Skip to content

Latest commit

 

History

History
697 lines (348 loc) · 129 KB

Academy.md

File metadata and controls

697 lines (348 loc) · 129 KB

screen shot 2018-08-31 at 15 47 56

Index

  • Introduction to Democracy Academy

  • 1. Background & Sovereign: In this first unit we discuss the emergence of civic tech/democracy tech and the history of the Democracy Earth Foundation. We provide an overview of the vision and journey of the founders, and how their experiences and lessons shape the software we develop currently, as well as our movement. With that, we look into the three main key aspects of our platform, Sovereign.

  • 2. Blockchain Basics: In this section we learn about the history and technolgy behind blockchains, in order to understand how blockchain networks provide censorship resistance and security for the Democracy Earth platform.

  • 3. Global decision-making & Universal Basic Income: In this unit we focus on the state of governance in the world. We connect the dots between globalization and governance, the concepts of the Land and the Cloud and the control each exerts in our lives, what a jurisdiction means in the age of blockchains, and how Universal Basic Income can support democracy.

  • 4. Smart Contracts & Liquid Democracy: On unit 4 we introduce a complementary piece of technology that is fundamental in enabling our work: smart contracts, which run on top of blockchains. We will develop an introductory knowledge of smart contracts and learn how they permit the creation of a voting system called a token-based liquid democracy.

  • 5. Crypto Politics: With this unit we return to the topic of bitcoin and blockchains but from a much wider perspective, this time exploring the inherently geopolitical nature of bitcoin. This includes examining the relationship of money and state, understanding what is meant by the genesis block, exploring the political nature of cryptography, and understanding the relationship between energy accounting and currency for not just crypto, but current fiat systems as well.

  • 6. Decentralized IDs: On unit 6 we explore decentralized ID's, one of the most crucial remaining pieces required for realizing the full potential of the blockchain ecosystem and a decentralized internet.

  • 7. Blockchain Governance: On our final unit we are broadening our view to look at the governance of blockchains in general, and how these networks and protocols are mantained and continuously updated.

Introduction

The Democracy Earth Foundation is working to update government for the 21st century by building a blockchain-based liquid-democracy platform. In that pursuit, the foundation has spent the past 6 years researching, experimenting, learning and building at the intersection of technology and politics. In our white paper, The Social Smart Contract, we explore in detail how a blockchain-based liquid democracy can help the world solve some of the most pressing challenges facing democracy, such as rising authoritarianism and a lack of voter participation.

While Democracy Earth is focused on building civic tech designed to be easy to use on an everyday basis, we also view it as important to provide education regarding the ideas and technology that have made this possible. Due to the fact that The Social Smart Contract contains some technical vocabulary and information that require background expertise not possessed by the typical reader, we are launching this companion curriculum, the Democracy Academy. Our goal is to give readers the foundational knowledge needed to understand the content of The Social Smart Contract, provide a sound understanding of blockchains, liquid democracy and other technical information it contains, and with it help foster a global movement that enables everyone to claim civic participation as their right.

The content of Democracy Academy was developed collaboratively by students for students, but will be helpful to anyone curious about these topics. Our goal is for everyone following this curriculum to emerge with a strong grasp of essential blockchain technology concepts, as well as the history and context around the founding and development of the Democracy Earth governance platform. It is our hope that in doing so we can help a new generation of leaders effectively learn as much as possible about the intersection of technology and politics - and Democracy Earth’s crowd-sourced proposal - so they are fully equipped to advocate for it, contribute to it, and promote it around the world.

Neither the white paper nor the Democracy Academy curriculum are intended to remain static and we welcome contributions from readers to continue improving them. Like Democracy itself, Democracy Academy must always be a work in progress.

*This content will be updated regularly, with a new unit being added every week. The full content will be posted by September 1st.

1.0 Background & Sovereign

In this first unit, we will discuss the emergence of civic tech/democracy tech and the history of the Democracy Earth Foundation. We will provide an overview of the vision and journey of Democracy Earth founders, and how their experiences and lessons shape our software development and movement.

1.1 A group of hacktivists tried to improve their country

screen shot 2018-07-22 at 10 50 07

Before co-founders Pia Mancini and Santiago Siri launched Democracy Earth and the Sovereign platform, they created a software called Democracy OS, one of the earliest civic tech projects of its kind. As Pia stated in a 2016 interview with The Guardian [1], Democracy OS could not have emerged in a stable country like the US or UK, but only in a country where politics were bad enough that people were willing to take risks. In many ways, their native Argentina - with some of the highest internet access in Latin America, yet some of the most corrupt and unresponsive politics - offered the perfect birthplace for this historic civic tech.

Pia's political education included years spent developing training programs to teach democratic values, preparing civil leaders for public office - efforts that were succcessful in getting candidates elected as mayors and governonrs. Yet systemic corruption made it clear that working in traditional politics would not be effective in fixing pervasive social issues. Eventually Pia and Santi concluded that it was not enough to try to place better people in the same system, but that the very system itself was an issue. It distanced the voters from decision-making, creating a breakdown in communication between political leaders and ordinary citizens. That inspired them to create Democracy OS, where citizens could learn about current congressional policy proposals, as well as make their own proposals, debate and vote on them. The software translated all proposals into plain language, and was accessible to anyone with a smartphone. Though Pia, Santi and their collaborators offered the Democracy OS platform to political parties, they had no takers; instead, they were "sent away like little kids", as she noted in her 2014 TED Talk.

They were not the first civic technologists to learn the lesson that software alone could not solve the deep divide between politicians and citizens – although better technology was needed, the main barrier was still a cultural one. Undaunted by this rejection, Pia and Santi decided to take a different path, and form their own political party called “Partido de la Red,” or the “Net Party” in English. The party promised to vote in line with how citizens voted on the DemocracyOS application. In 2013, they campaigned with a large Trojan Horse made of wood, driving it around the neighbourhoods of Buenos Aires. The Trojan Horse signified that while the Net Party was participating in the familiar process of campaigning like a typical political party, it was only a front - they had no intention to behave like one. Unlike the other parties, they intended to actually let citizens guide their decisions directly through their app. While Partido de la Red candidates did not win an elected seat in the parliament, they received 22,000 votes. It was enough for the Congress to take notice and to launch an instance of DemocracyOS to discuss three issues, two on public transport and one on the use of public space.

Partido de la Red and DemocracyOS taught Pia and Santi three important lessons that still ring true today:

  1. Civic tech has the potential to revolutionize government. Though it failed to gain a Parliamentary seat, Partido de la Red forced the government to take notice of, and even use, Democracy OS civic tech. Clearly, the idea of online participation had power - it resonated with people. But even with this success, the government did not promise to vote in alignment with the decisions made by citizens on the Democracy OS platform, which led to the second lesson:

  2. While civic tech has a true potential to change government, this change is far from inevitable - and a simple app that serves as an interface with Congress is not enough in and of itself to make change happen.

  3. The third and most painful lesson was about corruption. Spies infiltrated party meetings to generate confusion; they were attacked online, and were even asked to bribe a judge in order to be able to run for the 2015 elections. This first-hand contact with corruption taught them how difficult it is to change the system from within. As Santi has remarked, “it is much more likely that the system will change you first.”

1.2 Silicon Valley

screen shot 2018-07-22 at 11 32 27

In 2015 the Silicon Valley accelerator YCombinator - backer of Reddit and AirBnb, among others - invited Pia and Santi to join the Y15 class of nonprofit startups, selected for their potential for global impact. It was here they met Herb Stephens, a former GE auditor and serial software entrepreneur with a 25-year history of building disintermediating systems that shifted power to the user through technology. Since learning of blockchain technology in 2012 and considering it “the best invention since the Internet itself”, Herb dedicated the rest of his career to social entrepreneurism, readily joining the foundation in the role of president and treasurer.

Together Herb, Santi, Pia and Virgile Devile - the Paris-based co-founder of Open Source Politics and one-time team lead for Democracy OS Europe- formed the Democracy Earth Foundation, a U.S. (CA) 501©(3) non-profit.

With these early civic tech experiences, the team was prepared to go well beyond the constraints of the political status quo. They adopted a theory of change best summarized by architect Buckminster Fullers’ famous quote: “You don’t change the existing reality by fighting against it. To change something, build a new model that makes the existing model obsolete.” In other words, building an app to interface with existing political systems won’t create change; what is needed is a tool that brings about such an obvious and enormous improvement to governance it renders the current system outdated.

Their new approach was to use blockchains - the same technology underlying bitcoin - to create a censorship resistant peer-to-peer democracy (terms that will be explained in greater detail later in the curriculum). This new focus would bring massive improvements to three fundamental pillars of governance:

Voting: The current system for voting is both insecure and difficult to audit because it is highly centralized. It can be hacked and manipulated in many ways, and the only people able to verify voting rolls are a very small group of election officials. With a blockchain-based system, manipulating results is functionally impossible as all votes are recorded in an immutable public ledger that anyone can audit.

Identity: Today we receive identity from centralized authorities such as governments providing passports and ID cards, and from websites providing passwords, logins and profiles. The Democracy Earth platform will employ a decentralized ID system, allowing citizens to have a secure form of identification beyond the influence of any third party. Democracy Earth will help citizens own their data and identity through the use of new cryptographic technologies, which will be explained in-depth later in the curriculum.

Representation: Our system does not provide the right incentives for our representatives to represent us very well. If we disagree with how they voted, we have to wait until the next election cycle to try to remove them which could be many years. We are forced to choose a single representative to represent us on all issues, rather than be able to choose multiple experts from different fields to represent us on different issues. This is why Democracy Earth is building a liquid democracy platform that allows for users to propose, debate, and vote directly on issues, or to delegate their vote to someone they trust to vote for them. Representation will be more responsive when you can delegate your vote to anyone and immediately revoke it if they vote incorrectly or behave unethically.

1.3 Sovereign

screen shot 2018-07-22 at 11 36 00

There are three main strategic components to the Democracy Earth governance platform, Sovereign: it is blockchain based, open source, and designed to be as simple to use as a social media platform.

Why blockchain and not just an online platform?

In the next section we will learn exactly how a blockchain works to store information in an incorruptible way. Until then, what is important to know now is that blockchain technology is necessary for security and censorship resistance. In order for election results to be trusted on this platform, it has to be blockchain-based, so that all users are able to see that votes have been tallied accurately.

Web-based voting platforms are centrally run. They have one organization that manages the platform, and this centralization makes it easier to tamper with or even shut them down. Blockchain based platforms are decentralized and maintained by nodes – essentially people running a program on their computer – making them much harder to shut down. Alternative governance platforms like Democracy Earth are most necessary where governments are repressive, where transparency is nonexistent and where voters face the greatest threat of censorship. By using blockchain technology, the Sovereign platform is resistant to both hacking and censorship.

Why must the platform be open source?

Open source describes software with source code that anyone can freely inspect or use. Another property of open source is that anyone is able to contribute code, so it is a truly open and transparent process of creation. For Democracy Earth, the open source ethos extends beyond code, carrying into decision-making too. For example, topics concerning the platform are regularly debated on the Democracy Earth Github repository--> (Link´s broken). Even our white paper The Social Smart Contract was created in open source, with contributors adding to it from around the world.

Why a “social media feel”?

Good civic tech needs to be something people will want to use everyday. Although people should be encouraged to participate in their own governance, too often are actively shut out by densely written, legalistic policy language or by practices that are difficult to understand without a political science or law degree. At Democracy Earth we aim for the exact opposite – to use clear, simple, everyday language and an easy, user-friendly interface that allows anyone to propose a topic of discussion, vote, or delegate their votes to someone else to vote on their behalf. People can use the app for other types of organizing - not only for political decision-making but for day-to-day uses, like deciding on a weekend gathering or what kind of food they want at their office. It is a design enabling simple governance that is inclusive and as easy as clicking “like”.

While Democracy Earth will have a social media look and feel, other features will vary widely relative to typical social media platforms. Unlike Facebook, Twitter, Instagram and other platforms, actions taken on on Sovereign will not be aggregated and sold to advertisers. Users will not be put into ideological boxes where they are limited to viewing topics and votes that they agree with. Right now, users are the products of most social media platforms: most do not realize to what degree their information is being sold to researchers and advertisers, or to what degree their consumer, political, and cultural preferences are being manipulated. With the revelations of how user data were improperly shared during the 2016 US election by data consultants Cambridge Analytica - enabling its clients to influence the outcome through targeted campaign advertising - it is clear that data ownership is a critical issue for protecting free thinking and democracies. With Democracy Earth, it will be impossible to collect data to manipulate users, enabling it to become a forum for true discussion and decision-making rather than an algorithmically curated echo chamber.

Our mission at Democracy Earth is to create a governance platform with all the good qualities of social media – the accessibility, usability, the global facilitation of discussion and the sharing of stories. Given the decentralized nature of blockchains, there will be no governing body with the ability to collect data or manipulate feeds; Sovereign would not be able to mirror any of social media’s negative aspects. Most importantly, users will own their data, meaning they cannot be exposed to the kinds of psychological manipulation enabled by centralized applications like Facebook.

Another key difference from centralized social media: while a “like” or a “retweet” on centralized platforms might show support for a person or idea, in practical terms these signals serve the purpose of feeding attention-mining algorithms that generate profit to the private organizations controlling the apps. With Sovereign, because there is no middleman, all benefits from the use of the platform go to the users. They keep their data, they make meaningful decisions about their own lives.

Ultimately, Sovereign will help realize the principles expressed in the Universal Declaration of Human Rights:

“Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers. Everyone has the right to freedom of peaceful assembly and association. Everyone has the right to take part in the government of his country, directly or through freely chosen representatives.”

2.0 Blockchain Basics

In this section we will learn about the technology and history behind blockchains, in order to understand how blockchain networks provide censorship resistance and security for the Democracy Earth platform.

2.1 Origins of bitcoin and blockchain technology.

"Privacy is necessary for an open society in the electronic age.”

Eric Hughes | The Cypherpunk Manifesto

Bitcoin and blockchains are products of a particular intellectual ecosystem, one that arose from a series of technological innovations and far-seeing individuals. Though these seem like new innovations, in fact the fundamental cryptographic technologies underlying the bitcoin blockchain were created in response to a collection of important political and mathematical developments in the second half of the twentieth century.

Throughout World War II, the Allied and Axis powers secretly developed systems of mathematic codes and ciphers to relay sensitive wartime information between field commanders and their superiors. Only those who possessed the proper key could read the information – so the key was only shared between the two parties communicating. These messages were sometimes called cryptographs. Some of the Allied nations - namely the U.S. and Britain - created their own ways of using cryptography (the codes and ciphers) to securely send messages.

However, these nations also needed to pioneer ways of decrypting the cryptographs sent by their enemies (Germany and Japan) without knowing the keys. This process is called cryptanalysis. Several major battles were won by the Allies through the efforts of early cryptanalysts who worked tirelessly and in complete anonymity from the public to crack the ciphers used by the Axis powers - the most renowned one being Alan Turing for his breakthrough accomplishments in the field.

screen shot 2018-08-31 at 17 40 30

At the end of the war, military shifted its focus to the maintenance of national security. The Cold War political climate ushered in an era of information warfare and espionage between the United States and Russia. This led the United States executive branch to leverage the powers of Congress to allow the FBI and other intelligence agencies to use wiretaps and digital surveillance methods on U.S. citizens. Around the same time, two publications, the US Government Publication of the Data Encryption Standard and Dr. Martin Hellman’s New Directions in Cryptography, demonstrated the value of cryptography for secure data communication. More importantly, these publications revealed new forms of cryptographic technologies that otherwise would not have been available for use by the general public.

In fact, Dr. Hellman’s writing on “public-key cryptography,” also known as asymmetric cryptography, was the first of its kind, and later inspired the work of individuals such as Eric Hughes. In 1992, Eric Hughes, Timothy May, and John Gilmore founded a small group of mathematically savvy firebrands to share ideas about increasing individual privacy through the use of cryptography. Jude Milhon, an attendee of the first group meeting, was credited with naming the group “Cypherpunks”, a clever combination of cipher and cyberpunk. More like-minded individuals began to attend the group’s meetings and this free flowing sharing of thoughts eventually culminated into Eric Hughes’ A Cypherpunk's Manifesto.

screen shot 2018-08-31 at 17 48 42

The document outlined the beliefs and vision of the Cypherpunk movement. Hughes explained the distinction between privacy and secrecy throughout the manifesto, famously writing that

"Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. A private matter is something one doesn't want the whole world to know, but a secret matter is something one doesn't want anybody to know. Privacy is the power to selectively reveal oneself to the world.”

Yet perhaps the most powerful message of the manifesto was that in order for society to successfully enter into the electronic era, it would be necessary to increase individual privacy. The Cypherpunk movement and its vision of an electronic era that guaranteed the human right to privacy has inspired generations of new dreamers to continue using cryptography in pioneering ways. Blockchain technology was one of these ways. Throughout the next sections of this unit we will explore the various components that were combined to create the bitcoin network.

2.2 Peer-to-peer networks

“A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution.”

Satoshi Nakamoto | Excerpt from Bitcoin Whitepaper

Bitcoin, and the underlying blockchain technology, was created by an anonymous individual or group called "Satoshi Nakamoto." Satoshi wanted to create a "peer-to-peer version of electronic cash." Peer-to-peer basically means person-to-person or without intermediaries. In other words, no intermediaries. It's a term used to describe a network in which participants can communicate with each other directly, without the need for centralized trusted third parties (TTPs) to intermediate the exchange of services or the transfer of data. Peer-to-peer networks are becoming a staple of the 21st century “sharing economy” business model. Uber and AirBnB are partial examples of a peer-to-peer because while the services are provided in a peer-to-peer manner the payment and governance still happens through a centralized company. The bitcoin blockchain is an example of a truly peer-to-peer network.

2.3 How can a truly peer-to-peer Internet of Value be enabled? What is the double-spend dilemma?

“We propose a solution to the double-spending problem using a peer-to-peer network.”

Satoshi Nakamoto | Excerpt from Bitcoin Whitepaper

A peer-to-peer network in the physical world is slightly simpler to create, where individuals can directly exchange cars, rent their rooms, or trade services. But Satoshi was not trying to create any sort of physical peer-to-peer network; instead, his goal was a completely digital network where individuals could send money to each other. In the physical world, someone either hands you cash or they do not. In contrast, a digital exchange of digital money creates a host of issues, not least of them requiring trusted organizations – usually banks – to serve as intermediaries. Creating a peer-to-peer network that can operate without the need for centralized intermediaries is the first step towards democratizing the way we share data. It also happens to be a difficult task because this network must be able to communicate valuable data (such as money, or votes) without allowing it to be replicated. How to create such a network had baffled the worlds best cryptographers and cypherpunks until the release of the bitcoin whitepaper in 2008.

2.3.1 The Double-Spend Dilemma:

This brings us to the difference between the internet of information and the internet of value. The internet of information contains websites and digital communication protocols that allow for the sharing of materials such as emails, photos, or documents. Right now on the internet of information, when you want to send some piece of information you are not sending the original but rather a duplicate (copy) of the data. The sender of information still retains the original photo or document when a message or email is sent. The internet of value deals with the sending of a different class of things -- things that have value due to their scarcity such as a vote, intellectual property, or money. In these type of transfers of valuable digital items it is crucial that the sender relinquish ownership of the data - this is the concept of digital scarcity. The sender must send the original and not a copy - this is so that the original sender cannot use the same valuable data to make the same transfer to a new party -- a practice known as "double spending." In the Bitcoin whitepaper Satoshi Nakamoto explains a solution to this double spend dilemma -- one that used peer-to-peer networks -- as well as several other technical elements that we explain below.

2.4 What is a hash function and why are hashes important in peer-to-peer networks?

2.4.1 Hash & Hash Function

A hash function is a mathematical process that takes any kind of digital message and turns it into a unique sequence of letters and numbers that always has a fixed amount of characters. For example, it could take my digital image of an apple and turn it into 256 bits. It would also take something much longer and more complex - say, the draft of a novel - and turn it into a different 256 bits. It can be thought of as a mathematical operation that transforms any input of arbitrary data into a fixed-length numerical value. This numerical value is called a Hash. This hash value is represented by a string of characters that includes numbers and letters. The Hash can be described as a digital fingerprint that is unique to a single input of value. No input can have more than one unique hash, and no hash can refer to more than one unique input. If there is any change in the value of the input then the hash itself must change completely. Adding a leaf to our earlier example of digital image of an apple would result in a completely new and different hash. Hence the term digital “fingerprint” - no two hashes (of different input data) are ever alike.

So what is the purpose of utilizing hash functions in a blockchain network? As described above, hash functions will only return a single unique output given the same input. If there is any change to the message being hashed, then the hash of the message changes completely. This fundamental property of hash functions is exactly what blockchain networks leverage to make the ledger immutable. On the bitcoin network, people make transactions -- essentially sending bitcoin to each other in exchange for some good or service. Groups of transactions (called blocks) are periodically (for the Bitcoin blockchain, every ten minutes) pooled together and all of the data that comprise each transaction are combined and hashed. When the new block of transactions is ready, the hash of the previous block is included as part of the transaction data to be hashed for this new block. This creates a chain of hashes, meaning all of the transactions that come before a new block are inextricably linked to the hash of the new block. This prevents anyone from going back and changing a transaction -- even if it were one transaction thousands of blocks back -- because when the new block is hashed, the slight change would cause that hash to look entirely different than the hash of the legitimate blocks. This means that any attempt to alter the network is immediately detectable and will be rejected by other people using the network who have the hash of the true transaction history.

2.5 What is public key cryptography? How do digital signatures enable peer-to-peer value transfer?

2.5.1 Trusted Third Party

Traditional computer networks use what is known as a client/server architecture. The clients are the individual computers that access the network. The servers are the computers which host the data that is accessed by the client computers.

In networks where valuable data such as money or sensitive personal information is transferred, the use of trusted third parties is required to relay data between users securely. These TTPs act as servers that (1) verify the identities of the network participants, essentially making sure that users attempting to transfer valuable information cannot send information as someone else, and (2) ensure that the data being communicated is authentic and trustworthy. As we mentioned before, banks are a great example of a trusted third party, acting as an enabler of transactions between its clients.

However, in peer-to-peer networks the need for TTP’s is replaced by the clever use of cryptographic technologies, one of them being public key cryptography. Digital signature schemes are an application of public key cryptography that allow for anonymous actors to verify each others’ identities without the need for TTPs.

2.5.2 Public and private keys

screen shot 2018-07-16 at 17 29 28

The public and private key system, also known as asymmetric cryptography, was first published by Whitfield Diffie and Martin Hellman. It provided an ingenious solution to a difficult dillemma: imagine that you are trying to send an encrypted message to someone that is in a different country. You can encrypt the message in your home and send it to her, but she won't be able to decrypt it unless you can somehow share with her the correct key to decrypt it. In the past, for war purposes, people would meet in person to share that key. But if you are in an unsafe situation, or meeting in person is not an option, than encryption won't be very useful to you. The public and private key method solved that. It enables two parties to exchange encrypted messages and verify each other's identities without needing to communicate or share the key required to decrypt the message. It's one of the underlying technologies of blockchains that allow users to circumvent the need for TTPs (trusted third parties) to verify the identity and authenticity of their messages in computer networks - meaning that the receiver knows both who the message came from, and that the information is directly coming from the sender and has not been tampered with.

Here's how it works:

An algorithm generates two keys. One key is a private key, which as the name suggests, should always be kept private. The other is a public key which can be made publicly available for all to see.

The two keys are mathematically linked to each other. This means everything that is encrypted with your public key, can only be decrypted with your private key. And everything that is encrypted with your private key can only be decrypted with your public key. This allows you to both encrypt and sign messages.

When encrypting, you use the recipient's public key to encrypt a message, so you can be assured that only he can read it because only he has the private key that will allow him to decrypt it.

When signing, you use your private key to encrypt your message's signature. This way, anyone can use your public key to verify that that signature came from you, because your public key could only decrypt a signature that was made with your private key.

How is this employed in bitcoin? You use your private key to sign/send transactions, and they are addressed to someone’s public key -- or more precisely an address derived from it. You can know who sent you a transaction too, because the transaction will be signed with the sender’s private key which is mixed together with the hash of the transaction. This means that the recipient does not end up with the sender’s private key undercutting the sender’s privacy because the private key is now combined with a transaction hash that is specific to that particular transaction, and verifiable with the sender’s address/public key.

2.6 How do all of these pieces of technology combine to create a peer-to-peer network that solves the double-spend dilemma?

screen shot 2018-07-16 at 17 28 35

“Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double-spending.”

Satoshi Nakamoto | Excerpt from Bitcoin Whitepaper

Hashes and asymmetric cryptography provide two crucial elements for building the bitcoin network, but in order to understand how Satoshi Nakamoto solved the challenge of creating a peer-to-peer network where value can be shared we will next turn our attention to nodes and the protocol they use to secure the bitcoin blockchain.

2.6.1 Nodes

In the context of a blockchain, nodes are computers running software that maintains the bitcoin network. Anyone can download the software and become a node if they so choose. Basically, instead of having employees looking into the transactions as banks do, the Bitcoin blockchain lets nodes perform those tasks. Nodes are responsible for storing a shared ledger of the network's entire transaction history and maintaining the integrity of the network. A ledger is typically a book or other collection of financial accounts, in this case of bitcoin transactions. The nodes run special algorithms, we’ll call them the “bookkeeping software”, that periodically check transaction pools - meaning all of the transactions submitted by network participants within a specific timeframe - to make sure they are congruent with the history of all previous transactions. In this way, these nodes are able to keep the inegrity of the network without relying on trusted third parties.

If this seems a little incomprehensible an example might clarify it. In a football game each player knows what the score is at any one time because they all have the ability to look up at the scoreboard and see it. No one could change the score without convincing a majority of the players that there was a good reason to, or literally overwhelming them with force -- like tackling the scorekeeper and anyone who tried to stop you -- until you could change it. Applying this example to the bitcoin network, the ledger is the scoreboard, and the nodes are the players. They can observe every play (transaction), or at least their software can, and so no individual player can secretly change the ledger because they are all watching the transactions come in and storing their own record of them.

2.6.2 Protocol

The “bookkeeping software” can more accurately be called the protocol.The protocol is a set of rules and requirements that standardize the transactions contained in each block in order to maintain the integrity and functionality of the blockchain - it is what actually prevents double spending. It provides the rules for inter-node communication and the validation of new blocks. There is no need to fully understand the protocol, but just for clarity here is an example of some of the rules of the protocol for validating nodes:

  1. Check syntactic correctness of each block
  2. Reject if we have duplicate of block in any of the three block categories
  3. Transaction list must be non-empty

All the nodes mentioned above are running software that automatically checks if a block of transactions matches these rules. If it does, the nodes accept that block as valid, if it doesn't, then the nodes reject it.

2.6.3 Proof of Work and Miners

screen shot 2018-07-16 at 17 29 06

The network is made up of nodes who are following this protocol, but there are different types of nodes. Partial nodes, which have downloaded a part of the ledger, full nodes, which have downloaded the entire ledger, and full nodes that are also miners, meaning that they are actively submitting blocks of transactions to the ledger for other nodes to examine. Since miners do this extra process of bundling, hashing, and submitting transactions, they need an extra incentive on top of just being able to see first hand a secure ledger of their transactions. They need an incentive for behaving honestly so that they keep the ledger's integrity. This incentive comes through a process known as Proof of Work. It provides a reward system which makes any attempts at double-spending economically and computationally costy.

The protocol is being applied by all nodes, but it is miners who package together transactions and submit them to the network so that other nodes can examine them. By participating in this process miners have a chance of winning bitcoin as a reward. The miners then have another incentive to only submit valid transactions because their bitcoin reward will only be valuable so long as the bitcoin network itself is secure. This creates a financial incentive to maintain the network's integrity, and the process has been working well in this decentralized, uncoordinated manner for the past decade with nodes all over the world working to ensure the integrity of the transactions. All blockchains that use Proof-of-work, which at the moment is all major blockchains, have miners engaged in a process that is the same or very similar to the one we are describing.

2.6.4 How does mining work?

About every 10 minutes a new block is composed, with all the network transactions from the previous 10 minutes contained within. The big question here is, of all the miners, who gets to be the one to mathematically compose this new block and link the next block to the chain and earn some Bitcoin?

In order to decide that, the system creates a challenge for all the miners to solve. Whoever solves it first gets the right to validate if the transactions from the past 10 minutes are in accordance with the protocol and to attach them to the blockchain -- and to earn some Bitcoins in the form of a reward and all of the transaction fees associated with the transactions in that block!

This challenge is based on a hash function. Currently the one that is utilized is called SHA-256. “SHA” stands for “Secure Hash Algorithm.” The SHA-256 hash function transforms a piece of input, let's say the message

'Hello'

and adds numbers to the end of the input, or base string, which can be:

'Hello1' or 'Hello2' etc.

...so that when that message is hashed, the resulting hash starts with four 0s.

Here is an example of a hash created by SHA256:

0000c3af42fc31103f1fdc0151fa747ff87349a4714df7cc52ea464e12dcd4e9

The challenge is to find out what are those numbers that, when added to the end of the base string, will result in the hash starting with four zeros.

When we hear that computers are “mining bitcoin”, what that actually means is that they are essentially solving a big guess and check problem. The software they are running is trying, randomly, by trial and error, to find what numbers were added to the input in order to originate that hash. They keep trying all possibilities until they find the right one and the first to do it gets to validate the next block.

41691617-558679fa-74b0-11e8-887c-bd4e7d96d17f

Any computer can compute more than 4,000 trials per second, so as the number of computers competing for the right to validate a block increases, the system adjusts the difficulty of the challenge so that it corresponds to the current computational power available. It does this by simply adding more leading zeros. This ensures that new blocks are always "mined" every ten minutes. This is why the process is called Proof of Work: in order to mine Bitcoin, computational processing work is involved. Attaching a computational cost makes submitting false transactions uneconomical because then you would have to overpower the network in order to have the right to validate the next block and submit your false transactions in it.

Anyone can become a miner, and this fits in with the democratic nature of bitcoin. All you need is a computer with sufficient processing power and enough energy to run it, but if you had these resources you could start up a node today and begin competing to validate a block and receive the mining and transaction fee rewards. Some people create mining pools, where multiple miners join together. This means they are likely to receive a mining reward more often because of their greater computing power, but this also means the reward will be smaller as it will be split between them.

When PoW is combined with the protocol and digital signature scheme, double spending is effectively eliminated as a potential threat. This This gets us back to the reason we are learning about bitcoin -- because the nodes are located around the world, and no single node or group of nodes is more important than another, the network cannot be easily shut down making it censorship resistant. The bitcoin network involves thousands of nodes to verify transactions against the protocol, as well as miners with a strong financial incentive to maintain the integrity of the network so that their block rewards are made up of a valuable token. These components create a secure, distributed, and censorship resistant network that has no need of centralized intermediaries.

3.0 Global Decision Making & Universal Basic Income

In the previous unit we learned about blockchain technology. In this unit we will build on that by looking at how blockchains can help us make decisions globally. This section will be less technical as we focus on the state of governance in the world. We will focus on how globalization connects to governance, the concepts of the Land and the Cloud and the control each exerts in our lives, what a jurisdiction means in the age of blockchains, and how Universal Basic Income supports democracy.

3.1 The Land: Limitations of nationally-based governance in a globalized world

screen shot 2018-07-23 at 21 50 03

In our deeply interconnected societies, where our economies and ecology are globalized and trends spread rapidly over the webs of social media, national governments are inherently limited in their abilities to confront many of the issues that affect us, such as climate change, refugee crises and technological disruptions. This incompatibility between a globalized world and national governments often makes our political systems ineffective and increasingly vulnerable to forces outside of their control.

We are accustomed to thinking about the world in terms of nation-states: land-based governments that organize our life as a society. Another way to gain insight into the nature of our political lives is by focusing on The Cloud, which corresponds to the biggest internet corporations. The amount of power and influence these centralized organizations exert on our society is comparable to that of nation-states. They contain an unprecedented amount of data about individuals, easily co-opted by actors willing to influence the direction of political events, as demonstrated by the Cambridge Analytica revelations.

As citizens of the 21st century, living between the Land and the Cloud, we are discovering that our control over our own lives is limited. Establishing a functional model would require a new kind of governance where citizens of different nations can come together to collaborate on decisions regarding the challenges they collectively face – a concept Historian Yuval Noah Harari makes clear with the following simple story:

Thousands of years ago, many different tribes lived along the Yellow River in China, relying on it for their survival and suffering from its periodic floods and droughts. Individually, no tribe could do much about it as each only controlled a tiny portion of the river. So they coalesced together to form the Chinese nation, with the ability to build dams and canals, regulating the river and bringing prosperity to the entire region.

In the 21st century, around 200 different Nation-states are all living along the same challenging river, which today represents a host of issues looming above our heads such as like climate change, mass migration of refugees, transnational terrorist groups, global corporations driving rising inequality, automation eliminating jobs by the millions, and the urgent threat of an Artificial Intelligence-driven arms race.

Today, disenfranchised countries and communities have no way to address the issues that most impact the lives of their citizens. Historically, patriotism has given us the ability to tackle local issues by coordinating cooperation among large groups of people. Now the challenges that impact our lives most directly are no longer local, but take place in a deeply networked and economically globalized system. Like the ancient tribes along the Yellow River, Nation-states are individually inadequate to address those issues and protect their citizens from them: if one country tries to properly regulate any of those areas it will likely undermine its competitive advantage in comparison to the other unregulated countries. For example, if a country tries to implement environmental regulations on a multinational company that company might just move to another country, taking its economic development power with it.

On the other hand, coalition agencies such as the UN are still extremely ineffective in promoting a globalized governance, as member buy-in is ultimately optional. As Peter Schurman from One Global Democracy puts it:

“Since countries only have to work together as far as they agree to, there’s every opportunity for disagreement and for failure to do what needs to be done.”

It is also worth noting that the very five countries that hold veto power at the UN — China, France, Russia, United Kingdom, and the United States — also happen to be the ones responsible for the vast majority of all major arms exports in the world. Where that leaves us with the prospect of having the UN as a champion of global peace is unclear.

3.1.1 The Cloud

While most of the problems listed above pertain to the land, the Cloud is also a formidible and flawed realm. The Cloud controls our data. Major internet corporations have the ability to track and aggregate data regarding most of our digital activities. In a way, they know users better than users know themselves, and over and over have demonstrably predicted and influenced user behaviour. Even though Internet monopolies stand as the gatekeepers of online privacy, it should not be forgotten that, theoretically, Facebook has the power to impersonate any of its 2 Billion registered users should it ever desire to.

Google and Facebook hold the largest identity databases in the world, surpassing the governments of India and China. With 97% of their reported revenue coming from advertising, their source of income strongly influences the kind of experience that users get with their technology. In other words, users find themselves in bubbles not of their own making, but defined by the invisible hand of the profit-optimizing algorithms of the social media giants. It is in their corporate interest to gather as much information as possible to profile people in order to stay competitive in the attention market, and both companies filter information fed to users with algorithms accountable to no one but their own board.

Uncensored, free and sovereign debates on the future of humanity are being eaten by attention-farming algorithms and useless likes that help only to perpetuate these corporate entities. Fake news exploits (as were used during the U.S. elections) or critical content spreading like wildfire (as happened during the Arab Spring) demonstrate that any effort to stop international influence on national politics is futile as societies spend most of their time online. Simply put, the Internet is bound to challenge Nation-States, and in a sense, incompatible with their territorial domains.

3.2 Towards an Inclusive Global Governance

screen shot 2018-07-23 at 21 59 52

The idea of humanity united under the same governance system is anything but new and does not need to come about in an imperial manner. Visions of global governance date back to the ancient Chinese and Indian civilizations. The approaches to this vision are as varied as its defenders whose ranks include Albert Einstein, Immanuel Kant, Mahatma Gandhi, Dante Alighieri, and Martin Luther King Jr, among many others. Now, with blockchain technology, for the first time in history individuals can actually build this kind of global system of cooperation from the bottom up.

For many, global governance can sound like an oppressive and hegemonistic idea, with good reason — the first forms of globalization we witnessed in history were accomplished through bloody conquest by empires. In the modern era, the word globalization brings to mind an explosion of opportunity that has not been equally distributed. Some geographies have enormously benefited because of liberal trade policies, mass migrations, and increased travel. Yet, to large segments of the population, the globalization of our economies did not improve their lives - instead they have borne the costs of it, being exposed to pollution from multinational conglomerates, brain drain, and increased inequality.

The question now is how we ensure that the benefits of globalization are shared equally and the costs minimized as much as possible. The pains caused by globalization are largely due to the fact that only a small number of countries -- and even a small group of people within those countries -- shaped the policies that guided this process. Lesser developed countries had worse standing in trade negotiations and the forming of regulatory policies. This meant that the globalization of the economy took place without a globalization of the decision making process. Blockchain technology can help to change that, because while it ultimately empowers individuals (and their local communities), it is also inherently transnational, enabling dialogue and collaboration.

3.2.1 Blockchains Create a New Jurisdiction

Blockchain technology creates a layer in between The Land and The Cloud. In effect, a sovereign jurisdiction where individuals have control of their identity, their data, and the ways in which they connect with each other.

This changes the dynamics of governance: the economically-driven tension between local and global can be overcome by a global system of governance that is based on blockchain networks. Local and global are woven together because in such a model decision-making is enacted from the bottom-up, from the individual level, by means of a technology that is inherently transnational, empowering disenfranchised groups and small local communities to have a say on the global agora about the global forces that determine their futures.

As Democracy Earth Foundation sets out to create a blockchain-based governance platform, our goal is to strengthen traditional forms of participation with incorruptible decision-making tools. We understand that in the inter-connected reality that we inhabit, it is necessary to enable one more layer of commitment: in addition to being citizens of a country, we need to be citizens of the world -- and global governance is the next logical step in a world already connected over the Internet.

It is extremely fortuitous that exactly when humanity most needs it most we are seeing the rise of blockchain technology, enabling us to achieve global cooperation that can be built by citizens from the bottom-up and generating transparent and legitimate decision-making. We can have liquid governance establishing the foundations for a democracy of peers, and in that context even permission from established Nation-States is not required: citizens anywhere in the world can embrace this change using blockchain-based networks.

3.2.2 Universal Basic Income and Democracy

The same technology that enables the creation of a global governance system also enables the distribution of a universal basic income. During Unit 6 of the curriculum we will return to digital identity systems, another piece of technology that is necessary for UBI; for now, we have seen that blockchain technology is a powerful tool to securely and widely distribute value with no chance of corruption or mismanagement of the funds.

Universal Basic Income has recently become a hot topic due to its ability to support societies whose populations are rapidly losing jobs due to automation. Despite this recent technology-specific interest in UBI, the economic stability that it provides has a symbiotic relationship with democracy. According to research presented at Basic Income Earth Network (Munich September 2012), the implementation of basic income can greatly contribute to realizing the principles of democracy because it brings about a base level of economic well-being within society that allows for more full democratic participation.This is not to say that the technology-specific argument for UBI is untrue -- UBI both supports democracy and is critical for weathering the effects of automation and job displacement.

While UBI is typically examined in the context of a single country, to be truly universal it must be distributed internationally because already we see that the use of a new technology in any given industry or country can have effects that reverberate around the world. Blockchains are ideal technology for UBI implementation, as they can enable such an international distribution, for the realization of a truly universal basic income.

4.0 Smart Contracts & Liquid Democracy

On the previous section we examined governance on a global scale. On this section we are going to turn our attention to a smaller scale -- the governance structure within any given country. We also introduce a complementary piece of technology to blockchains: smart contracts, which run on top of blockchains. We will develop an introductory knowledge of smart contracts and learn how they enable a voting structure called liquid democracy.

4.1 Smart Contracts

screen shot 2018-07-30 at 20 31 51

What is a smart contract?

A smart contract is a computer program that is stored and executed on a blockchain, enabling a new paradigm of "programmable money". A basic analogy can be made with a vending machine: if a person puts in some amount of money, an item will come out. Smart contracts can also employ loops and conditional statements to any desired degree of specificity -- an example would be a contract meant to send a friend (or the holder of any given public key) funds to purchase a pizza, where funds sent to the smart contract can only be spent at one particular pizza store and where the funds are returned (gradually, or all at once) if a pizza is not purchased by the friend in the first 72 hours after being deposited. The pizza order, signed with the private key of the receiving friend, and sent to the smart contract as a transaction, would release the funds to the pizza store.

The concept of smart contracts are most often discussed in relation to the Ethereum network, but the term was first coined by Nick Szabo back in 1996 and in theory they are not unique to Ethereum. A multi-signature wallet (where multiple parties need to sign for a transaction to go through) for bitcoin, is also a basic example of a smart contract. Smart contracts in Ethereum are programmed in a language called Solidity. The applications are not limited to only basic financial transactions, but could also automate the collection of royalties, the execution of wills, or the transferring of housing ownership.

How do smart contracts work?

The beauty of smart contracts is that it allows people to transact with each other without having to necessarily trust that the other party will fulfill their end of the agreement - they can rely on the smart contract to execute according to how it was programmed. Smart contracts get executed when they are interacted with, usually when they receive money, or when some external “oracle” indicates that an event that the smart contract is programmed to watch for has occurred. For example, with the executing of a will, say the smart contract was programmed to begin when an obituary was posted in the newspaper.

Sending a transaction to a smart-contract is like sending a transaction to any other blockchain address, but there is an additional deployment fee for the creator of the smart contract, denominated in the currency of the host blockchain (ETH for ethereum). The more complex a smart contract becomes, the higher the deployment fee becomes -- this is due to the fact that the smart contract will have to be stored and executed on all of the nodes that compose a network, which takes up space. Given the programmable nature of smart contracts, the applications that run on top of smart contracts are known as decentralized apps or dApps.

4.2 Proof of Stake

screen shot 2018-07-30 at 20 30 42

Proof of Stake (PoS) is a proposed alternative to Proof of Work (PoW) for preventing sybil attacks and establishing consensus in a decentralized network. Although the details are still being worked out, PoS promises an anti-sybil solution which requires significantly less electricity consumption than PoW.

A user's chance of winning a block reward in PoS does not rely on the power of their computing device as it does in PoW. Instead, the number of coins a user/staker holds -- or their "stake" in the network -- determines the chance that they will be pseudo-randomly selected to act as the main validator for a certain amount of time. Users who are heavily invested have less incentive to act dishonestly -- if they act dishonestly, their staked coins can be destroyed or "burned".

4.3 Issues with Representative Democracy:

screen shot 2018-07-30 at 20 33 07

Smart contracts are one of the fundamental technological innovations that permit us to envision a token-based liquid democracy. But before we learn about how smart contracts allow for a new kind of decision-making, it is necessary to take a detour to see why national governments need updating at all.

Most traditional democracies in the world share one basic system: every four years or so, citizens are offered a couple of candidates to choose from. After voting, citizens' power to decide on anything is frozen until the next election cycle and all they can do is watch events unfold from a spectator’s seat. In between voting cycles, citizens are forced to rely on opinion polls to gauge their contentment, positions and desires.

This system is what we call representative democracy. It was designed as an evolution of direct democracy, which has its origins in ancient Greece, where “legitimate” citizens would gather in a public place  —  the agora  —  and vote in favor or against every decision that was made about the city. However, the direct model wasn’t scalable to larger territories. When voting systems had to be built for larger territories, naturally the voting power of the citizen had to be delegated to a representative. This was a rational decision that reflected the information technology of the time, which was the printing press, and its inability to logistically scale the decision-making process at a pace that contemplated the needs of a large country. At the time, it was natural that some people would have to be solely occupied in making decisions for others. And thus, professional politicians were born.

For a while, the model of representative democracies worked fairly well. From the 1970s through the 1990s, dozens of authoritarian regimes became electoral democracies. Things moved forward in a positive, freedom-promoting direction. Unfortunately, it seems that growth has reached its limits.

Since 2006, we have been in a global democratic recession. Currently only 45% of the global population is living in countries that are qualified as “free” according to the annual report by Freedom House. We live in an age of unprecedented technological connectivy but most democratic governments are fairly opaque and many suffer with corruption. The natural dissatisfaction that arises from that is being leveraged by more authoritarian and often populist leaders, who are taking control in countries that once seemed like they were on the path to becoming democratic. Facing the faillure of representative democracy in creating effective governments, authoritarianism is now on the rise.

Movements like Occupy Wall Street and the Arab Spring show that it is much easier to protest and even to remove leaders than it is to change politics for the better within the confines of a representative democracy. Often, dissident movements, even when successful, only end up creating power vacuums that get filled by new politicians who will eventually repeat the patterns of whatever system they deposed. Escaping that dynamic requires more than citizens having the ability to connect to each other (given by the internet and social media) and point out the flaws of a given system. It requires citizens to actually have a way to propose functioning governance models that can replace the old ones.

The flaws in representative democracy are not necessarily inherent flaws of democracy. The alternative that is being taken by many countries over the past few years is to replace it with more authoritarianism - but there are other paths to be explored.

Technological connectivity breaks the main premise that once justified the creation of representative democracy in the first place — the necessity to scale the decision making process to a large territory. Now we can vote online. There are no technical impediments that could prevent a willing person to participate in a voting procedure. We are connected by a digital commons. The main justification for representatives no longer applies. In the next two sections we will look at a different model, that fully leverages the technology of today to create a stronger, more legitimate democracy, that can rise to the expectations of citizens of the 21st century.

4.3.1 Liquid Democracy

screen shot 2018-08-31 at 16 29 15

Democracy is about getting the best possible decision, with the greatest amount of legitimacy. In direct democracy, everyone votes — directly. But there is no way that everyone has the time, interest, or expertise to vote on every single issue. On the other hand, in a representative democracy, we elect other people to vote for us.

There is a system that combines both of these models -- it is called Liquid Democracy. In a liquid democracy individuals can either vote directly on an issue or delegate their vote to an individual they trust to decide for them. They can revoke that vote at any time if they feel their representative voted incorrectly or if they change their mind on the issue. For example, if Laura is a citizen who knows a lot about housing policy she can choose to vote directly on all issues concerning housing policy. If an issue on nuclear power comes up, she might choose to delegate her vote to her favorite physics professor from college with full confidence that she can revoke it from him if she disagrees with his decision. Instead of having representatives based on territory, we utilize a digital, secure, blockchain-based application to start choosing representatives that we know and trust. They represent us for the specific topics that we assign them.

There are some key advantages to this model:

  • It enables leadership to emerge from the bottom up: if you are trusted by your peers on any given issue, you can have a larger stake on the decisions regarding it. Anyone can potentially be a "politician" or decision-maker.
  • It enables smarter decisions: given that more knowleadgeable people are likely to have increased stakes on their subjects of expertise, this is a great model to actually leverage all the knowledge that a society posesses on different policies. A liquid democracy quickly evolves to a peer-review system.

4.3.2 Token Based Liquid Democracy

Smart contracts are the technological platform that allows for something like a liquid democracy to exist. Smart contracts combined with liquid democracy creates what we call a “token-based liquid democracy,” and that is because votes now operate as programmable tokens. Imagine that in the same way that you have a cryptocurrency transaction running on a blockchain, and that cryptocurrency can be programmed to operate under certain rules with smart contracts, it is equally possible to have vote tokens that enable us to have the same kind of control, auditability, and security over how they operate. In the next section, we'll examine how each of these aspects can help the fight against corruption.

Crypto as corruption fighter

Control
With a VOTE token - what Democracy Earth is currently developing - citizens will have full control over their vote. This means that once a citizen owns their token, they can delegate it to representatives, but if dissatisfied with how that representative is using their vote, they can revoke that delegation at any time. The ability to revoke at any time brings a paradigmatic change to representation, because it incentivizes better behavior on the part of the representatives.

Think of the all-too-common scenario of a politician who quickly stops delivering on promises right after the election, once his seat is practically guaranteed for four long years. A liquid democracy placates such scenarios because it enables citizens to immediately revoke their delegations if they so want, effectively creating a model in which empty promises are impractical as the representative is not shielded by a number of years having his power guaranteed to him. This framework creates better incentives for leadership, encouraging representatives to want to be honest, otherwise lies can quickly result in them losing influence. The issue-based delegation will allow for a different model of political leader, who will be involved in decision-making because she or he is knowledgeable on a certain issue.

Finally, it also helps prevent a scenario where people buy delegations, because even if a citizen promises away their vote to someone, they can never lose the ability to revoke it. Unless the buyer can control that person 24 hours a day, or have some other means of control (like being able to harm the person in any way) then there is no guarantee that the purchase will be enforced in the long-term.

Auditability
In a referendum that is made with VOTE tokens, anyone is able to personally audit the results of that referendum and be certain of their integrity. This is because the vote tokens are cast on public blockchains, open for all to audit. That does not mean that anonymity is lost for the voter. Decentralized IDs, which is a topic that we will cover extensively in one of the coming units of this curriculum, enable voters to properly own their data and disclose only as much information as is necessary for any specific context. Cryptography ensures the anonymity of the voters, while maintaining the voting records public for all to check. This level of auditability makes it so one can be certain of the integrity of the results of any vote, knowing that it has not been tampered with or manipulated in any way.

Security
The ability to do referendums where anyone can easily participate from their phones and have the results be reliable might not be so critical in well-functioning and earnest governments, but it is a game-changer when it comes to repressive regimes. All over the world votes and referendums are suppressed with different kinds of violence or corruption. For example, with physical elections voting places can be attacked or ballot boxes burned. Removing the complex logistics of running an election and making voting a safe act that anyone can do from their phones and their homes, empowers citizens to clearly express their preferences with no way for powerful actors to suppress the vote. This is one of the most important aspects of how blockchain technology can help otherwise disenfranchised individuals and even entire nations to fully enact their human rights of expressing themselves and their choice of leaders.

The financial value of the $VOTE

In addition to these corruption-fighting properties, blockchain-based $VOTE tokens also have a financial value, giving rise to several properties. The idea seems strange at first: if $VOTES have a financial value, would that mean that capital can overtake the decision-making process?

It is a legitimate concern, addressed by new technologies that can be employed to prevent this from happening in several different ways, such as enabling universal access. On section 3.2.2 we discussed how blockchains enable the distribution of a Universal Basic Income. By granting $VOTE tokens to every person, as a human right, the fact that they have monetary value does not mean that certain people will be unable to afford them -- anyone who verifies their unique identity is eligible to join the Democracy Earth Network and receive their tokens.

We have discussed previously how buying delegations is a difficult act to permanently enforce, given that every $VOTE owner can always revoke their delegations at any time. It is important to also note here that despite one being able to buy $VOTE tokens in the market, having more $VOTEs does not necessarily translate to having more power. The Democracy Earth platform brings elasticity in the potential configurations that can serve a democracy, so different kinds of institutions can be modeled. Any organization can set their Constitutional Smart Contract (the contract that will regulate how voting is structured within that organization) to permit one vote to be cast by each member, on each poll; in this case, possessing more tokens does not imply possessing more voting power. Even if someone had a million tokens, she or he could only validly cast one vote per issue, like everyone else.

A $VOTE token with financial value enables many benefits to citizens and communities. Even though they only possess a small value, this value helps citizens think more realistically about decisions. Scarcity (vs the artificial inflation of being able to "Like" everything, forever) enables decision-makers to send very clear signals about what matters most.

In the same way that institutions have a limited amount of resources to devote to different budgets and projects, and must prioritize their energy, attention, and money, so too voters must prioritize with their own resource of votes. Facebook presents a very good example of how expressions of decisions made via “Likes” - which have no financial value attached to them - can quickly become empty conversations with little impact. The sense of limitless possibilities that users get with a "Like", where they can "Like" everything that they want, is not useful when real-world decisions must be made. This has generated what we know as “slacktivism” where users get a sense of satisfaction from talking about issues online but those posts, "Likes" and shares rarely have consequences in the real world. Causes that effectively use Facebook activism to achieve change in legislation are the exception and not the rule, and usually require a series of efforts involving much more then the online platform. One of the reasons that online campaigning often fails to achieve their goals is due to the fact that “Likes” lack impact because they’re infinitely inflatable -- you can like as many things as you want, without any cost -- which diminishes their value. With blockchain-based $VOTE tokens, such expressions are deployed rationally by the users because each vote has a value. This more intentional use of votes can make advocacy movements online more meaningful, sending a precise and secure signal of citizens' preferences.

Facing this global recession of democracy and the growing dissatisfaction even in functioning democracies, a token-based liquid democracy provides a feasible alternative -- it allows citizens to participate exactly as much as they want to and to have more control than ever over the policy that govern their lives. Liquid Democracy holds potential to be the foundation of decision-making in virtual communities, as well as local communities and entire governments -- at a global scale. It enables citizens to be more informed and more empowered to engage with their own governance with their opinions being taken into account more often and on a wider range of issues. In liquid democracy, we have the coming together of technologies - smart phones, blockchains and cryptography - that will ensure everyone owns their own voice/VOTE on a system is incorruptible and censorship-resistant.

5.0 Crypto Politics

With this unit we return to the topic of bitcoin and blockchains but from a much wider perspective, this time exploring the inherently geopolitical nature of bitcoin. This includes examining the relationship of money and state, understanding what is meant by the genesis block, exploring the political nature of cryptography, and understanding the relationship between energy accounting and currency for not just crypto, but current fiat systems as well.

5.1 Bitcoin and Blockchains Are Inherently Political

screen shot 2018-08-06 at 18 54 48

5.1.1 The Divorce Between Money and State

The notion that money can be produced by an entity other than a nation-state has profound political implications. From as early as the Lydians, Greeks, and the Roman Empire, the state has been responsible for printing coinage. There have been sporadic and small incidences of the private issuance of currencies - such as in eighteenth century Scotland and in mid-nineteenth century America - but these have been far and away the exceptions. In the modern era, states typically respond with hostility to attempts to create alternative currencies as it is viewed as direct threat to their control of monetary policy and the economy as a whole. Bitcoin represents a divorce between money and the state that has never been seen at this large of a scale before, thus its issuance as a non-state currency makes bitcoin inherently geopolitical.

5.1.2 The Genesis

1tmreg

One needs to look no further than the genesis block of bitcoin to recognize its geopolitical nature. In the genesis block -- the first block on the bitcoin blockchain -- there was a headline from a British newspaper stating “03/Jan/2009 Chancellor on brink of second bailout for banks.” It is a reference to the events on the day of bitcoin’s beginnings but it also is a political message. The message could be read several different ways. It could be signaling the failure of the current monetary system, or highlighting the injustice of how large players were bailed out of the 2008 crisis while individuals were left to suffer, or pointing to how nation states will protect their economic interests at the costs of their citizens'.

Source: Federal Reserve Bank of St. Louis

The US Federal Reserve printed massive amounts of money after the financial crisis, ultimately injecting $3.9 trillion dollars into the US economy between 2008 and 2014. This process was just beginning when the genesis block was created, but it is significant that a currency that could not be touched by monetary policy was created just as the major global economies were about to engage in a serious program of it. Regardless of which reading one takes of the headline, the headline's inclusion was no accident and the decision to include it reveals that built into bitcoin is a challenge to the current economic and political system.

5.1.3 Encryption

Blockchains make use of another inherently geopolitical technology: that of encryption. Encryption is as old as the Roman Era, and is essentially a method for keeping information secret. The history of modern cryptography truly begins when Alan Turing built the first proto-computers to decrypt Nazi messages. The difficulty was that this was still single key encryption, where one was only able to encrypt and decrypt information using the same “key”. Reviewing what we covered in section 2.5, this meant that you had to be able to get the encryption key to the person you wanted to communicate with. An article in American Scientist articulates how this difficulty was gotten around with asymmetric cryptography, or public key encryption, i.e.:

“Two MIT mathematicians called Whitfield Diffie and Martin Hellman solved this in 1976 with a system they called “public key encryption.” Each user is given his own personal cypher system comprised of two “keys,” which are different but mathematically related to each other through their relationship to a shared prime number. The mathematics behind it is complicated, but the idea is simple: it means you can share your “public” key with everyone, and they can use it to encrypt a message into a meaningless jumble that can be decrypted only with your secret “private” key. Public key encryption transformed the potential uses of encryption, because suddenly people were able to send encrypted messages to each other without having to also exchange a code, and indeed without even having to ever meet at all.”

The government did not respond well to the invention of public key encryption. According to the article, “The United States had even classed powerful encryption as a “munition” in 1976 and made its export illegal without a license.” Encryption made it difficult for the state to maintain the same level of surveillance of the internet previously possible; it also made it easier for the citizens who used it to defend their data than, while making offensive data breaches extremely immpractical and unlikely to be successful. As explained in section two, public key encryption is an instrumental part of blockchain technology. Encryption and blockchain go hand in hand, with cryptocurrency presenting a form of money that could be equally as private as encrypted messages.

5.2 The Current Geopolitical Landscape

5.2.1 The Land and the Cloud

As we learned in previous units, currently individuals are caught between two realms: that of the land and that of the cloud. The land is a place where the nation state controls monopolies of force and money, but are limited/defined by by geography. Nation states are far from a constant throughout history, but since the Peace of Westphalia, nation states have slowly covered the entire globe, with the result that individuals find it difficult to move from place to place without special/required documentation to do so, such as passports. The cloud is the online realm that controls user data; here, individuals give control of their data to sites like Facebook, Google and other major corporations. The cloud may initially appear easier to navigate, given that individuals have the freedom to click from site to site, but power is nevertheless as centralized here as on land.

Both of these realms are deeply flawed. On the land, even among countries that have supposedly free and legitimate governing systems like democracies, there is decreasing voter participation, lack of transparency in how the votes are counted and collected, and a general distrust in the system. The cloud is equally troubled. Here, data is vulnerable due to the centralized nature of privately controlled sites: users have no ownership of their identity, and sites farm and monetize user attention for corporate profit/benefit, leaving users in content bubbles of unknown origin.

5.2.2 The Petrodollar

screen shot 2018-08-06 at 19 01 03

Bitcoin - and more specifically its associated blockchain - might offer a solution to the flaws of the Land and the Cloud, but some people are critical of it due to a misconception that maintaining blockchains is more costly than maintaining our current system. There has been a lot of uproar over the energy costs related to bitcoin mining. The amount of energy used mining bitcoin per year could power a country like Switzerland or the Czech Republic. This is a substantial amount of energy use. That being said, bitcoin’s energy consumption is highly transparent and quantifiable. The costs of maintaining the value of fiat currencies -- meaning currencies like the US dollar, the Euro, the Yen, or the Peso -- is also substantial but much more opaque. There is a massive cost to maintaining the value of the US dollar that is rarely if ever accounted for. Not even considering the cost of minting and distributing the US dollar, we will just examine one component that goes into maintaining the current value of the US dollar: oil trade. The US dollar was taken off of the gold standard in 1971 under President Richard Nixon. Almost immediately afterwards, Nixon made an arrangement with Saudi Arabia and the OPEC countries to conduct global oil deals in US dollars. This marked the transition to the US dollar as the “petrodollar.”

The concept of the “petrodollar” is far from a conspiracy theory. It was first defined by Dr. Ibrahim M. Oweiss in an address at Columbia University before the Conference on The World Monetary Crisis as “the U.S. dollar earned from the sale of oil, or they may be simply defined as oil revenues denominated in U.S. dollars.” The fact that oil is denominated in US dollars means that there will always be a demand for dollars in order to purchase oil. The US has monopolized the accounting of energy created by fossil fuels. When countries have attempted to conduct oil trade in non US dollars, it has led swiftly to armed conflict such as in the case of Iraq. Nuclear powers like China and Russia have been able to do so, but of course the cost of conflict with these powers would be much higher. We see that just one component of the maintenance of the value of the US dollar involves the international oil trade as well as all the very costly wars that have been fought to maintain US dominance of it. It is this total cost of energy for maintaining our current fiat that we must weigh against the energy consumption of bitcoin and other peer-to-peer currencies. The energy consumption of bitcoin may soon be immaterial: future innovations like transitioning from proof-of-work to proof-of-stake might make the energy consumption of cryptocurrency negligible. That being said, even under proof-of-work bitcoin is superior to fiat currency due to its honest ability to represent the true cost of energy usage in the modern world. In a world facing increasing environmental degradation due to energy use from fossil fuels, perhaps having an accurate record of the energy cost of the modern economy is a critical trait for a currency to possess.

5.3 Potential Changes in the Geopolitical Landscape due to Blockchain

5.3.1 Keeping Our Own Records

In the past, massive and reliable record keeping such as vote tallying and the recording of identities, was a job that had to be done by the nation state. Even in the modern era the tallying of votes in elections, except in a few extreme cases that merited international support, has been conducted by nation states. There has been no other reliable method available. Blockchain technology changes this paradigm. Blockchain technology makes it possible to tally votes on a decentralized network. This takes a large role away from the state. And while the perfect way to record identities in a decentralized manner on a blockchain has not yet been found, this is only a matter of time - decentralizing the provision of identity even further erodes the role of the state.

5.3.2 Less Vulnerable to Financial Crisis

With the invention of cryptocurrency, citizens of any country are not as vulnerable to the disasters that occur when governments conduct bad monetary policy.

Monetary policy is a government’s ability to determine the size of the money supply and to set interest rates. The process of inflation -- minting more money thus lowering the value of the money already in circulation -- is a key component of monetary policy. Whether or not governments should engage in inflation and to what degree is a hotly contested topic.

Some argue that a low degree of inflation, around 2%, is actually necessary for economic growth to take place. Others argue that governments merely inflate to fund their own projects such as military conflicts and that inflation penalizes those who save by constantly decreasing the value of their savings. Both sides generally agree that a high rate of inflation is always bad, because individuals spend all of their money immediately because of the knowledge that it will be worth less in the future if they do not.

This spending creates a cycle of worsening inflation as more and more money is put into circulation lowering its worth even more. If inflation gets high enough, typically into double digit percentage per year, it is called hyperinflation. This is currently occuring in Venezuela, with predictions of inflation rates reaching in 2018 (see: Reuters Report: Venezuela's annual inflation hits 82,766 percent in July. With cryptocurrency, citizens are given an alternative store of value and means of exchange. In face of their government's inability to conduct healthy monetary policy, it is no wonder so many Venezuelans have adopted Bitcoin and other peer-to-peer currencies.

Crypto's decentralized and censorship resistant structure also makes ambitious top-down economic schemes like a centrally planned Communist economy nearly impossible. One may view this inability to conduct monetary policy on cryptocurrency as a positive development or a negative one. Regardless, it represents a shift for nation states.

5.4 Three Major Types of National Responses to Cryptocurrency and Blockchain Technology

5.4.1 Adoption

Some countries have wholeheartedly embraced cryptocurrency and stand to gain much from doing so. These countries tend to be democratic countries that allow their citizens a greater degree of freedom. Early adopters of blockchain technology have included Switzerland, Estonia, and Japan. Estonia provides a striking example of the efficiency and cost savings that can happen through adoption of blockchains. Estonia allows cryptocurrency usage, ICOs, and has a comparatively low tax on cryptocurrencies. The country has gone so far as to transfer most of its government onto a blockchain: “E-Estonia” now handles online voting, online tax paying, and many other bureaucratic functions. This digitalization of state functions saves Estonia 2% of their GDP every year. In addition to such efficiency benefits, crypto-friendly countries draw blockchain development companies to their economies. Some countries have realized the benefits of embracing blockchain technology and have made their own laws more hospitable. An example of this is France in early May of 2018 lowering its capital gains tax on bitcoin and issuing a statement that specified the hope to "become a leader on positive cryptocurrency regulation."

5.4.2 Repression

Other countries have not been as welcoming to blockchain technology. Among countries actively repressing the technology is China. China has highly restricted who can trade bitcoin, even making it illegal for financial institutions to do so. Although individual trading of bitcoin is still technically allowed, China has closed down bitcoin exchanges and banned Initial Coin Offerings (ICOs). In early 2018, China announced it would begin a crackdown on bitcoin mining; since then dozens of mining farms have been shut down and had their equipment seized, and bitcoin media portrayals have been uniformly negative. There is much speculation over China’s motives for these repressive actions towards bitcoin. As a largely authoritarian country, China treats challenges to its control very seriously. Bitcoin’s network would opereate beyond the influence of Chinese government regulators - precisely the kind of challenge China is unlikely to permit. Another reading is the crackdown on bitcoin is simply part of a larger crackdown on reckless "shadow banking" that could lead to the scamming of citizens and ultimately hurt the economy.

Regardless, China is a good example of what the repression of bitcoin looks like. Other countries such as Iceland and Bolivia have instigated a more standard complete ban on their currencies being traded into bitcoin, but China serves as a much more interesting example given in 2017 Chinese miners were responsible for 60% of bitcoins mined. China’s recent crackdown on bitcoin, particularly on mining, is a dramatic example of how bitcoin repression can still be implemented -- at least to a certain degree -- even after adoption.

5.4.3 Subversion

petro_ cryptocurrency _logo

The subversion of cryptocurrency is an important response to examine. Venezuela's national cryptocurrency, the Petro, represents a subversion of both bitcoin and blockchain technology itself. In February 2018, Venezuela's Maduro regime issued the “Petro” token in what has been ironically dubbed an "Initial Country Offering". The Petro is backed by Venezuela's oil reserves; the token sale was launched on a private blockchain, but only after Maduro’s administration had seized bitcoin mining gear in surprise raids that used electrical grid usage to target miners. The trend to depress access to cryptocurrencies not controlled by the state is not likely to stop with Venezuela: Iran, China and Russia - among others - have expressed interest in launching Initial Country Offerings. These nation-state issued cryptocurrencies appear to be intended to undercut the use of other cryptocurrencies, providing citizens with obvious advantages -- fast transactions, ability to send money far away cheaply, ability to make small payments, ability to store wealth online -- while still not giving them the full (and most meaningful) benefits of cryptocurrency such as anonymity and censorship resistance. Such a strategy could effectively placate citizens into using state-run crypto, with the ironic result of blockchain providing the state wihth a means of greater surveillance and control.

Both repression and subversion will become more difficult if individuals become more educated on the benefits of cryptocurrency. Making sure that resources on blockchain tech and cryptocurrency are translated into the languages of countries suffering under repressive regimes is critical, and having hacktivists from those countries able to educate their peers could lead to wider adoption and discernment regarding the the values systems underlying different cryptocurrencies.

5.5 What Blockchain Technology Means for the Future

Early bitcoin adopters typically had a strong libertarian political streak, opposing government for various reasons including its perceived inefficiency, its immorality, its repressiveness of human potential. Bitcoin was seen as a way to liberate themselves from state control and to engage in an economic activity that actively countered the state’s power. Therefore a key question for many is, Does blockchain inherently support a libertarian agenda? For many, blockchain technology is first and foremost about enabling individual sovereignty. Sovereignty is a word that is typically applied only to rulers and to countries, but blockchain technology frees individuals from the intermediary control of rulers, allowing citizens to have a greater degree of control than ever before over their lives - to become self-sovereign, with the ability to govern their own lives. Blockchains offer citizens a world with autonomy, self-rule, and independence.

This increased personal sovereignty is the most conspicuous contribution of blockchain technology. Blockchain and cryptocurrency do undercut state control and very well could lead to a weakening -- and who knows, maybe even a collapse -- of nation states, especially in the case of ultra-repressive regimes, unable to enforce their own currency and voting mechanisms onto their citizens due to the cryptographic nature of this technology. This is not necessarily a negative outcome to be feared. There are many ways in which blockchains can be used to strengthen institutions and social safety nets, for example the previously mentioned enablement of Universal Basic Income (UBI) distrbution. The concept of UBI has been steadily gaining ground across the political spectrum as a (potentially necessary) means for combatting the effects of technology on job automation. While the the Democracy.Earth VOTE token will be distributed via Universal Basic Income mechanism, the same blockchain infrastructure could be applied to distrbute a UBI using any currency with the same smart contract-enabled transparency and taxation benefits. Through this example we can see that blockchain is, to a certain degree, ideology-agnostic. It is a technological development that can be used in many directions.

The intention here is not to litigate whether the libertarian view is correct or not, but merely to demonstrate how blockchain technology has the potential to support libertarian concepts as well as social programs and even taxation. Most importantly, blockchain technology will likely lead to greater efficiency both in the administration of social services and in the smart spending of taxes, and this increased efficiency is something that persons of all political stripes will likely support.

Ultimately, blockchain’s biggest contribution may be to democracy. Going back to the opening paragraph of this section, the biggest addition of blockchain is an ability for individuals to have more control over their lives than ever before. The decentralized structure of blockchains more directly mirrors democracy, with power being distributed among nodes just like power is distributed among voters. The censorship resistance of the blockchain ledger as well as its ability to be publicly viewed by anyone who downloads it means that it does not allow for corruption and manipulation. Right now, according to the Human Freedom Index 55% of the world’s population does not live in free countries. Thus access to a tool that allows individuals to circumvent repressive regimes in order to conduct elections and business - in short, to transact, and be heard - has the potential to radically improve personal freedoms and lives.

6.0 Decentralized IDs

Throughout the last few units we have learned about blockchain technology, the new forms of governance it enables, and developments in the world that have made it necessary, yet there is still a missing component: a decentralized ID system is one of the most crucial remaining pieces required for realizing the full potential of the blockchain ecosystem and a decentralized internet.

There are challenges that we must overcome to create this ID system: we want to protect it from being exploited by persons creating fake identities, plus we want to ensure that the system is truly decentralized, meaning that no organization holds disproportionate or unilateral power over it. In this section we explore the promises and challenges of creating a truly decentralized ID system, as well as the format of digital citizenship for the Democracy Earth Network, bringing the benefits of blockchain to anyone fulfills the requirements to join (as described below).

6.1 Challenges with online identity

In order for an online idenity to be valid it needs to be able to demonstrate two things -- that behind its keys there is a living person, and that the keys are singular.

Proving that someone is living means showing that the keys are not connected to a bot, an AI, or some other wholely invented persona, but a real self-conscious entity.

Proving that the keys are singular means showing that each identity is connected to a single individual, not a duplicate -- like someone hijacking the picture and a name of someone who actually exists, or the same person having multiple accounts.

Proving these things in the physical world is not too difficult, but proving them online is something else altogether.

6.1.1 The Sybil Attack

screen shot 2018-08-13 at 13 11 36

Building a secure decentralized digital ID system is a critical defense against Sybil Attacks. In peer-to-peer systems, there is no central authority to attest that a digital identity (an online signifier, like a key or an IP address) corresponds to an entity (a person in the real world), so it is always possible for such an entity to forge/present more than one identity (IP addresses, website profiles, etc) - also known as a Sybil attack.

This is important becausse a single person using a Sybil attack could sway a critical vote by presenting as hundreds of online identies. Another way a Sybil Attack could hurt a system is by overpowering the system's defenses against fake identities. Say a platform asks users to examine other people's profiles to see if they look real and unique, someone could hypothetically make so many fake accounts that they were both the checker and the person being checked, easily able to falsely claim that fake profiles correspond to real and unique persons.

Solving the problem of the Sybil Attack is not only crucial for voting but also for another component of the Democracy Earth Network: the secure distribution of a Universal Basic Income (UBI), which provides a strong incentive for fake identity creation. This is an ongoing research problem being pursued by many different teams, especially within the distributed ledger sphere, and more technical details can be explored here.

6.1.2 Not all online identity systems are created equal

Imagine that all your information -- from your grades to your parking tickets to your taxes -- could be stored in one place, while being secure and accessible only by you and those you personally allow access. Imagine that you could vote online, from anywhere in the world, and that your entire medical history was able to be selectively disclosed to doctors at any time. Imagine that you could search up a politician and see every piece of land they own, sign online forms with a digital signature, or become a digital citizen and start a business without ever entering the country. All of this is already the case in Estonia, dubbed "the first digital republic".

The power of an online ID system holds the potential to reshape the way we interact with governments, leading to more convenience for citizens and less bureaucratic costs for countries. Nevertheless, in a world where data is the new oil, centrally managed digital identities tend to be highly vulnerable to exploits by malicious actors. In India, for example, the Aadhaar system centrally stores the biometric information of over one billion people -- and after it was shown that it was possible to buy someone’s data for less than $10, many citizens fear that the system is not secure enough.

6.1.3 The problems with online identity

Identity centered around paper and plastic credentials works well in day-to-day life (for those fortunate enough to have them) however the same arrangement has been much harder to duplicate online. Challenges arise on many different areas. The first and most obvious of them all is the matter of not being able to physically meet someone and verify that the person is real and corresponds to the image and information that is contained in her or his identity card. Doing that simple check online, for example, is a mechanism that can potentially be hacked with technology.

Several other factors also present a challenge to realizing a digital ID in a responsible way.

The first thing to acknowledge is that we already have online identities and use them on a daily basis: those are our Google and Facebook credentials, and the several others that we have to create in order to be able to navigate the digital realm and access its different services. According to the password management company LastPass, the average business user has an average of 191 passwords (and seven times more the number of passwords that they think they have). The management of such fragmented hubs of personal data is not only excessively time consuming, but it's very complexity is what makes it open to all kinds of attacks by hackers that can profit from accessing that personal data. In the era of data being the new oil, better protection is a prerogative to any kind of responsible identity system.

The fundamental issue with those protocols is that they are not user-centric. What we mean by this is that they are not designed to satisfy the needs of individuals, but instead of each organization or identity hub that has created them. Users are at the service of those organizations, volunteering information, managing several passwords, and being at their mercy for access to digital services. The scenario can look different, where users control they data and can selectively reveal facts and attestations about themselves, having full control of how that data is used or monetized from.

6.2 Self-sovereign ID

Self-sovereign identity systems solve the above problems using decentralization and cryptography. Decentralized identity has been difficult because one of the core requirements of a functional identity system is the ability to look up credentials that are provided to you. In the past, this has always led to centralized directories, which has led to centralized identity systems.

However, with blockchain technology, attestations about your identity can be stored in a place that you control entirely, attached to a single blockchain address / digital wallet. In the effort to develop a system that avoids the pitfalls inherent to centralization, or delegating power to machines and algorithsm, Democracy Earth includes two human-centric concepts: Little Brothers and Attention Mining.

6.2.1 Little Brothers

Anyone on the network can participate to verify new self-sovereigns. That means that instead of relying on large intermediators that validate an individulas identity - i.e. a Big Brother -, Democracy Earth's decentralized identity system will leverage the trust already present in existing networks that validate identities - i.e Little Brothers.

A little brother could be an organization, or another human willing to vouch for someone's identity. In such a system an individual’s membership to a certain group can be revoked without compromising his overall identity, since there is no single Big Brother with universal power. These Little Brothers can also be scored on the percentage of their members which are found to be fake, and thus have an incentive to keep their membership as accurate as possible. A proof-of-identity should expire after a given period of time in order to increase the security of the system and ensure that only living users are participating in the network.

6.2.2 Attention Mining

A self-sovereign identity must be voluntarily generated by the user claiming it. For this purpose the user must broadcast a proof of his or her identity that strictly satisfies a criteria that can be met by human judgement, while remaining resistant to automation and artificial intelligence.

In attention mining, human attention serves the purpose of voting on self-generated identities after checking for legitimacy and/or duplication. The exact terms of the voting and the claims that must be submitted will be decided by the Democracy Earth Network and included as a part of Democracy Earth's Consitutional Smart Contract, which will be set in place with the main purpose of regulating the identity-approval process.

There are many different possibilities for this process. Some tactics include video-proofs (such as was done for Roma Siri, the first blockchain-registered baby or creating reputation scores for validators. An interesting expansion of the video proof idea that some groups have been exploring is so-called “online pseudonym parties”, where individuals are randomly assigned to video chat in groups of 4-6 and use conversation to verify that each identity has a real human behind it. Due to the current state-of-the-art with natural language processing, such verification parties would remain highly resistant to automation and serve as a useful tool in the fight against sybil attacks. As the shape and form of sybil attacks are constantly changing, the fundamental aspect of Democracy Earth's decentralized identity system is the Constitutional Smart Contract that regulates its validation process - an adaptable tool that can respond to the ever-changing threats, through the input of Democracy Earth Network citizens.

6.4 Properties of a decentralized ID system

screen shot 2018-08-13 at 16 54 41

In a decentralized ID system, any organization or person can issue whatever claims they want; you’re free to store whatever claims you like in your wallet; and claim verifiers are able to choose what claims they trust. Decentralizing these choices ensures the flexibility necessary for self-sovereign identity systems to be used for almost any purpose.

To be self-sovereign, an identity system must have certain properties:

  • Persistent: An identity that can be taken away is not self-sovereign. Identifiers in a self-sovereign identity system are long-lived, non-reusable by someone else and owned by the person who creates them. People aren’t the only ones who need self-sovereign identities. Organizations and connected things also need them, and can use the same infrastructure as individuals.

  • Peer-based: This sort of ID system allows individuals to have control over a larger segment of their life, granting them greater sovereignty over their data and their identity. Outside of this segment, individuals interact with others as peers. People are in control of the relationships they form and the information they share, but others get to make the same choices for themselves. Self-sovereign identity systems aren’t client-server, but rather peer-to-peer.

  • Privacy protecting: Self-sovereignty puts the person in control of how information is shared. Consequently, any identity system that doesn’t prevent correlation, minimize attribute disclosure, and provide for explicit consent puts people’s information at risk and removes it from their control.

  • Portable: Self-sovereignty implies choice and control. Vendor lock-in, wherein people cannot take their data from platform to platform, destroys both. Identifiers and associated credentials must be portable and self-sovereign identity systems must be interoperable to protect choice and control.

Self-sovereign ID systems introduce options which were not previously possible, such as Zero-Knowledge Proofs.

6.4.1 Zero-Knowledge Proofs  

Zero-Knowledge Proofs (ZKP) are a difficult topic but we will address the topic briefly in order for readers to see the array of possibilities they enable. ZKPs allow a person to prove things about themselves, based on verifiable claims, without having to reveal the claim itself. This reduces the amount of data given out by a person. For example, a ZKP can simply reveal that the holder of the claim is over 18 without revealing the date of birth or even their age.

Another example could be a virtual loan application: you could prove that you hold more than $500 in assets, without revealing what the actual number is - whether you have $501 or $5,000,000. Furthermore, you could prove your ownership of >$500 without revealing any of the other attestations/attributes connected to your identity.

6.5 The Promise of Decentralized IDs

Once a reliable decentralized ID protocol is developed, it will expand access to fundamental human rights and economic mobility to an unprecedented amount of people, allowing individuals to retain more power over their own lives and identity than has ever been possible before. The peer-to-peer nature of a decentralized ID system could allow for things like decentralized credit scores, which would allow people to build a portable reputation and allow them to use new services, like micro-loans.

Democracy Earth's decentralized ID will be an ERC725, which is a standardized Ethereum interface for identities. The ERC725 will be the "ID card" that every member of the network will hold. This identity will hold keys to sign actions (transactions, documents, logins, access, etc), claims, as well as a proxy function to act directly on the blockchain. Every user, once able to have his identity approved, will receive his ERC725 and therefore be considered a citizen of the Democracy Earth Network, with voting and Universal Basic Income rights.

7.0 Blockchain Governance

In Unit 6, we focused on a particular problem that is troubling the blockchain space, that of Decentralized IDs. For our final unit we are broadening our view to look at the governance of blockchains in general, and how these networks and protocols are mantained and continuously updated.

7.1 Open source and Decentralized

We will start by looking into two of the largest blockchains: bitcoin and Ethereum. Their organizational structure is often hard for people to grasp. How are blockchains maintained and updated if there is no centralized or single governing structure?

The first thing to understand is that the code behind both blockchains is open source, meaning that it is transparently available for anyone who wants to see it, analyze it or modify it...even copy it. As you read in the first unit, open source is both an ethos and a series of procedures used for developing and updating code. It is an ethos because it is used by people who believe that software should be available for free, be transparent, and have a truly democratic and meritocratic process of creation. So-called cyberpunks not only believe that open source is the right way to develop software, but also that open source makes for better software.

Open source is a series of procedures because it involves making code available on some easily accessible website, often github, allowing for others to copy it as well as propose changes or additions. The original code for bitcoin was publicized via cryptography email lists: today it can be downloaded from GitHub.

The second thing to know is that these networks are decentralized, meaning that the nodes maintaining the network are ultimately independent - there is no single actor that can impose a certain version of the code onto others. If someone who is a developer decided to start a node but wanted to modify the code in some way, they could do so. That modified version of the code would only be run on that particular node but if that code is publicized, which developers frequently do, then any person running a node who likes the updated code could also modify the code of their node and then run the updated version.

7.2 Off-chain Governance

With regards to bitcoin and Ethereum, the discussions about changes to the code run on the nodes are organized around bitcoin / Ethereum Improvement Proposals. These are debated extensively on different channels, and any developer can take part in this collaborative process. This is what is known as OFF CHAIN governance, meaning that there is not a governance structure specified by the protocol for how the network evolves.

Even in this decentralized system, there is some hierarchy for practical purposes, with repository maintainers -- individuals who accept changes or “pull requests” on Github -- as well as a "lead maintainer" who is responsible for the release cycle, overall merging, moderation and appointment of maintainers. Maintainers operate transparently and are accountable, yet they do have their own vision for the future of the network and divergences within the community happen. If the code is changed to a point where it becomes incompatible with the original code, the network has a choice: either everyone adopts the new code.... or there will be what is called a “fork”.

A fork happens when a large enough group wants to adopt the changed code that is no longer compatible with the old code, but with a significant minotiry that does not want to make the adoption. Essentially, at this point two cryptocurrencies are created -- the original crypto with the original code, and the new branch that is running the updated code. Forking has happened occurred in the history of both bitcoin and Ethereum history, and both have weathered the forks.

This is why these networks are considered to be open source and governed in a decentralized way - anyone can view the code and anyone can modify it, but only for their own node. There is no way to coerce other nodes into adopting a change if they do not want to do so. There are many developers and groups of developers that work on improving bitcoin’s code, but none dominate the network which means that it would be very difficult for any one group to take charge of the network.... and very difficult for anyone to shut it down.

Although this is the model chosen by the bitcoin and Ethereum projects (where the bitcoin community tends to be more strict about changes, and Ethereum less so), there are in fact many ways to operate a blockchain network. One of the main criticisms to the off-chain model is that it is a system open to abuse, because of the inherent hierarchy it has. Developers, for example, are often funded by private institutions, each with its own agenda, and different players can try to tip the network in different directions according to their own incentives. It is also not a very transparent decision-making process, with decisions made in an unpredictable way on a variety of channels, making it somewhat difficult for participants to track exactly what/how decisions are being made.

7.3 On-chain Governance

The other main governance structure for blockchains is ON-CHAIN governance, where voting, consensus and transparent rewards for the developers are deployed to make the network more secure. This makes decisions clear and easy to follow. One criticism to on-chain governance is that it takes autonomy away from the users. In an off-chain model, the nodes have to update their client manually to align with the new chain, giving them more control and independence -- meaning they could choose to not update with a change they did not agree with. In the on-chain model, updates that go through the determined governance process of their respective networks are deployed automatically to all nodes regardless of how they voted.

At Democracy Earth we understand that governance is the main challenge of blockchain networks, and we are exploring the properties of liquid democracy and quadratic voting to contribute to it. Similar to on-chain governance, eventually the Democracy Earth platform will be used to make decisions about the Democracy Earth Network itself.

Ultimately, these blockchain networks protect freedom, so it is important that they maintain their resistance to any kind of censorship. So far, the community around cryptocurrencies has done a terrific job in this respect, calling out bad initiatives and efforts.

An incident in 2017 provides a good example of how censorship resistance can be challenged, and how the community can respond. The incident involved a fork that was designed to increase bitcoin's scalability: the fork was proposed as an agreement between corporations from all over the world who needed those changes to improve their ability to serve their clients with services related to bitcoin. Although it was an understandable need, the bitcoin community was extremely adamant in its refusal to accept an agreement made by a small group of influential actors, and the fork was eventually called off. Bitcoin's development process, although slightly anarchical, has a zealous community of watchers who constantly push for maintaining the integrity of the project.

7.4 Actors

There are several different types of actors within a blockchain network, each with unique positions and incentives, each pushing for different proposals. Using the bitcoin network as an example, let’s examine the main classes of actors that compose the network:

Miners: Miners are key to the network because they continue adding new blocks to the chain and checking the validity of the transactions. They also bring new bitcoins into the system by triggering the mining rewards. Their incentives include gaining block rewards and transaction fees. As a result, miners are likely to favor changes that would increase the value of their existing holdings, and would increase or maintain the block rewards and transaction fees. There are different ways to mine, the most common being CPU (computer processors), GPU (graphics cards), and ASICs. ASICs are specialized devices which are optimized to perform mining and no other task. The development and use of ASICs can make mining unprofitable for smaller individual miners using GPUs and CPUs. Forks which enable ASIC resistance are seen as a way to avoid monopolies over the mining process by large central actors, but it can end up being a kind of arms-race as ASIC developers have the incentive to develop new devices which bypass the ASIC resistance.

Developers: Developers play a vital role, from envisioning the protocol to maintaining the blockchain by making updates to it. They help shape future implementations and provide direction to the community as a whole. Developers' incentives include potentially increasing their existing holdings and gaining popularity in the community for their contributions. Among blockchains that use off-chain governance, like bitcoin, there isn’t a strong mechanism in place to incentivize people to contribute towards the development of the system, such as a payment program. This is an issue for many blockchains that want to operate in a truly decentralized way but also need help with routine development needs. Private funding and crowdsourcing exist but there is not a robust reward mechanism in the protocol of the bitcoin blockchain, or of many other blockchains for developers who were not part of the initial team or foundation, to participate.

Users: Users are incentivized to favor upgrades, which would not only increase the price of their existing holdings but also improve the core functionality of the system, for example the speed with which transactions are processed. Some users choose to store a copy of the ledger on their computer to check its validity for themselves - these are called full nodes. Others choose instead to interact with the blockchain through a web based service.

While it is obvious that all the different participants have some common incentives, mismatches of incentives do exist and put strain on the network. For example, users and developers can push for upgrades which would drastically decrease the transaction fees and incidentally hurt the miners in a way that it is impossible for the network to sustain economically. Similarly, miners can push for upgrades which could drastically inflate the block rewards which in the long run might hurt the network. The blockchain as a whole must work to find a sustainable middle ground for problems like this.

7.5 Visions

Changes are not only driven by financial incentives, but also by competing visions of how blockchains should develop in the future and what kind of role they should have in our society. One great example is the contention regarding the size that a bitcoin block should have - how many transactions it can accommodate. This is also known as the scalability debate. Rather than being a simple technical matter, in many ways it is an academic debate and an ideological one. Here are two opposing arguments:

A portion of the bitcoin community are known as Maximalists. Maximalists desire “sound money” that cannot be inflated away or be at risk of confiscation. These individuals believe that, for the foreseeable future, the goal of the Bitcoin project is not to facilitate the buying of coffee, but to become “high-powered” money that can become an international standard -- like an even better form of gold -- that can be used by all international banks to settle transactions among them. Therefore the raw block space is not meant to facilitate small-value individual transactions. It is believed by this group, that its usage is for settling transactions of a larger value, where a comparatively small mining fee would not be an issue. This group is not likely to favor changes related to increasing the size of a block to add more transactions: for them, security and technological robustness is the main priority, not scalability. They are also not as concerned with changes that benefit the miners, but instead believe that nodes are in control of what bitcoin validates, and that a large number of validating nodes is what matters most. This is why they advocate for people to download a full node and have a wallet that connects directly with the network and helps maintain it, instead of using third parties.

On the other hand we have the Bitcoin Cash community. For them, Bitcoin should have unrestricted block sizes in order to facilitate peer-to-peer payments without bounds, and they argue that Satoshi’s original intention was to create a peer-to-peer electronic currency, as opposed to something like digital gold. They generally cite the title and abstract of the Bitcoin whitepaper as proof of their correctness, as well as Satoshi’s statements regarding a phased-in approach to increase the block size, among other writings. These supporters generally believe that the Bitcoin system should not be a settlement layer solely for those who can afford to pay increasing fees, such as banks and other wealthy entities. They want to see the network facilitating more, and smaller, transactions.

The beauty of forking is that both communities have the ability to promote their ideas. Bitcoin Cash forked off of Bitcoin, and despite the contentious debates about what should be the priority of the cryptocurrency community, those battles do not involve any kind of physical violence. This is why we understand blockchain-based currencies as a great alternative to the US dollar, which maintains its value and hegemony partially through the use of violence. Our contribution to these challenges is to continue fostering a governance that is based on ideas, and where the best proposals with the most legitimacy can win.

References

[1] https://www.theguardian.com/women-in-leadership/2016/feb/23/how-one-womans-app-is-changing-politics-in-the-digital-age