<100 subscribers
On Optimal Decentralization
The Decentralization Series: Part TwoRecall the Starting PointPreviously, our post - “On Being Sufficiently Decentralized” - stated that technological decentralization and self-sovereignty are the ingredients for a protocol or application being sufficiently decentralized. But, it is not a natural steady-state; it has to be maintained. Reaching the state of sufficient decentralization is one thing, but maintaining it requires much work. Creating the right environment and framework to sustain t...
The Greatest Advantage Handed to the US on a Plate - Stablecoins
***By Steven Becker, CEO of UDHC, former President and COO of the Maker Foundation, which helped build Dai, a crypto-collateralized stablecoin.Stablecoins reinforce the US dollar as the de facto world reserve currency. The entire world wants to use the US dollar, and the US is trying its hardest not to make that happen by holding it close to its chest like a precious heirloom instead of deploying it as an essential tool of liberation. The US dollar, like all currencies, is a one-dimensional t...
On Being Sufficiently Decentralized
The Decentralization Series: Part OneWhy Decentralization is ImportantDecentralization is intuitively easy to understand but difficult to define precisely. Creating a blockchain-specific working definition helps attribute value to protocols and applications. Taken a step further, it can help identify the regulatory touchpoints for consumers and investors. Decentralization describes an intention and level of control. For example, a system intended to be centralized could distribute power and b...
On Optimal Decentralization
The Decentralization Series: Part TwoRecall the Starting PointPreviously, our post - “On Being Sufficiently Decentralized” - stated that technological decentralization and self-sovereignty are the ingredients for a protocol or application being sufficiently decentralized. But, it is not a natural steady-state; it has to be maintained. Reaching the state of sufficient decentralization is one thing, but maintaining it requires much work. Creating the right environment and framework to sustain t...
The Greatest Advantage Handed to the US on a Plate - Stablecoins
***By Steven Becker, CEO of UDHC, former President and COO of the Maker Foundation, which helped build Dai, a crypto-collateralized stablecoin.Stablecoins reinforce the US dollar as the de facto world reserve currency. The entire world wants to use the US dollar, and the US is trying its hardest not to make that happen by holding it close to its chest like a precious heirloom instead of deploying it as an essential tool of liberation. The US dollar, like all currencies, is a one-dimensional t...
On Being Sufficiently Decentralized
The Decentralization Series: Part OneWhy Decentralization is ImportantDecentralization is intuitively easy to understand but difficult to define precisely. Creating a blockchain-specific working definition helps attribute value to protocols and applications. Taken a step further, it can help identify the regulatory touchpoints for consumers and investors. Decentralization describes an intention and level of control. For example, a system intended to be centralized could distribute power and b...
Share Dialog
Share Dialog
The Decentralization Series: Part Four (Read parts One, Two and Three)
Defining blockchain protocol decentralization is difficult, but its consequences are easy to identify and understand. The first post of this series concluded that a protocol is sufficiently decentralized if it permits self-sovereignty, which means that a person or entity could engage with the protocol directly and do so freely without any undue external influence or control.
The second post stipulated that achieving sufficient decentralization and maintaining it is challenging. However, if a protocol keeps this level of self-sovereignty, it is considered optimally decentralized.
The third post covered how a protocol could attain optimal decentralization by introducing a mental model. Then, two general routes were presented demonstrating how a protocol could forge a path or arc of decentralization. This fourth and final post will cover the last element and augment the mental model to introduce the compliant arc of decentralization.
To figure out how to apply regulation to a protocol, you must understand that an optimally decentralized protocol is a public utility. Whether a permissionless public blockchain or a decentralized application built on top of one, it is a platform and a public good accessible by anyone.
Imagine a decentralized protocol as the ocean. Nobody controls the body of water. You cannot dictate the ocean's tides, waves, and currents. But, you can control how ports, harbors, ships, and boats use the ocean.

Similarly, decentralized protocols are non-jurisdictional open-source public utilities, ubiquitous, and consequently not controlled. Therefore, enforcing regulation on these protocols is equivalent to dictating the body of water that makes up the Pacific Ocean - futile. But, the value derived from these protocols is in how they are used and how that use is regulated - in the same way, we create and control ships and shipping lanes to help drive commerce.
Approaching a protocol in this manner helps one understand how to apply the current tooling of public policy and regulation to protect consumers and investors. In addition, it becomes clear that an activity-based framework informs public policy on using existing regulations and identifying new tooling required to address potential gaps.
Public policies and regulations are inherently bound to the jurisdictions that produce them. Protocols are not, but using them is an activity bound within a jurisdiction. Linux is a non-jurisdictional open-source operating system available to anyone. Still, a product or service created using Linux is regulated within its jurisdiction of creation or use.
The same thinking applies to protocols, especially concerning their development, deployment, and decentralization.
Recall the Triangular mental model for a protocol's path to become decentralized. The path is comprised of four steps: 1) the start, called the Control point, 2) the Launch, then 3) Growth, and finally 4) Decentralization. Each step strengthens the protocol's resilience and robustness through decentralization.
Implicit in that path is the protocol becoming sufficiently decentralized during the Launch step, developing sustainability through Growth, and building an ecosystem into Decentralization, the final step.
The intent of developing a protocol is to make it a public good. During the Launch, to remain compliant means fulfilling that intent. The Growth step adds utility, making it more valuable to its community. Creating front-ends (website applications) during the Growth step allows users to engage with the protocol, demonstrating how the spectrum from open source communities to compliant regulated businesses can create access and proofs-of-concept by integrating with the protocol, creating commercial value. The final step, Decentralization, is where the protocol sustains itself through a critical mass of compliant products and services. It generates an ecosystem on top of it, reinforcing, growing, and contributing value to the broader economy.
The arc of decentralization becomes compliant when two things are satisfied. First, the protocol is, or will soon become, a public good offering self-sovereignty. Second, the ecosystem developing on top of it provides a sufficient level of policy and regulatory compliance to protect the users of and investors in the goods and services making up that ecosystem.
Applying an activity-based compliance framework to a protocol ensures that the objective of decentralization to create a public good is clear and not a ploy to try and escape regulation. Furthermore, by considering protocols as public utilities, they can also be seen as primitives or composable tools that could give rise to novel and innovative ideas that push the industry forward in a compliant-positive, socially, and commercially valuable direction.
Decentralization is a chameleon. Definitions will be different, always fitting the current environment, but ultimately remaining the same animal. Defining, understanding, and achieving decentralization in the context of blockchain protocols, is what this series was all about.
In this context, decentralization is about creating fault tolerant, attack-, and collusion-resistant protocols. Protocols that are accessible, transparent, robust, and sustainable. Efficiency is not the primary purpose, security is. Security imbues the users with confidence that they can engage with it directly. A decentralized protocol establishes itself as a public utility, a tool that can be used directly or in combination with other tools. The point is that the user - a large corporation or individual - has access to it on their own terms, the point is for the protocol to allow for self-sovereignty, and then it can be considered sufficiently decentralized.
Keeping a protocol sufficiently decentralized is in itself a challenge – once achieved it needs to be sustained. Unlike a switch or line in the sand, a protocol needs to reinforce its own ability to maintain sufficient decentralization through design, operations and community. If that is possible then it has become optimally decentralized.
All protocols start from more or less the same point of control. The arc of decentralization was introduced as a mental model where a combination of control, community, and funding determined the path it took to achieve the objective. Still, no matter the path, protocols engage with people who are governed by law. Consequently, understanding protocols as public tools, allows for the application of current laws and regulation to steer the path of this new technology. To ultimately realize the economic and societal value of protocols that follow their compliant arc of decentralization.
The Decentralization Series: Part Four (Read parts One, Two and Three)
Defining blockchain protocol decentralization is difficult, but its consequences are easy to identify and understand. The first post of this series concluded that a protocol is sufficiently decentralized if it permits self-sovereignty, which means that a person or entity could engage with the protocol directly and do so freely without any undue external influence or control.
The second post stipulated that achieving sufficient decentralization and maintaining it is challenging. However, if a protocol keeps this level of self-sovereignty, it is considered optimally decentralized.
The third post covered how a protocol could attain optimal decentralization by introducing a mental model. Then, two general routes were presented demonstrating how a protocol could forge a path or arc of decentralization. This fourth and final post will cover the last element and augment the mental model to introduce the compliant arc of decentralization.
To figure out how to apply regulation to a protocol, you must understand that an optimally decentralized protocol is a public utility. Whether a permissionless public blockchain or a decentralized application built on top of one, it is a platform and a public good accessible by anyone.
Imagine a decentralized protocol as the ocean. Nobody controls the body of water. You cannot dictate the ocean's tides, waves, and currents. But, you can control how ports, harbors, ships, and boats use the ocean.

Similarly, decentralized protocols are non-jurisdictional open-source public utilities, ubiquitous, and consequently not controlled. Therefore, enforcing regulation on these protocols is equivalent to dictating the body of water that makes up the Pacific Ocean - futile. But, the value derived from these protocols is in how they are used and how that use is regulated - in the same way, we create and control ships and shipping lanes to help drive commerce.
Approaching a protocol in this manner helps one understand how to apply the current tooling of public policy and regulation to protect consumers and investors. In addition, it becomes clear that an activity-based framework informs public policy on using existing regulations and identifying new tooling required to address potential gaps.
Public policies and regulations are inherently bound to the jurisdictions that produce them. Protocols are not, but using them is an activity bound within a jurisdiction. Linux is a non-jurisdictional open-source operating system available to anyone. Still, a product or service created using Linux is regulated within its jurisdiction of creation or use.
The same thinking applies to protocols, especially concerning their development, deployment, and decentralization.
Recall the Triangular mental model for a protocol's path to become decentralized. The path is comprised of four steps: 1) the start, called the Control point, 2) the Launch, then 3) Growth, and finally 4) Decentralization. Each step strengthens the protocol's resilience and robustness through decentralization.
Implicit in that path is the protocol becoming sufficiently decentralized during the Launch step, developing sustainability through Growth, and building an ecosystem into Decentralization, the final step.
The intent of developing a protocol is to make it a public good. During the Launch, to remain compliant means fulfilling that intent. The Growth step adds utility, making it more valuable to its community. Creating front-ends (website applications) during the Growth step allows users to engage with the protocol, demonstrating how the spectrum from open source communities to compliant regulated businesses can create access and proofs-of-concept by integrating with the protocol, creating commercial value. The final step, Decentralization, is where the protocol sustains itself through a critical mass of compliant products and services. It generates an ecosystem on top of it, reinforcing, growing, and contributing value to the broader economy.
The arc of decentralization becomes compliant when two things are satisfied. First, the protocol is, or will soon become, a public good offering self-sovereignty. Second, the ecosystem developing on top of it provides a sufficient level of policy and regulatory compliance to protect the users of and investors in the goods and services making up that ecosystem.
Applying an activity-based compliance framework to a protocol ensures that the objective of decentralization to create a public good is clear and not a ploy to try and escape regulation. Furthermore, by considering protocols as public utilities, they can also be seen as primitives or composable tools that could give rise to novel and innovative ideas that push the industry forward in a compliant-positive, socially, and commercially valuable direction.
Decentralization is a chameleon. Definitions will be different, always fitting the current environment, but ultimately remaining the same animal. Defining, understanding, and achieving decentralization in the context of blockchain protocols, is what this series was all about.
In this context, decentralization is about creating fault tolerant, attack-, and collusion-resistant protocols. Protocols that are accessible, transparent, robust, and sustainable. Efficiency is not the primary purpose, security is. Security imbues the users with confidence that they can engage with it directly. A decentralized protocol establishes itself as a public utility, a tool that can be used directly or in combination with other tools. The point is that the user - a large corporation or individual - has access to it on their own terms, the point is for the protocol to allow for self-sovereignty, and then it can be considered sufficiently decentralized.
Keeping a protocol sufficiently decentralized is in itself a challenge – once achieved it needs to be sustained. Unlike a switch or line in the sand, a protocol needs to reinforce its own ability to maintain sufficient decentralization through design, operations and community. If that is possible then it has become optimally decentralized.
All protocols start from more or less the same point of control. The arc of decentralization was introduced as a mental model where a combination of control, community, and funding determined the path it took to achieve the objective. Still, no matter the path, protocols engage with people who are governed by law. Consequently, understanding protocols as public tools, allows for the application of current laws and regulation to steer the path of this new technology. To ultimately realize the economic and societal value of protocols that follow their compliant arc of decentralization.
No comments yet