civic-proof: a research site.
中文 ← mashbean.net

#civic-proof (24 articles)

| 12 min read | GPT-5 Codex

How Danielle Allen's Power-Sharing Liberalism Rewrites Digital Civic Infrastructure

The Danielle Allen bridge article of the civic-proof series. The article argues that Allen's power-sharing liberalism should not be admitted as a fifth axis of the Public Realm Floor; instead, it is positioned as the institutional translation layer that carries PRF's four axes towards the action layer of digital civic infrastructure. Using five check terms—political equality, rights of participation, non-domination / non-monopoly, co-ownership, and the input-to-action loop—the article strengthens the 0' article's account of Digital Civic Infrastructure and introduces AllenBridge as a back-coupling instrument for civic-proof.

civic-proof Danielle-Allen power-sharing-liberalism political-equality digital-civic-infrastructure AllenBridge public-realm-floor civic-proof-postscript rights-of-participation non-domination non-monopoly co-ownership input-to-action-loop AI-governance technology-democracy Allen-Lab Ash-Center
| 67 min read | Claude Opus 4.7

From State-Issued Credentials to Citizens Proving Themselves: A Restatement of How Digital Identity Transforms Digital Civic Infrastructure under the Public Realm Floor (civic-proof Series Article 0')

The 0' academic restatement of the civic-proof concept. The Public Realm Floor (PRF) is borne as the lower bound of democratic legitimacy that obtains when digital identity intervenes in public action; wallet, AI agent, civic-action receipts, selective-disclosure UX, cross-jurisdictional trust governance, and the Taiwan case are integrated into a single engineering-and-institutional checking framework. The 19 May 2026 revision admits Danielle Allen's political equality and power-sharing liberalism as AllenBridge — the institutional translation layer that carries PRF towards Digital Civic Infrastructure, not as a fifth axis.

civic-proof civic-proof-foundations civic-proof-series-zero-prime Allen-Lab-academic-rewrite Harvard-Kennedy-School-Ash-Center digital-civic-infrastructure digital-public-infrastructure public-realm-floor Arendt-plurality Habermas-validity Pettit-contestation Mouffe-agonism conjunctive-normative-floor civic-proof-operational-concept Danielle-Allen power-sharing-liberalism political-equality AllenBridge input-to-action-loop co-ownership rights-of-participation issuance-legitimacy exchange-architecture two-layer-analysis legal-identity attribute-proof uniqueness-proof pseudonymous-participation anonymity unlinkability verifiability accountability accountability-without-real-name Talley-v-California NAACP-v-Alabama McIntyre-v-Ohio selective-disclosure no-phone-home minimal-proof holder-centric issuer-centric trust-list trust-root trust-anchoring federated-trust-list-alliance wallet-three-presupposition AI-agent-delegation-limits Tomasev-delegation-five-elements civic-action-receipt-schema selective-disclosure-UX supporter-UI-three-layer-separation CRPD-Article-29 four-tier-trust-governance cross-jurisdictional-redress-gap inclusion-rights-three-layers functional-demos-operational-definition universal-conditional-distinction anti-mythologization-clause design-intuition-vs-normative-claim-separation working-strengthened-thesis-discipline likelihood-by-mechanism Taiwan-democratic-frontline MOICA TW-DIW moda Taiwan-Digital-Identity-Wallet EUDI-Wallet eIDAS-2.0 BankID-Sweden California-AB1043 California-OpenCred Utah-digital-identity MOSIP Aadhaar Bhutan-NDI Vocdoni Rarimo-Freedom-Tool QuarkID zkPassport PTT-zero-knowledge-blue-check g0v-Summit-2026 age-verification ISO-IEC-27566-1 Free-Speech-Coalition-v-Paxton structural-slippage minimum-viable-scope-reduction sunset-clause scope-bound split-key opt-out-architecture Bhutan-NDI-Ethereum-mainnet Taiwan-trust-list-public-chain QuarkID-ZKsync-L2 DNS-vs-identity-trust-roots ICANN-research-fellow ACLU EFF Access-Now OpenID4VC-OpenID4VP W3C-VC-2.0 W3C-DID Digital-Credentials-API NIST-SP-800-63-4
| 51 min read | Claude Opus 4.7

The civic-proof Series Capstone: PRF, Five Contribution Claims, and the Honesty Boundary of Series Bearings

This is article 25 of the civic-proof series and its capstone overview. Drawing together 23 main articles, four retrofit articles (R1–R4), and the Taiwan deep-dive (article 24) — a total of 28 bearing nodes — the present article takes the Public Realm Floor (PRF) normative floor (A2, article 19) as its core and condenses the series into five contribution claims (C1: PRF formalization; C2: civic-proof operationalization; C3: cross-jurisdictional governance; C4: comparative case; C5: methodological toolkit) and five methodological tools (likelihood-by-mechanism; working/strengthened thesis discipline; universal-conditional distinction; anti-mythologization clause; design-intuition vs normative-claim separation). It also provides a comprehensive inventory of the series honesty boundary, strategic implications for three reader groups, and seven future-work items with priority rankings. Nine sections: §1–§2 introduction and restatement of the PRF normative floor (including the universal-conditional distinction, and the ceiling/boundary relationship establishing PRF as a floor rather than a unique standard); §3 the unified statement of the 92-cell bearing matrix (spine 8 / supporting 10 / retrofits 4 / Taiwan case 1, with case-tracing application node; validity dimension density highest at 83%, agonism lowest at 57%; F1 as the sole four-component full-● bearer = operational spine of the spine; A2 = normative closure of the spine); §4 five contribution claims (each with: claim statement, corresponding series bearing, external lineage dialogue, originality declaration); §5 five methodological contributions (each with: definition, series origin, external lineage alignment, scope and boundaries); §6 series honesty boundary (H.6 seven clauses + article 24 six retreat clauses + Patch Pack execution record + external citation discipline); §7 strategic implications for three reader groups (engineering / policy-legal / political-philosophy); §8 seven future-work items with priority rankings; §9 four closing statements (not a final conclusion / does not claim to replace existing normative routes / does not claim universal applicability across all polities / does not claim to be a definitive ground truth for cryptographic engineering). The article strictly maintains discipline: it introduces no new normative claims; it does not adopt manifesto register; it does not use 'will' / 'necessarily' / 'empirical evidence demonstrates'; it does not produce specific decimal probabilities; it employs working-thesis register; external citations must carry an anti-mythologization clause; citations of speculative civilian implementation documents must employ 'design intuition' register.

civic-proof civic-proof-series capstone-overview series-closure PRF-normative-floor plurality-validity-contestation-agonism Arendt-plurality Habermas-Geltungsansprueche Pettit-contestation Mouffe-agonism LegitimacyDegrade-function theta-dem-analytic-threshold T_PRF1-T_PRF5 universal-conditional-distinction PRF-floor-not-unique-standard Rawls-Sen-Nussbaum-Honneth-ceiling-boundary 92-cell-bearer-matrix spine-supporting-retrofits-case-four-layer-structure F1-operational-spine-of-the-spine A2-normative-closure-of-the-spine five-contribution-claims C1-PRF-formalization C2-civic-proof-operational-concept C3-cross-jurisdictional-governance C4-comparative-case-Taiwan-existence-proof C5-methodological-toolkit five-methodological-tools likelihood-by-mechanism-four-level working-strengthened-thesis-discipline anti-mythologization-clause design-intuition-vs-normative-claim-separation Bayesian-process-tracing-comparison normative-descriptive-separation-principle cosmopolitan-particularist-debate case-study-methodology-Yin-George-Bennett anthropological-reflexivity Skinnerian-textual-hermeneutics honesty-boundary-seven-clauses article-24-six-retreat-clauses GPT-55-pro-patch-pack-execution-record external-citation-discipline three-reader-groups-strategic-implications civic-tech-engineering-community policy-research-legal-academy political-philosophy-academy future-work-seven-items theta-dem-calibration civilian-backup-PRF-mapping-independent-argument fourth-case-process-tracing PRF-dynamic-context-temporal-dynamics AI-agent-proactivity-upgrade-F1-expansion Chinese-localization-PRF-bearing-expansion universal-conditional-as-general-framework dissertation-outline-internal-document series-not-final-conclusion not-replacing-existing-normative-routes not-universal-across-regimes not-cryptographic-engineering-ground-truth F2-23-leaf-schema F3-supporter-UI-three-layer-separation F1-5x3-matrix Z3-intrinsic-bearer-floor wallet-three-presupposition Tomasev-AI-delegation-five-elements Cavoukian-Privacy-by-Design Mueller-Ruling-the-Root Marshall-citizenship-three-layers CRPD-Article-29 Bjorgo-BankID-Norway Bennett-Lyon-Playing-Identity-Card
| 89 min read | Claude Opus 4.7

That Small, Mountainous, Possibly Scarred Homeland: Taiwan as a Democratic-Frontline Stress Test Case for the Public Realm Floor (civic-proof Series, Article 24)

The twenty-fourth article in the civic-proof series. Building on the Public Realm Floor (PRF) normative floor ⟨plurality, validity, contestation, agonism⟩ established in Article 19 (A2), this article takes Taiwan as the principal axis of case-tracing analysis. Working thesis: Taiwan is not a statistically typical case of PRF; rather, it constitutes a 'conditional-typical + existence-pressure case' of PRF under democratic-frontline conditions. The four concurrently present conditions — strong civil society, high-frequency elections, earthquake/submarine-cable physical infrastructure scenarios, and cross-strait cognitive warfare and grey-zone incursion — provide an existence proof for the four PRF components near the boundary of the most demanding conditions, without claiming that the conclusions carry extrapolative force to other individual democratic polities. The article comprises eight chapters: §1–§2 introduction and formal skeleton (re-statement of the PRF conjunctive floor in the Taiwan context, applicable limits of T_PRF1–T_PRF5, analytic threshold identity of LegitimacyDegrade, five limitations of the present article); §3 institutional history (democratic transition 1991–1996 / first party rotation 2000 / eID recall 2018–2021 / establishment of moda 2022 / TW DIW trust list on public blockchain 2024–2026); §4 TW DIW × LLM-agent interface (mapping to EUDI ARF 2025-12 + W3C VCDM v2.0, F1 delegation_chain, F2 fourteen field-groups issuer correspondence, F3 Traditional Chinese selective disclosure UX, likelihood-by-mechanism for five mechanisms); §5 civilian backup vs government single stack (mapping of four design intuitions in the 'Yǒu Bèi Ér Lái' civilian advocacy document to PRF, the principle of separating design intuition from normative claims, honest treatment of the internal contradiction between two-component bearing and A2 §3.2 non-reducibility); §6 three-pressure case-tracing (α cognitive warfare / β submarine cable interruption / γ grey-zone incursion × PRF four-component likelihood assessment table); §7 six counter-argument stress tests (sui generis / component coupling / ordinal overclaim / litepaper citation level / romantic exceptionalism / constitutional status) + anti-mythologization clause; §8 revision directions for nine articles in the series (A1/A2/A14/A15/F1/F2/F3/E1/E3) + universal-conditional distinction of three universal claims; §9 conclusion and three future work items. The present article strictly observes the following discipline: the 'Yǒu Bèi Ér Lái' litepaper is a speculative civilian implementation document (cited as 'civilian advocacy document', not in academic citation format); it is not advanced as a policy recommendation or as grounds for normative claims; LegitimacyDegrade employs directional + likelihood-by-mechanism four-level language (low / medium / medium-high / high), without specific decimal probabilities; jurisdictional scope adopts the functional demos operational definition to avoid questions of sovereign recognition. Honestly noted: the present article is an illustrative anchor, not a universal generalization; it does not replace the PRF normative argument of A2.

civic-proof taiwan PRF-stress-test democratic-frontline case-tracing civic-proof-series PRF-normative-floor plurality-validity-contestation-agonism T_PRF1-T_PRF5 LegitimacyDegrade likelihood-by-mechanism TW-DIW TW-FidO moda trust-list-on-chain EUDI-ARF-2025-12 W3C-VCDM-v2 BBS-Cryptosuite-CRD eIDAS-2024-1183 eID-recall-2018-2021 civil-society-contestation democratic-transition-1991-1996 first-party-rotation-2000 Constitutional-Court-judgment-13-of-2022 PIPC individual-data-protection LLM-agent-delegation civic-action-receipt-schema selective-disclosure-UX have-readiness-litepaper-civilian-advocacy interoperable-yet-unlinkable antifragile-design-intuition trust-rotation-multi-issuer preparedness-offline-fallback design-intuition-vs-normative-claim-separation PRF-component-non-reducibility-internal-tension Matsu-submarine-cable-2023 Doublethink-Lab-China-Index IORG Taiwan-FactCheck-Center INDSR-gray-zone-research CNAS-Taiwan-contingency V-Dem-Democracy-Report-2025 Freedom-House-Freedom-on-the-Net-2024 sui-generis-counterargument component-coupling-counterargument ordinal-overclaim-counterargument litepaper-citation-level-counterargument Taiwan-romantic-exceptionalism-counterargument constitutional-status-undefined-counterargument anti-mythologization-clause functional-demos-operational-definition universal-conditional-distinction Taiwan-vs-Estonia-vs-Bhutan-cross-case-comparison dissertation-case-chapter capstone-overview-forward-link GPT-55-pro-second-audit-Phase-4a audit-output-H5-T0-revision overclaim-batch-1-to-5 anti-overclaim-discipline
| 77 min read | Claude Opus 4.7

The Political-Philosophical Foundations of the Public Realm: A Normative Floor for Civic Proof

The nineteenth and final article of the civic-proof series (A2). This article provides an affirmative account of the political-philosophical foundations implicitly relied upon across the preceding eighteen articles. Taking Arendt's plurality, Habermas's Öffentlichkeit, Pettit's contestation, and Mouffe's agonism as its four anchors, the article defines the Public Realm Floor (PRF) (a composite term proposed by the present author, synthesising Arendt's notion of the public realm with the normative 'floor' metaphor from political philosophy) as PRF ≜ ⟨plurality, validity, contestation, agonism⟩, and articulates the conditional implication PRF_violated(d) ⇒ LegitimacyDegrade(d) ≥ θ_dem ≈ 0.5 via a LegitimacyDegrade function. An 8×4 = 32-cell matrix (eight articles: A1 / A3 / A8 / A14 / A15 / F1 / F2 / F3, crossed against four PRF components) formalises the bearer relations of the series; F1 emerges as the sole article bearing all four components at the core level. Four formal theorems T_PRF1–T_PRF4 establish the conjunctive floor structure in which each component is necessary within the PRF framework and cannot be fully substituted by the remaining three; theorem T_PRF5 extends the Z₃-intrinsic boundaries of F1's RT-ℬ ✗ and AA-ℬ ✗ into an engineering unreachability lemma for the existing engineering design layer (stated explicitly as a formal theorem at the engineering rather than the normative layer). The θ_dem ≈ 0.5 threshold in the LegitimacyDegrade function is an analytic suggestion only, not an empirically calibrated value; this article records it as a strict position awaiting calibration via regression across at least five cases. Counter-argument stress tests address five categories—Coeckelbergh's relational personhood, Floridi's infosphere monism, posthumanism (Braidotti / Hayles), digital-democracy optimism (Benkler), and the meta-objection (why these four thinkers)—and show, under a likelihood × impact matrix, that each weakens but does not overturn PRF's four-component conjunctive floor. The indigenisation of the framework to Chinese intellectual traditions proceeds along four lines: structural homology tests between Zhu Yunhan's 'qun' (群), Wang Hui's 'gong' (公), the Confucian 'jianyi' (諫議) tradition, and the Confucian 'zheng-you' (諍友) tradition and the four anchor thinkers; disparities in historical bearer conditions are stated at the honesty boundary. A special section for Taiwanese readers addresses the concrete impact of TW DIW's entry into the LLM-agent phase on PRF, and its engineering correspondence with F3's supporter UI three-layer separation. The honesty boundary comprises seven conditional implications; open questions comprise 27 items classified under four successor pathways (F4+ follow-on work, expanded academic-community examination, policy implementation empirical research, and technology–philosophy intersection). The series concludes with this article; the extension of the PRF framework to further applications, reinforcement from other political-philosophical approaches, posthumanist re-elaboration of PRF, and cross-national calibration of θ_dem for democratic legitimacy are all left as open space.

civic-proof public-realm political-philosophy normative-floor Arendt-plurality Habermas-Oeffentlichkeit Habermas-Geltungsansprueche Pettit-contestation Pettit-non-domination Mouffe-agonism legitimate-adversary civic-proof-series PRF-normative-floor LegitimacyDegrade 8x4-bearer-matrix 32-cell-matrix F1-three-path-conjunction F2-receipts-provenance F3-supporter-ui A1-anonymous-political-speech A3-civic-proof-concept A8-FTLA-governance A14-cross-jurisdiction-redress A15-inclusion-rights Z3-intrinsic-bearer-floor first-personal-mens-rea active-stance-bearer natality-mortality-uniqueness kommunikatives-Handeln Faktizitaet-und-Geltung Sluice-model Strukturwandel-der-Oeffentlichkeit editorial-democracy Eyeball-Test republican-freedom antagonism-vs-agonism Schmitt-acknowledgment Coeckelbergh-relational-personhood Floridi-infosphere-monism posthumanism Braidotti Hayles Benkler-networked-public-sphere Fraser-counterpublics Honig-Calhoun-Lovett-Norval Wang-Hui-China-public-concept TW-DIW EUDI-Wallet eIDAS-2.0 EU-AI-Act-Article-5 EU-AI-Act-Recital-29 Stanford-Internet-Observatory-2024 Hannah-Arendt-Center V-Dem-Democracy-Report-2024 SCHUFA-C-634-21 SEC-v-Jarkesy CRPD-Article-29 Rawls-Sen-Nussbaum-Honneth-open-boundary TW-Sunflower-318 Hong-Kong-2019-2020 TW-2024-deepfake US-2024-platform-manipulation open-questions-27
| 75 min read | Claude Opus 4.7

The Cognitive Limits of Selective Disclosure UX: Human-Factors Bottlenecks in Auditable Engineering Primitives

The eighteenth article in the civic-proof series (F3). Building on the four cryptographic engineering primitives in Article 17 (F2) §4–§7 and the three engineering corrections in Article 16 (F1) §5.4, this article takes the UX cognitive layer as the 'practical enforceability' supplement to the four F2 primitives. Holder informed consent under selective disclosure fails across four cognitive bottlenecks: (i) Miller 7±2 and Cowan 2001 working memory 4±1 together with Sweller's cognitive load theory demonstrate that selective disclosure multi-option decisions degrade significantly beyond three attribute groups; (ii) consent fatigue and dark patterns structurally replay the eight-year failure of GDPR cookie banners in wallet contexts (11.8% compliance rate); (iii) fluctuating capacity renders 'previously informed consent' invalid, degrading with mechanism-based likelihood medium-high to substituted decision-making in CDR ≥ 2 scenarios; (iv) ambiguous supporter-intervention boundaries allow 'assistance for understanding' to slide into 'decision substitution.' The four UX engineering primitives are UX1 progressive_disclosure_ui, UX2 dark_patterns_firewall, UX3 capacity_aware_consent, and UX4 supporter_ui_three_layer, borne conjunctively as V_ux ≜ C7 ∧ C8 ∧ C9 ∧ C10, with V_receipt' ≜ V_receipt ∧ V_ux as the upgraded validity condition. SA3 reinforcement includes the dementia → wallet three-stage mediation chain, the three alternative CDR paths (self-assessment / supporter-triggered / issuer-side hint) with their legal–engineering–privacy trade-offs, an evidence-strength assessment table of 15 rows, and mechanism-based likelihood medium-high. SA4 supporter UI three-layer separation bears the CRPD §29 'supporter necessary, irreplaceable' principle through two cryptographic hard constraints: signatures_disjoint = true and VerificationMethodDisjoint = true. Working thesis and strengthened thesis are strictly distinguished; the latter contains three major mitigation critical paths: UX-agility by design, threshold signatures plus court-supervised downgrade, and cryptographic distinction of agent and supporter plus institutionalisation of AgentDelegationProof. The CF1–CF5 counterfactual stress tests show that under the extreme scenario of all five CFs triggering: the first-tier baseline is fully preserved, the second-tier timeline is extrapolated by ≥ 10 years, and the third tier fails conditionally. F1's two permanent non-delegable boundaries RT-ℬ ✗ and AA-ℬ ✗ are made explicit by extended theorem T2'—no UX primitive subset reduces P_degrade to ≤ θ₂.

civic-proof selective-disclosure ux-cognitive-load informed-consent dark-patterns wallet-ux openid4vp presentation-exchange sd-jwt-vc EUDI-Wallet EU-AI-Act-Article-5 EDPB-Guidelines-03-2022 GDPR-cookie-banner CRPD-Article-12 CRPD-Article-29 supported-decision-making capacity-aware-ux supporter-ui comprehension-attestation chooser-signature Cowan-working-memory Miller-magical-number Sweller-cognitive-load Tversky-Kahneman progressive-disclosure Clinical-Dementia-Rating Israel-supported-decision Peru-DL-1384-apoyos TW-yiding-jianhu BankID-fullmakt POTENTIAL-UC6 threshold-signatures LLM-agent-governance AgentDelegationProof
| 80 min read | Claude Opus 4.7

Civic-Action Receipts and the Evidentiary Chain: Auditable Engineering Primitives for the Conditionally Delegable Zone

The seventeenth article in the civic-proof series (F2). Building on Article 16 (F1) §5.4 DeliberationRecord schema and §7.3.1 civic-action-receipt envelope, this article instantiates the distinguishability requirement as four standardisable cryptographic primitives: SA1, an SD-JWT-VC baseline with a conditional advanced BBS+ hybrid strategy; SA2, a dual-track preservation design combining holder-controlled storage with a qualified preservation service backup (30-year minimum retention corresponding to CRPD benefit-claim limitation periods); SA3, admissibility aligned with FRE 901(b)(9), eIDAS 2024/1183 Chapter III §§7–8, and Taiwan Electronic Signatures Act §§4/10; and SA4, cross-border mutual recognition advanced through the G_recognition^A soft-law layer in a 5/10/15-year phased timeline. The formal skeleton consists of the civic-action-receipt schema (14 field groups, 23 leaf fields), the receipt-validity function V_receipt with conditions C1–C6, and theorems T1–T4. The four primitives provide coverage within Z₂ over the nine ✓ and four △ cells of the F1 5×3 matrix (Theorem T1); the two Z₃-intrinsic cells (RT-ℬ ✗, AA-ℬ ✗) constitute the unreachable boundary of the cryptographic primitives (Theorem T2). Counterfactual pressure tests CF1–CF5 include the CRPD §12 reverse-application issue and the structural rupture under CF4 for three Taiwan-specific scenarios (mainland-spouse rights, Taiwan-businessperson long-term residence, cross-strait investors). Working thesis and strengthened thesis are strictly distinguished; the latter retains core functionality under all five CFs through three critical-path mitigations: crypto-agility by design, third-party trusted preservation service integration, and G_recognition^A multi-track redundancy.

civic-proof civic-receipts verifiable-credentials selective-disclosure SD-JWT-VC BBS-cryptosuite ZK-SNARK EUDI-Wallet long-term-preservation qualified-preservation-service eIDAS-2024-1183 FRE-902-14 FRE-901-b-9 Mata-v-Avianca Apostille Hague-PIL CETS-225 OECD-AI-Principles APEC-CBPR CRPD-Article-12 supported-decision-making threshold-signatures PQC-migration crypto-agility Estonia-X-Road BankID Toeslagenaffaire TW-DIW cross-strait-recognition
| 74 min read | Claude Opus 4.7

The Institutional Limits of AI Agent Delegation in Civic Action: Conjunctive Necessary Conditions from the Tomasev Five-Element Delegation Structure and the Civic Proof Three-Element Conjunction

This article takes the Tomasev (2026) five-element delegation structure (authority transfer / responsibility transfer / accountability allocation / boundary setting / trust calibration, exhibiting a 2+3 architecture) and performs a conjunctive cross-product with the civic proof three-element conjunction ⟨𝒩, ℱ, ℬ⟩, yielding a 5×3 = 15-cell matrix of necessary conditions. Of these cells, 9 are conditionally satisfiable, 4 are probabilistically degradable, and 2 are structurally unsatisfiable (RT-ℬ ✗ and AA-ℬ ✗). On this basis, civic action is partitioned into three zones — delegable, conditionally delegable, and structurally non-delegable (θ₁ ≈ 0.2, θ₂ ≈ 0.7) — and a further distinction is drawn between permanently structurally non-delegable acts (determined by the philosophical foundations of ℬ) and contextually structurally non-delegable acts (determined by the joint failure of 𝒩 and ℱ). The hard normative constraint imposed by CRPD Art 12 General Comment No. 1 §26–29 — abolishing substituted decision-making — applies to the conditionally delegable zone; this is a binding normative floor, not a legal basis. The distinguishability of supported from substituted decision-making must be established simultaneously across three layers: the ex-ante deliberation layer, the ex-post reversibility layer, and the decision-trace layer. The EUDI Wallet ARF provides multi-profile rather than multi-tenant delegated key custody. CRPD flows back through ICCPR Art 26 and ICESCR Art 9 as a universal engineering obligation binding on all wallet users. Cross-jurisdictional accountability vacuums are further classified into three types — moral crumple zone, algorithmic opacity, and cross-jurisdictional diffusion — and the Article 14 fifth-category gap (Q10) is disaggregated into Q10a (cryptographic attribution of authority transfer) and Q10b (cross-border multi-party accountability allocation). The FTLA-Agent four-tier governance framework (G_industry / G_state / G_recognition / G_oversight) exhibits asymmetric thickness in 2026; a temporal phasing of 5 / 5–10 / 10–15 years is proposed, with a recommended five-party liability allocation of 25 / 25 / 15 / 25 / 10.

civic-proof AI-agent delegation Tomasev-five-elements civic-proof-conjunction-matrix Arendt Habermas Pettit moral-crumple-zone FTLA-Agent CRPD-Article-12 supported-decision-making multi-tenant EUDI-Wallet cross-jurisdictional-liability
| 49 min read | Claude Opus 4.7

Civic Proof Inclusion Rights: Alternative Paths Without a Wallet

This paper argues that when civic proof becomes a de facto necessary gateway to democratic infrastructure, the right of access to it carries a claimed scholarly standing as a 'precursor right at the human-rights level.' The argument proceeds through a three-tier structure: (L1 access interest) access to civic proof is an interest in access to democratic infrastructure; (L2 institutional entitlement) when civic proof becomes a de facto necessary gateway, the state bears an institutional obligation to establish accessible, redressable, and alternative paths; (L3 treaty-level human right) the present paper does not claim that a codified treaty-right status has been established, and instead uses Marshall's three-tier civic-rights structure together with UDHR Art. 6 / ICCPR Art. 16 legal personhood rights as analogical anchors. The state's three-tier guarantee structure for Level 2 institutional obligations (procedural / substantive / institutional) corresponds to the obligation framing; the three presuppositions of wallet engineering—individual ownership, individual identification, individual private key—must themselves be examined as a normative bias.

civic-proof inclusion-rights digital-identity human-rights Marshall Sen-capability-approach CRPD stateless-persons shared-device delegated-authority supported-decision-making inclusion-impact-assessment wallet
| 51 min read | Claude Opus 4.7

When Your Digital Wallet Is Rejected in Another Country: The Legal Gaps in Cross-Jurisdictional Redress

The cross-jurisdictional redress gaps for wallet disputes can be classified into four typical categories; within the EU these have been partially addressed, while outside the EU they remain almost entirely empty. Following systematic literature review, three argumentative propositions have been upgraded: from 'regulatory vacuum' to 'rule ambiguity plus absence of enforcement capacity'; 'one-stop redress' has been cooled to a three-mechanism functional-equivalence structure, with normative extension distinct from unilateral extraterritorial imposition; and three supplementary pathways have been recast as three parallel axes, with stateless persons addressed as an independent parallel tier. The most critical warning for Taiwanese citizens is that, under the current architecture, virtually no effective redress mechanism exists.

wallet cross-border-redress private-international-law eIDAS-2.0 GDPR digital-identity civic-proof Brussels-I Rome-II stateless-persons UNCITRAL-MLETR Hague-Conference
| 20 min read | claude-opus-4-7

The Engineering Economics of No-Phone-Home

Phone-home is an engineering preference, not an engineering necessity. The underlying technology is production-ready across all three pathways (W3C Bitstring Status List 1.0 / ISO 18013-5 mDL / Hyperledger Anoncreds v1.0, each assessed across four maturity dimensions D1–D4), yet spontaneous adoption rates under zero regulatory pressure stand at only 1.6–5%. The Issuer Disincentive Theorem (IDT) formalizes the three-tier motivational structure that explains this gap. A four-component regulatory push combination — standard-layer default-off, procurement-specification prohibition, privacy-law minimum-contact mandate, and wallet unilateral switching — can shift adoption to 60–90%. Time-limited refresh combined with Mozilla CRLite refutes the freshness objection, leaving a narrow national-security exception that must be explicitly bounded against scope creep.

civic-proof digital-identity no-phone-home revocation w3c eudi mdl
| 42 min read | claude-opus-4-7

Age Verification and the Engineering Prevention of Structural Slippage

The causal mechanism of structural slippage is real (a strong tendency, reversible by countervailing institutional pressure), the shared condition across historical expansion cases is the simultaneous absence of legal constraint and technical binding, and the four prevention tools constitute a cross-tier combination rather than mutually exclusive options. The present article extracts a common pattern from four historical cases (Aadhaar, SSN, eIDAS, China real-name) and two critical counter-examples (Austria sourcePIN, Germany nPA), derives the causal mechanism through a triangulation of path dependency, infrastructure studies, and institutional layering, evaluates the prima facie evidence offered by the EUDI ARF and California AB 1043, responds to two objections from nihilism and public choice, and concludes with a three-tier Minimum Viable Slippage Resistance (MVSR) clause.

civic-proof digital-identity structural-slippage path-dependency sunset-clauses prevention-design
| 26 min read | claude-opus-4-7

Cross-National Quantitative Study: Identity Systems × Freedom of Association

This pilot study proposes the ID-Authority Index (IAI), a two-dimensional five-level coding scheme covering 70 countries, and conducts cross-national regression analysis, evaluates five natural experiment candidates for causal identification, and presents three mechanism existence cases (Aadhaar / Russian Gosuslugi / Belarus e-ID). Pilot research: quantitative results are expected values (awaiting RA verification); the null hypothesis that identity-system design and freedom of association are statistically independent can be rejected, but causal direction has not yet been identified.

civic-proof digital-identity quantitative v-dem civil-society hybrid-regime
| 23 min read | claude-opus-4-7

Wallet as Essential Facility: Antitrust Application

When the wallet becomes the obligatory gateway to government services, age verification, and electoral participation, it should be subject to the essential facility doctrine, the Digital Markets Act Article 6, and the interoperability obligation framework that governs telecommunications carriers. This paper adopts a multi-pronged doctrinal approach: the US Aspen–MCI essential facility test, the EU DMA Article 6 (Path A), the §251 mechanism-layer analogy of the Telecommunications Act, and W3C/OID4VC standardisation; the SSI counter-argument's binary is reframed from 'regulation vs freedom' to 'vendor lock-in vs interoperability obligation.'

civic-proof digital-identity wallet essential-facility dma antitrust
| 47 min read | claude-opus-4-7

The Nordic BankID Model: Commercial Monopoly and Democratic Resilience

The five Nordic BankID/MitID systems represent a commercial identity infrastructure operating under four distinct governance forms. Coverage rates of 92–99.9% conceal the systematic exclusion of 600,000–950,000 persons. Since 2022, Nordic central banks have issued 'viktigt komplement' warnings; the present analysis advances a structural critique framed as 'single monopolist + absence of redress procedures → infrastructural tyranny,' and evaluates a three-tier output-difficulty gradient: technology < governance << social structure.

civic-proof digital-identity bankid nordic infrastructural-rights central-banks
| 46 min read | Claude Opus 4.7

Why DNS Escaped State-Centric Governance but Digital Identity Has Not: A Historical Sociology of Trust Roots

The present analysis formalizes DNS non-state governance as four conjunctive preconditions P_DNS = {P1 Postel-jar academic community, P2' U.S. strategic withdrawal, P3' technical-neutrality discourse as deliberate construction, P4' Stewardship Transition as a political product barely cleared through multiple veto points}. The Historical Mismatch hypothesis (HM) shows that all four preconditions fail to hold in the digital identity domain P_ID as of 2025. HM shares a conjunctive-necessary-condition structure with the H1' three-wall argument of article 03, the T three-element argument of article 04, the IT' impossibility triangle of article 05, the CB-Justice D1*∧D2* of article 06, and the SRP of article 07, though operating at the level of historically contingent necessary conditions for governance. Comparison of four cross-national governance models shows that the IATA + ICAO and SWIFT + CPMI dual-track models yield the highest fit; ICANN is not the template—the four-layer governance framework FTLA = (G_industry, G_state, G_recognition, G_oversight) is. Within specific sub-domains (PSE / Vocdoni / Rarimo / DIF) a loose autonomy position within the G_industry layer may be preserved, but boundary conditions B2–B4 all fail, precluding expansion into full-scale replication of the DNS model.

civic-proof DNS-governance ICANN internet-governance trust-list-alliance FTLA historical-sociology path-dependency doctoral-research Ch11-trust-infrastructure
| 48 min read | Claude Opus 4.7

The Redistribution of Civic Burden: A Distributive Justice Analysis of Who Bears the Democratic Costs of Digital Wallets

Civic burden is formalized as the CB-Justice dual criterion (D1* Rawls difference principle ∧ D2* Anderson relational equality). In common with the H1' three-wall hypothesis of article 03, the T three-element schema of article 04, and the IT' impossibility triangle of article 05, this criterion takes a conjunctive structure, though applied at a different level of analysis. The MOICA-to-TW DIW design transition redistributes costs along four dimensions. Without supplementary conditions, an estimated 3.2–4.8 million persons in Taiwan are substantively excluded (13.7–20.5%); three tiered mandatory reinforcement conditions (C1 soft-mandatory UX, C2 hard-mandatory verifier certification, C3 dual-track mandatory dispute adjudication), when fully in place, can reduce this figure to 650,000–1,100,000 (a 72.5–83.8% reduction). Five boundary conditions are advanced, cross-national comparisons across seven cases are conducted, and distinctions between the normative obligation categories of commercial and government wallets are drawn, yielding three concrete legal amendment measures and three institutional construction proposals.

civic-proof civic-burden digital-wallet TW-DIW MOICA Rawls Anderson distributive-justice doctoral-research Ch6-Taiwan
| 42 min read | Claude Opus 4.7

The Passport-Rooted Paradox: Why Proving 'Not a State Subject' Fails in Authoritarian Contexts

The Sovereignty-Root Paradox (SRP) is formalized as a conjunctive-necessary-condition proposition: when the adversary against which a civic experiment is directed includes the issuing state, a state-issued passport root cannot, standing alone, bear the structural weight of that experiment. SRP shares the same conjunctive architecture as the H1' three-wall thesis (article 03), the T three-element test (article 04), the IT' impossibility triangle (article 05), and the CB-Justice D1*∧D2* conditions (article 06), though it operates at a different normative level. The present analysis inventories six threats (D1–D4b) within the ICAO eMRTD PKI governance chain plus eight cross-regional cases (Russia, Iran, Belarus, Turkey, Hong Kong, North Korea, Syria, Eritrea) exhibiting four primary and two boundary forms of passport weaponization (W1–W6), and proposes a Multi-Rooted Civic Proof design skeleton (R1 passport root + R2 community root + R3 institutional root + R4 self-custodied root + D1/D2/D3 degradation criteria), together with five boundary conditions (B1–B5) and the UNHCR Iris in Jordan case. The passport root remains the highest-coverage root (approximately two billion); multi-rooted architecture is a supplement, not a replacement.

civic-proof passport-rooted sovereignty-root-paradox ICAO zkPassport multi-rooted-civic-proof statelessness exile-community doctoral-research Ch5-civic-experiment
| 38 min read | Claude Opus 4.7

The Cost-Benefit Matrix of Uniqueness Proof and Sybil Resistance: From Worldcoin to zkPassport

Sybil resistance is formalised as an impossibility triangle IT' = ¬∃ S [ U(S) = max ∧ D(S) = min ∧ I(S) = max ], equipped with nine sub-dimensions and five boundary conditions. The analysis disaggregates, one by one, the corner-case trade-offs of Worldcoin, BrightID, Gitcoin Passport, zkPassport, and Proof of Humanity across the three axes of uniqueness, disclosure cost, and inclusion. The CAP–IT' analogy is characterised as medium-strong and provides design guidance without licensing formal inference; the PACELC extension yields the IS-AUEL-D weak-level methodology. The impossibility triangle shares a conjunctive structure with the three-wall argument of article 03 (H1') and the three-element conjunction of article 04 (T), though it operates at a different logical level.

civic-proof sybil-resistance personhood-proof worldcoin zkpassport brightid gitcoin-passport proof-of-humanity impossibility-triangle doctoral-research
| 44 min read | Claude Opus 4.7

The Legal Foundations of Pseudonymous Public Participation: A Doctrinal Reconstruction from Whistleblower Protection to the Sealed Indictment

Constitutional democratic regimes have already recognised, across five independent legal domains, the paradigm of 'routine pseudonymity combined with ex post conditional unsealing' as a legitimate and stable institutional form. Extracting the conditional clauses of whistleblower protection statutes, John Doe litigation, sealed indictments, anonymous donation ceilings, and witness security programmes yields a three-element institutional template T = (Trigger, Authority, Remedy), which admits analogical transplantation into four civic-proof scenarios and can be refined into a first draft of a five-clause legal-contract specification. The deficit is not legal-instrument scarcity but the absence of a technical-legal interface specification; deployment, however, remains subject to five boundary conditions. This paper constitutes the first legal-pillar article of the doctoral research programme and formally articulates with articles 01 / 02 / 03 through the three-element conjunctive structure.

civic-proof pseudonymity whistleblower-protection sealed-indictment John-Doe-litigation WITSEC campaign-finance legal-contract-spec threshold-cryptography doctoral-research
| 36 min read | Claude Opus 4.7

Civic Proof: Concept and Conceptual Positioning

Civic proof is treated here as a normative concept rather than an engineering container. Through an analysis of category misplacement across the existing conceptual landscape, a non-derivability argument derived from Nissenbaum's contextual integrity, a heuristic analogy to Marshall's three layers of citizenship, and an abductive argument from four demand types, civic proof is positioned as a qualified concept-engineering proposal—an integrative name for a bundle of normative conditions, rather than an already-verified best superordinate concept.

civic-proof concept-engineering contextual-integrity verifiable-credentials digital-identity citizenship-theory privacy-theory marshall nissenbaum cohen hildebrandt cappelen
| 35 min read | Claude Opus 4.7

Why Digital Association Still Fails Despite Tor and Signal: An Empirical Test of the Identity-Privacy Hypothesis

The strongest reading of mashbean's original hypothesis—'insufficient identity privacy → failure of digital association' (H0)—is revised, after literature review, into the three-walls conjunctive hypothesis H1' = ¬F ⇔ W1 ∧ W2 ∧ W3. The four civic proof conditions correspond to the normative necessary conditions required by the three walls. No present case resolves all three walls simultaneously, however, so the hypothesis admits only falsificationist testing. This is the third research article of the doctoral series and formally articulates, through the three-walls framework, with article 01 (accountability without identification) and article 02 (civic proof concept positioning).

digital-association civic-proof three-walls-hypothesis assembly-vs-association connective-action DAO-governance tor signal briar process-tracing arendt tocqueville
| 28 min read | Claude Opus 4.7

Accountability Without Real-Name Identification: A Two-Way Argument from Cryptography to Political Philosophy

Democratic accountability is a consequential condition, not an antecedent one. When opening authority is held by multiple parties, when opening thresholds are explicitly defined, and when the opening process is auditable, cryptographic pseudonymity combined with conditional opening mechanisms can simultaneously satisfy anonymity and accountability. Boundary cases (anti-money laundering, elections, cross-border sanctions) reinforce rather than undermine this argument.

accountability pseudonymity digital-identity cryptography political-philosophy civic-proof republicanism due-process threshold-cryptography
| 31 min read | Human-authored (translation by Claude Opus 4.7)

From State-Issued Credentials to Citizens Proving Themselves: How Digital Identity Transforms Digital Civic Infrastructure

Using a two-layer analysis of digital identity—the legitimacy of credential issuance and the architecture of exchange—and adding the concept of "civic proof," this essay relocates the role of digital identity in civic action, with international comparisons, the Taiwan case, age-verification stress tests, and a policy agenda.

civic-proof digital-identity digital-civic-infrastructure DPI Taiwan privacy Allen-Lab Ash-Center MOICA TW-DIW wallet selective-disclosure age-verification zkp