return ✕︎

Association and ⿻ Publics

By E. Glen Weyl, Audrey Tang and ⿻ Community

Association and ⿻ Publics

As the cacophony of war reverberated through the narrow streets of the Middle Eastern city, a relentless barrage of gunfire and the ghostly dance of flames cast a shroud over the metropolis, with a blackout plunging nearly half of it into fear-strewn darkness. The digital backbone of the city, once a beacon of interconnected brilliance, lay in tatters—government databases lay in ruin, communications networks severed by skilled enemy hacks, leaving the city's guardians grappling for any remaining strategies to wrest back control from the chaos.

Amidst the chaos, the hope of an entire nation rested on a group of hackers. They were the last bastions of defense, the last guardians. This decentralized group convened a hackathon aptly named “Guard.” Faisal was one of them. In a world in chaos, the group’s unwavering determination and skill had made them a beacon of hope.

Slipping on his headset, he activated his assistive agent, establishing an untraceable internet address. He turned on the privacy option of his digital wallet, showcasing his proof of citizenship and a myriad of credentials from hackathons gone by. Such precautions had become essential in these dark times.

As Faisal entered the “Guard” interface, it seemed just like any other online chatroom. The anonymity was palpable, as no one spoke or even typed a message. All that could be seen were silent avatars representing participants. But the difference lay in its secure foundation, which stopped anyone in the room from showing its contents to those outside while ensuring everyone there had heard exactly what was said in this last bastion of hope.

The host, the only voice in the silent room, began, “Several introductions and ground rules are about to show on your screen. Each of you will be asked questions to confirm your presence.” A warning followed, highlighting the risk of expulsion for non-compliance or suspicion.

Soon, a virtual Roman soldier appeared on screen, laying out the grand vision of “Guard”—to construct a decentralized defense system for the digital city. Faisal quickly went through the questions, and upon returning to the main room, found that only half of the initial participants remained. This filtering process seemed to break the ice, as the room came alive with chatter.

Wasting no time, the guardians began their mission. Faisal, with his expertise, was naturally drawn to the power grid security group. But their conversation was interrupted by a sudden ring. Faisal picked up the phone, and the voice from the other side rushed, “Have you gotten anything? We need the rest of the power grids down.”

The urgency in the voice was palpable. Faisal replied, "I can't find a secretive way in. The security is covered by the protocols. I can formally request access, but everyone must agree." He continued, "If even one participant objects, I might receive a copy, but I won't be able to discern if it's authentic."

"Is there no way to duplicate the original code?" the voice asked, desperation evident.

“I'll keep trying,” Faisal promised.


In his classic summary of his observations of Democracy in America, French aristocrat and traveler Alexis De Toqueville highlighted the centrality of the civic association to American self-government “Nothing...is more deserving of our attention than the intellectual and moral associations of America." Furthermore, he believed that such associations were necessary for political action and social improvement because equality across individuals had rendered large-scale action by individuals alone impossible: "If men are to remain civilized...the art of associating together must grow and improve in the same ratio in which the equality of conditions is increased."[1]

No individual has ever, alone, made political, social or economic change. Collective efforts, through political parties, civic associations, labor unions and businesses, are always necessary. For ⿻, these and other less formal social groupings are just as fundamental as individuals are to the social fabric. In this sense, associations are the Yin to the Yang of personhood in the most foundational rights and for the same reason are the scourge of tyrants. Again, to quote De Tocqueville, "No defect of the human heart suits [despotism] better than egoism; a tyrant is relaxed enough to forgive his subjects for failing to love him, provided that they do not love one another." Only by facilitating and protecting the capacity to form novel associations with meaningful agency can we hope for freedom, self-government and diversity.

The potential of computers and networking to facilitate such association was the core of Lick and Taylor's vision of "The Computer as Communication Device": "They will be communities not of common location, but of common interest."[2] In fact, as of this writing the online version of the popular English dictionary Merriam-Webster defined an association precisely this way: "an organization of persons sharing a common interest".[3] Given their shared goals, beliefs, and inclinations, Lick and Taylor believed these communities would be able to achieve far more than pre-digital associations. The only challenge the authors foresaw was that of ensuring that "'to be on line'...be a right" rather than "a privilege". Much of this vision has, of course, proven incredibly prescient as many of today's most prominent political movements and civic organizations formed or achieved their greatest success online.[4]

Yet, perhaps paradoxically, there is an important sense in which the rise of the internet has actually threatened some of the core features of free association. As Lick and Taylor emphasized, forming an association or community requires establishing a set of background shared beliefs, values and interests that form a context for the association and communication within it. Furthermore, as emphasized by Simmel and Nissenbaum, it also requires protecting this context from external surveillance: if individuals believe their communications to their association are being monitored by outsiders, they will often be unwilling to harness the context of shared community for fear their words will be misunderstood by those these communications were no intended for.

The internet, while enabling a far broader range of potential associations, has made the establishment and protection of context more challenging. As information spreads further and faster, knowing who you are speaking to and what you share with them has become challenging. Furthermore, it has become easier than ever for nosy outsiders to spy on associations or for their members to inappropriately share information outside the intended context. Achieving Lick and Taylor's dream, and thus enabling the digital world to be one where ⿻ associations thrive, requires, therefore, understanding informational context and building ⿻ systems that support and protect it.

Therefore, in this chapter, we will outline a theory of the informational requirements for association. Then we will discuss existing technologies that have begun to aid or could aid in the establishment of context and in its protection. We will then highlight a vision of how to combine these technologies to achieve not privacy or publicity but rather "⿻ publics", the flourishing of many associations of common understanding protected from external surveillance, and why this is so critical to supporting the other digital rights.

Associations

How do people people form "an organization of persons sharing a common interest"? Clearly, a group of people who simply happen to share an interest is insufficient. People can share an interest but have no awareness of each other, or might know each other and have no idea about their shared interest. As social scientists and game theorists have recently emphasized, the collective action implied by "organization" requires a stronger notion of what it is to have an "interest", "belief" or "goal" in common. In the technical terms of these fields, the required state is what they call (approximate) "common knowledge".

To motivate what this means to a game theorist, it may be helpful to consider why simply sharing a belief is insufficient to allow effective common action. Consider a group of people who all happen to speak a common second language, but none are aware that the others do. Given they all speak different first languages, they won't initially be able to communicate easily. Just knowing the language will not do them much good. Instead, what they must learn is that the others also know the language. That is, they must have not just basic knowledge but the "higher-order" knowledge that others know something.[5]

The importance of such higher-order knowledge for collective action is such a truism that it has made its way into folklore. In the classic Hans Christian Andersen tale of "The Emperor's New Clothes", a swindler fools an emperor into believing he has spun him a valuable new outfit, when in fact he has stripped him bare. While his audience all see he is naked, all are equally afraid to remark on it until a child's laughter creates understanding not just that the emperor is naked, but that others appreciate this fact and thus each is safe acknowledging it. Similar effects are familiar from a range of social, economic and political settings:

  • Highly visible statements of reassurance are often necessary to stop bank runs, as if everyone thinks others will run, so will they.[6]
  • Denunciations of "open secrets" of misdeeds (e.g. sexual misconduct) often lead to a flood of accusations, as accusers become aware that others "have their back" as in the "#MeToo" movement.[7]
  • Public protests can bring down governments long opposed by the population, by creating common awareness of discontent that translates to political power.[8]

Mathematically, "common knowledge" is defined as a situation where a group of people know something, but also know that all of them know it, and know that all of them knows that all of them knows it and so on ad infinitum. "Common belief" (often quantified by a degree of belief) is when a group believes that they all believe that they all believe that... A great deal of game theoretic analysis has shown that such common belief is a crucial precondition of coordinated action in "risky collective action" situations like the above where individuals can accomplish a common goal if enough coordinate but will be harmed if they act without support from others.[9]

While the common beliefs of a group of people are obviously related to the actual shared beliefs of their average members, they are conceptually distinct. We all know of examples when some "conventional wisdom" or norm persisted even though, individually and privately, almost everyone in a group disagreed with it; in fact, it was precisely this observation that led economist J.K. Galbraith to coin the idea of "the conventional wisdom".[10] Furthermore, we can use this notion of community to refer not just to beliefs about facts, but also moral or intentional beliefs. We can think of a "common belief" (in the moral sense) of a community as being things that everyone believes everyone else holds as a moral principle and believes everyone else believes that everyone holds, etc. Similarly, a "common goal" can be something everyone believes others intend and believes everyone believes everyone intends and so on. Such "common beliefs" and "common intentions" are important to what is often called "legitimacy", the commonly understood notion of what is appropriate.[11]

In game theory, it is common to model individuals as collections of intentions/preferences and beliefs. This notion of community gives a way to think about groups similarly and distinctly from the individuals that make them up, given that common beliefs and intentions need not be the same as those of the individuals that are part of that group (on average): group beliefs and goals are common beliefs and goals of that group. In this sense, the freedom to create associations can be understood as the freedom to create common beliefs and goals. Yet creating associations is not enough. Just as we argued in the previous chapter that protecting secrets is critical to maintaining individual identity, so too associations must be able to protect themselves from surveillance, as should their common beliefs become simply the beliefs of everyone, they cease to be a separate association just as much as an individual who spills all her secrets ceases to have an identity to protect. As such, privacy from external surveillance or internal over-sharing is just as critical as is establishing associations to their freedom.

It is little surprise, then, that many of the historical technologies and spaces that come to mind when we think of the freedom of association are precisely geared toward achieving common beliefs and shielding common beliefs from external beliefs from outsiders. Searching, in the imagery online or the writings of political philosophers, for "freedom of association" typically yields images of protests in public spaces, meetings in public spaces like parks and squares and group discussions in private clubs.[12] As illustrated above, group meetings and statements made openly in front of group members are crucial to achieving common beliefs and understanding among that group. Private pamphlets may achieve individual persuasion, but given the lack of common observation, game theorists have argued that they struggle to create public beliefs in the same way a shared declaration, like the child's public laughter, can.

But purely public spaces have important limitations: they do not allow groups to form their views and coordinate their actions outside the broader public eye. This may undermine their cohesion, their ability to present a united face externally, and their ability to communicate effectively harnessing an internal context. This is why associations so often have enclosed gathering places open only to members: to allow the secrecy that Simmel emphasized as critical to group efficacy and cohesion.[13] The crucial question we thus face is how systems of network communication can offer the brave new world of "communities of interest" these same or even more effective affordances to create protected common beliefs.

Establishing context

To the extent parks and squares are the site of protest and collective action, we might well search for a digital public square, a function many platforms have purported to serve.[14] Sites on the original World Wide Web offered unprecedented opportunities for a range of people to make their messages available. But as Economics Nobel Laureate Herbert Simon famously observed, this deluge of information created a paucity of attention.[15] Soon it became hard to know if, who and how one was reaching an audience with a website and proprietary search systems like Google. Proprietary social networks like Facebook and Twitter became the platforms of choice for digital communication, but only partly addressed the issue as they had limited (and usually pay-for) affordances for understanding audiences. The digital public square had become a private concession, with the CEO of these companies proudly declaring themselves the public utility or public square of the digital age while surveilling and monetizing user interactions through targeted advertising.[16]

A number of recent efforts have begun to address this problem. The World Wide Web Consortium (W3C) published Christine Lemmer Webber and Jessica Tallon's ActivityPub standard as a recommendation to enable an open protocol for social networking that has empowered open systems like Mastodon to offer federated, decentralized services similar to Twitter to millions of people around the world. Twitter itself recognized the problem and launched the BlueSky initiative in 2019 which rapidly gained attention after the acquisition of Twitter (now X under his leadership) by Elon Musk. Philanthropist Frank McCourt has invested heavily in Project Liberty[17] and its Decentralized Social Networking Protocol as another, blockchain-based foundation for decentralized networking. While it is hard to predict exactly which of these will flourish, how they will consolidate and so forth, the recent struggles of X combined with the diversity of vibrant activity in this space suggests the likelihood of cooperation and convergence on some open protocol for usable digital publication.

Yet publicity is not the same as the creation of community and association. Posting online resembles much more the distribution of a pamphlet than the holding of a public protest. It is hard for those seeing a post to know who and how many others are consuming the same information, and certainly to gauge their views about the same. The post may influence their beliefs, but it is hard for it to create common beliefs among an identifiable group of compatriots. Features that highlight virality and attention of posts may help somewhat, but still make the alignment of an audience for a message far coarser than what is possible in physical public spaces.

One of the most interesting potential solutions to address this challenge in recent years has been distributed ledger technologies (DLTs) including blockchains. These technologies maintain a shared record of information and append something to this record only when there is "consensus" (sufficient shared acknowledgment of the item to be included) that it should be. This has led cryptographers and game theorists to conclude that DLTs hold special promise in creating common beliefs among the machines on which they are stored.[18] Arguably this is why such systems have supported coordination on new currencies and other social experiments.

Yet even such community among machines does not directly imply it among the people operating these machines. This problem (from the perspective of creating community) is exacerbated by the financial incentives for maintaining blockchains, which lead most participants, motivated by financial gain, to run "validator" software rather than monitor activity directly. This also implies those participating are likely to be whoever can profit, rather than those interested in common, non-commercial action. Nonetheless one can imagine, as we will below, DLTs being an important component of a future infrastructure of association.

Protecting context

If establishing context is primarily about creating strong social notions of publicity, protecting context is about strong social notions of privacy. And, just as with technologies of publicity, those of privacy have primarily been developed in a more atomistic monist direction than in ones that support ⿻ sociality.

The field of cryptography has long studied how to securely and privately transmit information. In the canonical "public key cryptography" scheme, individuals and organizations publish a public key while privately holding its controlling counterpart. This allows anyone to send the holder an encrypted message that can only be decrypted by their private key. It also allows the key controller to sign messages so that others can verify the authenticity of the message. Such systems are the foundation of security on the internet and throughout the digital world, protecting email from spying, and allowing end-to-end encrypted messaging systems like Signal and digital commerce.

Building on top of this foundation and branching out from it, a number of powerful privacy-enhancing technologies (PETs) have been developed in recent years. These include:

  • Zero-knowledge proofs (ZKPs)- these allow the secure proof of a fact without leaking the underlying data. For example, one might prove that one is above a particular age without showing the full driver's license on which this claim is based.
  • Secure multi-party computation (SMPC) and homomorphic encryption- These allow a collection of individuals to perform a calculation involving data that each of them has parts of without revealing the parts to the others and allow for the process to be verified both by themselves and others. For example, a secret ballot can be maintained while allowing secure verification of election results.[19]
  • Unforgeable and undeniable signatures- These allow key controllers to sign statements in ways that cannot be forged without access to the key and/or cannot be denied except by claiming the key was compromised.[20] For example, parties entering into a (smart) contract might insist on such digital signatures just as physical signatures that are hard to forge and hard to repudiate are important for analog contracts.
  • Confidential computing- This solution to similar problems as above is less dependent on cryptography and instead accomplishes similar goals with "air gapped" digital systems that have various physical impediments to leaking information.
  • Differential privacy- This measures the extent to which disclosures of the output of a computation might unintentionally leak sensitive information that entered the calculation.[21] Technologists have developed techniques to guarantee such leaks will not occur, typically by adding noise to disclosures. For example, the US Census is legally required both to disclose summary statistics to guide public policy and keep source data confidential, aims that have recently been jointly satisfied using mechanisms that ensure differential privacy.
  • Federated learning- Less a fundamental privacy technique than a sophisticated application and combination of other techniques, federated learning is a method to train and evaluate large machine learning models on data physically located in dispersed ways.[22]

It is important to recognize two fundamental limitations of these techniques that depend most on cryptography (especially the first three); namely that they depend on two critical assumptions. First, keys must remain in the possession of the desired person, a problem closely related to the identity and recovery questions we discussed in the previous chapter. Second, almost all cryptography in use today will break and in many cases its guarantees be undone by the advent of quantum computers, though developing quantum-resistant schemes is an active area of research.

Furthermore, these technical solutions increasingly intersect and integrate with a range of technical standards and public policies that support privacy. These include cryptographic standards set by governments, privacy regulations and rights such as the EU General Data Protection Regulation and standards for the inter-operation of encryption.

Yet a basic limitation of almost all this work is the focus on protecting communication from external surveillance rather than from internal over-sharing. Preventing external snooping is obviously the first line of defense, but anyone who followed the saga of US National Security Agency leaker Edward Snowden knows that internal moles and leaks are one of the most important threats to information security. While military intelligence is the most dramatic example, the point stretches much further, especially in the internet age. Increasingly common phishing attacks rely on social engineering, not the ability of the attacker to "crack the code." As highlighted in works ranging from danah boyd's classic study It's Complicated to Dave Eggers's book and film The Circle, the ease of credibly sharing digital information has made the danger of over-sharing a constant threat to privacy.[23]

The basic problem is that while most cryptography and regulation treat privacy as about individuals, most of what we usually mean when we talk about privacy relates to groups. After all, there is almost no naturally occurring data that pertains to exactly a single individual. Let's revisit some of the examples of the social life of data from the previous chapter.

  • Genetic data: genes are, of course, significantly shared in a family, implying that the disclosure of one individual's genetic data reveals things about her family and, to a lesser extent, about anyone even distantly related to her. Related arguments apply to many medical data, such as those related to genetic conditions and transmissible diseases.
  • Communications and financial data: communications and transactions are by their nature multiparty and thus have multiple natural referents.
  • Location data: few people spend much of their time physically distant from at least some other person with whom they have common knowledge of their joint location at that moment.
  • Physical data: There are many data that are not personal to anyone (e.g. soil, environmental, geological). One of the only truly individualistic data are the bureaucratically created identifying numbers created as part of identity schemes deliberately for the purpose of being individualistic, and even these actually pertain not to the individual alone but to her relationship to the issuing bureaucracy.

This implies that in almost every relevant case, unilateral disclosure of data by an individual threatens the legitimate privacy interests of other individuals.[24] Protecting privacy therefore requires protecting against unilateral over-sharing. This has generally been thought essentially impossible to externally enforce, as anyone who knows something can share that information with another. Strategies have thus primarily focused on norms against over-sharing, gossiping and the like, tools to aid individuals in remembering what they should not share, attempts to make it hard to secretly over-share and policies to punish ex post facto those who do engage in oversharing. All of these are important strategies: literature, media and everyday experience are full of shaming for over-sharing and enforcement against leakers. Yet they fall far short of the guarantees enforced by cryptography, which does not merely condemn snoops but locks them out of systems.

Is there any chance of doing something similar for over-sharing? One common approach is simply to avoid data persistence: SnapChat rose to prominence with disappearing messages, and many messaging protocols have since adopted similar approaches. Another more ambitious cryptographic technique is "designated verifier proofs" (DVPs) which prove authenticity only to a single recipient while appearing potentially forged to everyone else.[25] Such an approach is only useful for information that cannot be independently verified: if someone over-shares a community password, DVPs are not of much use as unintended recipients can quickly check if the password works.

Yet most types of information are harder to independently and immediately verify. Even the location of buried treasure requires significant resources to pursue and dig up, otherwise the many adventure stories about such would not be nearly as interesting. As generative foundation models make persuasive deception ever cheaper, the importance of verification will grow. In such a world, the ability to target verification at an individual and rely on the untrustworthiness of over-shared information may be increasingly powerful. As such, it may be increasingly possible to protect information more fully from over-sharing, as well as snooping.

⿻ publics

If properly combined in a new generation of networking standards, a combination of these tools could give us the capacity to move beyond the superficial traditional divide between "publicity" and "privacy" to empower true freedom of association online. While we usually think of publicity and privacy as a one-dimensional spectrum, it is easy to see that another dimension is equally important.

Consider first information "hidden in plain sight", lost in a pile of irrelevant facts, available to all but reaching the awareness of no one a bit like Waldon in the popular American children's game "Where's Waldo?" where children must find a man in a striped shirt hidden in a picture. Contrast this with the secret of the existence of the Manhattan Project, which was shared among roughly 100,000 people but was sharply hidden from the rest of the world. Both are near the midpoint of the "privacy" v. "publicity" spectrum, as both are in important ways broadly shared and obscure. But they sit at opposite ends of another spectrum: of concentrated common understanding v. diffuse availability.

This example illustrates why "privacy" and "publicity" are far too simplistic concepts to describe the patterns of co-knowledge that underpin free association. While any simple descriptor will fall short of the richness we should continue to investigate, a more relevant model may be what elsewhere we have called "⿻ publics". ⿻ publics is the aspiration to create information standards that allow a diverse range of communities with strong internal common beliefs shielded from the outside world to coexist. Achieving this requires maintaining what Shrey Jain, Zoë Hitzig and Pamela Mishkin have called "contextual confidence", where participants in a system can easily establish and protect the context of their communications.[26]

Luckily, in recent years some of the leaders in open standards technologies of both privacy and publicity have turned their attention to this problem. Lemmer Webber, of ActivityPub fame, has spent the last few years working on Spritely, a project to create self-governing and strongly connected private communities in the spirit of ⿻ publics, allowing individual users to clearly discern, navigate and separate community contexts in open standards. A growing group of researchers in the Web3 and blockchain communities are working on combining these with privacy technologies, especially ZKPs.[27]

One of the most interesting possibilities opened by this research is achieving formal guarantees of combinations of common knowledge and the impossibility of disclosure. One could, for example, create ledgers distributed among members of a community group using DVPs. This would create a record of information that is common knowledge to this community and ensure this information (and its status as common knowledge) could not be credibly shared outside this community. Additionally, if the protocol's procedure for determining "consensus" relied on more sophisticated voting rules than at present such as those we describe in our chapter on voting below, it might instantiate richer and more nuanced notions of common knowledge than present ledgers.

Furthermore, all the space around these topics is suffused with work on standards: for cryptography, blockchains, open communications protocols like Activity Pub, etc. It therefore does not require great stretches to imagine these standards converging on a dynamically evolving but widely accepted technical notion of an "association" and therefore broadly observed standards enabling associations online to form and preserve themselves. Such a future could enshrine a right to digital freedom of association.

Association, identity and commerce

In 1995, one of De Tocqueville's most prominent heirs, political scientist Robert Putnam, began documenting the decline of American civic life starting in the 1960s in his essay "Bowling Alone". He attributes this to a corresponding reduction in participatory community associations such as fraternal organizations, religious groups and parent teacher associations, leading to his quip that there are more people bowling and fewer bowling leagues. He argues that the decrease in associative behavior directly affects the development of social capital and trust which "facilitate coordination and cooperation for mutual benefit."[28]

Putnam addresses several possible reasons but focuses in particular on television and the "privatizing" of our leisure time, noting that "television has made our communities ... wider and shallower." His essay preceded the modern Internet but we might import into his argument a phrase from our contemporary digital lives: there's an app for that. A challenge then for the extraordinary reach of 21st century digital technology is the harnessing of that power to form meaningful communities and deeper social interactions. Strong community engagement also cultivates robust civic discourse where social and political problems can be hashed out by constituent citizens.

Digital freedom of association is tightly connected to the other freedoms we discuss in this part of the book. As we saw in the previous chapter, "privacy" is at the core of the integrity of identity systems yet concerns usually labeled as such are more appropriately connected to the diversity of contexts an individual navigates rather than privacy in an individualistic sense. Thus, the right to freedom of association and the right to the integrity of personhood are inseparable: if it is our entanglement in a diversity of social groups that creates our separateness as a person, it is only by protecting the integrity of that diversity that separate personhood is possible. And, of course, because groups are made up of people, the opposite is true as well: without people with well-articulated identities, there is no way to create groups defined by common knowledge among these persons.

Furthermore, the right of free association is the foundation on which commerce and contracts are built. Transactions are among the simplest forms of association and how digital transaction systems can replicate the privacy that is often touted as a core benefit of cash depends intimately on who can view what transactions at what resolution. Contracts are more sophisticated forms of association and corporations even more so. All rely heavily on information integrity and common understandings of obligations. In this sense, the freedom of association we outlined in this chapter, together with identity in the last, are the linchpins for what follows in the rest of the book.


  1. Alexis De Tocqueville, Democracy in America, (Lexington, Ky: Createspace, 2013), also available at https://www.gutenberg.org/files/815/815-h/815-h.htm. ↩︎

  2. Joseph Licklider, and Robert Taylor, “The Computer as a Communication Device,” Science and Technology, April 1968, also available at https://internetat50.com/references/Licklider_Taylor_The-Computer-As-A-Communications-Device.pdf. ↩︎

  3. See https://www.merriam-webster.com/dictionary/association. ↩︎

  4. Japanese philosopher Kojin Karatani explores this concept in his book "The Principle of NAM." Karatani argues that individuals belong not only to geographical regions but also to global "regions" based on their interests. He calls this the "rhizomatic association" and depicts it as a network formation system consisting of diverse "regions." This concept resembles the network structure where small, closely-knit communities are interconnected. Kojin Karatani (2000). "NAM原理" 太田出版 (Published in Japanese. Not translated in English). In this year Karatani founded the New Associationist Movement in Japan. It was an anti-capitalist, anti-nation-state association inspired by experiments with Local Exchange Trading Systems. ↩︎

  5. That common knowledge is precisely the foundation of context against which communication must optimize is elegantly formally proven by Zachary Wojowicz, "Context and Communication" (2024) at https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4765417. ↩︎

  6. Stephen Morris and Hyun Song Shin, "Unique Equilibrium in a Model of Self-Fulfilling Currency Attacks", American Economic Review 88, no. 3 (1998): 587-597. ↩︎

  7. Ing-Haw Cheng and Alice Hsiaw, "Reporting Sexual Misconduct in the #MeToo Era", American Economic Review 14, no. 4 (2022): 761-803. ↩︎

  8. Timur Kuran, Private Truth, Public Lies: The Social Consequences of Preference Falsification (Cambridge, MA: Harvard University Press, 1998). ↩︎

  9. Stephen Morris and Hyun Song Shin, "Social Value of Public Information", American Economic Review 92, no.5 (2002): 1521-1534. ↩︎

  10. John Kenneth Galbraith, The Affluent Society (New York: Houghton Mifflin, 1958). ↩︎

  11. Vitalik Buterin, "The Most Important Scarce Resource is Legitimacy" March 23, 2021 at https://vitalik.eth.limo/general/2021/03/23/legitimacy.html. ↩︎

  12. Pragmatist political philosophy Richard Rorty wrote "We can urge the construction of a world order whose model is a bazaar surrounded by lots and lots of exclusive private clubs." Richard Rorty, "On ethnocentrism: A reply to Clifford Geertz" Michigan Quarterly Review 25, no. 3 (1986): 533. ↩︎

  13. George Simmel. “The Sociology of Secrecy and of Secret Societies.” American Journal of Sociology 11, no. 4 (January 1906): 441–98. https://doi.org/10.1086/211418. ↩︎

  14. Eli Pariser, "Musk’s Twitter Will Not Be the Town Square the World Needs", WIRED October 28, 2022 at https://www.wired.com/story/elon-musk-twitter-town-square/. ↩︎

  15. Herbert Simon, Designing Organizations for an Information-Rich World (Baltimore, MD: Johns Hopkins University Press, 1971): pp. 37-52. ↩︎

  16. danah boyd, "Facebook is a utility; utilities get regulated" May 15, 2010 at https://www.zephoria.org/thoughts/archives/2010/05/15/facebook-is-a-utility-utilities-get-regulated.html. ↩︎

  17. Frank McCourt, and Michael Casey, Our Biggest Fight: Reclaiming Liberty, Humanity, and Dignity in the Digital Age, (New York: Crown, 2024). ↩︎

  18. Joseph Y. Halpern and Rafael Pass "A Knowledge-Based Analysis of the Blockchain Protocol" (2017) available at https://arxiv.org/abs/1707.08751. ↩︎

  19. Josh Daniel Cohen Benaloh, Verifiable Secret-Ballot Elections, Yale University Dissertation (1987) at https://www.proquest.com/openview/05248eca4597fec343d8b46cb2bef724/1?pq-origsite=gscholar&cbl=18750&diss=y. ↩︎

  20. David Chaum and Hans van Antwerpen, "Undeniable Signatures" Advances in Cryptology -- CRYPTO' 89 Proceedings 435: 212-216 https://link.springer.com/chapter/10.1007/0-387-34805-0_20. ↩︎

  21. Cynthia Dwork, Frank McSherry, Kobbi Nissim and Adam Smith, "Calibrating Noise to Sensitivity in Private Data Analysis", Theory of Cryptography (2006): 265-284. ↩︎

  22. Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson and Blaise Aguera y Arcas, "Communication-Efficient Learning of Deep Networks from Decentralized Data" Proceedings of the 20th International Conference on Artificial Intelligence and Statistics (2017). ↩︎

  23. danah boyd, It's Complicated: The Social Lives of Networked Teens (New Haven, CT: Yale University Press, 2014). Dave Eggers, The Circle (New York: Knopf, 2013). ↩︎

  24. danah boyd, "Networked Privacy" June 6, 2011 at https://www.danah.org/papers/talks/2011/PDF2011.html. Daron Acemoglu, Ali Makhdoumi, Azarakhsh Malekian and Asu Ozdaglar, "Too Much Data: Prices and Inefficiencies in Data Markets" American Economic Journal: Microeconomics 14, no. 4 (2022): 218-256. Dirk Bergemann, Alessandro Bonatti and Tan Gan, "The Economics of Social Data" The RAND Journal of Economics 53, no. 2 (2022): 263-296. ↩︎

  25. Markus Jakobsson, Kazue Sako and Russell Impagliazzo, "Designated Verifier Proofs and Their Appliations", Advances in Cryptology--EUROCRYPT '96 (1996): 143-154. ↩︎

  26. Jain Shrey, Zoë Hitzig, and Pamela Mishkin, “Contextual Confidence and Generative AI,” ArXiv (New York: Cornell University, November 2, 2023), https://doi.org/10.48550/arxiv.2311.01193. See also Shrey Jain, Divya Siddarth and E. Glen Weyl, "Plural Publics" March 20, 2023 from the GETTING-Plurality Research Network at https://gettingplurality.org/2023/03/18/plural-publics/. ↩︎

  27. Elena Burger, Bryan Chiang, Sonal Chokshi, Eddy Lazzarin, Justin Thaler, and Ali Yahya, “Zero Knowledge Canon, Part 1 & 2,” a16zcrypto, September 16, 2022, https://a16zcrypto.com/posts/article/zero-knowledge-canon/.https://a16zcrypto.com/posts/article/zero-knowledge-canon/. ↩︎

  28. Robert Putnam, “Bowling Alone: America’s Declining Social Capital,” Journal of Democracy 6, no. 1 (1995): 65–78 and Bowling Alone: The Collapse and Revival of American Community (New York: Simon & Schuster, 2000). ↩︎