<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="/rss/feed-stylesheet.xsl"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:georss="http://www.georss.org/georss" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"><channel><title><![CDATA[networkstate.mp3 3Speak Podcast]]></title><podcast:guid>39eef49c-066b-5c30-9038-15e7e1f003d6</podcast:guid><itunes:author><![CDATA[Network State Audio Book]]></itunes:author><itunes:owner><itunes:name>Network State Audio Book</itunes:name><itunes:email>networkstate.mp3@3speak.v4v.app</itunes:email></itunes:owner><itunes:explicit>clean</itunes:explicit><description><![CDATA[Listen and watch the latest videos from networkstate.mp3. Hosted by 3Speak.tv. The free speech video platform on the HIVE blockchain.]]></description><link>https://3speak.tv/user/networkstate.mp3</link><atom:link rel="hub" href="https://hub.livewire.io/"/><atom:link href="https://3speak.tv/rss/networkstate.mp3.xml" rel="self" type="application/rss+xml"/><podcast:hiveAccname>networkstate.mp3</podcast:hiveAccname><podcast:medium>video</podcast:medium><image><url>https://images.hive.blog/u/networkstate.mp3/avatar/large</url><title>networkstate.mp3 3Speak Podcast</title><link>https://3speak.tv/user/networkstate.mp3</link></image><itunes:image href="https://images.hive.blog/u/networkstate.mp3/avatar/large"/><podcast:podping hiveAccount="podping.spk"/><podcast:podping hiveAccount="podping.bol"/><generator>https://3speak.tv</generator><lastBuildDate>Sun, 05 Apr 2026 15:41:10 GMT</lastBuildDate><copyright><![CDATA[2021 Network State Audio Book]]></copyright><language>en</language><ttl>60</ttl><podcast:value type="lightning" method="lnaddress" suggested="0.00000050000"><podcast:valueRecipient name="Network State Audio Book" type="lnaddress" address="networkstate.mp3@sats.v4v.app" split="95"></podcast:valueRecipient><podcast:valueRecipient name="Podping" address="podping@sats.v4v.app" type="lnaddress" fee="True" split="4"></podcast:valueRecipient><podcast:valueRecipient name="Podcastindex.org" address="podcastindex@getalby.com" type="lnaddress" fee="True" split="1"></podcast:valueRecipient></podcast:value><podcast:value type="HBD" method="transfer" suggested="0.05"><podcast:valueRecipient name="podcaster" type="account" address="networkstate.mp3" split="98"></podcast:valueRecipient><podcast:valueRecipient name="host" type="account" address="threespeak" split="1"></podcast:valueRecipient><podcast:valueRecipient name="podcastindex" type="account" address="podcastindex" split="1"></podcast:valueRecipient></podcast:value><item><title><![CDATA[Chapter 25. Examples of Self-Funded Communities and Initiatives - Audio Version]]></title><itunes:author><![CDATA[Network State Audio Book]]></itunes:author><itunes:episodeType>full</itunes:episodeType><link>https://3speak.tv/watch?v=networkstate.mp3/knegninp</link><pubDate>Sat, 18 Oct 2025 14:25:12 GMT</pubDate><dc:creator>networkstate.mp3</dc:creator><guid isPermaLink="false">hive-129940/@networkstate.mp3/knegninp</guid><description><![CDATA[<p><a href="https://3speak.tv/watch?v=networkstate.mp3/knegninp" rel="nofollow noopener" title="This link is not safe!">https://3speak.tv/watch?v=networkstate.mp3/knegninp</a> <br />-----------------------<br />
<strong>Securing Digital Rights for Communities (Game Theory and Governance of Scalable Blockchains for Use in Digital Network States)</strong></p>
<hr />
<h1>Chapter 25. Examples of Self-Funded Communities and Initiatives</h1>
<p><em>Already, so much is being done in the physical world</em></p>
<p><img src="https://files.peakd.com/file/peakd-hive/networkstate/23vhqV87ox2Ei5aqeosrKZ23nAwQ2mf8FKvqpxRaiywyF7kCQ4Msc8k5YxEkKxJ5uDyks.png" alt="25c.png" /></p>
<h2>25.1 Increased Security</h2>
<p>Beyond the examples below there are countless others and such independently funded initiatives will only continue to grow.  An important note is that where this technology continues to assist people with basic services and infrastructure where their governments failed to due to corruption or incompetence, any attempt to shut down or oppose such it will likely be met with resistance from local people who benefit from the benefits it provides.  The result is that neutral blockchains that carry out such work, not only help local communities, but they increase the distribution of their own tokens by benevolent means, which indirectly strengthens the protocol and its security against hostile shut downs by governments.</p>
<p>It is difficult to attack or shut down a system that is legitimately helping people who were not previously served by their existing systems.</p>
<h2>25.2 Ghana Borehole Projects</h2>
<p>In Ghana, local groups have successfully utilized decentralised autonomous organizations (DAO's) to fund the construction of boreholes, providing clean water to communities lacking direct access. By submitting proposals and documenting their progress on-chain, they have secured community support and funding.</p>
<p>As of the date of publishing, the Ghana water borehole project has installed 21 water wells for villages that previously did not have access to fresh water.</p>
<p>See link for latest progress and evidence for all 21 boreholes installed: <a href="https://hive.blog/hive-176874/@mcsamm/progress-update-on-the-21st-hive-borehole-project">https://hive.blog/hive-176874/@mcsamm/progress-update-on-the-21st-hive-borehole-project</a></p>
<p><strong>Key Points</strong></p>
<ul>
<li><strong>Transparent DIRECT Funding:</strong> Budgets and construction processes are documented on-chain, ensuring transparency without a facilitating charity accepting donations and taking a cut of the funds to cover its own operational costs.  Funds are sent directly from the blockchain to local, trusted people who have built reputation on chain over time</li>
<li><strong>Community Trust:</strong> Successful projects build trust, enabling further funding for subsequent initiatives.</li>
<li><strong>Real-World Impact:</strong> Access to clean water improves health and daily life for thousands.</li>
</ul>
<p>This approach bypasses traditional<br />
charitable institutions, which often have high administrative costs, by using on-chain reputation and proof-of-work content to ensure donations reach intended projects.</p>
<h2>25.3 Ghana Health Checks</h2>
<p>Building on the success of the Ghana borehole initiative, the same groups in Ghana have organized dental and health check-ups for remote villagers who do not have access to such services. Securing DAO funding and maintaining transparency through on-chain documentation, they provide free healthcare services to underserved communities.</p>
<p>See link for further details of this initiative: <a href="https://hive.blog/hive-176874/@hive.ghana/idhhbowu">https://hive.blog/hive-176874/@hive.ghana/idhhbowu</a></p>
<p><strong>Key Points</strong></p>
<ul>
<li><strong>Healthcare Accessibility:</strong> Offering free dental and health services to communities in need.</li>
<li><strong>Reputation Growth:</strong> Consistent project delivery fosters community support and enables larger-scale funding.</li>
</ul>
<h2>25.4 Venezuela: Street Acrobatics and Infrastructure</h2>
<p>In Venezuela, groups have obtained funding for equipment, shows, and community-building efforts. They promote their activities through various channels, bringing attention to decentralised funding models.</p>
<p><strong>Key Points</strong></p>
<ul>
<li><strong>Grass-roots Development:</strong> Small teams receive on-chain funding to purchase merchandise and organize events.</li>
<li><strong>Local Empowerment:</strong> Initiatives benefit individuals with limited economic opportunities.</li>
</ul>
<h2>25.5 Cuba and Mexico: Paying Utility Bills with Content Rewards</h2>
<p>In parts of Cuba and Mexico, individuals create on-chain content to earn rewards, which they can convert into local currency or use to pay utility bills. This system is particularly impactful in regions with limited banking services or where remittances incur high fees and restrictions.</p>
<p><strong>Key Points</strong></p>
<ul>
<li><strong>Daily Necessities:</strong> Users generate content, such as blog posts or community updates, to earn tokens.</li>
<li><strong>Real Bills Paid:</strong> Services exist to convert these tokens directly into utility payments, reducing reliance on traditional banks.</li>
</ul>
<p>By circumventing conventional financial gatekeepers, these users demonstrate how decentralised currencies can provide tangible benefits in areas with restrictive or expensive financial systems.</p>
<h2>25.6 Why It Matters</h2>
<ul>
<li><strong>Improved Security</strong> Providing grass roots, locally operated services and infrastructure where government was not able to increases token distribution, social image, local support and therefore security of the network.</li>
<li><strong>Neutral, Decentralised Funding:</strong> No single corporation controls the treasury; funds are allocated through community-approved proposals based on reputation and transparent reporting.</li>
<li><strong>Direct Accountability:</strong> All spending is documented through immutable on-chain posts, allowing donors or voters to see exactly how funds are utilized, reducing corruption and mismanagement.</li>
<li><strong>Real-World Impact:</strong> From building water wells to supplying medication and paying essential bills, on-chain funding models deliver concrete results in underserved regions.</li>
<li><strong>Incentivized Community Participation:</strong> Individuals who provide high-quality work and transparent reporting enhance their on chain reputation, attracting more votes and social trust for future initiatives.</li>
<li><strong>Scalable Model:</strong> These projects can inspire similar initiatives worldwide, with each region adapting decentralised tools to address local challenges.</li>
</ul>
<h2>Conclusion</h2>
<p>These examples illustrate how self-funded, reputation-based blockchain communities can achieve what traditional charities and governments often struggle with: direct, efficient delivery of aid, physical infrastructure and services. Whether providing clean water in Ghana, supporting community initiatives in Venezuela, or assisting families in Cuba and Mexico with utility payments, on-chain funding brings transparency and accountability.</p>
<p>By eliminating intermediaries and enabling communities to vote directly on proposals, these projects build lasting trust and deliver genuine impact. In a world where many lack basic infrastructure or face restrictive financial systems, decentralised initiatives offer a promising glimpse into the potential of blockchain governance and funding in the future.</p>
]]></description><image url="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeiemyws4xn4huh3awgkjtzegmkn73wc6ykjivdxrmn5ntkn5pin2ge/" title="Chapter 25. Examples of Self-Funded Communities and Initiatives - Audio Version image"/><itunes:explicit>false</itunes:explicit><itunes:image href="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeiemyws4xn4huh3awgkjtzegmkn73wc6ykjivdxrmn5ntkn5pin2ge/"/><enclosure  url="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeicvprmmntbi4c6pgwtqdrg65kv5fpwxrgodkgonopnnlvvgiup4pm" length="109096876" type="video/mp4"/></item><item><title><![CDATA[Chapter 24. Future Implications - Audio Version]]></title><itunes:author><![CDATA[Network State Audio Book]]></itunes:author><itunes:episodeType>full</itunes:episodeType><link>https://3speak.tv/watch?v=networkstate.mp3/tmibmcan</link><pubDate>Sat, 18 Oct 2025 14:21:25 GMT</pubDate><dc:creator>networkstate.mp3</dc:creator><guid isPermaLink="false">hive-129940/@networkstate.mp3/tmibmcan</guid><description><![CDATA[<p><a href="https://3speak.tv/watch?v=networkstate.mp3/tmibmcan" rel="nofollow noopener" title="This link is not safe!">https://3speak.tv/watch?v=networkstate.mp3/tmibmcan</a> <br />-----------------------<br />
<strong>Securing Digital Rights for Communities (Game Theory and Governance of Scalable Blockchains for Use in Digital Network States)</strong></p>
<hr />
<h1>Chapter 24. Future Implications</h1>
<p><em>How power is decentralised via tokenised, self-sovereign Network States in the future</em></p>
<p><img src="https://files.peakd.com/file/peakd-hive/networkstate/23tvVr8KutK9eyuThkJcScCGo6uYiuXpuT3Jn4GEPoE9zEDZjayUBmvgJZzLFSHXUfp4x.png" alt="24c.png" /></p>
<h2>Introduction</h2>
<p>The future implications of systems being built that broadly follow the guidelines outlined in this book are detailed below.  Decentralised communities and Network States that can be created by following the guidelines in this book secure Digital Rights for all and have profound implications for the future of humanity and its ability to secure its freedom in the digital and then, with the adoption and implementation of Network States, the real world.</p>
<h2>24.1 Social Media Account Not Owned by Silicon Valley Companies, Digital Self-Sovereignty and Guaranteed Free Speech</h2>
<p>Accounts on the immutable base layer cannot be deleted or suspended. As long as the network runs, these accounts and their followers remain intact. This gives individuals true ownership over their identities and speech, reducing the risk of being de-platformed. People can express themselves more freely, knowing their accounts will not disappear due to centralised decisions.</p>
<p>When the social accounts of community members exist on the base layer of such Web3 technology as outlined in this book, Web2 social media companies like Facebook, Instagram, Twitter, Google and others no longer control the keys to your account.  They exist outside of the Web2 social platform's control.  Social platforms become Layer 2 system that allow the Layer 1 accounts to log into them.  In this way, the social media platforms cannot confiscate, manipulate or delete your social account any longer. Your social account exists on a neutral Layer 1 which has its own economy and self funding mechanisms, which is controlled by the community, not private companies.  The same is true for your followers lists and the communities that you build; they all exist on Layer 1 and therefore cannot be deleted by any individual entity or Web2 tech company.</p>
<p>Content is served from the Layer 1 because the social platforms all tap into the same content database on Layer 1. This combined with the sovereignty of your social account now means that free speech and the right to express ideas within a community is already guaranteed for all people online who posses such Web3, DPoS social accounts, without the influence of a company or intermediary.</p>
<p>This also means that wherever you login with your Web3 Social account, you take your followers lists, account history, reputation, community, merits and achievements with you to each Web3 enabled platform you use.</p>
<h2>24.2 No Longer Possible to Manipulate History</h2>
<p>In addition to protecting speech, such networks preserve all interactions and historical events on-chain. Attempts to erase or rewrite the record are virtually impossible once multiple nodes independently store the information.</p>
<p>A key outcome of these decentralised systems is that history stored on-chain cannot be changed or erased. Once data is published, the record stays intact as long as the network operates. This makes it difficult for any authority to revise past events and ensures a permanent record of social, economic, and governance actions and data. Once existing Wikis and Encyclopedias begin using such technology to document present affairs, History will be preserved, protected by the community's super majority, elected consensus.</p>
<h2>24.3 Impossible to Shut Down</h2>
<p>By design, these networks are highly resilient. When governance and infrastructure are distributed among many participants with no central authority, there is no single point of failure. Even if an outside party tries to take over or attack the network, the original community can fork away and move to a new chain, leaving the attacker alone on the old chain. Ironically, attempted takeovers often enrich the original community, as hostile actors must buy large amounts of tokens on the open market.</p>
<h2>24.4 Money Attacks Can Strengthen Communities</h2>
<p>If a hostile entity purchases a significant share of tokens to dominate the network, they raise the token price in the process. Original holders can sell at higher values or fork to create a new chain, leaving the attacker with worthless tokens on the old fork. In this way, an economic attack can backfire, making the community wealthier, more united and more motivated, while the attacker ends up holding depreciated assets.</p>
<h2>24.5 Holding Abusive Oligarchs to Account</h2>
<p>These protocols also allow communities, a new, novel and tested way to deal with abusive large holders who fail to reinvest in the community or who harm the network. If a single individual accumulates an excessive share and exploits users, the community can collectively decide to fork, granting the abusive oligarch zero balance on the new chain. This mechanism avoids traditional violent revolutions by enabling digital secession from exploitative stakeholders.</p>
<h2>24.6 Network State Communities and Governments</h2>
<p>Over time, many believe governments will begin recognizing these decentralised, online "Network States." Some may cooperate, some will oppose and others may launch competing versions. Either way, communities that run their own economies, distribute governance rights, and store data on censorship-resistant chains could become akin to self-sovereign states, operating largely on voluntary participation rather than imposed authority.</p>
<h2>24.7 Rebalancing of Power</h2>
<p>Currently, a handful of national governments hold tremendous monetary power through fiat issuance. Soon, hundreds or even thousands of decentralised digital communities may issue their own currencies, manage their own governance, and command real economic influence. This diffusion of power could reshape global politics and economics.</p>
<h2>24.8 Fee-less DeFi</h2>
<p>In most existing DeFi (Decentralised Finance) systems, each transaction incurs gas or network fees. On high-traffic chains, these fees can be prohibitively expensive. By contrast, fee-less models allow users to stake tokens based on them possessing resource credits instead of paying a gas token for every transaction. This creates more inclusive finance where people can trade, lend, or provide liquidity without constant fees. Systems such as Honeycomb and VSC (Built on Layer 2 systems on The Hive Blockchain, for further information and definitions of these two systems see Annex I – Glossary of Terms and Acronyms) are already developing fee-less DeFi and Smart Contract capabilities.</p>
<p>See the following links for further information on these systems:<br />
Honeycomb Layer 2 Smart Contracts: <a href="https://www.hivehoneycomb.com/" rel="nofollow noopener" title="This link is not safe!">https://www.hivehoneycomb.com/</a><br />
VSC Layer 2 Smart Contracts: <a href="https://vsc.eco/" rel="nofollow noopener" title="This link is not safe!">https://vsc.eco/</a></p>
<h2>24.9 Competition with Traditional Models</h2>
<p>Fee-based chains may struggle to serve a global user base for everyday transactions. As fee-less alternatives mature, they could challenge established DeFi ecosystems by significantly reducing barriers to entry and increasing user adoption.</p>
<h3>Conclusion</h3>
<p>Emerging blockchain architectures, where communities store data, govern themselves, and issue tokens signal major shifts in how people will organize in future. They enable:</p>
<ul>
<li><strong>Immutable Records:</strong> History and accounts cannot be altered or de-platformed.</li>
<li><strong>Social Account Self-Sovereignty</strong> Accounts are owned outside of Silicon Valley Web2 company control.</li>
<li><strong>Free Speech</strong> Text communication is stored publicly on a neutral consensus based Layer 1 which is almost impossible to shut down or modify without a community super majority fork for anomalous situations.</li>
<li><strong>Autonomous Communities:</strong> Groups can run their own decentralised infrastructure and economies without being shut down or regulated by centralised entities.</li>
<li><strong>Resistance to Takeovers:</strong> Hostile actors enrich original participants but rarely succeed in capturing the network.</li>
<li><strong>Evolving Global Order:</strong> Network States may coexist with or challenge traditional governments and financial systems. In some cases they will demonstrate how they can improve existing governmental system and provide them with renewed legitimacy.</li>
<li><strong>Fee-less Finance:</strong> Decentralised finance without high transaction costs can boost accessibility and everyday utility.</li>
</ul>
<p>In short, these technologies are poised to disrupt power structures, incentivize more equitable governance models, and grant greater self-sovereignty to digitally native communities. The economic, political, and social implications are vast and still unfolding.</p>
]]></description><image url="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeie6kmsaazs5hmyjtu3db3opyz3phtj6t53sgvzmcnfw4ct6ptwbhq/" title="Chapter 24. Future Implications - Audio Version image"/><itunes:explicit>false</itunes:explicit><itunes:image href="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeie6kmsaazs5hmyjtu3db3opyz3phtj6t53sgvzmcnfw4ct6ptwbhq/"/><enclosure  url="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeia4eomvkyjd6ezvxlmoztypdbegn6twi5mu4bgzodxclz6jold3km" length="119461380" type="video/mp4"/></item><item><title><![CDATA[Chapter 23. A New Model for Startup Funding - Audio Version]]></title><itunes:author><![CDATA[Network State Audio Book]]></itunes:author><itunes:episodeType>full</itunes:episodeType><link>https://3speak.tv/watch?v=networkstate.mp3/avbmilxn</link><pubDate>Thu, 16 Oct 2025 14:00:07 GMT</pubDate><dc:creator>networkstate.mp3</dc:creator><guid isPermaLink="false">hive-129940/@networkstate.mp3/avbmilxn</guid><description><![CDATA[<p><a href="https://3speak.tv/watch?v=networkstate.mp3/avbmilxn" rel="nofollow noopener" title="This link is not safe!">https://3speak.tv/watch?v=networkstate.mp3/avbmilxn</a> <br />-----------------------<br />
<strong>Securing Digital Rights for Communities (Game Theory and Governance of Scalable Blockchains for Use in Digital Network States)</strong></p>
<hr />
<h1>Chapter 23. A New Model for Startup Funding</h1>
<p><em>A practical way to fund a project without compromising to Venture Capital or other centralising forces</em></p>
<p><img src="https://files.peakd.com/file/peakd-hive/networkstate/23vhqV87ox72DnG1qGkAh2Epr15PKwXRtTm66Vyax7FSnLemUFS9XL5DqGMUiAj18AYJc.png" alt="23c.png" /></p>
<h2>Introduction</h2>
<p>Many blockchain projects raise funds through token sales (ICOs, pre-mines) or venture capital, leading to centralization and misaligned incentives between founders, investors, and the community. It should be noted that the following is just a suggested way to create more decentralized projects with fewer conflicts of interest and centralizing stakes, and there may be many other approaches.</p>
<p>A more decentralized alternative is to obtain funding from an existing demonstrably decentralized DAO community, airdrop "miner or governance tokens" to its community, and allow participants to earn governance tokens by running infrastructure or otherwise contributing. This approach avoids early, compromising venture capital, ensures a fair launch, and promotes true decentralization by reducing conflicts of interest and centralized control compared to traditional funding models that use pre-seeds, early investor stakes, pre-mines and ICO's.</p>
<h2>23.1 DAO, Miner Tokens, and Fixed-Governance Supply</h2>
<p><strong>DAO Funding:</strong></p>
<p>A community DAO (decentralised, with no single owner) can vote to fund your project over a set period. If you prove the project benefits that DAO's ecosystem, you receive an ongoing allocation. No venture capital or private deals are required.</p>
<p><strong>Miner Tokens Instead of Pre-Mines:</strong></p>
<p>Instead of distributing governance tokens directly, you drop a miner token to the DAO's community. Anyone claiming and staking these miner tokens can run infrastructure (storage nodes, validation nodes, etc.) to earn the system's governance token over time.</p>
<p><strong>Controlled Supply and Inflation:</strong></p>
<ul>
<li><strong>Build Phase:</strong> Governance-token minting schedule is set to a minimum feasible amount in order to discourage massive speculative gains and over-rewarding of "early adopters".</li>
<li><strong>Maturity Phase:</strong> Once the system matures, the community members which have earned governance tokens by operating infrastructure (often at a loss during the build phase) can vote to raise the token minting schedule to normal levels, allowing wider participation and adoption during the maturity phase.</li>
<li><strong>Sustainability Phase:</strong> After several years and once the project is well established, having reached network effect, the new token minting may taper to a much lower, long-term, long tail sustainable rate.</li>
</ul>
<p><strong>Self-Funding Through the DAO:</strong></p>
<p>The startup team relies on DAO proposals for funding while completing the initial build. Once the core is stable, the newly launched project can develop its own internal DAO over time, funded by a portion of its daily minted governance-tokens. The community, not a founder, then decides how ongoing maintenance or development is financed.</p>
<h2>23.2 liquidity and Value Through Miner Tokens</h2>
<ul>
<li><strong>Autonomous Purchase:</strong> Anyone wanting to run infrastructure (and thus earn governance tokens) must acquire miner tokens. This can be done by claiming an airdrop, receiving them from the DAO community, or buying from individuals who already have them.</li>
<li><strong>Staking and Infrastructure:</strong> Once staked, miner tokens grant mining efficiency.  i.e. all other things equal, an infrastructure operator mining with the same equipment but staking more miner tokens than others, would earn a higher share of governance token rewards than their peers. This aligns incentives with participants who truly support the network with real infrastructure and have paid into the network by buying miner tokens.</li>
<li><strong>Service Infrastructure Pools (SIP's):</strong> A related model can create an autonomous liquidity pool for these miner tokens. When new infrastructure operators buy miner tokens, the funds remain in the pool, benefiting the community by creating self-sustaining liquidity  for the ecosystem in exchange for the miner tokens it issues.</li>
</ul>
<h2>23.3 Starting a Decentralised Project</h2>
<ol>
<li><p><strong>Find a Neutral DAO:</strong></p>
<p>Ideally, this DAO is widely distributed with no single controlling whale. Propose your project, outlining how it benefits that community. If funded, the community avoids pre-mines and having to do corporate deals.</p></li>
<li><p><strong>Drop Miner Tokens:</strong></p>
<ul>
<li><strong>Purpose:</strong> Dropping the main governance token to everyone can lead to poor incentives. Miner tokens let only those who truly want to participate (by running infrastructure or delegating) acquire the real governance token.</li>
<li><strong>Low Early New Token Minting:</strong> Keep governance-token inflation minimal in the initial build phase. Early participants gain influence, but not an outsized supply.</li>
<li><strong>Ramp Up Later:</strong> Once the technology is proven, the community can vote to increase token minting, letting new contributors earn tokens and preventing early insiders from dominating.</li>
</ul></li>
<li><p><strong>No Founder Pre-Mines:</strong></p>
<p>Since the DAO funds your work, you do not need to give yourself or your team a large initial stake. All token allocations occur through mining, staking, or DAO proposals. This eliminates the usual "team or founder tokens" problem and fosters broader trust.</p></li>
<li><p><strong>Distribute and Validate:</strong></p>
<ul>
<li>Encourage many accounts to claim miner tokens.</li>
<li>Let them stake miner tokens or run infrastructure nodes to acquire governance tokens.</li>
<li>Monitor distribution: if a single account accumulates too much, initiate community-driven remedies early on in development to maintain a wide token distribution and decentralisation of the network.</li>
</ul></li>
</ol>
<h2>23.4 Key Advantages</h2>
<ul>
<li><strong>Fair, Low-Value Start:</strong> By keeping token issuance under the radar at first, you avoid hype-driven pump-and-dumps. Tokens slowly gain value organically as the network utility grows instead of purely via speculative investments.</li>
<li><strong>Aligned Incentives:</strong> Those who run infrastructure or actively contribute earn governance power. There is no venture capital or early founder dump. Everyone starts from zero.</li>
<li><strong>Voluntary Team Building:</strong> Without a massive pre-mine for a small group, talented community members step up voluntarily. People who see long-term potential contribute, rather than working as employees of a central entity.</li>
<li><strong>DAO-Based Accountability:</strong> The community can stop funding if milestones are missed. It can monitor distribution, reject bad actors, and ensure the project remains neutral and widely owned.</li>
<li><strong>Post-Launch DAO:</strong> Eventually, the new network forms its own internal DAO. The startup team can propose further work be funded by this new DAY, but only receives funding if governance stakeholders of the new system approve. This sustains development without centralising ownership.</li>
</ul>
<h2>23.5 Example: SPK Network on the Hive Blockchain</h2>
<ul>
<li><strong>Hive DAO Funding:</strong> The Hive community voted to fund SPK Network, which aims to provide decentralised off-chain storage (video, large files).</li>
<li><strong>Miner-Token Drop:</strong> Hive users could claim SPK miner tokens. Those who believed in the project participated and ran infrastructure, while uninterested users simply ignored the claim drop.</li>
<li><strong>Build Phase:</strong> Newly minted Governance token amounts remained low at first while the project was built out, preventing an unfair early grab by early adopters. Community trust and decentralised ownership grew gradually.</li>
<li><strong>Long-Term Vision:</strong> Once stable and utility is demonstrated, SPK Network can create its own DAO. Ongoing funding decisions will again be subject to decentralised votes, not founder mandates.</li>
</ul>
<p>This approach kept SPK from needing an ICO or a venture round. No founder gained a massive token allocation. In turn, the community remains motivated, the distribution is healthier, and the final platform is more censorship-resistant.</p>
<h2>23.6 Best Practices and Takeaways</h2>
<ul>
<li><strong>Avoid ICO's and Pre-Mines:</strong> Receiving or directing tokens on day one will centralise the chain, making it susceptible to regulation, securities laws and corruption, as well as misaligning the incentives of the founders and the community</li>
<li><strong>Find a neutral, decentralised DAO</strong> Dropping value to such communities means that one central stakeholder or entity will not control the governance of the system you are building</li>
<li><strong>Drop miner tokens to the DAO community:</strong> Having to stake these tokens and provide a service in order to mine governance tokens, means only those who are interested in the project and also provide genuine value to it will have influence over the governance of the new ecosystem being developed</li>
<li><strong>Monitor for genuine decentralisation:</strong> Once the miner tokens are dropped and governance tokens are being distributed, the system can be monitored for strong distribution of tokens, nodes and governance stakeholders.  If this tends to centralisation, the community can take mitigating actions.</li>
<li><strong>limiting influence of early adopters:</strong> starting with a very small governance token inflation initially during the build phase, ramping up inflation once the system goes live and normal operation takes hold and finally moving to a limited long tail minting schedule after several years of operation allows the system to adequately reward its value creators while keeping fees low or at zero into the long term.</li>
</ul>
]]></description><image url="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeiba7r6w7enhrbwluhlyq6ye4ncrk4vf7lwu2tzjyn57moqou45ef4/" title="Chapter 23. A New Model for Startup Funding - Audio Version image"/><itunes:explicit>false</itunes:explicit><itunes:image href="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeiba7r6w7enhrbwluhlyq6ye4ncrk4vf7lwu2tzjyn57moqou45ef4/"/><enclosure  url="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeiejpfqg664yy4mq5t4qwk2sa3cm6mmh4aprx6jmnvcn4nb6aj4w5e" length="170695107" type="video/mp4"/></item><item><title><![CDATA[Chapter 22. DAO's and Community Proposals for Self-Funding - Audio Version]]></title><itunes:author><![CDATA[Network State Audio Book]]></itunes:author><itunes:episodeType>full</itunes:episodeType><link>https://3speak.tv/watch?v=networkstate.mp3/pibymtjm</link><pubDate>Tue, 14 Oct 2025 14:00:48 GMT</pubDate><dc:creator>networkstate.mp3</dc:creator><guid isPermaLink="false">hive-129940/@networkstate.mp3/pibymtjm</guid><description><![CDATA[<p><a href="https://3speak.tv/watch?v=networkstate.mp3/pibymtjm" rel="nofollow noopener" title="This link is not safe!">https://3speak.tv/watch?v=networkstate.mp3/pibymtjm</a> <br />-----------------------<br />
<strong>Securing Digital Rights for Communities (Game Theory and Governance of Scalable Blockchains for Use in Digital Network States)</strong></p>
<hr />
<h1>Chapter 22. DAO's and Community Proposals for Self-Funding</h1>
<p><em>Neutral funding removes compromise and maximises the neutrality of the tech</em></p>
<p><img src="https://files.peakd.com/file/peakd-hive/networkstate/23uQhz62j89T9FNpkMxNvoZzoZ9scii53FNWjyXoU1mqQjM6ko9DUD1jgzZG5bQqTveZU.png" alt="22c.png" /></p>
<h2>22.1 Decentralised and Neutral Funding</h2>
<p>A major advantage of properly designed blockchain ecosystems is the ability to fund projects through truly decentralised, neutral mechanisms. Unlike traditional ventures or ICO's with centralised teams and venture capital, these models allow a community-owned treasury to fund ideas and community projects without a controlling entity or CEO. Community members vote on proposals using their stake, and once a proposal meets a threshold, funds are released on-chain to the developer or group that will perform the work.</p>
<p>In a truly neutral environment, there is no single legal entity, foundation, or board that dictates funding. Instead, participants stake their tokens for voting power, propose initiatives, and decide on projects that add value to the network. The key benefit is that funding does not come with the usual "strings attached" seen in centralised or venture-backed deals. Rather, it aligns community incentives toward shared goals.</p>
<h2>22.2 What Is a DAO?</h2>
<p>A Decentralised Autonomous Organization (DAO) is a community-governed treasury and decision-making structure on a blockchain. It generally has:</p>
<ul>
<li><strong>On-chain funds</strong>: Often funded from newly minted tokens or fees.</li>
<li><strong>Proposal system</strong>: Projects request funding by submitting proposals.</li>
<li><strong>Stake-weighted voting</strong>: Token holders cast votes. If a proposal meets the required threshold, funds are released.</li>
</ul>
<p>A genuinely decentralised DAO has no outside venture capital dictating decision makers. It has no single company or CEO that can override votes, and no foundation controlling funds. Instead, the community's stake decides how to allocate resources.</p>
<h2>22.3 Decentralised vs. VC-Backed DAO's</h2>
<p>Many DAO's appear decentralised but are, in reality, influenced or controlled by large venture capital allocations ordained or obtained far below market price at a pre-mine stage early on in the project, often before the tokens are traded on the open market. These VC's can concentrate voting power, leading to outcomes favourable to a few stakeholders rather than the entire network. Venture Capital firms also usually reside in "regulation friendly" jurisdictions, making them prone to regulatory pressure that can significantly shape funding decisions.</p>
<p>In contrast, a truly community-driven DAO has widely distributed tokens, no pre-mine, no ICO, and no single party holding a controlling majority stake.  The ideal scenario and balance is where, even without the votes of the largest stakeholders, projects can still obtain funding via obtaining votes from the rest of the community. These are the rare DAO's that cannot be easily shut down, coerced, or dominated by external investors. Their funding decisions reflect actual community interests rather than extractive-driven agendas which do not necessarily serve the community.</p>
<h2>22.4 Returning Value to DAO's</h2>
<p>Because these DAO-funded projects do not have strings attached from corporate entities, it is crucial for the community to establish accountability:</p>
<ul>
<li><strong>Milestone-based releases</strong>: Funds are released only after certain goals are achieved.</li>
<li><strong>Monthly or phase payments</strong>: Ongoing work (e.g., maintenance) is funded incrementally, with the community free to remove votes if progress stalls.</li>
<li><strong>Open bidding</strong>: The community can publish desired tasks, inviting multiple bids. Stakeholders then vote on the most competent developer with the fairest price.</li>
</ul>
<p>The community expects projects to benefit the ecosystem long-term. A neutral DAO often funds tools or protocols that enhance network utility (for example, off-chain storage, social features, or scaling solutions). The team's reputation is on the line: if they fail to deliver, future proposals are unlikely to pass.</p>
<h2>22.5 Example: The Hive Blockchain Decentralised Hive Fund (DAO) and SPK Network</h2>
<p>On The Hive Blockchain (a text-based storage layer), the SPK Network received funding from Hive's decentralised proposal system to build off-chain media storage. SPK's work benefits Hive users who want to store large files (videos, images) beyond the scope of the base chain. In return, SPK gains community recognition and support but has no direct "contract" with a corporation. In return for this, the project dropped its mining tokens to the entirety of the Hive community in a claim drop.  The users who claimed tokens are able to mine more efficiently in the network and therefore earn the network's governance token for providing infrastructure operation.  Due to DAO funding, there was no need for a pre-mine or ICO to fund the project, and therefore the SPK Network has a highly neutral layer that protects the rights of users and their content storage.</p>
<p>The community can stop funding at any time if deliverables fall behind or if the project ceases to align with Hive's goals by un-voting the proposal and dropping its total votes below the community set threshold of votes required to receive funding.</p>
<p>This model shows how a community can sponsor critical infrastructure without relying on ICO's, venture capital, or centralised companies. It aligns incentives around expanding the chain's ecosystem while preserving user ownership and governance.</p>
<h2>22.6 Alternatives to "No Strings Attached" Funding</h2>
<p>A common concern with "free" funding is that teams could run off with the money. DAO's mitigate this by:</p>
<ul>
<li><strong>Clear scopes of work</strong>: Publicly outline tasks and deliverables.</li>
<li><strong>Reputation and trust</strong>: Developers who leave projects incomplete damage their standing, making future funding unlikely.</li>
<li><strong>Revocable votes</strong>: If a project deviates from its stated goals, community members can un-vote their support, temporarily or permanently halting further payouts.</li>
</ul>
<p>These checks protect communities from severe losses and ensure ongoing alignment. The outcome is a more transparent, flexible funding environment that encourages collaborative development.</p>
<h2>22.7 Why Neutral DAO Funding Matters</h2>
<ul>
<li><strong>Eliminates Venture Capital Control</strong>: No massive early allocations or pressure to chase short-term profit.</li>
<li><strong>Scales Through Collective Effort</strong>: Communities that must fund and maintain the chain<br />
themselves learn to optimize and reduce bloat.</li>
<li><strong>Resists Regulatory Capture</strong>: Without a centralised owner or foundation, a decentralised treasury cannot easily be forced to censor or comply with unfavourable rules.</li>
<li><strong>Protects Against "Exit liquidity" Behaviour</strong>: Teams funded by neutral DAO's are less likely to dump tokens or pivot abruptly because they rely on continued community approval and can be dropped governance or mining tokens in exchange for DAO funding, excluding the need for bringing in Venture Capitalists whose values and reasons for being involved in the project may not aling with those of the community.</li>
<li><strong>Promotes True Decentralisation</strong>: Everyone with stake can contribute ideas and vote, reflecting widespread consensus rather than corporate edicts.</li>
</ul>
<p>Projects developed under this model become genuinely community-oriented. Their tokens have higher community trust because there is no hidden pre-mine or venture round waiting to sell into unsuspecting community members at higher prices. As a result, DAO's with a broad, participatory user base produce ecosystems that are more censorship-resistant, equitable, and sustainable in the long run.</p>
<h2>22.8 DAO’s are Always More Centralised than the Witness Pool</h2>
<p>Community members that vote for Witnesses often do not also partake in DAO voting to fund projects.  Fewer people vote in DAO proposals since new funding proposals are submitted on a regular bases and are more difficult therefore for the whole community to keep track of when compared to voting for Witnesses which evolves much more slowly over time.  The result is that whale votes in DAO voting is more extreme than in Witness voting and DAO’s can often seem more centralised than the Witness voting distribution.  This is because the influence of one whale in the consensus Witness when voting along side a vast majority of the community seems less significant when compared to that same vote when compared to the fewer number of participants that vote in DAO funding proposals.<br />
This may lead to accusations of DAO’s being centralised as it is often the case that one whale can sway a community decision on whether or not something is voted above the voting threshold for funding.<br />
There are two key things to remember here:</p>
<ol>
<li>That the Witness voting remains decentralised when the voting tokens are well enough distributed that one whale cannot vote to manipulate and decide the top Witness pool such that your fundamental rights to transact and grow community on chain is no longer preserved.  If one whale can vote in a super majority of the witnesses then the Witness voting mechanism is centralised and highly corruptible.</li>
<li>Should a situation arise whereby the voting threshold for funding is voted so high by the community that only whale can decide which proposals get funded and which don’t, while this is not an ideal situation, it does not mean that the base chain is centralised.</li>
</ol>
<p>Ideally there should not be a situation when only one member of the community can have a vote strong enough to elect proposals past the voting threshold for funding.  Proposals should be able to be elected into funding without the vote of the largest voter on chain.</p>
<p>Times where situation 2) may benefit the chain is when:<br />
a) the largest voter feels that a proposal is not legitimate and is an attack on the chain and that community members have been mislead into believing a proposal is genuine, when in fact it is an attempt to drain the DAO’s funds and,<br />
b) when a collective of users feel that the chain is spending from its DAO beyond its means to sustain such spending and so drastic measures are needed to increase the voting for funding threshold high enough that only the largest voter can put proposals into a position where they exceed the voting threshold for funding. The result is that spending from the DAO is vastly reduced.</p>
<p>Scenarios a) and b) are however highly controversial situations and should only be temporary if at all, until such a time as the attacking proposal is removed, or until spending is bought into control.</p>
<p>Should this situation continue past either of these points, then the community should find diplomatic ways to ensure that the largest voter on chain de-escalates and allows money to flow based on decentralised community decisions again.</p>
<p>Neither of these scenarios however mean that the blockchain itself is centralised.  Only that there are extreme or edge case scenarios whereby one of the funding distribution mechanisms (the DAO) can potentially be decided by one user for a temporary period when it is justified. The community itself can however collectively influence the whale in question to de-escalate prematurely if there is enough social consensus against the action taken.</p>
]]></description><image url="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeicp3ewo6pmcwz5mqeejqijcmqkuugcp5yd3r5quhbajppzeszs3py/" title="Chapter 22. DAO&apos;s and Community Proposals for Self-Funding - Audio Version image"/><itunes:explicit>false</itunes:explicit><itunes:image href="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeicp3ewo6pmcwz5mqeejqijcmqkuugcp5yd3r5quhbajppzeszs3py/"/><enclosure  url="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeifrowpvim2a3eguufrb4oonrn3ilxgklaekzjo7toaklvyjxc3is4" length="141991303" type="video/mp4"/></item><item><title><![CDATA[Chapter 21. Importance of Decentralised, Immutable Communities as Network States - Audio Version]]></title><itunes:author><![CDATA[Network State Audio Book]]></itunes:author><itunes:episodeType>full</itunes:episodeType><link>https://3speak.tv/watch?v=networkstate.mp3/xgcmpcwz</link><pubDate>Sat, 11 Oct 2025 14:00:10 GMT</pubDate><dc:creator>networkstate.mp3</dc:creator><guid isPermaLink="false">hive-129940/@networkstate.mp3/xgcmpcwz</guid><description><![CDATA[<p><a href="https://3speak.tv/watch?v=networkstate.mp3/xgcmpcwz" rel="nofollow noopener" title="This link is not safe!">https://3speak.tv/watch?v=networkstate.mp3/xgcmpcwz</a> <br />-----------------------<br />
<strong>Securing Digital Rights for Communities (Game Theory and Governance of Scalable Blockchains for Use in Digital Network States)</strong></p>
<hr />
<h1>Chapter 21. Importance of Decentralised, Immutable Communities as Network States</h1>
<p><em>Now Network States can Form</em></p>
<p><img src="https://files.peakd.com/file/peakd-hive/networkstate/23wWprw37Dke6PmGZcHsvUnv15yXSTMLAEaqy6UfY54FZeGMRdy5HKfzV3pnPTnhcfY8K.png" alt="21c.png" /></p>
<h2>21.1 Defining Network States</h2>
<p>A Network State is a globally distributed community that manages its own governance, has an internal economy, and cannot be easily shut down or censored by external forces. The idea is often associated with the concept of online nations that develop real world influence. Some may eventually purchase or acquire land and function with true sovereignty and a real world economy complete with trade deals and international agreements with other states. Achieving this requires:</p>
<ul>
<li><strong>Immutable ledger and governance</strong>: A censorship-resistant blockchain or data layer upon which the community operates in the digital realm.</li>
<li><strong>Decentralised ownership</strong>: No single entity should control the chain, avoiding pre-mines, ICO's, or foundations.</li>
<li><strong>Sustainable economy</strong>: The community must be able to create and maintain its own token, Incentivizing contributions and causing buy demand for some sort of utility that increases proportionately to scaling, network effect and competition for demand for resources to interact with the communities base layer (as with the Resource Credit model described in previous chapters, See Chapter 7 – “Sustainable Economy &amp; Decentralised Coin Distribution” for further information on creating sustainable economies with resource credit systems).</li>
</ul>
<p>Unlike typical blockchain projects with ICO's or heavy centralisation, genuinely decentralised Network States distribute tokens fairly, making it impossible for any single party to dominate. This fosters a robust, self-sustaining digital community.</p>
<h2>21.2 Power of Self-Sovereign Communities</h2>
<p>When a community reaches critical mass, it can self-organize to:</p>
<ul>
<li>Communicate and collaborate without top-down control on an un-censorable text based, decentralised base layer.</li>
<li>Offer real economic incentives for labour and contributions.</li>
<li>Print its own token with no reliance on external permission.</li>
<li>Protect members from censorship, as there is no centralised database to shut down.</li>
<li>With an algorithmic stable coin on the base layer, the community can carry out trade in and conversion to stable value without needing an external DEX or CEX.</li>
</ul>
<p>Such communities can become de facto nation states. Traditional governments rely on force or laws to secure currency demand, while these blockchain based communities rely on voluntary adoption and network incentives. Community members hold their stake because they earned it or purchased it off the open market, not because they were ordained it in a pre-mine.  If they grow large enough, they can challenge or complement legacy financial and governance systems by making them more efficient and transparent.</p>
<h2>21.3 Decentralised Token Distribution on Layer 2</h2>
<p>Many Network States will likely form at the "layer 2" level, meaning they build on top of an existing censorship-resistant, neutral base chain. with the following characteristics:</p>
<ul>
<li><strong>Fair token distribution</strong>: No large pre-mine, no venture capital in the "first ICO round," and no single dominating stakeholder.</li>
<li><strong>Earning vs. pre-ordained</strong>: Members earn tokens through valuable work or content creation, or buy them on the open market - they are not self gifted tokens at low prices in a pre sale or for "funding and development" of the project.</li>
<li><strong>Self-sustaining model</strong>: The token's utility (e.g., voting, access, on chain resource bandwidth access) creates ongoing demand with growth of transactions within the community.</li>
</ul>
<p>Communities can thus issue tokens without creating a central point of failure. Over time, these tokens govern the community's own rules, curation and distribution mechanisms, and reward pools.</p>
<h2>21.4 Sustainable Token Value and Staking Incentives</h2>
<p>To foster lasting engagement:</p>
<ul>
<li><strong>Voluntary demand</strong>: As more people want influence, reputation, or access to blockchain bandwidth, they buy or stake tokens, raising overall liquidity and reinforcing value.</li>
<li><strong>Layer 2 Resource credit models</strong>: Community members will have to stake both the Layer 1 governance token and the Layer 2 community token in order to obtain bandwidth or resources to operate in, post to and vote in the L2 community or Network State.  As a network effect takes hold for the community, this will create demand for the token, driving its price up and making the token and community economy sustainable over time.</li>
<li><strong>Stake for influence</strong>: Members stake<br />
tokens to gain voting power, resource allocation, or other utilities (similar to how base layer staking controls network resources).</li>
<li><strong>Reward for participation</strong>: A daily rewards pool funded by newly minted tokens or other reward mechanisms ensure contributors receive tokens.</li>
</ul>
<p>All of the above turns each community into its own mini economy, encouraging long term commitment rather than short term profit taking.</p>
<h2>21.5 Liquidity Pools for Each Community</h2>
<p>Instead of using a centralised exchange that extracts fees and can seize funds, each community maintains its own Layer 2, community specific decentralised liquidity pool for trading. Key benefits:</p>
<ul>
<li><strong>Fees return to the community</strong>: Rather than paying centralised operators like Binance, trading fees feed back into community development and infrastructure operation.</li>
<li><strong>Reduced attack vectors</strong>: No custodial risk on centralised exchanges so tokens remain community owned.</li>
<li><strong>Sustainable growth</strong>: As liquidity pools deepen, more users participate which creates a virtuous cycle based on increasing liquidity and increasing confidence in the community and its economy.</li>
</ul>
<p>Over time, these pools can become self sustaining, generating enough fees to fund infrastructure or act as shock absorbers during market downturns, subsidising trusted, but unprofitable infrastructure in times of a down turn in the market.</p>
<h2>21.6 Community Self-Regulation of Content and Rewards</h2>
<p>Because communities operate socially, they need to manage on-chain discussions and incentives:</p>
<ul>
<li><strong>Rewarding quality</strong>: Users or apps vote on which posts, projects, or members deserve tokens.</li>
<li><strong>Downvoting abuse</strong>: Undesirable content can be downvoted or flagged, reducing its rewards or visibility.</li>
<li><strong>Consensus-based rules</strong>: The community sets thresholds for removal, tagging (e.g., NSFW), or moderating spam.</li>
</ul>
<p>No single corporation is in control. Instead, collective rules, stake based voting, and front end policies govern how content is curated.</p>
<h2>21.7 Content Gateways and Validators</h2>
<p>On certain architectures (like an off-chain video storage layer), validators or gateways can decide which content is acceptable for the community. They are elected or chosen based on stake-weighted votes, so the community's values and nuances ultimately guide what gets through via elected content validators.</p>
<h2>21.8 Stake-Weighted Tagging</h2>
<p>Members with sufficient stake can force specific tags (e.g., NSFW, political, spoiler) onto content if they reach a voting threshold. This allows flexible, community-driven categorization without needing a central moderator.</p>
<h2>21.9 Reward Disputes</h2>
<p>If there is disagreement on how many rewards a piece of content deserves, or if someone has gamed the system, the community can downvote or re-allocate rewards. In advanced setups, a "jury" process might review disputes to decide whether to restore or remove tokens, or rally community support to re-upvote content that has been unfairly downvoted.</p>
<h2>Conclusion</h2>
<ul>
<li><strong>Self-Sovereign Network States</strong>: Truly decentralised communities form online "nations" that can potentially buy land or exert real influence without centralised leaders or corporate backing.</li>
<li><strong>Fair Distribution</strong>: To remain censorship resistant, avoid pre-mines or ICO allocations. Community staking and fair issuance keep power spread out.</li>
<li><strong>Sustainable Economies</strong>: Internal tokens gain value through utility staked voting power, resource access, and liquidity pools that recycle fees back to the network.</li>
<li><strong>Self-Governance of Content</strong>: Community can set up effective content regulation systems on both Layer 2 Apps and Layer 1 content storage systems in order to prevent content that does not match the values of the community.  The key is that one central entity cannot control censorship on chain.</li>
</ul>
]]></description><image url="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeicw73wa6wid5mge4v2eqy24jwde6cg77ziif3prrdisbmck4zm6t4/" title="Chapter 21. Importance of Decentralised, Immutable Communities as Network States - Audio Version image"/><itunes:explicit>false</itunes:explicit><itunes:image href="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeicw73wa6wid5mge4v2eqy24jwde6cg77ziif3prrdisbmck4zm6t4/"/><enclosure  url="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeieql255x5pathclpqwwbsgeujkaa2cjckljvqxaz3xodlik5ynugu" length="159684731" type="video/mp4"/></item><item><title><![CDATA[Chapter 20. Open Source Makes IP Less Valuable - Audio Version]]></title><itunes:author><![CDATA[Network State Audio Book]]></itunes:author><itunes:episodeType>full</itunes:episodeType><link>https://3speak.tv/watch?v=networkstate.mp3/twymqvrt</link><pubDate>Mon, 06 Oct 2025 19:27:57 GMT</pubDate><dc:creator>networkstate.mp3</dc:creator><guid isPermaLink="false">hive-129940/@networkstate.mp3/twymqvrt</guid><description><![CDATA[<p><a href="https://3speak.tv/watch?v=networkstate.mp3/twymqvrt" rel="nofollow noopener" title="This link is not safe!">https://3speak.tv/watch?v=networkstate.mp3/twymqvrt</a> <br />-----------------------<br />
<strong>Securing Digital Rights for Communities (Game Theory and Governance of Scalable Blockchains for Use in Digital Network States)</strong></p>
<hr />
<h1>Chapter 20. Open Source Makes IP Less Valuable</h1>
<p><em>A new business model is to accumulate the governance token and give the rest away for free</em></p>
<p><img src="https://files.peakd.com/file/peakd-hive/networkstate/23vhqQFiJCWQLpg84EVM4dyRqp8z8yGHNAW3VERybwVAXYodZkYUy2pXDNS7K22msxY4p.png" alt="20c.png" /></p>
<h2>Introduction</h2>
<p>Open source development challenges the traditional value of intellectual property. In a blockchain ecosystem built on open source principles, code can be freely copied, iterated upon and improved by anyone. Instead of focusing on proprietary software or brand protection, the emphasis shifts to tokenizing a base layer protocol that gains value from community driven network effects.</p>
<h2>20.1 Why Traditional IP Models Will Weaken</h2>
<h3>20.1.1 Copy and Iterate</h3>
<p>In open source projects, anyone can copy the code and iterate upon it. This significantly reduces the power of patents and copyrights that typically protect software. Once the code is public, forks and variations can proliferate without legal barriers. It also vastly reduces the amount of work required to build a new digital project or product in cases where the original source code are used as the basis for that project.</p>
<h3>20.1.2 No centralised Enforcement</h3>
<p>Truly decentralised systems are resistant to lawsuits. You cannot sue an amorphous community of contributors or node operators, especially when many use pseudonymous identities. Traditional IP enforcement mechanisms lose their potency.</p>
<h2>20.2 Accumulating the Base Token Instead of IP</h2>
<h3>20.2.1 Governance Rights Accumulation as the Business Model</h3>
<p>Because open source leaves little “IP rent” to collect, builders accumulate governance or utility tokens in the underlying blockchain as a result of having received community votes for their valuable contributions to code building. As the ecosystem grows, the quality of products improves, a network effect takes hold in the user base, adoption increases, and the token’s value can rise.</p>
<h3>20.2.2 Community Ownership</h3>
<p>Projects no longer rely on proprietary lock in. Instead, they encourage developers to improve the code and create stronger network effects. Holding more of the base layer token gives influence and a direct stake in the ecosystem’s success, which incentivises further contributions from developers.</p>
<h2>20.3 Abundance vs. Scarcity of IP</h2>
<h3>20.3.1 Abundant Code</h3>
<p>In a fully open source environment, code is shared, and even brand elements can be replicated or remixed. This approach prioritizes expanding overall utility rather than controlling a limited pool of IP.</p>
<h3>20.3.2 Power of The Network Effect</h3>
<p>Instead of leveraging a single brand or patent, participants focus on building a strong community. The most valuable resource becomes the network of users, developers, and infrastructure operators all benefiting from a thriving token economy.</p>
<h2>20.4 Brand and Community Tensions</h2>
<h3>20.4.1 Forking Logos and Names</h3>
<p>In decentralised contexts, truly decentralised communities can mimic or adapt a project or Brand’s logo or name. Traditional lawsuits become impractical since there is no central entity to target. Attempts at enforcement can even backfire by uniting the community against the IP owner.</p>
<h3>20.4.2 Brands Aligning with Their Community</h3>
<p>Companies must adopt new ways to cooperate with decentralised user bases rather than trying to dominate them or see the data the generate as the sole property of the company to mine, sell and monetise. Real value lies in fostering community loyalty and participation, giving them skin in the value system via fair distribution of tokens / stake, not in clinging to trademarks or brand identities.</p>
<h4>20.4.3 Stake for Resources</h4>
<p>In a well designed, decentralised system, users or apps stake the token to gain network bandwidth. Developers build open source apps and receive tokens either by purchasing them on the market or earning them through community rewards for having done something valuable for the community itself.</p>
<h3>20.4.4 Intrinsic Utility</h3>
<p>A well designed, decentralised system offers censorship resistant text storage, fast and fee-less transactions, and stablecoin infrastructure. Its core is maintained by distributed contributors who share a common stake in the token of the community.</p>
<h2>20.5 Suing a Distributed Community</h2>
<h3>20.5.1 Impossible Central Target</h3>
<p>A fully decentralised network has no “headquarters” to subpoena. If there is no pre-mine, no foundation, and no single entity, lawsuits over IP infringement have no direct target.</p>
<h3>20.5.2 Communities Undermining IP Laws</h3>
<p>As a network becomes more censorship resistant and globally distributed, it becomes harder for IP owners to enforce claims. Communities operating worldwide with pseudonyms digital identities render legal pressures over trademarks and copyrights less effective.</p>
<h2>Conclusion</h2>
<ul>
<li><p><strong>Code Freedom Over IP</strong>: Open source software weakens traditional IP claims. Anyone can copy and improve code without significant legal fear.</p></li>
<li><p><strong>Token-Based Incentives</strong>: Instead of profiting from patents, developers accumulate the base layer token, aligning them with long term ecosystem growth which in most cases incentivises further open source contributions from developers and other community members who want their existing stakes to grow in value.</p></li>
<li><p><strong>Community as Strength</strong>: Brands and logos can be forked in truly decentralised systems. The most influential brand is the one the community supports, not the one with the most lawyers.</p></li>
<li><p><strong>No Central Point to Sue</strong>: Fully decentralised projects lack a headquarters, owner, central figurehead or foundation. IP related lawsuits have no clear way to shut them down.</p></li>
<li><p><strong>Focus on Network Effects</strong>: Real value flows from community collaboration and user adoption. Open source accelerates ecosystem growth by inviting a broad range of contributors and forks.</p></li>
</ul>
<p>When open source principles merge with decentralised governance, traditional IP loses its status as a profit centre. Economic rewards shift away from proprietary ownership and toward token staking in an ever-growing, cooperative network.</p>
]]></description><image url="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeibpx7pmhyaybitlyq7w55f6c2ucibppkeg34eezam6uhhbyj5jk7e/" title="Chapter 20. Open Source Makes IP Less Valuable - Audio Version image"/><itunes:explicit>false</itunes:explicit><itunes:image href="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeibpx7pmhyaybitlyq7w55f6c2ucibppkeg34eezam6uhhbyj5jk7e/"/><enclosure  url="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeiekj5fo2yiprg7trbyp5pilndhvpowr327n2pxwo4j6w7zbliwgsm" length="93513922" type="video/mp4"/></item><item><title><![CDATA[Chapter 19. Service Infrastructure Pools (SIP) - Audio Version]]></title><itunes:author><![CDATA[Network State Audio Book]]></itunes:author><itunes:episodeType>full</itunes:episodeType><link>https://3speak.tv/watch?v=networkstate.mp3/ukmqqxye</link><pubDate>Wed, 24 Sep 2025 19:15:35 GMT</pubDate><dc:creator>networkstate.mp3</dc:creator><guid isPermaLink="false">hive-129940/@networkstate.mp3/ukmqqxye</guid><description><![CDATA[<p><a href="https://3speak.tv/watch?v=networkstate.mp3/ukmqqxye" rel="nofollow noopener" title="This link is not safe!">https://3speak.tv/watch?v=networkstate.mp3/ukmqqxye</a> <br />-----------------------<br />
<strong>Securing Digital Rights for Communities (Game Theory and Governance of Scalable Blockchains for Use in Digital Network States)</strong></p>
<hr />
<h1>Chapter 19. Service Infrastructure Pools (SIP)</h1>
<p><em>Paying the community instead of the exchanges</em></p>
<p><img src="https://files.peakd.com/file/peakd-hive/networkstate/23vhqQFiJCbC4BL43MDBhkF8dJGVm4qH7AyFL5xPcAAo8YYCQeBQRvJuc1CHM4gjLrjNq.png" alt="19c.png" /></p>
<h2>Introduction</h2>
<p>A Service Infrastructure Pool (SIP) combines elements of a decentralised exchange (DEX) and a DAO. Normally, DEX trading fees go to a centralised operator’s profit. In a SIP, those fees are pooled and can be voted on by token holders to fund infrastructure improvements or other community initiatives.</p>
<h2>19.1 Basic Concept – Send Exchange Fees Back to the Community</h2>
<p>Instead of letting a centralised exchange collect trading fees, a SIP aggregates them into one pool. Stakeholders then decide how to use those pooled funds. They might pay infrastructure operators, fund new features, or distribute incentives that benefit the broader network. This is often coupled with a way for the SIP to sell an autonomous product or service.  The revenue of which goes directly into providing additional liquidity to the SIP account. This allows the SIP to grow over time, potentially to a point where the fees generated from token exchanges are able to fund all or most of the infrastructure that is operating on the wider network.</p>
<h2>19.2 Example from SPK Network</h2>
<p>In SPK Network, users can buy mining tokens (like LARYNX) to improve their share of mining rewards directly from the SIP account. Purchasing these tokens requires locking up dollars (HBD or similar) in a liquidity pool. The key points are:</p>
<ul>
<li>Buyers of tokens place funds into a SIP account.</li>
<li>Those funds stay in the pool and can be used for community-driven initiatives.</li>
<li>The mining tokens give owners more “mining” weight or resource priority.</li>
<li>If attackers want control, they must buy these tokens from existing holders, effectively paying the community their required rate for taking over the governance, after which the original community will likely fork, if the attacker is deemed as non benevolent to the protocol.</li>
</ul>
<p>This setup discourages hostile takeovers because any large purchase of mining tokens raises the token’s price (benefiting existing holders), and the attacker’s funds permanently bolster the ecosystem’s liquidity.</p>
<h2>19.3 Combining a DEX and a DAO</h2>
<p>A typical DEX allows people to stake liquidity, earn fees, and withdraw profits. In a SIP, part of (or all) the funds remain in the pool rather than returning to individual stakers. The pool’s growing liquidity produces trading fees, and those fees can be:</p>
<ul>
<li>Sent to infrastructure operators.</li>
<li>Allocated to development teams.</li>
<li>Distributed for marketing, user incentives, or emergencies.</li>
</ul>
<p>By design, it is like a DAO controlling a permanent liquidity stash, with revenue streams continuously replenished by users buying service tokens (e.g., mining tokens which improve a users mining capabilities in the network).</p>
<h2>19.4 Required Technology and Combining Ecosystem liquidity</h2>
<p>As SIP's grow they can be combined as multi-sig liquidity and collateral providers, stored on the base layer.  For additional security, they can employ a massive mutli-sig technology such as BLS signatures.  This allows for a reduction in size of the signature storage required in each block and therefore accommodates 400 up to thousands of keyholders on the main multi-sig account (SIP) in the eco-system.  This means that much larger amounts of liquidity can be securely stored for various purposes by various parties on chain who seek increased security for their liquidity providers.</p>
<h2>19.5 Self-Sustaining Ecosystem</h2>
<p>Over time, more participants buying tokens for better mining efficiency drives more funds into the SIP. The liquidity pool gradually swells. As it does, it may earn enough in trading fees to:</p>
<ul>
<li>Pay for infrastructure without relying on external funding.</li>
<li>Provide a safety net if outside market conditions weaken.</li>
<li>Autonomously finance new ecosystem projects and expansions.</li>
</ul>
<p>The end goal is an ownerless, decentralised “pot of liquidity” that pays for the chain’s operations and growth, acting like a shock absorber during market downturns.</p>
<h2>19.6 Replacing centralised Exchanges</h2>
<p>centralised exchanges such as Binance or Coinbase collect trading fees for corporate profit. A SIP, by contrast, directs its fees and other revenue streams into an on-chain pool governed by community votes. Rather than benefiting a few large shareholders, these funds can:</p>
<ul>
<li>Reward node operators.</li>
<li>Subsidize new projects or Dapps. - Remain inside the community, strengthening the protocol overall.</li>
</ul>
<p>This model reclaims revenue streams that would otherwise flow into centralised parties.</p>
<h2>Key Takeaways</h2>
<h4>Autonomous Purchases</h4>
<p>When users buy mining or service tokens from the SIP, funds go into the SIP and never leave, creating a permanent, increasing liquidity reserve.</p>
<h4>DAO-like Control</h4>
<p>The community decides how to allocate SIP reserves, ensuring democratic management.</p>
<h4>Stability and Growth</h4>
<p>As more people seek the service tokens, the SIP grows, generating fees that can fund infrastructure or offset downturns.</p>
<h4>Reduced Attack Vectors</h4>
<p>A would be attacker must inject significant capital to gain leverage, thereby strengthening the ecosystem<br />
in the process.</p>
<h3>Conclusion</h3>
<p>Service Infrastructure Pools blend DeFi liquidity pooling with DAO governance to create sustainable, community owned revenue mechanisms. They transform trading fees into collective assets that keep infrastructure running and development funded, all without centralised exchange intermediaries.</p>
]]></description><image url="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeifsc5pgjb6nfzurxy4lrntimflqwnvyqxucfonqvuir3qcgeteeni/" title="Chapter 19. Service Infrastructure Pools (SIP) - Audio Version image"/><itunes:explicit>false</itunes:explicit><itunes:image href="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeifsc5pgjb6nfzurxy4lrntimflqwnvyqxucfonqvuir3qcgeteeni/"/><enclosure  url="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeic44lcfb4hueiijeb75k6sbftd3qx7albabrifz72kkkvm5rhscme" length="101187648" type="video/mp4"/></item><item><title><![CDATA[Chapter 18. Off-Chain Data Availability Layer for Non-Text Data - Audio Version]]></title><itunes:author><![CDATA[Network State Audio Book]]></itunes:author><itunes:episodeType>full</itunes:episodeType><link>https://3speak.tv/watch?v=networkstate.mp3/bwysiiuf</link><pubDate>Mon, 22 Sep 2025 14:30:41 GMT</pubDate><dc:creator>networkstate.mp3</dc:creator><guid isPermaLink="false">hive-129940/@networkstate.mp3/bwysiiuf</guid><description><![CDATA[<p><a href="https://3speak.tv/watch?v=networkstate.mp3/bwysiiuf" rel="nofollow noopener" title="This link is not safe!">https://3speak.tv/watch?v=networkstate.mp3/bwysiiuf</a> <br />-----------------------<br />
<strong>Securing Digital Rights for Communities (Game Theory and Governance of Scalable Blockchains for Use in Digital Network States)</strong></p>
<hr />
<h1>Chapter 18. Off-Chain Data Availability Layer for Non-Text Data</h1>
<p><em>Storing More Than Text on a Blockchain</em></p>
<p><img src="https://files.peakd.com/file/peakd-hive/networkstate/23vhqQEBGkNt657XRFZeQNJTs7YiiYeP16sML4CdhsxyzqKTzCcRVQMWh5ZszUcUV9HSh.png" alt="18c.png" /></p>
<h2>Introduction</h2>
<p>A text-based storage layer on the base chain is critical for censorship-resistant records, but what happens when you need to store large files like videos or software? Storing them directly on a lightweight, text-focused chain would bloat the network. Once you move beyond text, you need an <strong>off-chain data availability layer</strong> to keep blockchain nodes lean while still distributing and verifying heavier content.</p>
<hr />
<h2>18.1 Why Not Just Put It All On-Chain?</h2>
<ul>
<li><strong>Data Density</strong>  <br />
Large files (videos, high-resolution images, or entire software packages) are too big for most blockchains to handle without enormous storage overhead.</li>
<li><strong>Performance Bottlenecks</strong>  <br />
Even if you tried, nodes would become “fat” and resource-intensive, ruining the fast, low-latency experience needed for high transaction throughput on the base layer.</li>
<li><strong>Selective Immutability</strong>  <br />
Most users do <em>not</em> want every casual comment (e.g., “LOL”) stored immutably forever. It’s better to keep the on-chain layer for critical text, metadata, and important references.</li>
</ul>
<p>Hence, pushing large files off-chain is both practical and efficient. This also helps to de-load the base layer allowing it to focus on storage only of critical information and data links that direct to off-chain information.  The result is that the base layer can scale far beyond what was originally possible if everything had been stored only on the base layer.</p>
<hr />
<h2>18.2 How Off-Chain Incentives Work</h2>
<p>With text on the base layer, you still need secure, censorship-resistant ways to store everything else. Think of it as <strong>Layer-2</strong> storage where off-chain, dedicated storage nodes maintain heavier files, but receive <strong>on-chain incentives</strong>. A widely discussed approach is a separate token-based system that pays operators for providing off-chain data availability.</p>
<ol>
<li><p><strong>Users or Apps Want to Store Files</strong>  <br />
They create an on-chain contract specifying the data and how much they will pay to keep it available.</p></li>
<li><p><strong>Nodes Run Off-Chain Storage</strong>  <br />
These are community-run machines providing excess hard drive space or bandwidth.</p></li>
<li><p><strong>Proof of Storage or Access</strong>  <br />
The network randomly checks if the nodes still hold the data. If they prove it correctly by quickly delivering requested file segments they earn rewards.</p></li>
<li><p><strong>Layer-2 Tokenomics</strong>  <br />
An additional token can fund payouts for storage, encoding, or content delivery. This token’s rules are anchored to the main chain but operate independently for heavy data needs.</p></li>
</ol>
<hr />
<h2>18.3 Example: The SPK Network</h2>
<p>One model for off-chain availability is the <strong>SPK Network</strong>, which stores large files (like videos) via a distributed set of nodes. There is:</p>
<ul>
<li><p><strong>A Core Incentive Token</strong>  <br />
Operators provide bandwidth and disk space for content.<br />
They are rewarded by user-created contracts, each specifying what files must remain available.</p></li>
<li><p><strong>Validator Nodes</strong>  <br />
A light weight system of twenty community elected validators should be the route through which all content on the off chain storage system is uploaded.  The Validators can then take the encoded chunks of data and hash their data footprints.  Community storage nodes must download the files from these validators and hash the same data chunks to confirm receipt of the data.</p></li>
</ul>
<p>The reason this works well is that it does not require all validators running nodes to process and store all files in the network, like a proof of work system would do.  A Parameterised Coin Voting system (DPoS) for file storage is the optimum solution since it is lighter weight that PoW and, with 20 elected validators it can manage decentralised consensus governance whilst still being a trustless system which does not need to count only on the richest members of the community to run its most critical infrastructure; the content validator nodes.</p>
<ul>
<li><p><strong>Proof of Access</strong>  <br />
The network randomly pings community data storage nodes to confirm they can serve requested data. If they deliver the matching hashed chunks back to the validators quickly, this is confirmation that the storage node is storing what they say they are storing. As a result, they earn rewards from the allocated contract pool associated with the contract within which the file is stored.</p></li>
<li><p><strong>Video Encoding &amp; Streaming</strong>  <br />
In addition to raw storage, a system like SPK can incentivise video transcoding and live streaming servers, offloading the heaviest processing from the main chain.</p></li>
</ul>
<p>Through these incentives, SPK aims to replace centralised video platforms’ back-end (storage, streaming, encoding) with a decentralised, community-owned layer.</p>
<p>For further information on The SPK Network visit: <a href="https://spk.network/" rel="nofollow noopener" title="This link is not safe!">https://spk.network/</a></p>
<hr />
<h2>18.4 Keeping the Base Layer lightweight</h2>
<p><strong>Text is fundamental</strong> for an immutable record of governance, transactions, and high-level metadata. Everything else heavier or more data intensive such as video, large images, or software should be stored off-chain. By separating duties:</p>
<ul>
<li><p><strong>Layer 1</strong>  <br />
Stores text data (comments, references, IDs), plus the chain’s consensus rules and transaction layer.</p>
<ul>
<li>Remains fast, minimal, and non-“fat.”</li>
<li>Uses no fees or very low fees, powered by a daily rewards pool of newly minted tokens.</li>
</ul></li>
<li><p><strong>Layer 2</strong>  <br />
Handles heavy storage with separate economic incentives.</p>
<ul>
<li>Runs “proof of storage” or “proof of access” to verify hosting.</li>
<li>Nodes earn a specialized token.</li>
<li>Maintains partial immutability: if a node drops your file, it loses rewards and on chain reputation.</li>
</ul></li>
</ul>
<hr />
<h2>18.5 Why Separate Layers Matter</h2>
<ol>
<li><p><strong>Scalability</strong>  <br />
Dividing text-based consensus from heavy file hosting prevents the entire chain from bogging down.</p></li>
<li><p><strong>Targeted Security</strong>  <br />
Text on-chain enjoys the strongest guarantees (immutable, globally replicated). Multimedia off-chain can still be censorship-resistant but doesn’t force every blockchain node to store gigabytes of data.</p></li>
<li><p><strong>Flexible Costs</strong>  <br />
On-chain data is costly and must remain minimal. Off-chain nodes can set custom storage prices, allowing a market-based approach for different file sizes and retention durations.</p></li>
<li><p><strong>Endless Services</strong>  <br />
Beyond video, any large-scale process such as music hosting, 3D rendering, AI model storage and many more can be incentivized similarly. Community-run nodes provide resources and earn tokens for proven work.</p></li>
</ol>
<hr />
<h2>Conclusion</h2>
<ul>
<li><p><strong>lightweight On-Chain Core</strong>  <br />
Text data and governance remain on a fee-less, Parameterised Coin Voting chain. This ensures immutable text based information and references, reliable transactions, and stable coin minting.</p></li>
<li><p><strong>Off-Chain Data Availability</strong>  <br />
Parallel networks like SPK host non-text data under a separate token economy. Nodes prove accessibility of large files to get paid via the Proof of Access method (PoA). Users, content companies and content platforms create contracts for any multimedia content. As a result, individual community members can be paid for backing up this content.</p></li>
<li><p><strong>Mutual Reinforcement</strong>  <br />
The main chain’s reputation and incentives ensure honest participation. Layer-2 nodes trust the base chain for governance, data permanence and data availability, while the base chain gains broader utility through off-chain hosting solutions.</p></li>
</ul>
<p>This two-tier system (immutable text plus incentivized off-chain data) balances <strong>scalability</strong> with <strong>censorship resistance</strong>. It stores critical records on the main blockchain and offloads heavier or less crucial files to user-powered networks for back up. The result is a robust ecosystem where nodes can specialize, content remains online without centralised servers, and the core chain stays lean and can scale.</p>
]]></description><image url="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeigpowslj2t5epzmiy4xsyo7wvlti4crcpzoalpgbojrzchjg5zmce/" title="Chapter 18. Off-Chain Data Availability Layer for Non-Text Data - Audio Version image"/><itunes:explicit>false</itunes:explicit><itunes:image href="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeigpowslj2t5epzmiy4xsyo7wvlti4crcpzoalpgbojrzchjg5zmce/"/><enclosure  url="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeiaoqv3dcul7gygqyjtt3sad4quvpa7ypp3ij74diq35tt26uo3adu" length="138784696" type="video/mp4"/></item><item><title><![CDATA[Chapter 17. Algorithmic Stablecoins on Layer 1 - Audio Version]]></title><itunes:author><![CDATA[Network State Audio Book]]></itunes:author><itunes:episodeType>full</itunes:episodeType><link>https://3speak.tv/watch?v=networkstate.mp3/szvbrwbt</link><pubDate>Sat, 20 Sep 2025 14:53:55 GMT</pubDate><dc:creator>networkstate.mp3</dc:creator><guid isPermaLink="false">hive-129940/@networkstate.mp3/szvbrwbt</guid><description><![CDATA[<p><a href="https://3speak.tv/watch?v=networkstate.mp3/szvbrwbt" rel="nofollow noopener" title="This link is not safe!">https://3speak.tv/watch?v=networkstate.mp3/szvbrwbt</a> <br />-----------------------<br />
<strong>Securing Digital Rights for Communities (Game Theory and Governance of Scalable Blockchains for Use in Digital Network States)</strong></p>
<hr />
<h1>Chapter 17. Algorithmic Stablecoins on Layer 1</h1>
<p><img src="https://files.peakd.com/file/peakd-hive/networkstate/23vhqQFiJCWQLpg84EVM4dyRqp8z8yGHNAW3VERybwVAXYoeYWvQNY2kGsr35hWLxcYcH.png" alt="17c.png" /></p>
<hr />
<h2>17.1 Why We Need a Truly Decentralised Stablecoin</h2>
<p>Many blockchains rely on <strong>centralised stablecoins</strong> (like Tether or USDC) that hold reserves in fiat accounts. These assets can be seized, frozen, or regulated at any time. A censorship-resistant blockchain must have an <strong>algorithmic stablecoin</strong> backed only by digital value that no single entity can control or confiscate.</p>
<hr />
<h2>17.2 Backing the Stablecoin with Digital Real Estate (Social Tokens and Bandwidth in the Ecosystem)</h2>
<p>A stablecoin has to be backed or collateralised by something. In a censorship-resistant system, backing cannot be gold, dollars in a bank, or any physical good vulnerable to seizure. Instead, it should be backed by a <strong>layer-1 governance token</strong> that represents valuable digital real estate or<br />
bandwidth to post data on chain, relative to other users or apps also wishing to post data to chain.</p>
<p>The governance token should grant:</p>
<ul>
<li><strong>Access to on-chain resources</strong> (e.g., text storage, zero-fee transactions otherwise known as bandwidth access to upload to the database).</li>
<li><strong>Payouts in newly minted tokens</strong> for community contributions.</li>
<li><strong>Proof-of-stake governance</strong> with strong parameters to prevent takeovers.</li>
</ul>
<p>This “digital real estate” has fundamental demand because it secures data availability (free speech) and zero-fee transactions. The main token can then back or over collateralise an on-chain stablecoin, algorithmically pegged to the dollar without the need to hold collateralising assets in a traditional bank, which are subject to seizure or censorship.</p>
<hr />
<h2>17.3 How It Works</h2>
<ol>
<li><p><strong>Pegging to the Dollar</strong>  <br />
The stablecoin maintains a target value of one US dollar. It does so by letting holders redeem the stablecoin for one dollar’s worth of the base token. As long as the base token has a higher market cap than the total stablecoin supply, redemption is secure and the stable asset remains adequately over collateralised.</p></li>
<li><p><strong>Haircut Rule</strong>  <br />
To avoid the fate of projects like Terra/Luna, a <strong>debt limit</strong> or “haircut” parameter is set (often around 20–30%). If the stablecoin supply approaches such a set percentage of the base token’s market cap, the chain stops issuing new stablecoins. This prevents the stablecoin’s market cap from exceeding its collateral.</p></li>
<li><p><strong>Delayed Conversions</strong>  <br />
Attacks happen when a stablecoin is instantly swapped for the governance token and dumped on the market. To counter this, conversions take place over a few days (3.5 days is typical). Large conversions face <strong>time risk</strong> and possible fees, making quick takeovers highly risky for the attacker and most likely unprofitable.</p></li>
<li><p><strong>Fee or “Haircut” on Bulk Conversions on the Base Layer</strong>  <br />
A small fee (e.g., 5%) can apply to mass conversion, discouraging sudden attacks. Genuine users pay the fee only when moving large sums, while attackers find it prohibitively expensive to destabilize the system.</p></li>
<li><p><strong>Reward Pool Funding</strong>  <br />
These stablecoins often emerge via new token minting to a daily rewards pool that the community competes for.  The more stake weighted votes your contributions receive, the more of the rewards pool you receive in turn: half of the daily rewards go to users in stablecoins, and half in the base governance token. This slow, steady issuance avoids reliance on centralised reserves. Over time, the stablecoin organically expands alongside the flow of tokens to the community.</p></li>
</ol>
<hr />
<h2>17.4 Infinite liquidity Through Base-Token Conversion</h2>
<p>Even if centralised exchanges list only small amounts of the on-chain stablecoin, true liquidity can be <strong>effectively unlimited</strong>. A large holder can:</p>
<ol>
<li><strong>Buy the Base Token On the Open Market</strong>  <br />
Purchase the governance token on open markets.</li>
<li><strong>Convert Over Time</strong>  <br />
Convert that token supply into stablecoins via the protocol’s built-in mechanism on Layer 1.</li>
<li><strong>Haircut Rule Enforcement</strong>  <br />
If the conversion is large, the base token’s price likely rises. This increase keeps the ratio below the debt limit, preserving stability, in fact it may lower the debt limit as the supply of the stable coin is increased, since in this scenario it is likely that the market cap of the base layer token being bought on the open market and used to convert to stable coins will increase at a higher rate than the increase in supply of the new stable coins being created by those conversions.</li>
</ol>
<p>This process mirrors how centralised stablecoins work except there’s no single issuer to “call” for a mint or redemption. The protocol itself autonomously executes conversions.</p>
<hr />
<h2>17.5 Example: Hive Backed Dollars (HBD)</h2>
<ul>
<li><strong>Non-Custodial</strong>  <br />
No single wallet, company, or government can KYC, freeze HBD or seize its collateral.</li>
<li><strong>Three-Second Confirmations</strong>  <br />
Transactions are nearly instant and effectively fee-less thanks to resource staking.</li>
<li><strong>Parameter Rules</strong>
<ul>
<li><strong>30% Debt limit (Haircut):</strong> If HBD nears 30% of the governance token’s market cap (Hive), no more HBD is issued.</li>
<li><strong>Conversion Delay:</strong> Converts from HBD to Hive (or vice versa) take several days and may incur a fee.</li>
</ul></li>
<li><strong>Organic Expansion</strong>  <br />
HBD supply grows through daily new tokens mints which are allocated to content creators and community members via decentralised community, stake-weighted voting systems.</li>
</ul>
<p>If large financial players want millions in decentralised stablecoins, they simply acquire Hive on the open secondary market, then convert day by day into HBD. This pushes Hive’s price up such that its market capitalisation increases more than the newly minted stable coins, lowering the debt ratio. Thus the stable coin issuance system scales while maintaining an adequate collateral buffer.</p>
<hr />
<h2>17.6 Resilience Against Attack</h2>
<p><strong>Comparisons to Failed Models</strong>  <br />
Un-parameterised algo stablecoins like Terra/Luna had no effective cap on supply or redemptions. When attackers mass-converted the stablecoin to Luna, it collapsed the token’s value. In contrast, parameterised systems employ:</p>
<ul>
<li><strong>Haircut thresholds</strong></li>
<li><strong>Delayed conversions</strong></li>
<li><strong>Optional conversion fees</strong></li>
</ul>
<p>These dampen flash manoeuvrers, vastly increase financial risk to the attacker and reduce exploit potential.</p>
<p><strong>Fork-Out Option</strong>  <br />
Even if a large actor gains a huge stake, reputation based, censorship-resistant communities can fork the chain and exclude hostile balances. This threat deters malicious governance attacks.</p>
<hr />
<h2>17.7 Toward a Parallel Dollar Economy</h2>
<p>A reliable Layer 1 stablecoin sets the stage for a <strong>true parallel economy</strong>, allowing everyday people to:</p>
<ul>
<li><strong>Transact globally with no KYC</strong></li>
<li><strong>Store value in a stable currency</strong></li>
<li><strong>Move into or out of local currencies without permissioned gateways</strong></li>
<li><strong>Access zero-fee settlement in seconds</strong></li>
</ul>
<p>Because these stablecoins are algorithmic and fully on-chain, they also enable advanced financial instruments like <strong>bonds and collateralized loans</strong> mirroring “pristine collateral” (akin to US Treasuries) but free from legacy banking restrictions. Over time, such systems can mirror or replace major components of traditional Euro Dollar international finance system without centralised reserves or permissioned intermediaries.</p>
<hr />
<h2>Conclusion</h2>
<ul>
<li><strong>No Physical Reserves</strong>  <br />
Backing must be purely digital, immune to seizure or control by a single entity.</li>
<li><strong>Parameter-Based Algorithm</strong>  <br />
Enforce haircut rules, delayed conversion, and optional fees to maintain the peg and prevent sudden attacks.</li>
<li><strong>Infinite liquidity</strong>  <br />
As long as the governance token is valuable (due to real utility), large amounts of stablecoins can be created by buying the base token.</li>
<li><strong>Stable, Parallel Currency</strong>  <br />
Distributed newly minted tokens and community-driven enforcement produce a sustainable on-chain dollar for everyday use and financial services.</li>
</ul>
<p>Algorithmic stablecoins on Layer 1 are an essential pillar for any genuinely decentralised blockchain ecosystem, powering commerce, savings, and economic growth outside centralised oversight.</p>
]]></description><image url="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeia6n4oy4jkiaxazoy2ifo44j73odmvsp3gy7phdje6hhbd42bkte4/" title="Chapter 17. Algorithmic Stablecoins on Layer 1 - Audio Version image"/><itunes:explicit>false</itunes:explicit><itunes:image href="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeia6n4oy4jkiaxazoy2ifo44j73odmvsp3gy7phdje6hhbd42bkte4/"/><enclosure  url="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeib4d5xpkpzuvzinphdvutjdxam3r5cwve3vjunov7zubr5j72au3u" length="156671524" type="video/mp4"/></item><item><title><![CDATA[Chapter 16. Three Pillars of Decentralisation - Audio Version]]></title><itunes:author><![CDATA[Network State Audio Book]]></itunes:author><itunes:episodeType>full</itunes:episodeType><link>https://3speak.tv/watch?v=networkstate.mp3/ygbbrxsp</link><pubDate>Wed, 03 Sep 2025 14:00:19 GMT</pubDate><dc:creator>networkstate.mp3</dc:creator><guid isPermaLink="false">hive-129940/@networkstate.mp3/ygbbrxsp</guid><description><![CDATA[<p><a href="https://3speak.tv/watch?v=networkstate.mp3/ygbbrxsp" rel="nofollow noopener" title="This link is not safe!">https://3speak.tv/watch?v=networkstate.mp3/ygbbrxsp</a> <br />-----------------------<br />
<strong>Securing Digital Rights for Communities (Game Theory and Governance of Scalable Blockchains for Use in Digital Network States)</strong></p>
<hr />
<h1>Chapter 16. Three Pillars of Decentralisation</h1>
<p><em>Three Pillars that all digital communities need for self-sovereignty</em></p>
<p><img src="https://files.peakd.com/file/peakd-hive/networkstate/23vhqQFiJCbC4BL43MDBhkF8dJGVm4qH3nzjTxTFy3HQd6oL2XRvon5iW8YhDj12jPGiY.png" alt="16c.png" /></p>
<hr />
<h2>Introduction</h2>
<p>Many projects struggle with decentralisation because they focus on the wrong goals or mix too many complex features into their base layer. By contrast, truly censorship-resistant and scalable systems can emerge from <strong>three core pillars</strong>. When these pillars exist at the base layer, the entire ecosystem gains self-sovereignty, freedom of speech, and economic resilience.</p>
<hr />
<h2>16.1. Text-Based Data Availability</h2>
<p><strong>Freedom of Speech</strong>  <br />
A system must store text (or fundamental data) in a globally replicated way. This ensures everyone can freely post or read, without a single entity able to delete or block content.</p>
<p><strong>Simplicity and Cost</strong>  <br />
Only storing text keeps overhead predictable and minimal. Complex computations or large file storage on the base layer lead to huge costs and limited scaling.</p>
<p><strong>Neutral Infrastructure</strong>  <br />
Because text is universal and lightweight, it can be distributed across many jurisdictions. Attempts to censor or alter historical records fail unless the entire network agrees, ensuring true data availability.</p>
<blockquote>
<p><strong>Key Point:</strong> <em>Text-based storage on the base Layer 1’s the foundation of free speech and collaboration across any border.</em></p>
</blockquote>
<hr />
<h2>16.2. Zero-Fee Transaction Layer</h2>
<p><strong>Skin in the Game Instead of Fees</strong>  <br />
Rather than paying every time you transact, you stake (lock up) tokens to gain transaction bandwidth. This model is often called “resource credits” or “regenerative fees.” It eliminates unpredictable costs and fosters global usability for all people, whereas chains with fees on transactions can become prohibitively costly to people without economic means to pay such fees.</p>
<p><strong>High Throughput, Low Friction</strong>  <br />
When you remove transaction fees, you open the door for real-time micropayments and rapid app development. Users do not abandon the network under surge pricing or fee spikes.</p>
<p><strong>Expanding Ecosystems</strong>  <br />
Zero or near-zero fees make it viable to build truly decentralised applications (on Layer 2’s) that reference data from the base layer. Expensive layer 1’s cannot host decentralised apps effectively because each action that clears from layer 2 to layer 1 (so that the Layer 2 application gains trustless security) becomes too costly.</p>
<blockquote>
<p><strong>Key Point:</strong> <em>A zero-fee transaction layer (backed by staking) ensures anyone can use the network, allowing broad adoption and preserving censorship resistance.</em></p>
</blockquote>
<hr />
<h2>16.3. On-Chain Stablecoin</h2>
<p><strong>Essential for Daily Use</strong>  <br />
A stable form of payment is critical for real-world transactions. If the native token always fluctuates in value, most people will not rely on it for routine expenses, business transactions or savings.</p>
<p><strong>Decentralised &amp; Backed</strong>  <br />
An on-chain stablecoin can be algorithmically backed by the main governance token. As long as the stablecoin’s market cap remains well below that of the base token, the system remains secure.</p>
<p><strong>Self-Sovereign Conversion</strong>  <br />
Because this stablecoin resides entirely on the base chain, users exchange value without external markets or centralised “gatekeepers.” True on-chain liquidity means no forced reliance on outside exchanges for dollars or stable value exchange.  Essentially this means that the eco system can continue to function and provide itself with liquidity, without Centralised or even decentralised exchanges</p>
<blockquote>
<p><strong>Key Point:</strong> <em>A decentralised stablecoin, fully integrated on the base layer, is the final piece that allows people worldwide to store and transact in stable value without leaving the protocol.</em></p>
</blockquote>
<hr />
<h2>16.4 Why These Three Pillars Matter</h2>
<ul>
<li><p><strong>Censorship Resistance</strong>  <br />
Text-based storage protects free speech. Distributed nodes ensure no single jurisdiction or entity can delete what you say, post, your followers, your community or its economy.</p></li>
<li><p><strong>Zero-Fee Transactions</strong>  <br />
With staked tokens, users bypass unpredictable network fees. This opens the door to everyday usage, micro-transactions, and diverse decentralised apps where users do not require gas, a prohibitive hurdle to access in order to interact with the ecosystem.</p></li>
<li><p><strong>Stablecoin Integration</strong>  <br />
People need a stable unit of account for commerce. An on-chain stablecoin allows real economic activity without centralised intermediaries.</p></li>
</ul>
<p>Together, these pillars form a self-reinforcing network:</p>
<ul>
<li><strong>Free Speech</strong> (data availability) increases the system’s inherent value and communication.</li>
<li><strong>Zero Fees</strong> encourage participation and app development for all people.</li>
<li><strong>A Base layer Stablecoin</strong> empowers real-world trade without needing external exchanges.</li>
</ul>
<p>When combined, they create a <strong>truly self-sovereign</strong> ecosystem: no central point of failure, no single jurisdiction in control, resistant to blockages of on and off ramps, and no reliance on external stablecoins or exchanges. This model is already demonstrated in systems like The Hive Blockchain, which integrates text-based data, near-feeless transactions through staking, and an on-chain stablecoin. By mastering these three pillars, a blockchain can achieve a higher degree of decentralisation and practical everyday utility.</p>
]]></description><image url="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeihbua5j4bgspbojppqcpoibzkes6ww7uabrignld2b3yu4du75idq/" title="Chapter 16. Three Pillars of Decentralisation - Audio Version image"/><itunes:explicit>false</itunes:explicit><itunes:image href="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeihbua5j4bgspbojppqcpoibzkes6ww7uabrignld2b3yu4du75idq/"/><enclosure  url="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeifj7h3aemak6i3hlp4evp36kfc2xybo642srgmqaccgqvyccojh2q" length="94748777" type="video/mp4"/></item><item><title><![CDATA[Chapter 15. Censorship and the Morality of Pre-Mines]]></title><itunes:author><![CDATA[Network State Audio Book]]></itunes:author><itunes:episodeType>full</itunes:episodeType><link>https://3speak.tv/watch?v=networkstate.mp3/ijcdpqvr</link><pubDate>Wed, 03 Sep 2025 00:08:39 GMT</pubDate><dc:creator>networkstate.mp3</dc:creator><guid isPermaLink="false">hive-129940/@networkstate.mp3/ijcdpqvr</guid><description><![CDATA[<p><a href="https://3speak.tv/watch?v=networkstate.mp3/ijcdpqvr" rel="nofollow noopener" title="This link is not safe!">https://3speak.tv/watch?v=networkstate.mp3/ijcdpqvr</a> <br />-----------------------<br />
<strong>Securing Digital Rights for Communities (Game Theory and Governance of Scalable Blockchains for Use in Digital Network States)</strong></p>
<hr />
<h1>Chapter 15. Censorship and the Morality of Pre-Mines</h1>
<p><em>How Pre-Mined Tokens Enable Centralized Control and Why True Decentralization Demands Fair Distribution</em></p>
<p><img src="https://files.peakd.com/file/peakd-hive/networkstate/23vhqQFiJCWQLpg84EVM4dyRqp8z8yGHJnXXd6vqxpbn274nAQAvkPoZB1CSh2Y9Vmksf.png" alt="15c.png" /></p>
<hr />
<h2>15.1. Understanding the Moral and Practical Issues of a Pre-Mine</h2>
<h3>15.1.1 Defining a Pre-Mine</h3>
<p>A <strong>pre-mine</strong> occurs when a blockchain’s token supply is minted, sold to or allocated to specific insiders (founders, VC funds, early investors) <em>before</em> it becomes available to the broader community. This may happen in an ICO, private sale, or “seed round.”</p>
<ul>
<li><strong>Moral Concerns</strong>
<ul>
<li><strong>Unearned Privilege</strong>: Those who receive a large portion of tokens at negligible or no cost gain disproportionate power over governance, essentially “buying out” a community that doesn’t even exist yet.</li>
<li><strong>Misalignment of Incentives</strong>: Early insiders can exit (“dump”) on future participants, who then become de facto exit liquidity. The project’s “community” and the insiders do not have the same goals as a result.</li>
</ul></li>
<li><strong>Regulatory Exposure</strong>
<ul>
<li>If the same small group has significant control (e.g., 20%+ of the supply), that project can be classed as an unregistered security under various interpretations. Even if it is <em>not</em> formally regulated by the SEC or CFTC, it remains susceptible to political or legal pressure due to its obvious central points of failure.</li>
</ul></li>
</ul>
<h3>15.1.2 Hidden “Regulation Through Pressure”</h3>
<p>Even when regulators officially classify a token as a “commodity", where it falls outside of the regulation of the governing bodies <strong>informal leverage</strong> still exists:</p>
<ol>
<li><strong>Centralized Owners</strong>: Large token holders often operate in major financial jurisdictions. If pressured by authorities, they can be forced to comply, or risk legal consequences.</li>
<li><strong>Control of Infrastructure</strong>: On a chain that is majority-owned by a handful of entities, governments (or powerful corporate interests) can persuade infrastructure operators, or coerce them to censor certain users or transactions, particularly if they are operating a significant amount of an eco-system's infrastructure under one corporate entity.</li>
<li><strong>No Official “Crackdown” Needed</strong>: The project appears “unregulated,” yet it’s quietly <em>controllable</em> by anyone who can influence those few whales or well-funded validators or infrastructure operators.  This is the case with most blockchain projects operating today.  Particularly those with the largest market capitalisations.</li>
</ol>
<p><strong>Key Point</strong>: <em>Pre-mines hand regulators and large stakeholders a built-in “attack vector.” They can shape the chain’s rules or impose censorship <em>indirectly</em> because the underlying distribution is centralized.</em></p>
<hr />
<h2>15.2. How Pre-Mines Undermine Censorship Resistance</h2>
<h3>15.2.1 Coin Voting Without Parameters</h3>
<ul>
<li>Many chains use <strong>un-parameterised proof of stake</strong> which is effectively “coin voting” with no strict guardrails.</li>
<li>If pre-miners hold large stakes, they can dominate every decision without having earned their positions of influence on a fair basis. Legitimate community members hold far less influence and cannot effectively resist if these big holders choose to censor certain addresses or content.</li>
</ul>
<h3>15.2.2 Tying into Centralized Nodes</h3>
<ul>
<li>Large token holders often fund massive infrastructure, especially when the chain’s nodes are expensive to run (e.g., requiring high-end hardware).</li>
<li>This fosters a network of large, centralized validators often operating in “regulation friendly” jurisdictions. If governments demand blacklisting or freezing, this small circle of validators will likely comply, no matter how “officially decentralized” the chain claims to be.</li>
</ul>
<hr />
<h2>15.3. Moral Arguments Against Pre-Mines</h2>
<ol>
<li><p><strong>Fairness and Earning</strong></p>
<ul>
<li>A chain that launches without pre-mines (or large ICO allocations) forces <em>every</em> participant to “earn” their position, whether by early mining, meaningful contributions, buying tokens on the open market or earning social “value-for-value” rewards.</li>
<li>This fosters alignment: all holders have sacrificed time, labour, or resources, so they <em>want</em> the system to be robust and censorship resistant.  Where there is no pre-mine or ICO, even if the stake holder wants to buy and exit quickly, they will at least have already added value to the eco-system in some way. Where they obtained their tokens by pre-mine, this is not always the case since no value was added when the stake holder was ordained tokens since they added little to no value to obtain that stake.</li>
</ul></li>
<li><p><strong>Avoiding Exit-liquidity and Exploitation</strong></p>
<ul>
<li>When venture capital or founders hold a massive early stake, they can, and often do, sell those tokens after hype builds, leaving later arrivals holding devalued coins.</li>
<li>This dynamic cripples trust and channels wealth to insiders rather than distributing it among actual and organic community builders.</li>
<li>Why would you run a validator on a chain which is clearly owned by others? This means that all of your efforts and work are going into supporting increasing the value of other people who didn’t actually earn that value fairly, since they obtained their tokens, pre-ordained, in a pre-mine.</li>
<li>Most chains with pre mines are making it look like many people run validators, where as in reality, no person who genuinely values freedom would would run a node in a chain that was pre-mined by someone else, as you are working for them by proxy</li>
<li>Once pre-mines are removed form a community, or on projects where there is no pre-mine from inception of the project, often more open source contributions are observed from community members, since they know that the value of the work they do is not going back to a corporation, owner, founder, CEO or early venture capitalist firm.</li>
</ul></li>
<li><p><strong>True Decentralization from Day One</strong></p>
<ul>
<li>If no single party holds, say, more than 7% of tokens, there is less risk that an external, hostile force can capture the network by coercing that party, or obtaining their tokens in an over the counter private purchase.</li>
<li>The network’s governance emerges naturally: participants vote proportionally to how much effort or value they have added, not how cheaply they acquired tokens at launch or even are ordained tokens at zero cost as happens in some cases.</li>
</ul></li>
</ol>
<hr />
<h2>15.4. Censorship Implications of Centralized Coins</h2>
<p>The more centralised a blockchain is the more likely it is to succumb to corruption, regulation and shut downs. The following are some of the ways centralised entities can corrupt a seemingly decentralised eco-system given just enough centralised control to tip the balance of power in their favour:  1. <strong>Layer-1 Manipulation</strong></p>
<ul>
<li>Given enough stake and coordination from centralised exchanges, that hold significant amounts of custodial stake or Large stakeholders can simply impose code changes and only reorganize the chain, or block addresses that centralised entities who do not have the best interests of the community at heart if so demanded by a regulating agency.</li>
<li>Users have no recourse; the chain’s rules can be rewritten without broad consensus in this scenario.</li>
<li>A chain’s users must be vigilant, always monitoring for such vulnerabilities and attack vectors taking place or forming on the chain and in its governance token distribution.</li>
<li>Early Venture Capital, Pre-mine, ICO or company backed chains will appear decentralised under normal operational periods, however, in times of defending against catastrophe, when the community needs the chain to be the most censorship resistant, the ability for these centralising entities to censor transactions often becomes overwhelmingly clear.  Even in times when the chain is not undergoing catastrophic attack, such as during a hack or when new, more restrictive government regulation is released, code changes can be passed that go completely against the community’s wishes. In such cases, the community has little recourse.</li>
</ul>
<ol>
<li><p><strong>Censorship on Layer-2</strong></p>
<ul>
<li>If the base chain is compromised then so are “layer-2” apps. Artificially imposed high fees by bad actors on Layer 1, or central gatekeepers hamper true censorship resistance, because it can become expensive to clear to Layer 1 for immutability in such cases.</li>
<li>Many “layer-2” solutions rely on Layer 1 stablecoins, which may become controlled by a few large token issuers (again, pre-mined or pre-funded). Authorities can freeze or reverse transactions on these assets easily in such scenarios.</li>
</ul></li>
<li><p><strong>No Grass-roots Defence</strong></p>
<ul>
<li>In truly decentralized systems, communities can “fork out” malicious large holders. But if the majority stake belongs to a handful of powerful investors or exchanges holding custodial stake that can be used for governance voting, forking to remove them is nearly impossible. The entire infrastructure effectively obeys or is operated by the largest stakeholders.</li>
</ul></li>
</ol>
<hr />
<h2>15.5. Case Studies &amp; Real-World Consequences</h2>
<ol>
<li><p><strong>Steem–Hive Fork</strong></p>
<ul>
<li>When Steemit Inc., the company behind The Steem Blockchain sold its large “ninja-mined” stake to an external buyer, that buyer (Justin Sun) attempted to dominate chain governance and stated that  the ecosystem’s decentralised applications would now be migrating across to another chain, without first getting approval from the Dapps in question, the community quickly forked Steem, creating the The Hive Blockchain which removed the hostile ninja mined stake on the new fork.  Since there was one identifiable hostile stakeholder and many opposing whales and community members that supported the community, the new fork was sufficiently decentralised after having forked out the hostile entity, and so the Hive fork was a success.  However, had there not been sufficient decentralisation of large stakeholders, it may have been the case that the new fork created a situation in which a new group could easily form an alliance to dominate and dictate the new fork's governance, making it a failure.</li>
<li><em>Key Lesson</em>: If a chain can unify and remove an overbearing founder stake by forking, it avoids permanent capture, but only if distribution is already broad enough to resist takeover on the new fork.</li>
</ul></li>
<li><p><strong>Ethereum’s Regulatory “Gray Area”</strong></p>
<ul>
<li>Ethereum pre-sold tokens in its Initial Coin Offering, yet it still ended up under partial regulatory capture because it is big enough and has signalled compliance (e.g., censored Tornado Cash transactions at the protocol level based on regulatory body actions, causing compliance among major validators).</li>
<li><em>Key Lesson</em>: Even if not formally labelled a “security,” the chain is still vulnerable to censorship demands because large validators and infrastructure operators, especially those who obtained their stake by being sold cheap tokens by the founders in a pre-mine, can be pressured indirectly by regulatory and government bodies.</li>
</ul></li>
<li><p><strong>Highly-Centralized “Chains”</strong></p>
<ul>
<li>Some networks remain so heavily pre-mined that a founder or VC sees almost all future “community” participants as exit liquidity. They seldom resist censorship or they bow out to regulation if it threatens the early insiders’ majority stake.</li>
</ul></li>
</ol>
<hr />
<h2>15.6. How a Pre-Mine Hurts Everyday Users</h2>
<ol>
<li><strong>Misaligned Incentives</strong>
<ul>
<li>Insiders may not care about genuine freedom of speech or censorship resistance; they often care only about short-term ROI. They will normally comply with any authority if<br />
it sustains token price or personal safety.</li>
</ul></li>
<li><strong>No Real Vote</strong>
<ul>
<li>Even if the chain claims to have on-chain governance, smaller user stake is dwarfed by whales who were self ordained pre-mines and who never earned their tokens, making “community voting” largely symbolic.</li>
</ul></li>
<li><strong>Susceptibility to Attacks</strong>
<ul>
<li>A single compromised entity (venture fund or centralized exchange) can pivot chain policy, effectively turning the network into a lightly disguised corporate product.</li>
</ul></li>
</ol>
<hr />
<h2>15.7. Moving Forward Without Pre-Mines</h2>
<ul>
<li><strong>Founder-less/No-ICO Launch</strong>: It is critical to allow people mine or contribute from day one without privileged allocations on a fair bases, so that as many people, technical and non-technical alike, can mine the token from a neutral base layer.  The result is a much wider, organic distribution, where the goals and interests of the vast majority of players are aligned, and people trying to exit have already added value in some form.</li>
<li><strong>Stake Distribution</strong>: Encouraging “value-for-value” earn models, so tokens flow to users who actually run nodes, create valuable content, or provide valuable services rather than early self ordained pre-mine holders.</li>
<li><strong>Parameterised Coin Voting</strong>: Long lock-up periods and other distribution and voting constraints make it harder for one group to seize control.<br />
(As described in chapter 11.4 De-Governance, Delegated Proof-of-Stake (DPoS) for further information on DPoS)</li>
<li><strong>Community Watchdog</strong>: If any large entity accumulates too much power and becomes hostile or is perceived as a security risk, the community is prepared to fork or vote them out.  This is impossible if pre-mines gave them a large enough majority stake that the community becomes fragmented following the defensive fork. the community needs therefore to self regulate this dynamic and make sure it does not become susceptible to such a situation.</li>
</ul>
<hr />
<h2>Conclusion</h2>
<p><strong>Pre-mines</strong> are more than a funding shortcut: they are a structural vulnerability that undermines the very decentralization many blockchains claim to champion. By empowering a small elite or large investors from inception, such projects pave the way for censorship, regulatory capture, and moral hazards, <em>no matter what the official legal label might be.</em></p>
<p><strong>Key Takeaways:</strong></p>
<ol>
<li><strong>Moral Misalignment</strong>: Pre-mined coins let a handful of insiders profit off later participants.</li>
<li><strong>Regulatory Pressure</strong>: Even if not formally classed as “securities,” large holders can be coerced to implement censorship or “comply” with government mandates.</li>
<li><strong>Weak Community Defence</strong>: When a chain is top-heavy, resisting takeovers or forks that remove corrupt actors is nearly impossible.</li>
<li><strong>True Freedom Requires Fair Distribution</strong>: Launching without pre-mines or ICO's compels all to earn tokens <em>proportionately</em> to contributions, building a naturally decentralized governance system in which all have a fair chance to build stake and participate, without serving someone else who has not already added value to the eco system themselves.</li>
<li><strong>Mis-Alignment of Incentives</strong> Early, pre-ordained token holders have an incentive to use unsuspecting, new users as exit liquidity, without first adding any value themselves.</li>
</ol>
<p>Refusing pre-mines and demanding fair, open distribution isn’t just an ideological stance, it is a practical necessity for any blockchain that aims to be <strong>censorship-resistant</strong> and provide <strong>neutrality</strong> and therefore <strong>Digital Rights</strong> to its users, ethically aligned with user interests, and <em>beyond</em> easy regulatory capture.</p>
]]></description><image url="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeiajjhj4s3sjt5gznrwsuskkmhlcakbepeqmkujdpy3zv77l3uacte/" title="Chapter 15. Censorship and the Morality of Pre-Mines image"/><itunes:explicit>false</itunes:explicit><itunes:image href="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeiajjhj4s3sjt5gznrwsuskkmhlcakbepeqmkujdpy3zv77l3uacte/"/><enclosure  url="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeig5wxtn4rdwnsjoncomqdld3fbdmtz5vzx75t5won742siomax76y" length="201433975" type="video/mp4"/></item><item><title><![CDATA[Chapter 14. Balancing Scalability and Censorship Resistance (Disproving the “Scalability Trilemma”)]]></title><itunes:author><![CDATA[Network State Audio Book]]></itunes:author><itunes:episodeType>full</itunes:episodeType><link>https://3speak.tv/watch?v=networkstate.mp3/isyjsumb</link><pubDate>Thu, 21 Aug 2025 13:18:05 GMT</pubDate><dc:creator>networkstate.mp3</dc:creator><guid isPermaLink="false">hive-129940/@networkstate.mp3/isyjsumb</guid><description><![CDATA[<p><a href="https://3speak.tv/watch?v=networkstate.mp3/isyjsumb" rel="nofollow noopener" title="This link is not safe!">https://3speak.tv/watch?v=networkstate.mp3/isyjsumb</a> <br />-----------------------<br />
<strong>Securing Digital Rights for Communities (Game Theory and Governance of Scalable Blockchains for Use in Digital Network States)</strong></p>
<hr />
<h1>Chapter 14. Balancing Scalability and Censorship Resistance (Disproving the “Scalability Trilemma”)</h1>
<p><em>How to Achieve High Throughput Without Sacrificing Security or Decentralisation</em></p>
<p><img src="https://files.peakd.com/file/peakd-hive/networkstate/23wqdqcL6XuxkEsuDYrxKsHwi4ET2inSj78Gyas9DMa3qxMZ5v8XVh3WYX6meVSEdZwJa.png" alt="14c.png" /></p>
<hr />
<h2><strong>Introduction</strong></h2>
<p>The so-called “Scalability Trilemma” asserts that a blockchain must compromise on either <em>security</em>, <em>decentralisation</em>, or <em>scalability</em>, it seemingly cannot excel in all three. This idea, widely attributed to certain high-profile developers, has shaped much of the industry’s design choices, often leading to high fees, heavy Layer-1 “smart contracts,” or reliance on centralised second layers. However, <strong>the Trilemma itself is based on flawed assumptions</strong>. By distinguishing data availability from computation, optimizing for truly low-fee base layers, and ensuring fair token distribution, we <em>can</em> build systems that are both highly scalable and censorship resistant without sacrificing security.</p>
<hr />
<h2>14.1. Why the “Scalability Trilemma” Is Misleading</h2>
<h3>14.1.1 Security and Decentralisation Are the Same Goal</h3>
<p>A core claim of the Trilemma is that security, decentralisation, and scalability are three separate pillars that a blockchain must juggle. Yet, in reality:</p>
<ul>
<li><strong>Security</strong> in a censorship-resistant<br />
blockchain <em>derives</em> from <strong>decentralisation</strong>.</li>
<li>If a network can be censored, it is <em>not</em> secure.</li>
<li>Hence, these two “pillars” are really just one: a network’s <em>degree of decentralisation</em> determines its censorship resistance, which determines its security.</li>
</ul>
<p>Any framework that treats security and decentralisation as separate categories is already conflating the same property in two forms. This conceptual redundancy leads many projects astray.</p>
<h3>14.1.2 Mixing Computation With Data Availability</h3>
<p>Many protocols that attempt to handle everything including smart contract computation <em>and</em> data storage at the base layer end up with:</p>
<ul>
<li><strong>High fees</strong>, because on-chain computation is both expensive and socialized.</li>
<li><strong>Unpredictable throughput</strong>, any popular app (such as  “CryptoKitties”, an early meme ecosystem that bloated all Ethereum transaction fees when it attempted to scale with its popularity) can clog the network, driving fees sky-high for everyone else.</li>
</ul>
<p>These symptoms are not <em>inevitable</em> but arise <em>if</em> you force every node to perform all heavy computations on every block. By separating the roles leaving text-based data availability to the base layer, while pushing complex computations to Layer-2 systems blockchains can avoid the trade-offs that the Trilemma insists upon.</p>
<hr />
<h2>14.2. Rethinking Scalability</h2>
<p>“Scalability” often means the network can handle many transactions per second (TPS), but ironically, many “scalable” chains impose <em>high</em> base layer fees or complex Layer 1 logic that undermines widespread usage and results in fat nodes that are uneconomic to operate without passing excessive costs onto the user base.</p>
<h3>14.2.1 lightweight Base Layer for True Layer-2’s</h3>
<p>A truly scalable Layer 1 should focus almost exclusively on being a <strong>data availability layer</strong> with near-feeless (or staked-resource) transactions. Layer-2 solutions, which rely on that base-layer security, can then run intensive computations or store large non-text based data <em>off-chain</em>, referencing the base chain for its immutability requirements. If the base Layer 1 is <em>too expensive</em> to write to, then any purported Layer-2 will become centralised because it cannot afford to commit its data or proofs back on-chain on a regular enough basis without having to "trust" the Layer-2 system.  This undermines the "trustlessness" that blockchain technology was supposed to minimise.</p>
<p><strong>Example</strong></p>
<ul>
<li><strong>Bitcoin’s lightning Network</strong>: Channels are expensive to open/close, so users rely on a few large node operators which form transaction hubs, through which much of the network's traffic passes. Decentralisation suffers as a result.  Lightning effectively forms a small cluster of well-funded custodians.  Lightning nodes are not forced to process all transactions and therefore there is a level of censorship capability built in, without having to risk losing mining rewards from the Bitcoin Layer 1.</li>
<li><strong>High-Fee Smart-Contract Chains</strong>: When “Layer-2” operators cannot frequently submit data on-chain due to high Layer 1 transaction costs, they must store it off-chain, losing the guaranteed immutability from the Layer 1. They turn into "trusted", centralised services as a result.</li>
</ul>
<h3>14.2.2 Resource Credits vs. Fee Auctions</h3>
<p>Standard blockchains often rely on fee auctions: users outbid each other, so the chain always “chooses” the highest-paying transactions first. This leads to:</p>
<ul>
<li><strong>Spikes in fees</strong> whenever demand surges (the “CryptoKitties problem”).</li>
<li><strong>Poor user experience</strong> and unpredictability, making it impossible for typical apps to guarantee stable transaction costs to their user bases.</li>
</ul>
<p>By contrast, a <strong>resource-credit or stake-based</strong> model requires:</p>
<ul>
<li>Users or applications to stake tokens to gain an <em>allotment</em> of daily transactions (credits).</li>
<li>No one else’s willingness to pay can “steal” your bandwidth; as long as you hold enough stake, you can transact or store text data at minimal cost.</li>
<li>This approach remains stable <em>even during high usage</em> because your right to transact is locked in by your stake, not by ephemeral, variable fees which always increase in times of high demand, when the user needs to transact the most.</li>
</ul>
<p><strong>Result</strong>: By applying a fee-less, resource credit model, you get a chain that can handle large volumes of traffic without punishing normal users with unpredictable fee changes.</p>
<hr />
<h2>14.3. Censorship Resistance = Security</h2>
<p>If a project claims to solve “the Trilemma” by scaling up yet remains easily censorable, it fails on security. <em>Real security means no single entity can freeze accounts or remove data.</em> This is only feasible if:</p>
<ol>
<li><strong>Token Distribution</strong> is broad enough that no whale, foundation, venture capital firm or centralised exchange can unilaterally dictate governance.</li>
<li><strong>Block Production</strong> is parameterised so a fixed amount of top,  independent validators, each accountable to the community and replaceable by stake weighted election, remain spread worldwide.</li>
<li><strong>Low Fees</strong> or staked resources ensure that usage doesn’t centralise around large corporate infrastructure.</li>
</ol>
<h3>14.3.1 Un-Parameterised Proof of Stake vs. Parameterised Coin Voting</h3>
<p><strong>Proof of Stake</strong> systems without guardrails (“Un-Parameterised Coin Voting”) often devolve into a handful of (2-4) large staking pools (e.g., lido Finance) controlling consensus. Unless carefully designed, this leads to:</p>
<ul>
<li><strong>High centralisation</strong>, where the votes of one or two large pools overshadow smaller validators.</li>
<li><strong>Easy regulatory targeting</strong>, since large staking services become choke points for governments or corporations.</li>
</ul>
<p>A better approach, especially for social and highly nuanced community governance is <strong>Parameterised Coin Voting</strong> (e.g., Delegated Proof of Stake with a fixed number of validators and mandatory stake lock-ups). This ensures:</p>
<ul>
<li>No single entity can spin up infinite validators and manage to have them all simultaneously elected into the consensus by the community's votes.</li>
<li>Full transparency if anyone attempts to buy excessive influence.</li>
<li>Time-locked stakes for governance voting create real accountability; people can’t just vote maliciously and dump.</li>
</ul>
<hr />
<h2>14.4. Governance and Stake Distribution: The Most Difficult and Most Crucial Element</h2>
<p>A Proof of Stake (PoS) or Delegated Proof of Stake (DPoS) blockchain can only be censorship resistant if its tokens are meaningfully and widely distributed. If a small group of venture capitalists, founders, or pre-miners holds the majority of tokens, they can override governance or be legally pressured into compliance that ultimately represents a take over of a community causing it to operate against its own best interests. Achieving broad distribution typically requires:</p>
<ol>
<li><strong>No Pre-mines, No ICO's</strong>: Nothing seeds an imbalance and centralisation more than giving a few insiders large shares at launch.</li>
<li><strong>Low Barriers to Entry and to Earning</strong>: Anyone, anywhere should be able to earn tokens by providing value, running infrastructure, creating content, building apps, or other socially beneficial actions.</li>
<li><strong>Long-Term Engagement</strong>: Communities that <em>improve</em> everyday life (e.g., enabling people in countries where their currencies experience high levels of inflationary devaluation to save in a  currency which is pegged to a stable value) attract organic users who value and hold the token, forging deeper loyalty and distribution and as a result, increased security for the community's economy and governance.</li>
</ol>
<hr />
<h2>14.5. Zero Knowledge Roll-ups for Scaling and Privacy</h2>
<p>Scaling blockchain networks for mainstream use has been challenging due to network congestion and high transaction costs on layer 1's. Zero-knowledge (ZK) roll-ups, a layer-2 solution, address these issues by moving computation off the Layer 1 chain and validating transactions with compact proofs on layer 1, reducing congestion and costs.</p>
<p>ZK proofs work, essentially by allowing someone to prove that they have access to information without actually showing that information to the party asking for proof.  For example, if the information that they posses allows them to correctly solve a complex mathematical problem over numerous iterations and adjustments in input variables so that expected outputs are received in return, then after a number of repeated correct responses in a row, the party asking for the proof can be satisfied that the party with the information actually has it, even though they do not know what the information is and do not need to reveal it.</p>
<p>A simple example of a ZK Proof is where you ask a friend to tweet out a word from a Twitter account that they say they control.  They oblige and a few minutes later you see the Twitter account in question has posted the word you requested.  There is now a good chance that your friend is proven to be the owner of this account, but to be sure you ask them to repeat the process several times, each time posting a different word that you have specified. After several correct tweets, you have enough evidence to be convinced that your friend controls the password to that twitter account.  Your friend does not need to reveal to you the password to their Twitter account to prove to you that they do in fact have the keys to that account.  This is a Zero Knowledge Proof.</p>
<p>The process of ZK roll-ups is where the computation to carry out and verify transactions is not done on the blockchain Layer 1, but on a ZK capable Layer 2.  ZK Roll-ups on such a Layer 2 can batch or roll up many thousands of transactions.  Then a ZK Proof can be published to the Layer 1 for final clearing and security, verifying the correctness of the transactions in the process.</p>
<p>The important thing to note here is that these ZK proofs are far smaller than complete Layer 1 transaction data making the Layer 1 far less congested when it uses ZK Proofs to scale while not adding to the cost of transactions.</p>
<p>Because of their Zero Knowledge nature, these proofs can be adapted to enable Layer 1 block producers to validate Layer 2 transactions without needing the transaction information itself.  This makes the transactions private, obscuring information from both the Layer 1 block producers, third party observers and even the person receiving the transaction.</p>
<hr />
<h2>14.6. Real-World Example: Community Forks</h2>
<p>The evolution of certain DPoS systems shows how distribution often arises from unexpected events such as hostile takeovers or forks rather than neat, planned “token sales.” When a community must set aside its internal differences and unify to fork out a malicious actor’s stake, distribution can become more <em>organic</em>:</p>
<ul>
<li>Many previously inactive holders in voting become active voters to defend the chain - like an immune system kicking in, it increases the inherent security of the chain by reducing apathetic voters.</li>
<li>Founder stakes or investor stakes get nullified if they attack the community.</li>
<li>The result is a large class of committed stakeholders who align around genuine and continued decentralisation.</li>
<li>(See chapter 13.4.2 for more information on forking away from an abusive whale stake)</li>
</ul>
<hr />
<h2>Conclusion</h2>
<p>The so-called “Scalability Trilemma” posits that a chain must sacrifice security (decentralisation) for scalability or vice versa. In practice, this trilemma stems from conflating <em>data availability</em> with <em>computation</em> and ignoring the power of Parameterised Coin Voting combined with a widely distributed token.</p>
<p><strong>Key Lessons</strong></p>
<ol>
<li><p><strong>Separate Computation from the Base Layer</strong></p>
<ul>
<li>Keep Layer-1 minimal: text data availability and lightweight transactions.</li>
<li>Push heavy smart-contract logic, large media storage, or advanced computations to Layer-2.</li>
<li>This allows near fee-less base layer transactions, crucial for censorship resistant usage.</li>
</ul></li>
<li><p><strong>Resource-Credit or Staking Models</strong></p>
<ul>
<li>Eliminate high, unpredictable base layer fees so layer-2 solutions and normal users can reliably store data or do basic transfers.</li>
<li>Guarantee that the success of one application doesn’t undermine the cost of transactions on others through universal “fee auctions.”</li>
</ul></li>
<li><p><strong>Ensure No Single Entity Can Dominate</strong></p>
<ul>
<li>Avoid pre-mines, large ICO's, or central staking pools that accumulate majority control.</li>
<li>Parameterised consensus (e.g., a fixed set of elected, replaceable block producers) and lock-up stakes for governance.  (For more information on Pre-Mines and ICO’s see Chapter 15. “Censorship and the Morality of Pre-Mines”).</li>
</ul></li>
<li><p><strong>True Security = Decentralisation</strong></p>
<ul>
<li>“Security” is not separate from “decentralisation.” A chain is only secure if no single party can impose censorship or freeze assets.</li>
</ul></li>
<li><p><strong>Broad Distribution Is Non-Negotiable</strong></p>
<ul>
<li>Let anyone earn the token from real value-added activities such as building, content creation, infrastructure support.</li>
<li>Community forks or “freak events” often achieve fair distribution more effectively and organically than any top-down design.</li>
</ul></li>
</ol>
<p>By following these principles, a blockchain can deliver robust throughput <em>and</em> maintain censorship resistance disproving the notion that one must compromise “security vs. decentralisation vs. scalability.” Properly built systems show these are not mutually exclusive trade-offs but rather aspects of a carefully designed, parameterised network where <em>no single dimension</em> has to be sacrificed.</p>
]]></description><image url="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeiewfpi5tapfytp5kam7cb5ea7txgnyy3lvnxgfeizkbx7nqjhenbi/" title="Chapter 14. Balancing Scalability and Censorship Resistance (Disproving the “Scalability Trilemma”) image"/><itunes:explicit>false</itunes:explicit><itunes:image href="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeiewfpi5tapfytp5kam7cb5ea7txgnyy3lvnxgfeizkbx7nqjhenbi/"/><enclosure  url="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeigjz4angosc7nvc6glpxocvbnnkk64dxiczpypsrntv7ijhfzt5j4" length="271236784" type="video/mp4"/></item><item><title><![CDATA[Chapter 13: Defending Decentralized DPoS Communities—Attack Vectors, Security Mechanisms]]></title><itunes:author><![CDATA[Network State Audio Book]]></itunes:author><itunes:episodeType>full</itunes:episodeType><link>https://3speak.tv/watch?v=networkstate.mp3/dcrpdray</link><pubDate>Wed, 20 Aug 2025 02:23:32 GMT</pubDate><dc:creator>networkstate.mp3</dc:creator><guid isPermaLink="false">hive-129940/@networkstate.mp3/dcrpdray</guid><description><![CDATA[<p><a href="https://3speak.tv/watch?v=networkstate.mp3/dcrpdray" rel="nofollow noopener" title="This link is not safe!">https://3speak.tv/watch?v=networkstate.mp3/dcrpdray</a> <br />-----------------------<br />
<strong>Securing Digital Rights for Communities (Game Theory and Governance of Scalable Blockchains for Use in Digital Network States)</strong></p>
<hr />
<h1>Chapter 13: Defending Decentralized DPoS Communities—Attack Vectors, Security Mechanisms, and the Power of Layer Zero</h1>
<p><img src="https://files.peakd.com/file/peakd-hive/networkstate/23wqbqYJpH2rcJW82qbkWyA8TSKSiNFaE4nYAxh4mQs2z1ShVtYTLHL8WyBw5KegHFdBF.png" alt="13c.png" /></p>
<p>Decentralized ecosystems promise censorship resistance, transparent governance,<br />
and community ownership. Yet these aspirations come under threat the moment someone attempts to gain disproportionate control. Whether through direct purchase of tokens, stealthy accumulation, or coordinated influence, attackers seek to seize the reins of power or, at the very least, disrupt the shared values that hold the community together. As a result, the community must be highly vigilant to monitor its systems for signs of centralisation and be ready to defend itself at all times. This chapter explores the key attack vectors in delegated proof-of-stake (DPoS) blockchains, the defences that resilient communities employ, and how reputation, distribution, and circular economies become powerful shields against hostile takeovers.</p>
<hr />
<h2>13.1. Understanding the Direct 51% Attack</h2>
<p>A <strong>“51% attack”</strong> in the context of many blockchains typically refers to controlling the majority of mining hash power (in proof-of-work) or the majority of total stake (in proof-of-stake). In a <strong>delegated proof-of-stake (DPoS)</strong> chain, the equivalent is controlling over 51% of the <strong><em>active voting stake</em></strong>, not necessarily 51% of total tokens in existence. A large fraction of tokens may be non voting, dormant or held by long-term investors who choose not to participate in governance, so the threshold to seize decision-making power might be lower (e.g., 30–40% of total tokens) if it translates to half of the actively voted stake.</p>
<p>The goal of gaining 51% of the voting stake in either POW or DPOS governance systems is to control or change the underlying consensus software of the blockchain. The group which controls 51% of the active voting stake has the power to nullify balances, change the rules or carry out any number of wide ranging nefarious actions which may act against the best interests of the wider community. Some of these actions may even be subtle and hard to detect without deep knowledge of the base code.</p>
<h3>13.1.1 Calculating the Threshold in Practice</h3>
<ul>
<li><strong>Dormant or apathetic stake.</strong> Many investors do not wish to use their governance rights. Some have lost access to keys; others simply hold tokens passively, others are ill informed as to the importance of maintaining activity of their tokens in governance decisions.</li>
<li><strong>Voting delays.</strong> DPoS platforms often include powering-up requirements and waiting periods (also known as staking). For example, once tokens are staked (“powered up”), an attacker must wait (e.g., 30 days) before being able to vote for witnesses (the block producers).</li>
<li><strong>Community “immune response.”</strong> During peaceful times, only 30–40% of total supply might be actively voting. Under attack, additional dormant stake frequently awakens, pushing the actively voted stake higher. An attacker who has purchased 30–40% of the total tokens might suddenly face 50–60% of active stakeholders voting against them, when these voters were apathetic before their attack.</li>
</ul>
<h3>13.1.2 Over-the-Counter (OTC) Acquisitions</h3>
<p>Attackers sometimes attempt <strong>shock acquisitions</strong>: buying large stakes through private Over the Counter (OTC) deals with major token holders to avoid moving markets. Even so, a month-long lock or similar delay feature grants the broader community critical time to observe the build-up, approach the new party about their intentions and organize a defence if necessary.</p>
<hr />
<h2>13.2. Indirect or Slow Accumulation Attacks</h2>
<p>An alternative method is the <strong>slow, stealthy</strong> approach, gradually buying tokens over a long period so that no sudden price surges draw suspicion. The attacker attempts to outpace inflation and avoid spooking community members. This is often described as a <strong>“Red Queen Race or Game,”</strong> where the attacker has to keep running, constantly purchasing stake to maintain or grow their position because:</p>
<ol>
<li><strong>Inflation</strong> issues new tokens to existing stakers, continuously diluting outsiders attempting to accumulate stake over the long term for an attack.</li>
<li><strong>Community awareness</strong> can lead to counter-buys. If accumulation becomes obvious, others may accumulate too, driving up price and making the attack prohibitively expensive.</li>
</ol>
<p>In practice, truly stealthy long-term accumulation on a healthy DPoS network proves extremely difficult. Because continuous buying raises a token’s profile, it can also raise the price, creating a negative feedback loop that the attacker has to outpace.</p>
<hr />
<h2>13.3. Distribution as Security</h2>
<p><strong>Well-distributed token ownership</strong> is the most fundamental defence against takeover attempts in DPoS. If a small group of large holders controls the majority of tokens, an attacker may simply collude or purchase those stakes. Conversely, if significant token supply rests in the hands of numerous mid-level stakeholders (“dolphins” or “orcas” in some ecosystems), no single OTC deal can guarantee majority control.</p>
<ol>
<li><strong>Healthy Middle Class.</strong> A broad “middle class” of token holders ensures that a handful of whales cannot single-handedly decide governance.</li>
<li><strong>Ongoing Community Allocation.</strong> Continuous reward mechanisms (e.g., content creation rewards, infrastructure rewards, gaming, or curation) spread tokens widely among active participants, reinforcing decentralization.</li>
<li><strong>Fair Launch or Post-Launch Distribution.</strong> Token systems with large pre-mines or concentrated early investors may face outsized risk of governance capture. Over time, these chains must actively work on distributing tokens to genuine, productive community members, otherwise they undermine their own security model.</li>
</ol>
<p>For more information on Pre-Mines and ICO’s see Chapter 15. “Censorship and the Morality of Pre-Mines”.</p>
<hr />
<h2>13.4. How to Defend Against Attacks</h2>
<h3>13.4.1 The Immune Response</h3>
<p>In the event of an attempted 51% attack, a DPoS community often springs into action much like a biological immune system. Dormant stakeholders rally to vote; whales who had previously been indifferent secure the network to protect their own investment. This sudden rise in active voting power can defeat or mitigate the attacker’s advantage. The lower the level of dormant or apathetic voting stake during times of normal operation, the more of a deterrence it is to an attacker.</p>
<h3>13.4.2 Forking: The Ultimate Escape Hatch</h3>
<p>Even if an attacker somehow takes control of the main chain, <strong>forking</strong> remains a final check on malicious power.</p>
<ul>
<li><strong>Copying State and Excluding Attackers.</strong> Communities can duplicate the blockchain’s history but exclude or freeze the attacker’s stake. Everyone else’s balances are preserved on the new fork where the community will to move in order to isolate an attacker (on the old fork).</li>
<li><strong>Migrating to a New Brand.</strong> Though the original chain may keep its name under the attacker’s control, the “real” community can move to a new chain, complete with code and state continuity.  In this case, the community should do everything it can to communicate what the new brand is, where to find the new chain and what changes the new chain has made in order to mitigate the attack on the previous fork.  Failure to do this is often as bad as not forking away from a hostile attacker.</li>
<li><strong>Winner Takes All.</strong> In most scenarios involving DPoS chains which are being attacked, the community-led fork becomes the de facto chain. The attacker, holding no tokens on the new fork, discovers that “you cannot buy a community.” Without people to give the token utility, the original chain withers.</li>
</ul>
<p>Forking therefore holds large token holders accountable, compelling them to act benevolently towards the community. If whales push too hard or threaten the ecosystem’s values, the rest of the network can simply leave. This “veto power” ensures that smaller stakeholders, though individually less wealthy, collectively hold enormous influence which far outweighs that of any of the whales (large stakeholders) in the ecosystem.</p>
<hr />
<h2>13.5. You Can’t Buy a Community</h2>
<p>Centralized startups or traditional corporations may be acquired by buying out a single entity or board of directors. In a <strong>community-governed ecosystem</strong>, no single gatekeeper can sell the “heart” or values of the community. If an attacker attempts a hostile takeover:</p>
<ul>
<li><strong>Rebellion.</strong> The moment members sense motives detrimental to the network, they organize resistance.</li>
<li><strong>Fork Off.</strong> Communities fork away if necessary, taking the developer talent, user engagement, and brand loyalty with them.</li>
<li><strong>Moral Imperative.</strong> Decentralized communities often coalesce around values like censorship resistance or autonomy. Members who have already “tasted digital freedom” are notoriously unwilling to forfeit control or make a deal with the hostile attacker, especially when the new "overlord’s" intentions are questionable.</li>
</ul>
<hr />
<h2>13.6. The Community Is the Layer Zero</h2>
<p>In blockchain architecture, we often hear about <strong>Layer 1</strong> (the core protocol, consensus, and data availability) and <strong>Layer 2</strong> (applications, smart contracts, Dapps). Missing from many discussions is <strong>Layer 0</strong>: the <strong>community of people</strong> who participate, build, and govern.</p>
<ul>
<li><strong>Ultimate Source of Value.</strong> DApps, transactions, and social engagement bestow real-world relevance and demand upon a token. Without active users and developers, the network is merely code.</li>
<li><strong>Immune Response.</strong> Layer 0 unifies in times of crisis, bringing otherwise dormant stakeholders to defend the chain.</li>
<li><strong>Collective Veto.</strong> When whales or outside attackers threaten the ecosystem, it is the community, Layer 0, who can coordinate a new fork, rendering any hostile stakes worthless.</li>
</ul>
<p>In proof-of-stake systems which usually lack engaged community members due to the typical nature of the passive earning for staking model in PoS systems, a wealthy minority can capture governance outright with no recourse for remediation for the majority individual members of the community. By contrast, well-distributed DPoS networks rely on their engaged, vigilant user base; the crucial layer zero to monitor, maintain control decentralized, and fight for it digitally when necessary.</p>
]]></description><image url="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeidwvtmcreout52tpd2pff2d3spvqkvw2jnxtmjjeseszlpvn7kfqi/" title="Chapter 13: Defending Decentralized DPoS Communities—Attack Vectors, Security Mechanisms image"/><itunes:explicit>false</itunes:explicit><itunes:image href="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeidwvtmcreout52tpd2pff2d3spvqkvw2jnxtmjjeseszlpvn7kfqi/"/><enclosure  url="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeigrfpjkmgsfa2wnreghgmgompaldtkdcxuprfgkbzho2ou2yodrim" length="387136423" type="video/mp4"/></item><item><title><![CDATA[Chapter 12. Coin Voting Parameters - Audio Version]]></title><itunes:author><![CDATA[Network State Audio Book]]></itunes:author><itunes:episodeType>full</itunes:episodeType><link>https://3speak.tv/watch?v=networkstate.mp3/ivamxnnb</link><pubDate>Tue, 19 Aug 2025 00:13:46 GMT</pubDate><dc:creator>networkstate.mp3</dc:creator><guid isPermaLink="false">hive-129940/@networkstate.mp3/ivamxnnb</guid><description><![CDATA[<p><a href="https://3speak.tv/watch?v=networkstate.mp3/ivamxnnb" rel="nofollow noopener" title="This link is not safe!">https://3speak.tv/watch?v=networkstate.mp3/ivamxnnb</a> <br />-----------------------<br />
<strong>Securing Digital Rights for Communities (Game Theory and Governance of Scalable Blockchains for Use in Digital Network States)</strong></p>
<hr />
<h1>Chapter 12. Coin Voting Parameters</h1>
<p><em>How Time Locks, Stable-coins, and Infrastructure Incentives Strengthen Governance on DPoS Chains</em></p>
<p><img src="https://files.peakd.com/file/peakd-hive/networkstate/23u5tiZjpBJ9Ss2zkRkp2kSaqdtuSuGrD2BHxDENgVTBBb6TWTivBMwJC6BC4ffAUQqQ6.png" alt="12c.png" /></p>
<hr />
<h2><strong>Introduction</strong></h2>
<p>Once a blockchain community agrees on “Parameterised Coin Voting” (often called Delegated Proof-of-Stake, or DPoS), it must also define <em>how</em> the eco-system's voting power is distributed and exercised. These “coin voting parameters” determine everything from how long stake must remain locked when powered up, protective time delays for stable coin token swaps on the base layer, to how new tokens are issued or taxed as well as many other variables. Each parameter serves as a safeguard against centralisaed takeovers and short-term manipulation, while also incentivizing community members to hold, build, and coordinate in the long term.</p>
<p>This chapter details key parameters such as lock-up durations for governance, stablecoin security rules, token minting and inflationary controls, and more.  It explains why collectively they form the backbone of secure, censorship-resistant on-chain economies.</p>
<hr />
<h2>12.1. Importance of Long Lock-Ups for Governance Participation</h2>
<p><strong>Why Locking Matters</strong>  <br />
When stakeholders lock (or “power up”) tokens for an extended period, they reveal genuine “skin in the game.” Someone who can instantly withdraw has far less risk and can more easily perform a short-term attack or manipulate votes. By contrast, a locked-in stakeholder must carefully choose who or what they vote for, because they can’t exit quickly if they cause harm or fail to benefit the community.</p>
<p><strong>Preventing Custodial Attacks</strong>  <br />
Long lock-ups also prevent custodial wallets (like centralised exchanges) from freely using <em>other people’s</em> tokens to hijack governance. If tokens must remain staked for months, it’s much harder for an exchange to suddenly vote without telegraphing its move. The community gains time to see large power-ups and respond if malicious behaviour appears.</p>
<p><strong>Time as a Security Factor</strong>  <br />
Time itself becomes an integral part of security. With a multi-month lock-up requirement, any new whale is effectively “on probation” for that period before it can fully influence governance. This discourages opportunistic short-term attackers who want to “buy in, vote, then sell.”</p>
<hr />
<h2>12.2. One-Month Voting Delay</h2>
<p><strong>Seeing Attackers Coming</strong>  <br />
A “voting delay” is a specific parameter stating that <em>even after</em> you lock your tokens for, say, three months, so that you can vote in governance decisions, you must still wait an additional period (e.g., one month) <em>before</em> you can cast those governance votes. This delay means:</p>
<ul>
<li>The community can observe and reach out to new, large stakeholders and see if they’re legitimate or a threat.</li>
<li>Any suspicious movement of funds from, for example, a major exchange’s wallet, becomes immediately visible and can be monitored in case it is going to be used in an attack on the community.</li>
</ul>
<p><strong>Critical Defence</strong>  <br />
Had such a voting delay existed on certain DPoS chains in the past, major hostile takeovers by custodial exchanges would have been thwarted or significantly hampered (See STEEM blockchain takeover). The extra time window lets defenders rally: they can withdraw support from compromised witnesses or even prepare a hard fork to nullify an attacker’s stake if it’s obviously stolen or the intention is to use stake against the super majority's will which represents the community's consensus.</p>
<hr />
<h2>12.3. Why a Three-Month Lock-Up</h2>
<p><strong>Why Three Months?</strong>  <br />
Three months is a good lock duration for governance participation, but similiar lengths are good as well. It strikes a balance: long enough to deter “drive-by” attackers, but not so long as to alienate ordinary users. During this period:</p>
<ul>
<li>Stakers cannot instantly sell their tokens, so they share in the chain’s volatility and remain committed.</li>
<li>Potential attackers must accept that if they sabotage the system, their funds remain at risk to volatile price movements and community, consensus driven mitigations for months.</li>
</ul>
<p><strong>Future Variations</strong>  <br />
Some ecosystems might experiment with different lengths or even <em>tiered</em> lock-ups with longer commitments giving even greater voting power. The core idea is consistent: time-bound staking cements accountability and weeds out short-term exploiters.</p>
<hr />
<h2>12.4. Stablecoin Security</h2>
<p><strong>Why a Decentralised Stablecoin Is Crucial</strong>  <br />
For an on-chain economy to function, especially one prioritizing censorship resistance, users need a stable unit of account that <em>doesn’t</em> rely on centralised issuers or banks. A purely “speculative” chain with a volatile native token won’t serve everyday commerce or wages. Algorithmic stablecoins fill this gap by:</p>
<ul>
<li>Maintaining a peg (usually $1, but could be pegged to some other stable asset, commodity or basket of the same, should the community consensus wish it so)</li>
<li>Relying on on-chain mechanics, free of direct fiat banking</li>
<li>Allowing users to buy goods, save money, or transact in a familiar unit instead of an unfamiliar, volatile priced asset.</li>
</ul>
<p><strong>Collateralised by the Base Token</strong>  <br />
The main token is often 20-30 times larger than the stable coin which it collateralises.  There should be multiple controls built into the base layer protocol which ensure the stable asset is always vastly over collateralised by the main token.</p>
<p>A robust <em>algo-stablecoin</em> typically uses the chain’s main token as collateral. For example, if you hold one “Hive Backed Dollar” (HBD), you can always convert it into $1 worth of Hive (the main token), provided certain parameters remain healthy. To prevent runaway issuance, the chain includes “haircut rules” and time delays on large token swaps, ensuring the stablecoin supply can’t surpass the market capitalisation of the underlying collateral in a way that threatens the peg. An example of where these rules were not followed, ending in inevitable disaster was Terra Luna which incorporated none of the above mitigations into its protocol, resulting in a hyper inflationary collapse.</p>
<hr />
<h2>12.5. Haircut Rules</h2>
<p><strong>Preventing Over-Issuance</strong>  <br />
A “haircut rule” puts a hard cap on how large the stablecoin’s total market cap can be relative to the base token’s market cap (e.g., 30%). If the stablecoin ever approaches or exceeds this threshold:</p>
<ol>
<li>The chain can <strong>stop</strong> creating additional stablecoins (e.g., halting certain reward distributions in stable form).</li>
<li>It may <strong>devalue</strong> the internal stablecoin peg (to 90¢, 80¢, etc.) to ensure overall system solvency, by prioritising the limitation of the creation of new main governance / collateral<br />
tokens during conversions back from stable coins at the cost of the stable coin peg value. This prevents a hyper inflationary event of the main collateral token, protecting the ecosystem, albeit at the cost of a temporary de-pegging of the stable coin asset's price</li>
</ol>
<p><strong>Adaptive Mechanism</strong>  <br />
This dynamic protects both the stablecoin and the chain from a “bank run,” where too many stablecoins chase too little collateral. Over time, once conditions improve and the chain’s base token regains value, the stablecoin’s internal peg and issuance can return to normal. This cyclical approach allows algorithmic stablecoins to recover from market dips without collapsing irreversibly.</p>
<hr />
<h2>12.6. Time Delay on Bulk Token Swaps</h2>
<p><strong>Slow Conversions, More Safety</strong>  <br />
If large holders could instantly swap massive amounts of tokens into stablecoins (or vice versa), they could destabilize the market or execute rapid attacks by building short positions in the main token and then instantly converting large amounts of stable coins to the main token.  This causes massive inflation of the main token and devalues it, resulting in large payouts for the attacker's short positions. Imposing a three-day (or similar) delay on major conversions:</p>
<ul>
<li>Gives the community consensus driven protocol time to adjust supply and internal pricing.</li>
<li>Alerts the community to suspicious behaviours well before the conversion finalizes.</li>
<li>Creates a highly risky situation for the attacker, who now has to wait for 3 days with a large short position that can be liquidated by a move higher in the base layer asset, causing a huge short squeeze against their position.  This makes the potential losses to the attacker infinite and the inherent risk of such an attack far greater than carrying out such an attack without the time delay on internal stable coin conversions mitigation in place.</li>
</ul>
<p><strong>Avoiding System Shocks</strong>  <br />
A delayed swap mechanism prevents sudden surges in the stablecoin or base token supply, reducing manipulative volatility. This resembles “capital controls,” ensuring a healthy conversion pace rather than abrupt floods that can crash markets.</p>
<hr />
<h2>12.7. Inflation Control</h2>
<p><strong>Steady, Transparent Token Issuance</strong>  <br />
Blockchains commonly issue or mint new tokens as “inflation,” distributing them to infrastructure operators (validators) or to individuals providing value (content creators, developers, liquidity providers). However, the inflation rate must remain carefully managed:</p>
<ul>
<li><strong>Too high</strong> and the token’s value dilutes, undermining long-term growth, inflating it away to zero.</li>
<li><strong>Too low</strong> and the chain can’t adequately fund community projects or incentivize widespread distribution of the token.</li>
</ul>
<p><strong>Community-Defined Parameters</strong>  <br />
Many DPoS-like systems use scheduled token minting curves (e.g., starts at 12% then drops 0.5% per year until 0.5%) or allow consensus decision by governance voting to adjust annual rates. The key is that <em>no central party</em> arbitrarily mints unlimited tokens. When stakeholders collectively control inflation, they align it with network health.</p>
<hr />
<h2>12.8. Importance of Transaction Taxes</h2>
<p>(<em>Note: Some chains opt for “resource credits” instead of explicit transaction fees, but the concept is similar.</em>)</p>
<p><strong>Prevents Spam</strong>  <br />
Tiny taxes or “resource credit” costs in zero transaction fee systems on each transaction deter malicious actors from flooding the network with meaningless transactions.<br />
<strong>Funds Public Goods</strong>  <br />
If designed properly, transaction fees can be channeled into a decentralised community fund (a DAO), financing infrastructure upgrades, marketing, or development without relying on external Venture Capital funding.</p>
<p><strong>Trade-Off</strong>  <br />
High fees can stifle usage, pushing users to centralised layers or competitor chains. Low or zero-fee designs risk spam unless you stake tokens to earn “resource credits.” The right solution typically involves parameterised resource models that scale usage based on staked token amounts.</p>
<hr />
<h2>12.9. Backing the Token with Community Interactions</h2>
<p><strong>Real Economic Activity</strong>  <br />
A chain’s main token gains lasting value not through speculation alone, but from genuine utility. If people need to stake tokens long term in order to:</p>
<ul>
<li>Post or comment,</li>
<li>Run apps,</li>
<li>Vote on governance proposals,</li>
<li>Earn stablecoins or other rewards,<br />
then they <em>compete</em> for access to on chain resources in exchange for holding and staking those tokens. As network effect takes hold and the community grows, the demand for transactions grows and thus competition for access on chain resources also grows with it.  This usage is what “backs” the token’s worth <em>far</em> more stable than mere hype, speculation and venture capital backed market makers.</li>
</ul>
<p><strong>Circular Incentives</strong>  <br />
Users earn tokens for creating valuable content or running infrastructure. They then stake (lock) those tokens to gain influence or resource credits, enabling them access to more on-chain activity, which further enriches the ecosystem. This positive feedback loop cements real demand for tokens that pure speculation cannot match.</p>
<hr />
<h2>12.10. Rewards for Holding and Locking In</h2>
<p><strong>Staking Benefits</strong>  <br />
Long-term stakers may earn extra yield or command stronger voting power. This can:</p>
<ul>
<li>Counterbalance short-term traders,</li>
<li>Incentivize early believers and builders,</li>
<li>Foster and favour a middle class of stakeholders who have earned their tokens from the protocol over time, over whales that merely buy big positions on day one.</li>
</ul>
<p><strong>Proof of Commitment</strong>  <br />
These “hold-and-earn” or “stake-and-earn” models on social blockchains where community stake weighted voting of valuable content show that one can support the chain’s vision long enough to shape its governance responsibly. In many systems, staked accounts also receive a portion of newly minted tokens or content curation rewards over time. This incentivises long term, staked holders with skin in the game to continue to contribute to the community while earning additional stake as a result of their value added contributions.</p>
<hr />
<h2>12.11. DApps and Services as Holders of Last Resort</h2>
<p><strong>Why They Don’t Sell</strong>  <br />
Applications built atop a chain (social media platforms, games, DeFi protocols) need guaranteed access to transactions, bandwidth, and resource credits for their users. They must lock large amounts of the base token:</p>
<ul>
<li>If they become distressed sellers and sold under times of price pressure, <em>their entire app</em> would cease to be able to post to chain and thus lose much of its functionality.</li>
<li>This creates a class of “holder-of-last-resort” entities, who keep tokens <em>no matter</em> how low the price dips, in order that they can continue to operate their applications on chain.</li>
</ul>
<p><strong>Intrinsic Value Floor</strong>  <br />
When multiple serious DApps stake substantial amounts of tokens, you get a “demand floor". An intrinsic value to the token. Even in market crashes, these services can’t afford to offload their stake. This underpinning helps prevent token value from hitting zero purely from panic sells.</p>
<hr />
<h2>12.12. Anonymous Accounts vs. Known Accounts</h2>
<p><strong>Freedom vs. Trust</strong>  <br />
A truly censorship-resistant chain lets users create accounts without government-issued IDs or personal details. However, if people want to build public reputations or operate recognized infrastructure, they may choose to “dox” themselves revealing their identity. Both approaches matter:</p>
<ul>
<li><strong>Anonymous</strong> (or pseudonymous) users enjoy privacy, crucial for free speech in hostile regimes.</li>
<li><strong>Known</strong> users gain trust more quickly and may have “official” track records.</li>
</ul>
<p><strong>Hybrid Ecosystem</strong>  <br />
Chains typically end up with a mix: some top validators or developers might be pseudonymous, while others are open about who they are. Reputations can form around handle names, proven over time by consistent participation.</p>
<hr />
<h2>12.13. Importance of Locally Run Desktop Apps for Censorship Resistance</h2>
<p><strong>Web Apps Are Vulnerable</strong>  <br />
If an application only exists as a website (e.g., <em>something</em>.com), governments or ISPs can block the URL. Domain registrars can seize or censor it, pressuring the app to follow local regulations.</p>
<p><strong>Desktop Clients</strong>  <br />
By contrast, user-installed desktop or mobile clients directly query the blockchain’s node infrastructure. No single domain or centralised server can be shut down. Even if a front-end website disappears, the <em>community-run blockchain</em> remains accessible through these locally operated apps.</p>
<p><strong>True Decentralised Access</strong>  <br />
Desktop clients shift control back to users. They choose which API nodes to connect to, or even run a node themselves. This fosters unstoppable digital communities no domain take down or corporate compliance order can erase the chain’s content or access to it.</p>
<hr />
<h2>Conclusion</h2>
<p>Coin voting parameters might seem like small technical rules, but collectively they fortify an ecosystem against takeover, ensure broad participation, and maintain the stablecoin foundation crucial for everyday transactions. <strong>Long lock-ups</strong> and <strong>voting delays</strong> deter short-term money attacks, while stablecoin <strong>“haircut rules”</strong> and <strong>time-delayed swaps</strong> prevent systemic collapse. <strong>Transaction fees or resource credits</strong> control spam and fund public goods, and <strong>Dapps</strong> become “holders of last resort,” sustaining demand for the base governance / collateral token.</p>
<p>Whether your account is anonymous or publicly known, these governance parameters allow a robust, censorship-resistant environment where individuals can operate desktop apps, earn tokens from the rewards pool, and shape policy over time. By weaving all these elements together economic, technical, and social blockchain communities can grow into truly self-sovereign digital Network States, immune to the centralising forces and quick-profit motives that undermine so many freedom / self-sovereignty based projects.</p>
]]></description><image url="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeiexfe2ooalrvvn34yulg7x2l22qd323sryfqulsxoj3ql2qi5josu/" title="Chapter 12. Coin Voting Parameters - Audio Version image"/><itunes:explicit>false</itunes:explicit><itunes:image href="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeiexfe2ooalrvvn34yulg7x2l22qd323sryfqulsxoj3ql2qi5josu/"/><enclosure  url="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeihuqq6vnv2usfxb6ircg74igpgxqjnn2smdimjxwsbluciosmrqae" length="300981846" type="video/mp4"/></item><item><title><![CDATA[Chapter 11. De-Governance - Audio Version]]></title><itunes:author><![CDATA[Network State Audio Book]]></itunes:author><itunes:episodeType>full</itunes:episodeType><link>https://3speak.tv/watch?v=networkstate.mp3/hdjldect</link><pubDate>Sun, 10 Aug 2025 05:10:22 GMT</pubDate><dc:creator>networkstate.mp3</dc:creator><guid isPermaLink="false">hive-129940/@networkstate.mp3/hdjldect</guid><description><![CDATA[<p><a href="https://3speak.tv/watch?v=networkstate.mp3/hdjldect" rel="nofollow noopener" title="This link is not safe!">https://3speak.tv/watch?v=networkstate.mp3/hdjldect</a> <br />-----------------------<br />
<strong>Securing Digital Rights for Communities (Game Theory and Governance of Scalable Blockchains for Use in Digital Network States)</strong></p>
<hr />
<h2>Chapter 11. De-Governance</h2>
<p><em>Where Consensus Meets Human Judgment</em></p>
<p><img src="https://files.peakd.com/file/peakd-hive/networkstate/23u5tiZjqcXnYhjHkSMPbRGKzURnVawqFrLyCwHZ3A3HTEZ3iGEsbnSYDJCRD3E5r8CNm.png" alt="11c.png" /></p>
<hr />
<h2><strong>Introduction</strong></h2>
<p>Blockchains inevitably require a <em>consensus</em> mechanism some form of governance to decide how data is validated, how upgrades occur, and who ultimately exerts control. Yet many projects misunderstand governance, defaulting to simplistic models that invite centralisation. This chapter examines three major paradigms Proof-of-Work, Proof-of-Stake, and Delegated Proof-of-Stake while highlighting how true decentralisation for communities and social systems requires more refined “parameterised” voting systems. We then show why neutral, ownerless blockchains must avoid founders, VC's, and pre-mines, and how community-driven governance can act as a counterbalance against takeover attempts and regulatory threats.</p>
]]></description><image url="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafkreid4xlamrtpcymckpuqqmiuggl75y7vqnejb2dol6ykkf4f4f23vwa/" title="Chapter 11. De-Governance - Audio Version image"/><itunes:explicit>false</itunes:explicit><itunes:image href="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafkreid4xlamrtpcymckpuqqmiuggl75y7vqnejb2dol6ykkf4f4f23vwa/"/><enclosure  url="https://hotipfs-3speak-1.b-cdn.net/ipfs/bafybeibmau3qbwfy7dhfkatrsylqbkyukmzbpfnrlt7ulxehdpjo5rt6e4" length="603483487" type="video/mp4"/></item></channel></rss>