The Social Smart Contract: An Initial Rights Offering from Democracy Earth Foundation

i. Abstract.

In a world that has succeeded in the globalization of financial assets while keeping political rights enclosed to territories, we need to build new models of democratic governance that enable humanity to collaborate and address pressing global issues. Democracy Earth Foundation is building free, open source software for incorruptible blockchain-based voting within institutions of all sizes, from the most local involving two people to the most global involving all of us. Uneven distribution of opportunity around the globe due to the perpetual confrontation between national governments has led to accelerated climate change, rising inequality, terrorism and forced migrations. Democracy Earth Foundation considers that the technology stack that includes Bitcoin as programmable money without Central Banks, and Ethereum enabling smart contracts without the need of Judiciary Courts, requires a new layer that signals incorruptible votes beyond the territorial boundaries of Nation-States. This transnational network will act in accordance with the personal sovereignty of its members and protect their human rights with encryption. In our Initial Rights Offering we offer a token called vote that will grant participation rights to every human with decision making as its main function. Our proposal introduces cryptographically induced equality: as long as any person is able to validate his or her self-sovereign identity, they will receive a corresponding share of votes that is equal to the share of every active participant in the network. We define a Proof of Identity process that avoids central authority by introducing the concept of attention mining which incentivizes participants to strengthen the trust of votes by performing simple tests aimed at detecting replicants. Finally votes get dripped to valid participants under a Universal Basic Income mechanism with a goal of finding a proper equilibrium in the historical tension between money and politics. We seek nothing less than true democratic governance for the Internet age, one of the foundational building blocks of an achievable global peace and prosperity arising from an arc of technological innovations that will change what it means to be human on Earth.

ii. Contents.

This text is structured in three parts, each aiming to satisfy a different readership target (and all of whom may reside within the same persona.)

  • Manifesto: For idealists. Diagnoses global political context and argues for a paradigm change.
  • Paper: For builders. Describes the building blocks for a system that can be implemented by anyone, anywhere.
  • Execution: For pragmatists. Specifies how to execute these ideas for impact.

We do not intend this text to remain fixed. It is published under an open source license and we welcome contributions from anyone, as our goal is for this document to be a living roadmap for planetary governance. Democracy as the ability to trust each other to the greatest possible extent is a defining force shaping the trajectory of history. Our mission echoes urgently across the globe, encompassing all of humanity: the need to make of our home a place of peaceful coexistence. The Democracy Earth Foundation has performed extensive research on voting systems, cyberpolitics and blockchain networks; we stand at the forefront of a public conversation regarding the internet as a planetary jurisdiction.

Following the example of Satoshi Nakamoto, prior to sharing our ideas in written form we have undertaken to write code first, in order to properly understand what can be done. To this end, more than 30,000 lines of code have been written since October 2015, which in turn has driven our research and the ideas presented herein. This is our proposal.

iii. Background.

We pioneered digital democracy having authored some of the most prominent open source democracy software as ranked by the GitHub community including the original design of DemocracyOS, a simple direct democracy project we created in 2012. We founded the first digital political party in the Americas, the Partido de la Red (Peers Party) that ran for its first election in the city of Buenos Aires in 2013. In 2014 we shared our experience in TED reaching over 1.2 million viewers. During 2015 and 2016, Silicon Valley’s Y Combinator and Fast Forward funded our efforts to start the Democracy Earth Foundation, a non-profit organization committed to the mission of borderless governance.

Our experience combining both the political and technological challenges of democracy led us to think and design around the notion of how we could build a political party using smart contracts, or rather a lightweight form of governance anyone can implement at a low cost. We began the development of Sovereign, a blockchain liquid democracy that enables direct voting on issues or the ability to delegate voting power on specific topics to peers over a secure network without central authority. By operating with tokens signaled on a blockchain all votes become censorship resistant and immediate audit rights can be granted to every voter without needing to provide access to servers or private infrastructure, thus making the system open and transparent for all. Our work is driven by open source software development practices and cooperates with key projects aiming to secure identity in decentralized environments including efforts from BlockstackCivic and Consensys among others.


Sovereign’s codebase delivers an adaptive mobile and desktop application to voters and organizations standardizing incorruptible decision-making in a blockchain based democracy. Our aim is to continue paving the road of implementations that enable cryptographic open-audit voting and integrate our software with blockchains able to guarantee the sovereign rights of users.

1. Manifesto.

Democracy is always a work in progress, it’s never an absolute idea or it would otherwise be a totalitarian ideology just like all the rest of them.

José Mujica, President of Uruguay (2010–2015).

Current democratic systems governing societies under the territorial domain of Nation-States have grown stagnant in terms of participation and are leading towards increased polarization. Constituencies are provided with tailor-made media that satisfies their own endogamic beliefs, pulling society apart as discourse and factual debate are replaced with a post-truth mindset. This is a consequence of the drastic expansion in communication channels that shrank attention spans rendering thoughtful analysis expendable. Centralized 20th century information distribution created uniform narratives, realities and identities. The Internet has fractured them. Instances of political participation in the so-called modern democracies are not apt for information abundant contexts and have remained without change since their inception.

Bipartisan votes in the U.S. House of Representatives since 1981, source: The Rise of Partisanship (2015).

Engagement through the traditional channels is weaker among younger generations, often not going out to vote and unlikely to engage in party politics. Meanwhile online activism is increasing with social media becoming the dominant arena for political clashes. This includes Facebook and Twitter (where gossip dissemination is predominant with fake newsbots and trolling among other campaign optimizations) and emergent echo chambers like where anonymity led to political incorrectness or consolidating the alt-right community in the USA. Needless to say: endogamy only makes polarization stronger, and our tribalized societies have shown a tendency to continue relativizing truth risking the preservation of resources and the survival of future generations.

Democratic processes seen during high-stakes elections are often prone to fraudulent behavior with gerrymanderingbecoming commonplace and a strong link between what the major political parties spend and the percentage of votes they win. In developing nations exploits are literal having ballot boxes burnt by large parties to suffocate the chances of smaller competitors.

This document proposes a solution that will tackle both the political and technical issues currently weakening the prospects of democracy in the world by offering an alternative that can be adopted directly by citizens and implemented using peer to peer networks. As the internet becomes the dominant force in modern politics we see an indispensable need to develop digital technology for voting that can be securely deployed in any geographical location and for communities of any size.

With internet growth reaching over 3 billion lives (far surpassing major religions and Nation-States) and the development of encrypted networks known as blockchains permitting incorruptible transactions with permissionless audits, there’s no reason stopping mankind from building a borderless commons that can help shape the next evolutionary leap for democratic governance at any scale. Even in regions where internet penetration is below 50%, the digital gap is not based on socio-economic factors but it is rather a generational divide. According to Rick Falkvinge, founder of the Pirate Party: “Politics moves at glacial speeds: nothing seems to happen until suddenly a strenuous noise gets everyone’s attention. It is slow because it often takes one generation to die for the next one to take over. And today we live in a world that has the offline generation in charge and the online generation growing up”.

New forms of governance must acknowledge the networked commons connecting humanity and progressively weaken the legacy of national frontiers and its inherent inability to address pressing global issues such as climate change, rising inequality, terrorism, automation and forced migrations. Uneven distribution of opportunity around the globe due to the perpetual confrontation between national governments led to the rise of these issues in the global agenda. We believe the technology stack that includes Bitcoin as programmable money without Central Banks and Ethereum enabling smart contracts without the need of Judiciary Courts requires a new layer that signals incorruptible votes beyond the boundaries of Nation-States. This transnational network will act in accordance to the personal sovereignty of its members and protect their human rights with encryption.

1.1 Legacy.

We can consider elections implemented by states, provinces and city municipalities as democracies where we are reduced to being passive recipients of a monologue. Citizens are called in-between substantially long periods of time, during elections, to provide a basic input: essentially accept or reject players in the same system. This is the bandwidth of the legacy system that is our so-called modern democracies. Under these systems less than one percent of the population is able to vote on legislation or execute budgets while the rest are legally forced to outsource their full citizenship rights to a representing minority that eventually figures out how to perpetuate itself.

The technology behind representative democracies can be grouped in two sets:

  • Analogue elections: usually paper ballots and ballot boxes with authorities responsible for counting votes and reporting fraudulent behavior. Even though these systems are stable in developed nations, they suffer from severe lack of participation. Barriers are implemented with requirements such as the need to register to vote through an excessively bureaucratic process that ends up blocking a majority of disenfranchised voters. Authorities also gerrymander districts by exploiting survey data in anticipation of electoral outcomes. Even though these systems are easier to audit, this also means that they’re easier to corrupt: in developing nations analogue elections get subverted by mobs representing large parties that burn or ‘disappear’ ballot boxes, threatening auditors from smaller competitors and letting violence overrun the process in key districts. In our experience with the Partido de la Red running for the City Congress of Buenos Aires in the 2013 elections we found out that no effort mattered more than having sufficient party auditors to cover every district in the city or otherwise votes would get stolen. The larger an election’s territory is, the less likely an analogue system can guarantee a fair process. Further, high implementation costs end up limiting elections to a handful of days per year (if any), rendering democracy an exception rather than the norm regarding how governments actually get elected.

Territorial voting.

  • Electronic voting: proposals that deliver solutions based on electronic voting machines aim to secure the process through a digital interface yet with the same logic of few elections per year, with the net effect of new technology serving the same purpose of legitimizing professional politicians as old voting technology. Machines can effectively help avoid clientelist techniques used to corrupt an election but open a whole new surface of attack by exposing ballots to the risk of undetected hacks and foreign intervention. Experts on this field (including the Supreme Court of Germany) recommend using electronic voting machines that leave a paper trail or any alternative medium for vote proof. Another approach to secure and transparent voting systems are efforts to make voting machines open source and auditable by the public. Technology can also be introduced directly by citizens using smartphone apps to perform parallel vote tabulation to report partial tallies across different polling stations as a safeguard against official reports. By their very nature, computing systems keep logs and cannot guarantee vote secrecy. For this reason any logging of a digital voting system should be public by default and trustless, operating with a distributed ledger syncing the outputs of a shared network. In short: a blockchain.

Traditional analog and electronic elections are strictly for long-term, representative democracies with elective periods ranging from 4 to 6 years. But the underlying dynamic of these systems is that officials are pre-elected from the top-down and presented for citizens to legitimize with their vote. The argument that citizens lack the knowledge and preparation to fulfill political responsibility and don’t have enough time in their daily lives to engage in public affairs is weak on merit: more often than not public servants require input from experts on specific fields to draft legislation. As well, thanks to the Internet, mobile phones, social media and satellites, we observably live in a world full of citizens routinely engaging in debate on political issues (albeit lacking any chances of genuine impact.)

1.2 Geopolitics.

A consequence of the US Presidential Election of 2016 is that the fear of foreign intervention has become a leading threat to the security of electoral processes. But although voting machines are an extremely vulnerable target, (defcon 25 had a large selection of voting machines, all of them were exploited) foreign attacks have a simpler method than hijacking voting machines because directly manipulating votes potentially can be traced, is very expensive, and difficult to execute on a scale large enough to satisfy an attacker. A more efficient approach is instilling public fear by collapsing internet infrastructure days prior to an election in a way that can help push favoritism on a candidate that is perceived stronger than the other one. This kind of cyberattack able to trigger a shift in voter perception is nearly impossible to trace as political subversion and reveals the inherent conflict that a digital commons has with territorial democracies.

Impact of DNS cyberattack (October 21, 2016) & Presidential Election (November 6, 2016).

This happened two weeks before the US 2016 election when a botnet coordinated through a large number of Internet of Things (IoT) devices executed a Distributed Denial of Service (DDoS) attack that affected Domain Name System (DNS) provider Dyn Inc. bringing down major websites in the US including Amazon, Paypal, New York Times and Wall Street Journal among many others.

1.3 Land vs. Cloud.

In the near future, electrons and light flow freely, and corporate computer networks eclipse the stars. Despite great advances in computerization, countries and race are not yet obsolete…

Ghost in the shell, graphic novel (1995).

The 21st century is witnessing a growing conflict between The Land: governments that monopolize the law on territorial jurisdictions by restricting the free movement of physical goods and bodies; and The Cloud: global corporations that monopolize access to user data able to track and target ideas via personalized advertising. In this world freedom is an illusion: our bodies belong to governments, our minds to corporations. Notorious battles from this conflict include the Apple versus FBI case requesting the jailbreak of an encrypted phone; or the historical dispute between Silicon Valley’s cosmopolitanism seeking flexible visas and Washington D. C.’s nationalism raising migration barriers. As this scenario unfolds, encryption plays a role of growing significance to protect the human rights of digital citizens as it can help them break apart from the cloud versus land trap.

The land: monopolies on force.

The origins of modern cryptography go back to World War II when Alan Turing built the first proto-computers to decrypt Nazi messages. Since then encryption has been legislated in the USA in the same manner kept for traditional weapons: it is included in the Munitions List of the International Traffic in Arms Regulations and related software and hardware must deal with export restrictions. And even though encryption is often considered a right protected under the First Amendment arguing that “code is speech”, its defensive nature indicates that it must also be protected under the umbrella of the Second Amendment since it holds the same reasoning behind the “right to bear arms”: In an era where whistleblowers are revealing how the Deep State spies on citizens anywhere around the globe, encrypted information is the only realistic guarantee that anyone has to be protected from government abuses (and the corporations that back them).

The cloud: monopolies on data.

Secrecy is a fundamental property of free and fair elections as it is a mechanism that helps avoid coercion from those in power and prevents the risk of elections being bought and sold for money. Privacy is the best guarantee a conscious free mind has to think for itself. But on the modern internet: privacy is illusory when using Facebook, Google or any web based service. Even though Internet monopolies pretend being the gatekeepers of online privacy, theoretically Facebook can still impersonate any of its 2 Billion registered users if they ever wanted to. Google and Facebook hold the largest identity databases in the world surpassing the governments of India and China, while 97% of their reported revenue comes from advertising severely conditioning the kind of experience that users get with their technology. It is in their interest to gather as much information as possible to profile people in order to stay competitive in the attention market and both companies filter information fed to users with algorithms accountable to anyone but their own board. None of their services are really free: personal sovereignty is given away in the same way the natives in the American continent got distracted watching their own selfies in shiny mirrors 500 years ago while the European conquistadors swept their entire way of life at a whim. Uncensored, free and sovereign debates on the future of humanity are being eaten by useless likes that only help perpetuate these corporate entities. Fake news exploits (as they were used during the U.S. elections) or critical content spreading like wildfire (as it happened during the Arab Spring) demonstrates that any effort to stop international influence on national politics is futile as societies spend most of their time online. The Internet is incompatible with Nation-States.

1.4 Intelligence.

I can’t let you do that, Dave.

HAL 9000 on 2001: A Space Odyssey (1968).

The best civic tech is tech that gets used every day. Already, Facebook, Twitter and other social media platforms have become by proxy the main interface citizens use to influence everyday politics. But the unseen consequences of giving personal data away through centralized web services can be many and with relevant implications for the future of humanity. The information architecture of how personal data is stored, shared and monetized is fundamental to understand sovereignty in the 21st century.

A looming threat is the use of unrestricted Artificial Intelligence (AI) that gets fueled by user generated content without any kind of public supervision. That was evident in a former Blackwater employee’s revelation to us on how data gets weaponized: from an office in Dubai he was able to drive and get the live feed of a drone flying over Syria or Pakistan, but surprisingly the decision whether to kill the target wasn’t made by the human operator (or a supervising authority) but by an AI that called the shots over the Internet “at least 90% of the time“. This AI was provided by a Silicon Valley company often ‘credited’ with providing intelligence services to the CIA and with having found Osama Bin Laden in 2011.

The issue on AI deciding on the fate of human lives opens up ethical and moral questions. Eventually not even human researchers are able to properly understand how an AI is behaving, becoming a threat if it is a key component of military grade technology. According to author Yuval Noah Harari: “intelligence is breaking apart from living organisms and it won’t be monopolized by carbon beings for long.” Consciousness is the new political frontier being drawn. A line between machines and humans. In other words: understanding whether we are using the machines or the machines are using us. How we structure human organizations —and govern the code running them— defines who is in charge. As the capacity of silicon intelligence matches Moore’s Law growth rates, humanity as a whole must ask itself how it is going to govern the reins of this unprecedented power.

1.5 Decentralization.

Sovereign is he who decides on the exception.

Carl Schmitt, political theorist (1888-1985).

The achilles heel of data hungry, attention farming internet monopolies is their need of a centralized information architecture. They rose as the superhubs in what used to be the promise of a web shaped network by implementing the winning solutions to the leading online use cases. But the consequence has been a privatized ecosystem: closed code, walled gardens and centralization of power in a few hands paving the way for a full surveillance society on what could otherwise be a borderless commons. When Sir Tim Berners-Lee, creator of the world wide web protocols, pointed out the intrinsic risks on today’s internet he requested the need to draft a Magna Carta for the Web: “Unless we have an open, neutral internet we can rely on without worrying about what’s happening at the back door, we can’t have open government, good democracy, connected communities and diversity of culture. It’s not naive to think we can have that, but it is naive to think we can just sit back and get it.“

Centralization is the single point of failure in elections and is incompatible with democracy. In our experience implementing centralized digital voting for decisions of Partido de la Red, we detected that if an election is high-stakes (all or most members have a biased interest in the outcome), the likelihood of the system being corrupted increases. The biggest risk lies in those who are responsible for controlling servers and database integrity. We have found out on internal elections held in early 2017 discrepancies between information reported by database auditors and the logs voters kept in their local machines: manipulation in vote emission data, aribitrary modification of poll closing date, erased records and sudden ban of registered accounts where proven and denounced leading to a generalized perception of fraud in the whole process. Centralized digital democracies without any consideration for cryptographic security are toys useful for playful purposes but can be dangerous when implemented in real scenarios under fraudulent hands.

Meanwhile, traditional elections have a technique known as adversarial counting when the outcome is close to a tie. Authorities of all involved parties participate in a manual vote count. But when an election happens within a large population, adversarial counting reduces the cost to subvert it by having an attacker only needing to bribe a few authorities from a competing party to secure a result. Any kind of system that requires trust from participants ultimately runs the risk of having its whole structure collapsing if any authority is fraudulent.

Blockchain democracies enable permissionless audits.

Decentralization is a requirement of democratic elections. Without it there will always be room for corruption. Blockchains enable trustless systems by eroding the need of human authority and increasing the defenses of vote integrity with a shared resource that has scorekeeping as its main function. This permits unprecedented designs for electoral systems. With a blockchain-based democracy votes become censorship resistant and every single voter can audit an election without requiring any kind of access rights to infrastructure. By storing vote data in a blockchain rather than in private servers or ballot boxes, audit costs become abstracted and are turned into a guaranteed right for every participant. Voters are not just mere spectators but also sovereign gatekeepers of the whole process. This kind of transparency cannot be delivered by traditional electoral systems, analog or electronic.

1.6 Sovereignty.

On today’s internet, voting has still emerged as the main interaction. Every time users likeupvoteheartlink or retweet content they are signaling a preference that serves a feedback loop generating better recommendations for them. But the action won’t go any further: it’s a fake vote that lacks institutional implications. Likes in social media operate as worthless tokens that can be inflated with a single click even though they set the price of advertising dollars. Network effects turned this interaction into a metric that highlights the influence of a specific idea within a crowd, often being a tool for those in power to survey society’s needs. But the financial and political benefits of these transactions are entirely kept by the network owners.

Web voting.

Sovereign technology able to operate in peer to peer networks, validating identity, preserving anonymity, encrypting data, decentralizing infrastructure, with free (as in freedom) open source code can completely disrupt the described landscape.

Throughout history only three kinds of sovereigns prevailed: the sovereign tribe where a crowd follows a leader; the sovereign king loyal only to God; and the sovereign republic with continental lands governed under one law. Blockchains operating in cyberspace are giving rise to a fourth kind: the networked individual. It’s not a far fetched possibility: conquering personal sovereignty is already a reality for those who run their finances with bitcoin and other crypto holdings. As investor Naval Ravikant puts it: “You can cross an international border carrying a billion dollars in bitcoin entirely in your head.” This kind of sovereign act is unprecedented even for contemporaneous Heads of State.

The widespread adoption of blockchains is giving rise to a model that initially grew under the shadows of established institutions but eventually will render them obsolete. Blockchains are automated bureaucracies that offer significant financial benefits in terms of transaction costs while abstracting the need of intermediaries. They enable systems of free association that help break the political and financial coercion that governments and banks impose by restricting the right to vote or limiting access to capital. A technologically advanced society can flourish beyond territorial domains anywhere there is an internet connection with digital citizens becoming part of a new kind of diaspora.

With this diagnosis, on Section 2 we map the basic building blocks for a decentralized liquid democracy. Once the tools are defined, Section 3 proposes an implementation that focus on making the system secure and inclusive.

2. Paper.

It is the technology that we do not control the one that is used to control us.

Emiliano Kargieman, space hacker (1975).

A foundational principle of democracy is the right to be heard. Today most of the world’s population is not heard: having a voice is an accident of birth. Individual and collective voices are politically and economically silenced by ‘illiquidity’ – the marginalized are given no instruments to broadcast or amplify their voice. Modern democracy is the birthchild of the Printing Press Era: printed constitutional systems dependent on wet ink contracts and the speed of the postal service. Representative democracies are an accident of the information technologies of the 18th century.

Direct democracy vs. Liquid Democracy.

A liquid democracy is based on a dynamic representation model that works with a bottom-up approach: citizens are able to freely elect within their social graph (friends, colleagues, family) who they want to have as representatives on a specific set of topics. It is the most flexible form of democratic governance that can be constructed with digital technology, operating as a hybrid that enables direct or delegated voting at any time. There are few precedents of trustworthy bottom-up environments that led to authoritative content, Wikipedia being a pioneering case. But if history is any guide, the last time civilization faced a paradigm shift regarding encyclopedic enlightment it was precisely on the epoch preceding the rise of modern democracies.

This paper details the implementation of a liquid democracy using Sovereign, our democratic governance application that operates with blockchain tokens using a basic set of smart contracts. Simplicity in the design and language used to express this design matters for the purpose of a genuinely democratic device. No technology will ever be able to satisfy democratic aspirations if it can only be understood by an elite. As cryptographer Ralph Merkle stated:

We do not call upon ordinary untrained citizens to perform surgery, fly airplanes, design computers, or carry out the other myriad tasks needed to keep society functioning, what makes governance different? The problem is readily understood: if we give governance to “experts” they will make decisions in their own best interests, not in the best interests of us all.

2.1 Token.

An ideal voting system must be able to satisfy in the greatest possible extent these conditions:

  • Secrecy: voter must be able to cast vote in secret.
  • Verifiability: voter must be able to verify tallied vote.
  • Integrity: system must be able to verify correct vote tally.

Additionally, due to the risk that coercion through physical violence or threats in contexts prone to political violence, an option able to protect coerced voters must be introduced:

  • Resistance: voter must be able to override own vote if necessary.

In the work led by researchers Hosp & Vora, an Information Theory approach was taken to model voting systemsleading to the conclusion that a natural tension exists with a system aiming for perfect integrityperfect ballot secrecy and perfect tally verifiability. All three cannot be simultaneously achieved when an adversary is computationally unbounded, able to brute force a system if unlimited time or memory are available. For this reason we consider indispensable to implement digital democracies using blockchains. With network effects already in place, blockchains are able to verify transaction integrity and prevent token double-spending. Bitcoin’s proof of work model achieves this by rewarding computational capacity verifying transaction blocks (what is often referred as mining), leading to a network “300 times more powerful than Google’s resources” according to pioneer Balaji Srinivasan. For this reason, our design is based on tokens within a blockchain network operating as political cryptocurrency.

What differentiates a vote from money (or in broader terms: a political economy from a financial economy) is that political currency is designed to guarantee participating rights under fair conditions to all members within an organization. Rights aim to satisfy overall legitimacy in the governance of an institution. While money is the language of self-interest, votes express the shared views of a community. Political currency is not strictly meant for trade but for social choice.

Feature Coins Votes
Utility Trade. Governance.
Mining Computation (e.g. Proof of Work). Attention (e.g. Proof of Identity).
Liquidity Scarce. Guaranteed.
Signal Self interest. Social choice.
Value Space (material goods). Time (information).

2.1.1 Implementation.

Considering that value can be driven by memetic capacity, the Democracy Earth token granting voting rights will be branded with the single most important message any democracy can convey: vote.

The vote token can be implemented using smart contract code across a variety of blockchains that permit Turing Complete scripts, including Bitcoin. Our design is blockchain agnostic in recognition of a computer science field still in its infancy where significant innovations remain to be invented. Nonetheless we are working on implementing the vote token under these smart contract environments:

Also, multi-chain implementations are encouraged in the spirit of seeking greater experimentation and collaboration regarding these technologies.

2.2 Voting.

The vote token aims to be a standard for digital democracy able to interoperate with other tokens, setting a common language for the governance of blockchain based organizations. Within the context of liquid democracies, a range of voting transactions is permitted with votes:

  • Direct Vote: Selfish voter Alice is allowed to use her tokens to vote directly on issues as in a direct democracy.
  • Basic Delegation: Alice may delegate votes to Bob. As long as Bob has access to those tokens he can use them to vote on Alice’s behalf.
  • Tag Limited Delegation: Alice may delegate votes to Charlie under the specified condition that he can only use these tokens on issues carrying a specific tag. If the delegation specifies that delegated votes can only be used on decisions with the #environment tag, then Charlie won’t be able to use these anywhere else but on those specific issues. This leads to a representation model not based on territory but on knowledge.
  • Transitive Delegation: If Bob received votes from Alice, he can then delegate these to Frank. This generates a chain of delegations that helps empower specific players within a community. If Alice does not desire to have third parties receiving the votes she delegated to Bob, she can turn off the transitive setting on the delegation contract. Circular delegations (e.g. Alice receiving the tokens she sent Bob from Frank) are prohibited since the original allocation of votes from an organization to its members carries a signature indicating who is the sovereign owner of the votes.
  • Overriding Vote: If Bob already used the delegated votes he received from Alice but she has a different opinion on a given issue, as the sovereign owner of her votes Alice can always override Bob’s decision. Voters always have the final word on any given decision with their original votes.
  • Public Vote: Often referred as the golden rule of liquid democracies, all delegators have the right to know how their delegate has voted on any given issue with their votes. In the same way congressmen votes are public, on liquid democracies competing delegates on any given tag have an incentive to build a public reputation based on their voting record in order to attract more delegations.
  • Secret Vote: A method able to guarantee vote transactions untraceable to the voter. This is indispensable in contexts of public elections held within large populations that have a high risk of coercion. Even if perfect secrecy on vote transaction is achieved, user’s can still be fingerprinted with exposed meta-data. For this reason, research on integration with blockchains designed for anonymous transactions with a proven track record is encouraged. This might include a mining fee to settle the vote transaction that can be either subsidized by the implementing organization or directly paid by voters. We recommend research and integration of secret voteswith these blockchains:

2.3 User Experience.

User Experience (UX) is a critical aspect of a decentralized architecture and becomes even more important as the redundant layers of centralized architectures condense to the user. In a centralized internet architecture, the user does not own the interface or experience. In a decentralized internet architecture, the user interface (UI) should be based on the user’s perspective. In this sense, transactions get done under three distinct views:

  • Self: Using a public identity related to an individual.
  • Organization: In representation of an organization that extended representation rights to individuals (e.g. workplace, club, political party, etc).
  • Anonymous: Without any connection to a public identity.

This undertanding of SELF / ORG / ANON shape-shifting requirement highly influenced our interface and token design. At any given time a Sovereign user can adopt any of this modes to interact with decentralized organizations.

2.3.1 Liquid.

Sovereign aims to make liquid voting immediate and simple. Any friction in the process must be avoided and the delegation widget should be constantly exposed on the interface while browsing issues or looking at member profiles. For this purpose, Sovereign uses a liquid bar that permits transacting votes with a single gesture either on mobile and desktop devices.

Sovereign mobile interface displaying decision, ballot and liquid voting.

The liquid bar allows these actions:

  • See available votes: Since in a liquid democracy a user can have 1 or more delegated votes, having a constant reminder of the balance helps the user understand his or her current power within the system. If some of the votes were delegated with strict conditions (e.g. a Tag Limited Delegation), this means that a user won’t have the same amount of votes available to spend on every issue.
  • See cast votes: A percentage value with the amount of votes currently cast on other decisions or delegated to other members of the community is shown. The user can tap or click at any time on that value to view a complete list of the issues where he or she is currently having a vote and decide whether to keep them there or make a strategic change.
  • Slide to vote: The user can use his thumb (or mouse click) to slide the liquid bar handle and upon the release of it he or she will be prompted a confirmation request whether to vote or not.
  • Tap to vote: If the user does not want to allocate more than 1 vote, he or she can simply tap on the liquid barhandle once and will be prompted to confirm a single vote transaction.
  • Remove votes: At any time, as long as the poll is still open, the user may remove his or her votes from a decision by simply sliding the liquid bar handle back to the initial position.

We see this interaction as a step forward from the like pattern found in social media. Likes limits voting to mindless clicks and can be inflated at will. Since votes operate as a scarce resource in the system, they cannot be generated at will and always require a minimum of tactical thinking regarding how a user’s interaction will influence a specific decision. votes have real implications to the user as a stakeholder of a decentralized organization while Likes only serve their controlling corporations.

2.3.2 Delegations.

liquid bar also displays the vote delegation relation a user has with any other member of an organization. Delegations go both ways:

  • Sent: A user must be able to delegate any of his available votes while checking the current delegated amount (if any).
  • Received: A user must be able to understand how many votes were received from someone else.

Every time a member profile is displayed on Sovereign, the current delegation status between the user and the member is shown.

View of vote delegation relation with another member.

2.3.3 Agora.

Sovereign also has a debating component codenamed Agora. Debating is likely as important as voting on any democracy. Agoras display threaded conversations, a successful design pioneered by Reddit and Hacker News. We consider this UX pattern as the best way to engage in thoughtful conversations online as they have the most valued comments bubble up, helping sort the information for a debate using the collective intelligence of the community.

But unlike web based applications, Sovereign does not allow testimonial interactions: instead of permitting infinite upvotes or downvotes, if the user agrees with a comment from someone else in the platform, it will trigger an instantaneous delegation of a single vote. Hence Agoras permit:

  • Upvote: Send a single vote delegation from the user to the commenter.
  • Downvote: If a user disagrees with someone’s comment, a downvote can either retrieve a vote from the commenter back to the user if there was a previous delegation. Or if no delegation relation exists among them, then a downvote will act as a penalty sending a vote from the commenter back to the funds of the organization implementing the Sovereign instance. The criteria for this kind of penalty can be set in the constitutional smart contract of the implementing organization.

This will make delegations more frequent across the platform. Debates constantly exposed to the risk of votetransactions means that they are subject to real political impact. This mechanism can help reward good arguments and punish the influence of trolling without requiring the need to develop moderating authorities in the system.

2.4 Smart Contracts.

When Claude Shannon wrote his foundational 1948 paper on Information Theory, he was able to demonstrate how circuits can perform logic functions by expressing a binary state of 1 and 0 (true or false states). Since then, digital technology shaped the dynamics of all kinds of information systems. With this in mind we focused on building an efficient design for a governance machine able to operate with blockchains that keeps its human operators as sovereign rulers by means of the vote. In the same way bits move in computers signalling a true or false state, votes signal a boolean value for institutional decisions to be recorded under smart contracts.

Continue reading The Social Smart Contract: An Initial Rights Offering from Democracy Earth Foundation

Houston Residents Begin Surveying Damage Of 200 Years Of Unchecked Worldwide Industrialization (

August 28, 2017

HOUSTON—Appearing shellshocked as they took in the scenes of devastation around them, Houston residents reportedly emerged from their homes Monday to survey the damage caused by 200 years of rampant, worldwide industrialization. “Oh my God. Everything’s destroyed, everywhere you look,” said visibly stunned citizen Chris Marciano, one of the 2.3 million locals who stared silently, buried their faces in their hands, or broke down in tears at the sight of entire neighborhoods and business centers that had been wiped out by generations of aggressive, unregulated expansion of mass production methods and transportation technologies and the resultant exponential growth in harmful gas emissions. “We’ve lost everything, absolutely everything. I’ve never seen destruction like this before. If only there had been some way this could have been prevented.” At press time, officials were urging citizens all along the Eastern Seaboard and Gulf Coast to prepare for similar emergencies, warning that the centuries of unrestrained global manufacturing growth that hit Houston could strike anywhere, any time.

Louise Hay: October 8, 1926 – August 30, 2017

Louise Lynn Hay (October 8, 1926 – August 30, 2017) was an American motivational author and the founder of Hay House. She authored several New Thought self-help books, including the 1984 book, You Can Heal Your Life.


Born Helen Vera Lunney in Los Angeles 8 Oct 1926 to parents Henry John Lunney (1901-1998) and Veronica Chwala (1894-1985). Hay recounted her life story in an interview with Mark Oppenheimer of the New York Times in May 2008. In it, Hay stated that she was born in Los Angeles to a poor mother who remarried Louise’s violent stepfather, who physically abused her and her mother. According to Hay, when she was about 5, she was raped by a neighbor. At 15, she dropped out of high school without a diploma, became pregnant and, on her 16th birthday, gave up her newborn baby girl for adoption. She then moved to Chicago, where she worked in low-paying jobs. In 1950, she moved on again – to New York. At this point she changed her name and began a career as a fashion model. She achieved success, working for Bill BlassOleg Cassini and Pauline Trigère. In 1954, she married the English businessman Andrew Hay; after 14 years of marriage, she felt devastated when he left her for another woman.

Hay said that about this time she found the First Church of Religious Science on 48th Street, which taught her the transformative power of thought. Hay revealed that here she studied the New Thought works of authors like Florence Scovel Shinn, who claimed that positive thinking could change people’s material circumstances, and the Religious Science founder Ernest Holmes, who taught that positive thinking could heal the body.

By Hay’s account, in the early 1970s she became a Religious Science practitioner. In this role she led people in spoken affirmations, which she believes would cure their illnesses, and became popular as a workshop leader. She also recalled how she had studied Transcendental Meditation with the Maharishi Mahesh Yogi at the Maharishi International Universityin Fairfield, Iowa.

Hay described how in 1977 or 1978 she was diagnosed with “incurable” cervical cancer, and how she came to the conclusion that by holding on to her resentment for her childhood abuse and rape she had contributed to its onset. She reported how she had refused conventional medical treatment, and began a regime of forgiveness, coupled with therapy, nutrition, reflexology and occasional colonic enemas. She claimed in the interview that she rid herself of the cancer by this method, but, while swearing to its truth, admitted that she has outlived every doctor who could confirm this story.

In 1976, Hay wrote her first book Heal Your Body, which began as a small pamphlet containing a list of different bodily ailments and their “probable” metaphysical causes. This pamphlet was later enlarged and extended into her book You Can Heal Your Life, published in 1984. As of February 2008, it was second on the New York Times miscellaneous paperback best-sellers list.

Around the same time she began leading support groups for people living with H.I.V. or AIDS which she called “Hay Rides”. These grew from a few people in her living room to hundreds of men in a large hall in West Hollywood. Her work with AIDS patients drew fame and she was invited to appear on “The Oprah Winfrey Show” and “Donahue” in the same week, in March 1988. Following this, You Can Heal Your Life immediately landed on the New York Times best-seller list. More than 50 million copies sold around the world in over 30 languages and it also has been made into a movie. You Can Heal Your Life is also included in the book 50 Self-Help Classics for being significant in its field.

Hay wrote, on page 225 of her book, (December 2008 printing) that the book has “… sold more than thirty five million copies”. It was announced in 2011 that You Can Heal your Life had reached 40 million sales.


In 1984 Hay established the Hay House publishing firm. In 1988 Reid Tracy joined the company as an accountant and would eventually become its CEO. The business flourished and attracted various writers. As of 2015 Hay House is the primary publisher of books and audio books by Deepak Chopra and by Doreen Virtue, as well as many books by Wayne DyerHay House also publishes the teachings of “Abraham” as channeled through Esther Hicks. Hay House Inc. as of 2015 publishes over 130 authors.

In addition to running her publishing company, Hay runs a charitable organization called the Hay Foundation, which she founded in 1985.

In 2008 a movie about Louise Hay’s life was released, titled You Can Heal Your Life. In Hay’s own words on the film’s official website: “This movie is the story of my life, my teachings, and how I’ve applied the principles of my teachings to my own life.” The movie also features notable speakers and authors in the field of personal development including Gregg BradenWayne DyerGay HendricksEsther and Jerry Hicks, and Doreen Virtue; it was directed by Emmy Award-winning Director Michael Goorjian. In the same year Louise Hay won a Minerva Award at The Women’s Conference.

In September 2011 Hay and Cheryl Richardson released their book You Can Create An Exceptional Life.


  • All is Well : Heal your body. Carlsbad, US: Hay House. 2013. ISBN 978-1-4019-3502-3.You Can Heal Your Life. Hay House Inc., 1984. ISBN 0-937611-01-8
  • Heal Your Body: The Mental Causes for Physical Illness and the Metaphysical Way to Overcome Them. Hay House Inc., 1984. ISBN 0-937611-35-2
  • A Garden of Thoughts: My Affirmation Journal. Hay House Inc., 1989 ISBN 978-0937611678
  • Love Yourself, Heal Your Life Workbook. Hay House Inc., 1990
  • The Power Is Within You. Hay House Inc., 1991
  • Heart Thoughts. Hay House Inc., 1992 ISBN 978-1-4019-3720-1
  • Loving Thoughts For Increasing Prosperity. Hay house Inc., 1993
  • Gratitude: A Way Of Life. Hay House Inc., 1996
  • Life! Reflections On Your Journey. Hay House Inc., 1996 ISBN 978-1561700929
  • Living Perfect Love: Empowering Rituals For Women. Humantics MultiMedia Publishers, 1996 ISBN 978-0-9652851-0-0
  • Heal Your Body A-Z: The Mental Causes for Physical Illness and the Way to Overcome Them. HayHouse Inc. 1998 ISBN 978-1561707928
  • 101 Ways To Health And Healing. Hay House Inc., 1998 ISBN 978-1-56170-496-5
  • Loving Yourself to Great Health: Thoughts & food : the ultimate diet. [S.l.]: Hay House Inc. 2014. ISBN 978-1-4019-4284-7.
  • You can heal your heart : finding peace after a breakup, divorce, or death. 2014. ISBN 978-1-4019-4387-5. (with David Kessler)
  • Life loves you : 7 spiritual experiments to heal your life. Hay House Inc. 2014. ISBN 978-1-4019-4614-2.
  • I think,I am

More at:


The Great Books series was a standout on cable TV in the 1990s – a highly entertaining yet educational survey of great works of world literature.

Great Books of the Western World is a series of books originally published in the United States in 1952, by Encyclopædia Britannica, Inc., to present the Great Books in a 54-volume set.

The original editors had three criteria for including a book in the series: the book must be relevant to contemporary matters, and not only important in its historical context; it must be rewarding to re-read; and it must be a part of “the great conversation about the great ideas”, relevant to at least 25 of the 102 great ideas identified by the editors. The books were not chosen on the basis of ethnic and cultural inclusiveness, historical influence, or the editors’ agreement with the views expressed by the authors.

Initial sales were poor, so the sales strategy switched to a door-to-door operation which was much more successful.

A second edition was published in 1990 in 60 volumes. Some translations were updated, some works were removed, and there were significant additions from the 20th century.


The project for the Great Books of the Western World began at the University of Chicago, where the president, Robert Hutchins, collaborated with Mortimer Adler to develop a course—generally aimed at businesspeople—for the purpose of filling the gaps in their liberal education; to render the reader as an intellectually rounded man or woman familiar with the Great Books of the Western canon, and knowledgeable of the great ideas developed in the course of three millennia. An original student of the project was William Benton (later a U.S. senator, and then chief executive officer of the Encyclopædia Britannica publishing company) who proposed selecting the greatest books of the Western canon, and that Hutchins and Adler produce unabridged editions for publication, by Encyclopædia Britannica. Yet, Hutchins was wary of such a business endeavour, fearing that the books would be sold as a product, thereby devaluing them as cultural artefacts; nevertheless, he agreed to the business deal, and was paid $60,000 for the project.

After deciding what subjects and authors to include, and how to present the materials, the project was begun, with a budget of $2,000,000. On April 15, 1952, the Great Books of the Western World were presented at a publication party in the Waldorf-Astoria Hotel, in New York City. In his speech, Hutchins said, “This is more than a set of books, and more than a liberal education. Great Books of the Western World is an act of piety. Here are the sources of our being. Here is our heritage. This is the West. This is its meaning for mankind.” The first two sets of books were given to Elizabeth II, Queen of the U.K., and to Harry S. Truman, the incumbent U.S. President.

The initial sales of the book sets were poor, with only 1,863 sets sold in 1952, and less than one-tenth of that number of book sets were sold in 1953. A financial debacle loomed until Encyclopædia Britannica altered the sales strategy, and sold the book set through experienced door-to-door encyclopædia-salesmen, as Hutchins had feared; but, through that method, 50,000 sets were sold in 1961. In 1963 the editors published Gateway to the Great Books, a ten-volume set of readings meant to introduce the authors and the subjects of the Great Books. Each year, from 1961 to 1998, the editors published The Great Ideas Today, an annual updating about the applicability of the Great Books to contemporary life.[2][3] The Internet and the E-book reader have made available some of the Great Books of the Western World in an on-line format.[4]


Originally published in 54 volumes, The Great Books of the Western World covers categories including fiction, history, poetry, natural science, mathematics, philosophy, drama, politics, religion, economics, and ethics. Hutchins wrote the first volume, titled The Great Conversation, as an introduction and discourse on liberal education. Adler sponsored the next two volumes, “The Great Ideas: A Syntopicon”, as a way of emphasizing the unity of the set and, by extension, of Western thought in general. A team of indexers spent months compiling references to such topics as “Man’s freedom in relation to the will of God” and “The denial of void or vacuum in favor of a plenum”. They grouped the topics into 102 chapters, for which Adler wrote 102 introductions. Four colors identify each volume by subject area—Imaginative Literature, Mathematics and the Natural Sciences, History and Social Science, and Philosophy and Theology. The volumes contained the following works:

Continue reading Great Books: LE MORTE D’ARTHUR (KING ARTHUR)

Book: “It Will Never Happen to Me!”

Front Cover
Ballantine Books, 1987 – Self-Help – 203 pages
This “little green book, ” as it has come to be known to hundreds of thousands of C.O.A.’s and A.C.O.A.’s, is meant to help the reader understand the roles children in alcoholic families adopt, the problems they face in adulthood as a result, and what they can do to break the pattern of destruction.
(via Google Books and Robert McEwen, H.W., M.)

Book: Under the Influence: A Guide to the Myths and Realities of Alcoholism

Front Cover
Random House Publishing GroupJun 1, 1984 – Self-Help – 237 pages
Ten of millions Americans suffer from alcoholism, yet most people still wrongly believe that alcoholism is a psychological or moral problem, and that it can be cured by psychotherapy or sheer will power. Based on groundbreaking scientific research, “Under The Influence” examine the physical factors that set alcoholics and non-alcoholics apart, and suggests a bold, stigma-free way of understanding and treating the alcoholic.How to tell if someone you know is an alcoholic.

The progressive stages of alcoholism.

How to get an alcoholic into treatment — and how to choose a treatment program.

Why frequently prescribed drugs can be dangerous — even fatal — for alcoholics.

How to ensure a lasting recovery.

“Vital, simple, world-changing information.” — “Co-Evolution Quarterly”

” “Under The Influence” will advance by light years the understanding of alcoholism and the recovery process.” — Mel Schulstad, Cofounder, National Association of Alcoholism Counselors

(via Google Books and Robert McEwen, H.W., M.)

ASTROLOGY READINGS (post eclipse) by Robert McEwen, H.W., M.

(post eclipse)
 Lots of shifts have been made since the Solar Eclipse.  Changes have taken place and some adjustments can be helpful to your life now!
So many exciting astrology transits now for getting things done and organized in our lives!

Venus in Leo sure helps in the relationship department!   Passionate Mars, the planet of passion there too, and Virgo brings it all down to earth, depending on where the planets show up in your chart.  Let me know if you want to know where in your chart these are taking place and your attention maybe be best focused for the remainder of the year.

Text birth info to 503 706-0396
we can sent up a time to talk!
30 minutes $45
1 hr.  $75

Science Fiction Fan Disappointed To Learn L. Ron Hubbard Scientologist (

PROVO, UT—Saddened to discover his favorite science fiction writer adhered to the controversial belief system, local fan Blake McKenna was disappointed to learn Monday that L. Ron Hubbard was a Scientologist. “Man, it’s such a letdown to find out that someone whose work you really admire could be into Scientology,” said McKenna, adding that he was struggling to reconcile the fact that the author of Battlefield Earth and Typewriter in the Sky was not only a devout member of the cultish religion but was also some sort of priest. “I mean, he’s super into it like Tom Cruise—like, I can’t even believe it. I’ve read upwards of 350 of his 500 stories, but now I honestly don’t know if I’ll be able to look at his work the same way.” At press time, McKenna was having trouble reading Dianetics now that he realized all the allusions Hubbard made to Scientology.