boundary crossers. Eventually, someone invents a fence. A debate ensues between the legal absolutists, arguing fences are not legitimate versus the fence absolutists, arguing that property law has become irrelevant. There are obviously many lower-cost solutions to the boundary crossings problem than legal records. A fence may substitute for the law in some of these cases. But not in all cases, because people can climb over and go under fences.
Likewise, the world in which traditional legal systems emerged had no better choice; it did not have the enablers of strong cryptography and the net. Like a fence, a smart contract will substitute for some, but not all, cases in which we currently use legal systems. But since code can be buggy or we sometimes just want a human in the loop, paper law will remain a useful tool, for instance in Split Contracts. A contract acts by provoking behavior in an enforcement mechanism; in a legal contract this is the legal system, while a smart contract is simply the choice of a different system. Our current legal systems have never been static and will change along with technology, requiring continuous updating of our notions of “rule-based systems”.
Change the Rules Without Relying on the Rules
Apart from honoring the voluntary Schelling Points as constraints, we don’t necessarily have to rely on existing rules to change them. Often, legal policy framings haven’t been concretely articulated into laws. This leaves an intermediate space, which different policymakers have different ways of regulating. Premature filling of such regulatory gray areas could be disastrous for innovation. The U.S. Supreme Court had to overturn early railroad regulations drafted before we had sufficient experience with the railroad system.
The internet could not have emerged without many people operating in the emerging blank spaces of their time. Its rules are built on both political and technological interaction. Many political decisions were embodied in protocols such as those promoted by the IETF, which created a transnational rules system in which most countries let their citizens participate. This was not an extensible rules system in the way smart contracts are, but it was a base system of rules founded on voluntary gray area interactions that, at that time, no one decided to try to suppress. No rules clearly allowed the internet’s phenomena, but no one interpreted the ambiguity into an enforceable rule violation. It was unclear if doing commercial transactions online was legal. Many assumed it was not. But people just started doing it, regulators refrained from interfering, and it gradually grew into an accepted legal activity. Enough people were interested in seeing certain uses continue so that whatever was needed to continue those uses became technological reality. The internet changes the nature of the emergent rules, such that they increasingly operate by its logic.
Bitcoin nudges the rules further to settle ambiguities in favor of continuing to allow new activities. Cryptocurrencies are built from voluntary interaction that is costly to suppress. At most, a nation can take its citizens out of the game and weaken its own position. We have settled on the intermediate state of regulated on- and off-ramps into cryptocurrency via services like Coinbase. These convert dollars into crypto and vice versa. Yet, once on the other side of the boundary, private currencies let you transact without record-keeping, at least until you off-ramp into fiat currency again.
Many of the more complex arrangements are not illegal, but are genuinely novel economic phenomena. Blockchain-based prediction markets may fall under gambling laws by one reading of U.S. law. But they are not treated as such by the mainstream economy. You can earn cyber coins betting on the future, withdraw those coins and trade them for fiat money. Know Your Customer (KYC) and Anti Money Laundering (AML) efforts mean this directly borders current legal systems. But the lack of a central control point means that to shut the process down, one would have to go after people individually via the KYC. This is extremely costly given how easy converting one cryptocurrency for another is.
We are used to negotiation at the boundary between different rule-based systems; international law is an evolving consensus from negotiation at jurisdictional boundaries. We can compare the interaction of the legal system with cryptocommerce to interactions among jurisdictions. When jurisdictions have contradictory rules, engaging in multi-jurisdictional transactions requires complex negotiations. Despite the messiness of those negotiations, they often succeed. Transacting across the legal system backed by the government's monopoly on violence and cryptocommerce backed by cryptography and strong anonymity will be equally messy.
New territory will be unlocked. As agreements are made without relying on courts, we may create a new functional legal subset, a Lex Cryptographia, the crypto-equivalent of the Lex Mercatoria that merchants developed to expand European commerce.3 Just as this traditional commercial law emerged autonomously via custom and best practice, and was enforced by merchant courts, Lex Cryptographia will emerge from cryptocommerce participants, enforced by a mix of code and decentralized dispute resolutions. As legal and crypto systems encroach on each other’s realms, both systems will try to fight back. As this fight becomes increasingly costly, they may converge on a new legal-technological reality.
There Be Dragons: Risks of Centralization
What can we say about future dynamics of an emergent cryptocommerce? Much of its activity is based on innovators wanting to introduce new cooperative arrangements into the world. But once introduced, the arrangements become much more valuable if not subject to their inventors’ whims. As long as a centralized entity provides the arrangement, it does not have the benefits of multipolar checks and balances.
In the early days, computers had tremendous architectural diversity. Each computer had a little operating system and localized interactions through the timesharing system. The ARPAnet connected some of those computers by enabling them to email each other without suppressing their architectural diversity. Each was an independent experiment, but suddenly, via network effects, there was a larger community to cooperate with.
Fast forward to today, our interactions are already centralized in the Internet Protocol (IP) on the web. There aren’t many completely different hypertext experiments that don’t play with it. But the web itself is largely decentralized; protocols allow many different parties to communicate with each other. They function more like language than governments. One could say that the decentralized nature of the protocol achieves a system that is 99% decentralized and 1% centralized.4 Realizing the dangers of a centralized power, the temptation is to regulate. But to make progress toward voluntarism going up levels of abstraction, we need to seek novel solutions. There are already single web governing bodies and efforts against them.5 The domain name system functions as a centralized decision-making point to allocate the namespace’s root names. The Petnames project seeks to enable interconnectivity without a global namespace. The Dweb movement builds a distributed web infrastructure that compensates against concentrated control. If an architecture causes us to make overly-centralized decisions, we should consider it a bug and find a better one.6
If innovators deliver more value by taking themselves out of the control position, they can find arrangements to make more profit by doing so. If they don’t find a way to deploy their arrangement without their controls, their competitors will. To speed this up, let’s point out a few centralization dangers that are innovation opportunities for better systems. One near-term centralization risk to cryptocommerce has been well articulated for the computer security foundation that it’s built on. TOR is the onion router that protects against knowing a message sender’s physical location by routing between hops with multiple inputs and outputs. But we don’t know if TOR nodes are conspiring. If 90% of the TOR nodes are run by the NSA — and you can't know they aren’t—it's not providing the desired privacy protection. This is the Sybil attack, which involves falsely simulating a highly multipolar world.7
We want active compensation against centralization. Bitcoin is spread across jurisdictions such that any single corrupting jurisdiction is just taken out of the game. But one government could threaten the lives of their Bitcoin miners to force them to do something corrupt. Proof of location is an economic attestation that a computation is happening at a particular location at a particular time. This can incentivize decentralization by creating rewards for computing in spread-out geographic areas. Geographic diversity means jurisdictional diversity, making governmental interference and collusion more costly. Rather than relying on entities to naturally keep each other in check, proof of location incentivizes multipolarity, thus creating compensating dynamics against centralization risks.8
Ultimately, we need to rely on competition as a discovery procedure for finding out which systems work well, and there will be more than one winner. The more decision-making poles are spread out and interwoven into a cross-cutting cooperation ecosystem, the more they will see it in their interest to compensate for others dominating.
Long-term, can we rely on decentralized systems outcompeting centralized ones? A look at computer history provides a rich mixed picture: In the computer industry’s early days, it was common knowledge that IBM’s mainframe monopoly would lead to monopolizing the entire computer industry, unless the government broke it up. Antitrust forces were engaged against IBM; IBM fought back. It is possible that antitrust laws had little to do with IBM's loss of the dominant market position and that the personal computer’s rise had everything to do with it. IBM started in a fairly dominant monopoly position with its PC. Microsoft then outplayed it, and became the monopoly supplier of PC operating systems and most office applications.
For a long time Microsoft was so dominant in software that it seemed it would remain the monopoly forever, unless broken up. Antitrust forces were engaged against Microsoft, and Microsoft fought back. Once again, it is possible that antitrust forces had little to do with Microsoft losing its dominant position but that the rise of the web had much more to do with it. Microsoft was a substantial web player, with Internet Explorer being an initial browser wars winner, but that dominance was unstable. The character of the game changed, and players that grew up more adapted to the new game’s character out-competed the supposedly permanent centralized monopoly that had owned everybody's desktops.
Gradually, today’s internet giants emerged and turned email into Gmail, Usenet into reddit, blog replies into Facebook, pingbacks into Twitter, squid into Cloudflare, and Gnutella into The Pirate Bay.9 As in the previous Microsoft case, the current centralization wave has been swiftly accompanied by antitrust efforts, such as the 2020 efforts to break up Facebook and Google. Smaller companies cooperate to form coalitions such as standards committees to create a survivable system in light of a perceived threat. Now we have web3. Once again, it is possible that coalitions of non-dominant players compensate against power centralization of giants.
It took centuries for today’s open societies to outcompete tyrannical ones, just as it took decades for open source software to outcompete proprietary software. We should not expect quick wins of decentralized systems over centralized service providers, even if the decentralized ones bring a confident rule of law. There will be many failed ventures and it will take time to build up an adequate level of functionality. But we have repeatedly witnessed the long-term winners are those which create a rules framework leading to a predictable basis for cooperative interaction with minimal risk. As long as future levels of the game are defined by a rich taxonomy of rights and composability of contracts, cooperation can evolve. As civilization unlocks level after level, we expect non-human cognition to play an increasing part in the growth of knowledge, wealth, and innovation. We’ll come back to this in chapter 8.
Chapter Summary
Starting from our paper world, we embark on a co-evolution in which legal and digital jurisdictions develop within constraints imposed by the other. Within the digital domain, proof of location and a polycentricity of experiments can compensate for centralization. With a bit of foresight we can bake interoperability into this system from the get-go. A voluntary future of ever richer cooperative games awaits, yet there are serious physical and digital threats looming along the way; a topic we will examine in the following chapters.
How can the current legal systems and future systems coevolve and constrain each other? Checkout this seminar to find out more.
Next up: DEFEND AGAINST PHYSICAL THREATS | Multipolar Active Shields
See Mark S. Miller’s Computer Security as the Future of Law.
The graph is taken from Origins of Life. The concept originated in Genetic Takeover by A.G. Cains-Smith.
See Primavera de Filippi’s Decentralized Blockchain Technology and the Rise of Lex Cryptographia.
See Mitchell Kapor’s The Self-governing Internet: Coordination by Design.
See Brewster Kahle’s A Game with Many Winners.
See Behind the Scene of the Decentralized Web Principles by Mai Ishikawa Sutton.
Ironically, this danger is a collateral consequence of our ability to cooperate anonymously, one of our greatest protections. Because we don’t know who is running the TOR nodes, we don't know if they are conspiring. If TOR nodes aren’t conspiring, TOR helps provide anonymity, which could create the Sybil danger elsewhere. Even if TOR was corrupted by Sybil, it would not prevent the Sybil danger elsewhere. All the rest of us are still anonymous to each other, even if somebody knows everybody's identity.
Blockchain systems have a few options to prevent Sybil attacks. Let’s say it becomes known that one actor amassed the majority of the Bitcoin mining power to extend a chain with transactions the rest of the community views as illegitimate. If a minority agrees that the extension is illegitimate, they can ignore it and jointly extend the chain in a way they consider legitimate. There is no enforced automated mechanism saying that the used chain is the one extended by the majority of the mining power. If we can agree to do this for a Bitcoin bug, then we can agree to do it based on a shared sense of legitimacy that is more powerful than the Sybil attack. But we want to tread lightly when introducing precedents that impair the expected reliability that makes cryptocommerce desirable.