<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Protocolized: Articles]]></title><description><![CDATA[Essays, case studies, and news pieces covering important and immediate topics in the field of protocol studies. Expect a mix of formats with an anthropological tilt. ]]></description><link>https://protocolized.summerofprotocols.com/s/articles</link><image><url>https://substackcdn.com/image/fetch/$s_!UN8G!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F561581f5-d99c-4ccb-9dff-6ebfb75ad71e_1000x1000.png</url><title>Protocolized: Articles</title><link>https://protocolized.summerofprotocols.com/s/articles</link></image><generator>Substack</generator><lastBuildDate>Thu, 07 May 2026 04:03:38 GMT</lastBuildDate><atom:link href="https://protocolized.summerofprotocols.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Summer of Protocols]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[protocolized@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[protocolized@substack.com]]></itunes:email><itunes:name><![CDATA[Protocolized]]></itunes:name></itunes:owner><itunes:author><![CDATA[Protocolized]]></itunes:author><googleplay:owner><![CDATA[protocolized@substack.com]]></googleplay:owner><googleplay:email><![CDATA[protocolized@substack.com]]></googleplay:email><googleplay:author><![CDATA[Protocolized]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[A Government Guide to Open Protocols]]></title><description><![CDATA[Public sector teams must go beyond the in-house or off-the-shelf dichotomy to take advantage of open protocols, which offer a unique way to manage both software costs and geopolitical exposure]]></description><link>https://protocolized.summerofprotocols.com/p/a-government-guide-to-open-protocols</link><guid isPermaLink="false">https://protocolized.summerofprotocols.com/p/a-government-guide-to-open-protocols</guid><dc:creator><![CDATA[Kelly Roegies]]></dc:creator><pubDate>Thu, 19 Mar 2026 20:17:02 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/6ea17520-ef13-4eba-9bf4-61f3ec7ec79f_1200x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3><strong>From Vendor Dependency to Coordination Systems</strong></h3><p style="text-align: justify;">For most of the history of digital infrastructure provision, public institutions faced two uncomfortable options: deep dependency on large proprietary vendors such as Microsoft or Oracle, with all the lock-in and geopolitical exposure that entails; or the enormous difficulty and expense of building and maintaining systems in-house.</p><p style="text-align: justify;">Open protocols offer a third path. Infrastructure that no single actor owns, that evolves through distributed processes, and that can be implemented by anyone with the technical capacity to do so. The sovereignty offered by this approach is not about ownership, but about institutions understanding how their systems work, being able to participate in them, and retaining the option to move or adapt if needed.</p><p style="text-align: justify;">Public institutions across Europe and beyond are increasingly taking this third option. Public digital infrastructure is becoming dependent on systems that no single actor controls. Messaging platforms, digital ID systems, and cross-border government digital services increasingly rely on open protocol ecosystems. In Europe, this acceleration is shaped by two pressures: the call for digital sovereignty and legally mandated interoperability. The French government&#8217;s digital directorate, DINUM, for example, runs Tchap &#8211; a secure messaging platform for the French public administration &#8211; on Matrix, an open protocol maintained by a distributed global community rather than any single vendor.</p><p style="text-align: justify;">Overdependence on dominant corporate vendors or external jurisdictions is increasingly seen in Europe as a real political and strategic risk. The European Commission has put digital sovereignty and open strategic autonomy high on the agenda because control over digital infrastructure now touches everything from economic security to democratic resilience and Europe&#8217;s geopolitical standing. In that context, open protocols have advantages. They allow governments to reduce dependency on individual vendors without cutting themselves off from global technology ecosystems.</p><p style="text-align: justify;">At the same time, interoperability is no longer aspirational. With the adoption of the Interoperable Europe Act, cross-border compatibility and the reuse of public sector digital tools, standards, and components have become regulatory requirements rather than best practices. Public administrations are expected to build digital services that can function across Member States and integrate into shared European infrastructures. That legal shift creates pressure toward open standards and protocol-based systems, because interoperability at scale is difficult to sustain if the underlying evolution of systems is controlled unilaterally.</p><p style="text-align: justify;">As a result, many major public digital infrastructure projects over the next decade will involve protocol deployments. Realising the potential of this change, however, requires something most public institutions have not yet done: treating protocol engagement as a first-class infrastructure responsibility rather than a background technical detail.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-2tI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F227e962e-f749-4ac3-a044-083838d34c6e_1200x1200.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-2tI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F227e962e-f749-4ac3-a044-083838d34c6e_1200x1200.png 424w, https://substackcdn.com/image/fetch/$s_!-2tI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F227e962e-f749-4ac3-a044-083838d34c6e_1200x1200.png 848w, https://substackcdn.com/image/fetch/$s_!-2tI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F227e962e-f749-4ac3-a044-083838d34c6e_1200x1200.png 1272w, https://substackcdn.com/image/fetch/$s_!-2tI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F227e962e-f749-4ac3-a044-083838d34c6e_1200x1200.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-2tI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F227e962e-f749-4ac3-a044-083838d34c6e_1200x1200.png" width="500" height="500" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/227e962e-f749-4ac3-a044-083838d34c6e_1200x1200.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1200,&quot;width&quot;:1200,&quot;resizeWidth&quot;:500,&quot;bytes&quot;:884026,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/191397545?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F227e962e-f749-4ac3-a044-083838d34c6e_1200x1200.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-2tI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F227e962e-f749-4ac3-a044-083838d34c6e_1200x1200.png 424w, https://substackcdn.com/image/fetch/$s_!-2tI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F227e962e-f749-4ac3-a044-083838d34c6e_1200x1200.png 848w, https://substackcdn.com/image/fetch/$s_!-2tI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F227e962e-f749-4ac3-a044-083838d34c6e_1200x1200.png 1272w, https://substackcdn.com/image/fetch/$s_!-2tI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F227e962e-f749-4ac3-a044-083838d34c6e_1200x1200.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3 style="text-align: justify;"><strong>The Problem with How Institutions Procure</strong></h3><p style="text-align: justify;">The problem starts with how institutions think about procurement. Servers can be audited. Vendors can be contracted. Systems can be upgraded through planned lifecycle management. When something breaks, there is someone to call. The governance of these third-party relationships is externalised into contract law, and the institution can, at least in principle, hold the counterparty to account. Even open source has historically been absorbed into this logic. Vendors and consultancies package open source software into products and services that institutions can procure, with clear accountability structures.</p><p style="text-align: justify;">Open protocols do not fit that model. They define how systems communicate and evolve, but they are not owned or governed through formal authority. Maintained by distributed communities, they operate through proposal processes, informal norms and voluntary adoption rather than contractual obligation.</p><p style="text-align: justify;">When an institution procures a system built on an open protocol, it is not simply acquiring software. It is entering a coordination ecosystem governed by rules that will continue to evolve long after any contract is signed, through processes that the procurement office did not assess and toward outcomes that no single party controls.</p><p style="text-align: justify;">The protocol that makes a system interoperable today will be revised. The security practices embedded in it will need to change as threats evolve. The compatibility assumptions that allow it to federate with other deployments will be renegotiated by a community of contributors who have no formal obligation to an operational timeline or compliance requirements.</p><p style="text-align: justify;">This arrangement is still poorly understood in the public sector, particularly in procurement systems designed around vendors and deliverables rather than shared governance.</p><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/Xmci7/4/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/da054170-5109-4087-bd67-0ec1b78677ba_1220x2380.png&quot;,&quot;thumbnail_url_full&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4bce9052-def5-4585-911f-fc59e45ec19c_1220x2450.png&quot;,&quot;height&quot;:1215,&quot;title&quot;:&quot;Institutional Engagement Models for Digital Infrastructure&quot;,&quot;description&quot;:&quot;&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/Xmci7/4/" width="730" height="1215" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><div><hr></div><h3 style="text-align: justify;"><strong>The Risks of Unmanaged Dependency</strong></h3><p style="text-align: justify;">The case for open protocol infrastructure is strong, but adoption introduces its own risks. Technical robustness does not automatically translate into institutional readiness.</p><p style="text-align: justify;">Exit options can narrow quickly. If the protocol evolves in a direction that no longer fits institutional requirements, the practical alternatives are limited. Forking a protocol that is already widely deployed means taking on long-term maintenance and gradually drifting away from the wider ecosystem. Walking away usually means returning to vendor-based solutions, bringing back the same dependencies digital sovereignty policies were meant to reduce.</p><p style="text-align: justify;">Change can also arrive as operational surprise rather than managed evolution. Protocol governance is continuous. Security updates, specification revisions, and coordination shifts are normal features of healthy ecosystems. But if institutions are not following those processes, they might only notice the consequence of a particular direction when it urgently impacts them. What could have been handled through normal lifecycle planning turns into incident response.</p><p style="text-align: justify;">Governance influence is rarely evenly distributed, though to exactly what degree varies significantly by protocol. Some have governance structures with strong safeguards against capture by any single actor. In protocols with weaker safeguards, development tends to be shaped by those who can afford to fund full-time engineering participation. A public institution entering such a governance ecosystem may find it already dominated by a small group of well-funded private actors.</p><p style="text-align: justify;">Maintenance capacity can also be more limited than it appears. Key functions, particularly security response, may depend on a very small number of individuals. If those individuals move on or are unavailable during an incident, institutions have no contractual safeguards and may face response timelines that are incompatible with their operational requirements.</p><p style="text-align: justify;">In essence, open protocols replace vendor dependency with ecosystem dependency. That dependency is structurally healthier because the governance processes shaping these systems are visible and participatory, but it still requires institutional competence, monitoring and strategic engagement. Public institutions are not limited to acting as customers with influence tied to purchasing power. They can observe, engage and, where appropriate, contribute to how the infrastructure they depend on evolves.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://protocolized.summerofprotocols.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://protocolized.summerofprotocols.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h3><strong>Building Institutional Capacity for Protocol Governance</strong></h3><p style="text-align: justify;">The most productive response is to develop genuine institutional capacity to understand and track how protocol governance works, and to participate in it on the protocol&#8217;s own terms.</p><p style="text-align: justify;">Participation is not control. It would be a mistake to treat engagement in protocol governance as a route to directing how a global technical community decides things. Governance is distributed by design, and the value of that distribution is precisely that no single actor can capture the infrastructure.</p><p style="text-align: justify;">An institution that attends governance discussions, comments on proposals and tracks specification changes is not governing the protocol. It is informing its own planning and, where it has something useful to contribute, improving the quality of the collective decision.</p><p style="text-align: justify;">When protocol foundations offer formal participation structures, such as Governmental Advisory Councils, public institutions should make use of them. These forums allow governments running large deployments to raise operational needs early while still respecting the distributed governance model most protocols rely on. In some cases, institutions may also second engineers or technical staff to protocol foundations or working groups, a practice already common in standardisation bodies such as ETSI and W3C.</p><p style="text-align: justify;">Developing internal protocol literacy also changes how institutions manage their infrastructure. Teams that follow specification changes and community discussions gain early insight into how the systems they depend on are likely to evolve. Over time, a consistent presence also builds credibility within the ecosystem, increasing the likelihood that the needs of large public deployments are taken into account.</p><p style="text-align: justify;">A procurement team with real protocol literacy can also assess the governance health of a protocol before committing to it. Not just the quality of the current specification, but the community&#8217;s track record on backwards compatibility, the concentration of influence among contributors, the quality of security coordination and the overall health of the maintenance work.</p><p style="text-align: justify;">Making protocol risk visible at the moment dependency is created does not require complex new bureaucracy. It requires better questions during procurement and infrastructure planning. Where are decisions actually made? How does a proposal move from draft to adoption? How are breaking changes communicated, and with what notice? What happens if institutional requirements diverge from community direction?</p><p style="text-align: justify;">Procurement criteria can then reflect that understanding. Vendors who actively contribute to protocol specifications, participate in security coordination and maintain implementations are better positioned to keep deployments aligned with protocol evolution over time. Procurement frameworks that treat upstream contribution as a resilience signal do not just favour better suppliers. They shift incentives across the whole ecosystem, rewarding vendors embedded in the health of the protocol rather than those treating it as a static dependency.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PGho!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F169786e8-b56c-4e56-b1b0-e7fa2d30552a_982x1970.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PGho!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F169786e8-b56c-4e56-b1b0-e7fa2d30552a_982x1970.png 424w, https://substackcdn.com/image/fetch/$s_!PGho!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F169786e8-b56c-4e56-b1b0-e7fa2d30552a_982x1970.png 848w, https://substackcdn.com/image/fetch/$s_!PGho!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F169786e8-b56c-4e56-b1b0-e7fa2d30552a_982x1970.png 1272w, https://substackcdn.com/image/fetch/$s_!PGho!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F169786e8-b56c-4e56-b1b0-e7fa2d30552a_982x1970.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PGho!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F169786e8-b56c-4e56-b1b0-e7fa2d30552a_982x1970.png" width="400" height="802.4439918533604" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/169786e8-b56c-4e56-b1b0-e7fa2d30552a_982x1970.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1970,&quot;width&quot;:982,&quot;resizeWidth&quot;:400,&quot;bytes&quot;:749601,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/191397545?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F169786e8-b56c-4e56-b1b0-e7fa2d30552a_982x1970.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PGho!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F169786e8-b56c-4e56-b1b0-e7fa2d30552a_982x1970.png 424w, https://substackcdn.com/image/fetch/$s_!PGho!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F169786e8-b56c-4e56-b1b0-e7fa2d30552a_982x1970.png 848w, https://substackcdn.com/image/fetch/$s_!PGho!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F169786e8-b56c-4e56-b1b0-e7fa2d30552a_982x1970.png 1272w, https://substackcdn.com/image/fetch/$s_!PGho!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F169786e8-b56c-4e56-b1b0-e7fa2d30552a_982x1970.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3 style="text-align: justify;"><strong>Institutionalising Participation: The Matrix Example</strong></h3><p style="text-align: justify;">One of the clearest examples of an institution making this shift is the Direction interminist&#233;rielle du num&#233;rique (DINUM), the French government&#8217;s digital directorate, which in 2025 became the first government in the world to join the Matrix.org Foundation as a formal member.</p><p style="text-align: justify;">DINUM already operated the largest government deployment of Matrix through Tchap, the secure messaging platform used across the French public administration by hundreds of thousands of civil servants.</p><p style="text-align: justify;">Joining the foundation did not grant DINUM control over Matrix, nor did it create a privileged position within the protocol&#8217;s governance structure. What it did was formalise France&#8217;s presence in the ecosystem behind the infrastructure it already depended on. French engineers and security teams had already been tracking Matrix Spec Changes, coordinating on security advisories and planning upgrades in line with upstream development. Membership made that engagement structural rather than personal. Reliance on a small number of individuals was reduced by embedding governance awareness within the institution itself.</p><p style="text-align: justify;">Not every public institution will have the resources to sustain individual participation in protocol governance. Collective participation models offer a practical alternative. The Matrix for Public Sector forum, launched in October 2025 alongside DINUM&#8217;s foundation membership, brings together representatives from six EU Member States, the European Commission and other institutions to share knowledge, coordinate deployments and feed operational requirements into governance collectively. This lowers the threshold for meaningful participation.</p><p style="text-align: justify;">France is not alone. Across Europe and beyond, governments are building at scale on open protocol infrastructure, with varying degrees of governance engagement. Germany operates a large public sector deployment of Matrix through BwMessenger, the secure messaging platform developed for the Bundeswehr. Several EU Member States, including Sweden, Luxembourg and the Netherlands, are piloting or deploying similar open protocol-based messaging and collaboration infrastructures.</p><div><hr></div><h3><strong>Participation Is the Strategy</strong></h3><p style="text-align: justify;">Open protocol adoption by governments will continue. The pressures behind it are structural: the political will to reduce dependency on digital infrastructure controlled by big tech companies outside their jurisdiction, legal requirements for cross-border interoperability, and the economic advantages of building infrastructure on open protocols rather than each institution developing its own proprietary stacks.</p><p style="text-align: justify;">The question is whether the institutions involved understand the nature of that commitment. They are not simply buying a product. They are stepping into a<strong> </strong>governance process that existed before their deployment and will continue long after their contract ends.</p><p style="text-align: justify;">The institutions that invest in that relationship &#8211; that send someone to the working group, contribute to the specification and treat the protocol community as a constituency rather than a supplier &#8211; will end up with something no procurement process can deliver: infrastructure that grows with them, not against them.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://protocolized.summerofprotocols.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://protocolized.summerofprotocols.com/subscribe?"><span>Subscribe now</span></a></p><p style="text-align: justify;"></p>]]></content:encoded></item><item><title><![CDATA[Theorizing Protocolization II: Atomic Protocol Questions]]></title><description><![CDATA[Solving real coordination problems to discover the formal laws of protocols.]]></description><link>https://protocolized.summerofprotocols.com/p/theorizing-protocolization-ii-atomic</link><guid isPermaLink="false">https://protocolized.summerofprotocols.com/p/theorizing-protocolization-ii-atomic</guid><dc:creator><![CDATA[Venkatesh Rao]]></dc:creator><pubDate>Wed, 04 Mar 2026 22:41:11 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/3cd212b7-cc96-4504-a750-824f409e8f30_1200x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In the <a href="https://protocolized.summerofprotocols.com/p/theorizing-protocolization-i-new">first installment</a> of <em>Theorizing Protocolization, </em>we introduced <em>protocolization </em>as a progressively developing planetary transformation, that is, the metabolization of technologically-mediated behaviors into reliable coordination infrastructure at every social scale. From the highly cost effective and beneficial promotion of hand hygiene, to the simple yet powerful standardization of shipping containers, to the heady mixture of institutions, laws, and norms that form rules-based international order, protocols grow, rhizomatically, into what <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Venkatesh Rao&quot;,&quot;id&quot;:2264734,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!MJ9A!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F562e590a-9494-4f66-87f0-330c1be204c2_500x500.jpeg&quot;,&quot;uuid&quot;:&quot;2c7e2418-459a-4a49-98d7-092a6f96e56f&quot;}" data-component-name="MentionToDOM"></span> coined as <em>New Nature</em> &#8211; a pervasive yet nearly imperceptible artificial lawfulness.</p><p>This combination of ubiquity and invisibility creates a peculiar methodological quandary. Protocols permeate a multitude of technical substrates, institutional arrangements, and social realities, operating simultaneously at hyperlocal and global scales. Even so, it can prove difficult to locate protocolization precisely. What does it look like to <em>theorize </em>such a thing? How can we identify formal models that describe the common, generalizable features of protocols which can be reliably applied across contexts? If we manage this at all, how can we tell if we&#8217;re doing it well?</p><p>This time, we&#8217;ll explore one of our early responses to the challenge of conducting a generative collective research program for protocol formalization. In particular, we will introduce a new top-level research track built around specific, well-posed problems that we call <strong>Atomic Protocol Questions</strong>. We&#8217;ll explain what they are, why we think they&#8217;re a promising approach, and how you can contribute.</p><div><hr></div><p><em><strong>Join us at the next <a href="https://discord.com/channels/1082444651946049567/1327337414175490160">Special Interest Group in Formal Protocol Theory</a> (SIGFPT) call in Discord on March 6 if this idea interests you.</strong></em></p><div><hr></div><h3>Birds, Frogs, and Atoms</h3><p>The physicist Freeman Dyson, in his 2009 Einstein Lecture given to the American Mathematical Society, divided mathematicians into two species: <em>birds </em>and <em>frogs</em>.</p><p><em>&#8220;<strong>Birds</strong> fly high in the air and survey broad vistas of mathematics out to the far horizon. They delight in concepts that unify our thinking and bring together diverse problems from different parts of the landscape. <strong>Frogs</strong> live in the mud below and see only the flowers that grow nearby. They delight in the details of particular objects, and they solve problems one at a time.&#8221;</em></p><p>Fields Medalist Timothy Gowers, riffing on the famous &#8220;Two Cultures&#8221; divide between academics in science and the humanities, similarly drew a distinction among mathematicians between <em>theory-builders </em>and <em>problem-solvers.</em></p><p>Setting aside the apparently common impulse to bisect mathematicians, both reached the rather common-sense conclusion that a healthy intellectual climate requires individuals of both temperaments, for each complements and builds on the other. In Dyson&#8217;s words:</p><p><em>&#8220;Mathematics is rich and beautiful because birds give it broad visions and frogs give it intricate details. Mathematics is both great art and important science, because it combines generality of concepts with depth of structures.&#8221;</em></p><p>It seems quite natural to think that <em>theorizing protocolization</em> would entail primarily a <em>theory-building</em> approach. One might envision, for example, articulating an abstract general notion of a Protocol, audition or invent various formal systems in search of one that best captures it, and then set about applying that framework to protocols out in the real world. In fact, this has been the character of most of SIGFPT&#8217;s pathfinding investigations thus far, and will likely always form a major track of study; there is immense value in creatively bringing diverse domain knowledge to bear on shared formal questions.</p><p>But it also comes with several challenges, largely due to the difficulty of enumerating in advance a set of <em>necessary and sufficient</em> features of a successful formal modeling framework to this domain. Protocols are unusually resistant to analysis through any single descriptive lens. Even when a formalism is expressive enough in principle, it is often unclear how to apply it across domains without either flattening the phenomena that matter or rebuilding large amounts of domain knowledge inside the model itself. Several of the SIG&#8217;s early discussions revolved around issues of this nature.</p><p>Therefore, as a complement to the top-down, avian theory-building, we&#8217;ve introduced a research track for bottom-up, froggish theorization: enumerating small, well-scoped research questions about specific protocolized contexts: Atomic Protocol Questions (APQ).</p><p>The spiritual forebear of the APQ is David Hilbert&#8217;s famous list of 23 unsolved problems presented at the 1900 International Congress of Mathematicians in Paris. Hilbert&#8217;s problems ranged across the foundations of mathematics, number theory, algebra, and geometry, and came to define much of the research agenda for twentieth-century mathematics. In several cases, individual problems motivated new branches of mathematics entirely: his second problem, on the consistency of arithmetic, led to G&#246;del&#8217;s incompleteness theorems and the field of proof theory; his tenth, on solving Diophantine equations algorithmically, was eventually resolved through computability theory. In this vein, our ultimate goal is to pose and then attack a set of open questions that captures protocol studies in both conceptual and disciplinary breadth.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://protocolized.summerofprotocols.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://protocolized.summerofprotocols.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h3>Subatomic Particles</h3><p>&#8220;Atomic&#8221; is meant in several senses:</p><ul><li><p><strong>Self-Contained</strong>: Each problem is intelligible and evaluable on its own, without requiring deep background in other APQs or specialized disciplines.</p></li><li><p><strong>Indivisible</strong>: Each problem is framed at the lowest level of abstraction needed for its bearing on protocol studies &#8211; not decomposable into simpler protocol questions.</p></li><li><p><strong>Heterogeneous: </strong>The problems collectively span a wide variety of subject matters, disciplines, and scales to avoid overfitting to a small set of favored contexts.</p></li><li><p><strong>Representative</strong>: The problems collectively cover as many dimensions of protocolization as we can identify&#8212; learnability, evolvability, <a href="https://protocolized.summerofprotocols.com/p/one-tension-to-rule-them-all">tensions</a>, coordination costs, and many more.</p></li></ul><p>The first two properties make each APQ tractable in isolation. The second two ensure the collection functions as more than a grab-bag of puzzles &#8211; it becomes a map of the protocol landscape.</p><p>Each APQ has three essential constituents: an <strong>empirical context</strong> (a real-life, observable protocolized system), a<strong> key dimension</strong> of protocolization (a theoretically significant concept or aspect of protocolized systems), and a sufficiently precise <strong>research question</strong> (crisp enough to admit evaluable answers). Moreover, answering it should require one not simply to lean on the prior research of the particular field in which it originated, but to say something new about it <em>qua</em> protocol, and thereby demonstrate the value of this unique perspective.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NZQw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1127e4a-5a70-4c51-b542-581dbfcfef71_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NZQw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1127e4a-5a70-4c51-b542-581dbfcfef71_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!NZQw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1127e4a-5a70-4c51-b542-581dbfcfef71_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!NZQw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1127e4a-5a70-4c51-b542-581dbfcfef71_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!NZQw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1127e4a-5a70-4c51-b542-581dbfcfef71_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NZQw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1127e4a-5a70-4c51-b542-581dbfcfef71_1024x1024.png" width="500" height="500" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c1127e4a-5a70-4c51-b542-581dbfcfef71_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:500,&quot;bytes&quot;:302032,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/189904608?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1127e4a-5a70-4c51-b542-581dbfcfef71_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NZQw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1127e4a-5a70-4c51-b542-581dbfcfef71_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!NZQw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1127e4a-5a70-4c51-b542-581dbfcfef71_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!NZQw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1127e4a-5a70-4c51-b542-581dbfcfef71_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!NZQw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1127e4a-5a70-4c51-b542-581dbfcfef71_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>Keeping Apart</h3><p>Consider a familiar urban frustration: bus bunching. Buses, of course, are meant to adhere to a consistent schedule with a regular interval between arrivals (ideally both at once). In real life, buses tend to cluster together because of compounding delays: a delayed bus will arrive at a stop with more passengers waiting to board, who then take more time to board, delaying the arrival at the next stop, and so on. The trailing bus, meanwhile, will be in the opposite situation, picking up fewer passengers until eventually it catches up to the first. This problem, called &#8220;bus bunching&#8221; is a well-studied positive feedback loop.</p><p>It&#8217;s also a protocol problem. The issue isn&#8217;t what technology buses should use, but what <em>rules</em> should govern their coordination behavior. There are a number of common approaches to the overall problem, but the most basic interventions are to disrupt the feedback loop by making buses that are &#8220;ahead&#8221; wait at stops longer, have delayed buses skip stops, or have trailing buses overtake leading buses. The optimization objective is not necessarily a given &#8211; one can prioritize <em>schedule adherence</em>, for example, which tends to work best in lower-frequency routes where travelers plan based on the timetable, or optimize for <em>headway</em> between adjacent buses which tends to produce better outcomes on high-frequency routes where passengers arrive randomly. In practice, it is likely that a system in a realistic urban context would need to combine several strategies to flexibly manage the various causes of bunching.</p><p>Recent work has focused on dynamic control designs that integrate real-time information on various contributors to bunching and make adjustments automatically. For example, reinforcement learning systems trained in simulation can develop policies that dynamically adjust, such as holding times based on traffic conditions and demand, outperforming more conventional analytical or optimization-based methods. Separate lines of research approach the issue from the <em>demand </em>side, providing information to passengers about current wait times and bus congestion, in the hope that some passengers will make the decision to wait for a less crowded bus. Perhaps more drastically, real-time data can be used to update the <em>bus schedule itself</em> dynamically, with the obvious drawback of making the system less legible to would-be passengers.</p><p>The progressive integration of dynamic information and automation raises several interrelated issues with the relationship between these systems and the humans who participate in them &#8211; as drivers, dispatchers, or passengers. It turns out that deployment of real-time systems are hindered by various meatspace practicalities that are not typically modeled in simulation. One factor is variation among drivers, who each drive a bit differently, and in particular have different propensities to comply with the holding control guidance. This is double-edged: naive non-compliance tends to degrade the effectiveness of the overall fleet control, but human operators might also be able to react to conditions that are not easily observed through the data pipeline, due to cost or difficulty. Similarly, exposing information to passengers indeed allows them to make informed decisions about which bus to board, but there is a reflexivity problem; passengers may end up inadvertently coordinating so as to cause crowding on the previously-empty trailing buses!</p><p>The APQ approach attempts to sharpen such concerns into more tractable research questions about protocols:</p><ul><li><p><em>What operational discretion should a dynamic bus dispatch protocol preserve for human agents? When does human judgment improve versus degrade the protocol&#8217;s coordination performance?</em></p></li><li><p><em>What non-invasive data sources can capture sources of user heterogeneity that influence demand?</em></p></li><li><p><em>What ludic elements for drivers and passengers encourage aligned participation in the protocol?</em></p></li></ul><p>Each of these examples is meant to conform to the APQ specification. The <strong>empirical context </strong>and <strong>research question </strong>aspects are obvious, but more subtly each question is targeted towards the intersection of current research on bus bunching and ideas of interest in protocol studies (<strong>key dimensions)</strong>. The first question bears on concepts such as <em>stewardability, invisibility, and legibility. </em>How much can and should participants steer a protocol? In what ways must it be limited? When is active awareness of, and intervention into, protocols helpful or hindering? The second is a question of <em>constraint</em> and <em>observability</em>, from the system&#8217;s perspective. Can we improve the responsiveness and dynamism of protocols without overreaching or creating protocol failure surfaces and vulnerabilities? The third is <em>ludicity</em>, that is, how to support the protocol&#8217;s functioning and legitimacy via game-like and strategic elements.</p><p>The questions are also deliberately posed at a moderate level of abstraction. Protocol Studies is not, at present, suited to admit capital-P Problems that are well-posed in the sense that is typically expected in formal mathematics or other formally rigorous disciplines. On the other hand, it is not so broad (&#8220;What&#8217;s the best bus system?&#8221;) as to render any attempt at an answer indeterminate. It is also agnostic to the specific academic lineage or technical tools that one may use in subsequent research. Bus bunching itself ties together research in, at a minimum, control theory, urban planning, operations research, economics, and machine learning. A good APQ should invite a variety of possible approaches from a variety of possible perspectives. This diversity both within and between questions is in fact a load-bearing feature of APQs envisioned as an overarching research program.</p><div><hr></div><h3>Jumping Together</h3><p>The key wager behind the FPT effort is that &#8220;protocols,&#8221; over and above a striking set of terminological convergences, are something like what the philosophy of science calls a &#8220;<a href="https://plato.stanford.edu/archives/spr2018/entries/natural-kinds/">kind</a>&#8221;, or at the very least, exhibit the sort of structural unity that licenses productive cross-domain theorizing. We are not merely asserting that protocols are important but conjecturing something formally unified beneath the surface diversity. The APQ project operationalizes this with a sort of wisdom-of-the-crowds logic applied to <em><a href="https://en.wikipedia.org/wiki/Consilience">consilience</a> </em>&#8211; a &#8220;jumping together&#8221; of independent streams of evidence to a unified explanatory framework across disciplines. APQs are an attempt to enable such convergence in protocol studies.</p><p>Individually, questions are designed to encourage concrete, independent investigations into pressing practical issues in technology and society. An APQ is falsifiable in the sense that it shifts debate from abstract questions about which formalism(s) might comprise the &#8220;right&#8221; foundation to empirical and technical questions about fit: what traction does each provide on this concrete question, and what are its limitations?</p><p>In aggregate, the APQs must be sufficiently diverse to span the conceptual space of protocol studies across their constituent contexts and dimensions. The hope is that though approaches to different problems may initially appear disparate, the character of their solutions will reveal similarities and differences that interfere constructively or destructively. When multiple formalisms attack the same underlying phenomena, their idiosyncratic commitments tend to wash out, while shared structure is reinforced.</p><p>APQs, then, enable comparison at two levels. Within a single problem, multiple formalisms can be evaluated adversarially. Across problems, the more telling comparison emerges: do solutions to different APQs sharing a protocol dimension reveal common structure? If &#8220;evolvability&#8221; means something formally similar whether we&#8217;re studying bus networks or robot swarms &#8211; despite different researchers, methods, and vocabularies &#8211; that&#8217;s evidence the dimension names something real.</p><p>The history of science is rich with examples of consilience, when it works. One such example is the notion of computability<strong>. </strong>In the 1930s, mathematicians from around the world invented precise, independent definitions of what it means to be computable. Alan Turing developed abstract machines. Alonzo Church created the lambda calculus. Stephen Kleene formalized recursive functions. Emil Post devised production systems. They each worked from different starting points with different motivations, often unaware of each other&#8217;s efforts. All four formalisms turned out to define exactly the same class of functions. This striking convergence &#8211; proven rapidly once the systems were compared &#8211; is substantial evidence that &#8220;computable&#8221; captures something true about the underlying nature of reality.</p><p>Or consider entropy. Carnot&#8217;s 1824 question about engine efficiency was purely practical &#8211; &#8220;What&#8217;s the best a heat engine can do?&#8221; This led to Clausius&#8217;s thermodynamic formulation, then Boltzmann&#8217;s statistical interpretation decades later. Yet they proved mathematically equivalent for macroscopic systems at equilibrium &#8211; evidence that entropy named something real.</p><p>In both examples, specific problems came first and the unifying concept emerged from comparison. Neither Carnot nor Turing were attempting to architect entropy or computability from first principles. Carnot was trying to understand engines. Turing was trying to answer the Entscheidungsproblem. The generality emerged from specificity. This is one aspect of the symbiotic dance between frog and bird.</p><p>In these cases, of course, this convergence was also uncoordinated &#8211; researchers weren&#8217;t necessarily comparing notes. APQs are a bit different: a deliberate invitation for multiple formalisms to attack shared problems. Convergence here wouldn&#8217;t inherently prove that protocol as a concept &#8220;carves nature at its joints&#8221;, but it would demonstrate something nearly as valuable: that the abstraction does productive, non-redundant work across domains that previously had no common vocabulary.</p><div><hr></div><h3>Convergence Not Guaranteed</h3><p>Of course, this all assumes that there is some sort of <em>kind</em> upon which methods can converge in the first place. The history of science also shows that that is not necessarily the case, either. Cybernetics and the complexity science of the Santa Fe Institute, for example, are two intellectual movements that share affinities with protocol studies. The cyberneticists generated fundamental insights into what would become control theory, information theory, and artificial intelligence, but did not achieve their goal of unifying the behavior of all goal-oriented systems. Complexity science has made enormously productive contributions through agent-based modeling, network analysis, and related methods, yet cannot really be said to have converged on a formally precise definition of complexity itself.</p><p>This is not a particular criticism of those programs&#8217; approach or, say, bird-to-frog ratio. We can&#8217;t know whether different approaches would have or will someday yet yield some more unified frame. They&#8217;re simply reminders that convergence isn&#8217;t guaranteed, even with world-class talent, real research traction, and genuinely promising phenomena. Importantly, even without achieving some kind of &#8220;grand unification,&#8221; both lines of research produced lasting value, impact, and influence on later technical thinkers.</p><p>Perhaps, after all, &#8220;protocol&#8221; is more useful for pointing at phenomena than predicting or engineering them. We should find that out too. APQs are designed so that even if convergence doesn&#8217;t come, we&#8217;ll have produced something worthwhile: well-posed problems, cross-disciplinary vocabulary, and concrete progress on specific systems. But we believe that if there is indeed a fruitful underlying logic of protocols waiting to be unearthed, this direction will bring us closer to doing so.</p><div><hr></div><h3>Join Us in the Mud</h3><p>That&#8217;s all well and good, but how does one actually create an Atomic Protocol Question? A great place to start is Protocol Watching. Once you learn to see protocols, you will find them in every corner of our modern world: your airplane boarding group? Your daughter&#8217;s LEGO set? Your laptop&#8217;s charging cable? Each offers a myriad of protocol puzzles waiting to be honed into an APQ. <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Timber Stinson-Schroff&quot;,&quot;id&quot;:17195021,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/de5b15ba-b05d-4c8b-99f4-82f4268c69e9_1179x1179.jpeg&quot;,&quot;uuid&quot;:&quot;2ce3647c-6186-4428-8349-1b1d1c499c89&quot;}" data-component-name="MentionToDOM"></span> offers <a href="https://protocolized.summerofprotocols.com/p/how-to-protocol-watch">a handy guide</a>, complete with tools and tips to help you get started.</p><p>You might also seek the guidance of the LLMs. In addition to the human audience, this essay also functions as a piece of <em><a href="https://protocolized.summerofprotocols.com/p/from-destination-ai-to-intelligence">intelligence media</a></em> to provide a specification of Atomic Protocol Questions for ingestion into your model of choice. Armed thusly with your <a href="https://medlab.host/bicorder/">protocol bicorder</a>, you&#8217;ll have the elements to contribute to our project well in hand, no matter your technical background.</p><p>David Hilbert perceived clearly that the articulation of a problem itself is a generative act of taste. More than a list, his problems were a challenge and invitation to a global network of talented researchers to participate in an ambitious collective research program. As Dyson observed,</p><p><em> &#8220;Hilbert himself was a bird, flying high over the whole territory of mathematics, but he addressed his problems to the frogs who would solve them one at a time.&#8221;</em></p><p>In this spirit, be you bird, frog, hedgehog, or fox, we encourage you to join SIGFPT and help expand, refine, and prune the APQ set. Bring a problem you know well &#8211; from your domain, your city, your organization, your frustrations &#8211; sharpen it into an atomic question, and let it enter the comparative surface. Problems shape the future of research programs, and, eventually, entire fields. In helping to pose and attack APQs, you can help set the agenda for ours &#8211; perhaps for years to come.</p>]]></content:encoded></item><item><title><![CDATA[Casio: Adequate Enough to Rule the World]]></title><description><![CDATA[How a cheap plastic watch became a landmark in the world of sci-fi, geopolitics and terror &#8211; and what it might mean for contemporary consumer gadgets.]]></description><link>https://protocolized.summerofprotocols.com/p/black-resin-mirrors-and-the-adequacy</link><guid isPermaLink="false">https://protocolized.summerofprotocols.com/p/black-resin-mirrors-and-the-adequacy</guid><dc:creator><![CDATA[Timber Stinson-Schroff]]></dc:creator><pubDate>Wed, 28 Jan 2026 18:12:13 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/7cbea981-d55a-483e-b820-666792cd8f34_1200x801.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I&#8217;m wearing a Casio F-91W right now. It cost me about $14 CAD and has brought me immeasurable joy. My aussiedoodle uses it as a part-time chew toy. It&#8217;s frozen down to -40&#186; on an expedition and cooked at over 200&#186; in a sauna. It looks even better since I repaired it with a zip tie.</p><p>Recently, I discovered the deep lore of this watch. And I&#8217;m now convinced that it holds its own against wrists sporting Rolexes, Audemars Piguets, and Patek Philippes. What it lacks in sophistication, the Casio F-91W makes up for in its <em>unreasonable adequacy</em>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!t-2m!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d24098e-a20c-49ce-8123-27e4bc41c6fb_1200x1200.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!t-2m!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d24098e-a20c-49ce-8123-27e4bc41c6fb_1200x1200.png 424w, https://substackcdn.com/image/fetch/$s_!t-2m!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d24098e-a20c-49ce-8123-27e4bc41c6fb_1200x1200.png 848w, https://substackcdn.com/image/fetch/$s_!t-2m!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d24098e-a20c-49ce-8123-27e4bc41c6fb_1200x1200.png 1272w, https://substackcdn.com/image/fetch/$s_!t-2m!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d24098e-a20c-49ce-8123-27e4bc41c6fb_1200x1200.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!t-2m!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d24098e-a20c-49ce-8123-27e4bc41c6fb_1200x1200.png" width="500" height="500" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5d24098e-a20c-49ce-8123-27e4bc41c6fb_1200x1200.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1200,&quot;width&quot;:1200,&quot;resizeWidth&quot;:500,&quot;bytes&quot;:1700753,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/186086220?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d24098e-a20c-49ce-8123-27e4bc41c6fb_1200x1200.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!t-2m!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d24098e-a20c-49ce-8123-27e4bc41c6fb_1200x1200.png 424w, https://substackcdn.com/image/fetch/$s_!t-2m!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d24098e-a20c-49ce-8123-27e4bc41c6fb_1200x1200.png 848w, https://substackcdn.com/image/fetch/$s_!t-2m!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d24098e-a20c-49ce-8123-27e4bc41c6fb_1200x1200.png 1272w, https://substackcdn.com/image/fetch/$s_!t-2m!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d24098e-a20c-49ce-8123-27e4bc41c6fb_1200x1200.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>What do I mean by that? Obviously, the thing is quasi-indestructible. It&#8217;s also cheap, reliable and ubiquitous. As far as a timepiece goes, it&#8217;s a Maslowian choice. The F-91W meets all of one&#8217;s basic timekeeping needs. For that reason, it&#8217;s been worn by precocious schoolkids and global figures alike: Barack Obama, Captain Ripley in the movie <em>Alien</em> and, notoriously, Osama bin Laden.</p><p>One of the reasons that this watch became so widely associated with terrorism is that it has indeed been used as a timer in improvised explosive devices. A leaked document showed that U.S. government interrogators regarded the F-91W as a telltale sign that a detainee was associated with terrorist operations. Ironically, many American servicepeople rely on the same watch.</p><p>But why is it such a common choice among militant groups?</p><ol><li><p>It&#8217;s adequate. Utility (alarm, stopwatch, waterproof robustness) at minimal price.</p></li><li><p>It&#8217;s ubiquitous. Global popularity means it&#8217;s easy to replace.</p></li><li><p>It&#8217;s uniform. The watch&#8217;s design has remained virtually unchanged for decades.</p></li></ol><p>One of the big ideas that emerged from the Summer of Protocols research program is that protocols are <em><a href="https://summerofprotocols.com/research/module-two/the-unreasonable-sufficiency-of-protocols">unreasonably sufficient</a></em>. The story of the F-91W is a curious one. A single watch isn&#8217;t a protocol, but it <em>is</em> unreasonably sufficient. That made it the world&#8217;s most popular watch, transforming a quintessential consumer gadget into a piece of the planetary landscape, neutral and equally available for use by good and bad actors.</p><h2>The Adequacy Thesis</h2><p>Through the popularity of this watch, Casio created a global supply chain of time. It&#8217;s a system that anyone can tap into from virtually anywhere in the world. </p><p>It&#8217;s also a clear embodiment of Gall&#8217;s Law: &#8220;A complex system that works is invariably found to have evolved from a simple system that worked&#8221;. </p><p>In spirit, that&#8217;s a great quote. But if I could tweak it slightly, I&#8217;d replace the second &#8216;system&#8217; for &#8216;thing&#8217; because the initial kernel is usually not best understood as a system. Sorry, systems thinkers&#8212;a watch is a watch.</p><p>There&#8217;s something rather interesting about how many of the most consequential technologies (shipping containers, email, the Toyota Hilux, vaccines, etc.) tend to be the adequate ones, not the sophisticated ones. I have a thesis that Gall&#8217;s Law exists because popularity provides one of the rare, legitimate excuses to complicate things. And because sophistication has such high opportunity costs, it&#8217;s antithetical to popularity, especially in the long run.</p><p>Occasionally, those opportunity costs are worth paying. In the context of navigation or aerospace, precision timekeeping is a must. The Artemis III space mission aims to be the first crewed lunar landing since Apollo 17 in 1972. Such a complicated operation cannot afford to run on the stainless steel caseback of a F-91W, which can gain +/-1 second per month. That&#8217;s easily enough to make a very expensive&#8212;if not deadly&#8212;miscalculation.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BfyG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F399fc4ef-fd25-4980-88ce-d174caa74dae_4696x1998.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BfyG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F399fc4ef-fd25-4980-88ce-d174caa74dae_4696x1998.jpeg 424w, https://substackcdn.com/image/fetch/$s_!BfyG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F399fc4ef-fd25-4980-88ce-d174caa74dae_4696x1998.jpeg 848w, https://substackcdn.com/image/fetch/$s_!BfyG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F399fc4ef-fd25-4980-88ce-d174caa74dae_4696x1998.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!BfyG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F399fc4ef-fd25-4980-88ce-d174caa74dae_4696x1998.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BfyG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F399fc4ef-fd25-4980-88ce-d174caa74dae_4696x1998.jpeg" width="1456" height="619" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/399fc4ef-fd25-4980-88ce-d174caa74dae_4696x1998.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:619,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!BfyG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F399fc4ef-fd25-4980-88ce-d174caa74dae_4696x1998.jpeg 424w, https://substackcdn.com/image/fetch/$s_!BfyG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F399fc4ef-fd25-4980-88ce-d174caa74dae_4696x1998.jpeg 848w, https://substackcdn.com/image/fetch/$s_!BfyG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F399fc4ef-fd25-4980-88ce-d174caa74dae_4696x1998.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!BfyG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F399fc4ef-fd25-4980-88ce-d174caa74dae_4696x1998.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Designed by Ry&#363;suke Moriai &#8211; his first project at Casio &#8211; the F-91W was conceived to be small, flat and simple.</figcaption></figure></div><p>Many of civilization&#8217;s most important operations depend on clocks. Swiss watches, famously, emerged to meet the demand for precise train timetables in Europe. But there are wide variety of clocks, all created to enable the reliable repetition of critical activities&#8230; like averting disaster.</p><h2>Protocol-as-Clock</h2><p>This week, the Doomsday Clock has ticked its way to 85 seconds from midnight and I&#8217;ve been thinking a lot about clocks &#8211; from my tough little Casio to the ability of blockchains to introduce good friction into the world. Because protocols sequence events, they impose specific temporal orders, whether through clocks or rhythms.</p><p>When two friends attempt to call each other at the same time, sometimes the line will appear as busy. They&#8217;ll both (probably) wait a few seconds or minutes before trying again. There isn&#8217;t a widely agreed upon amount of time to wait, and that&#8217;s why it works. </p><p>TCP/IP, the protocol suite that makes the internet possible, shapes time through rhythm. That makes it a clock in its own right, since it&#8217;s not relying on an external timekeeping device. TCP/IP forces computers to &#8220;shake hands&#8221; in a certain sequence, otherwise information won&#8217;t make it from device to device. </p><p>During last year&#8217;s <a href="https://summerofprotocols.com/protocol-school-open-access">Protocol School</a>, composer Ben Zucker taught a course titled <a href="https://www.youtube.com/watch?v=ve0oe09LhI0&amp;list=PLIk0EtKZjVlv8VMGoIrENsV_LP-bdr_28&amp;index=5">Musicalization not Music</a>. Because protocols sequence how we do things and communicate, there is an inherent musicality to their design. </p><p>I&#8217;ve repeatedly joked with Ben that the TSA should hire him as a consultant to improve the choreography of their security lines. (Seriously, though.)</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://protocolized.summerofprotocols.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://protocolized.summerofprotocols.com/subscribe?"><span>Subscribe now</span></a></p><h2>Time to Think</h2><p>New technologies promise to affect how we think about time. Some also share the unreasonable adequacy of the Casio F-91W and promise to become a planetary landmark. </p><p>LLMs and AI tools are powerful. They&#8217;re used everywhere, all the time, by everyone, all at once. Just like the world&#8217;s most popular watch, the availability and affordability of these tools is accelerating their diffusion. Not all actors, obviously, will use them in prosocial ways. Policing use will be difficult because of the ubiquity of AI tools; certain versions, like LLMs that can run locally on a device and can&#8217;t be nerfed with a cloud update, might become associated with bad actors as a result of negative events.</p><p>However, there are differences. The capabilities of LLMs are far more complicated than any wristwatch. Many software tools can be patched or updated live, regardless of where their users are. The underlying information architectures are still evolving. </p><p>Working with AI gives one a sense that time is accelerating, whereas wearing a Casio (or working with blockchains) makes one feel like life is simply marching along. </p><p>AI-assisted teams and AI agents can rapidly become out of sync with supply chains. Blockchains are inexorable clocks that provide a foundation for coordination problems like establishing contracts or rules for marketplaces. </p><p><strong>New technologies are creating a battle over time.</strong> </p><p>The Summer of Protocols <a href="https://summerofprotocols.com/">research program</a> and its community have published some great work on time that you might enjoy:</p><ul><li><p><a href="https://protocolized.summerofprotocols.com/p/finding-fault-lines-within-the-firm">Finding Fault Lines Within the Firm</a> by <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;rafa&quot;,&quot;id&quot;:2227765,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/477725d7-0c1b-48c8-9d66-bbd3ec3fbb6e_907x907.jpeg&quot;,&quot;uuid&quot;:&quot;96086633-1fe1-4abf-ba10-7f78ffc57c85&quot;}" data-component-name="MentionToDOM"></span> </p></li><li><p><a href="https://summerofprotocols.com/research/control-and-consciousness-of-time">Control and Consciousness of Time</a> by <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;saffron huang&quot;,&quot;id&quot;:3624433,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3c9af1ab-0122-4457-8321-f90da0c74fef_1120x1122.jpeg&quot;,&quot;uuid&quot;:&quot;3a70eb60-6b6d-4432-be60-f82c9607c2da&quot;}" data-component-name="MentionToDOM"></span> </p></li><li><p><a href="https://summerofprotocols.com/research/protocols-in-emergency-time">Protocols in Emergency Time</a> by Olivia Steiert</p></li><li><p><a href="https://summerofprotocols.com/research/new-time-machines">New Time Machines</a> by Aaron Lewis, <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Kei Kreutler&quot;,&quot;id&quot;:111565805,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/07ba8ce1-9c72-4f42-8279-1abc7c38cb63_1100x1100.png&quot;,&quot;uuid&quot;:&quot;47744436-f798-4f4a-a0da-2821dcad0d9b&quot;}" data-component-name="MentionToDOM"></span>, Alice Noujaim, Nahee Kim, and <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Spencer Chang&quot;,&quot;id&quot;:3363406,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/f03fdd99-399f-41da-ae8b-5664287133d7_2973x3236.jpeg&quot;,&quot;uuid&quot;:&quot;ad05c791-1f0b-47ed-bd1a-ace0224f1cd0&quot;}" data-component-name="MentionToDOM"></span> </p></li><li><p><a href="https://www.youtube.com/watch?v=ZcnI_ErQoV8&amp;list=PLIk0EtKZjVlsZ2BQDzA0-TIOMulYoVuC8&amp;index=7">Fire Protocols &amp; Attention as Autopoietic Space</a> by <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Nathalia Scherer&quot;,&quot;id&quot;:3889179,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fede27cd9-c71f-4bc7-82d1-5ceec26c0f67_681x681.jpeg&quot;,&quot;uuid&quot;:&quot;9372eabc-58d4-4cd5-94ca-bd951e27c5c6&quot;}" data-component-name="MentionToDOM"></span> and <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Jiordi Rosales&quot;,&quot;id&quot;:12621776,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6b1f3a68-9808-4827-b178-33041edc74ce_1179x786.jpeg&quot;,&quot;uuid&quot;:&quot;0d595bc1-428f-4562-b98d-ed1881dcab51&quot;}" data-component-name="MentionToDOM"></span> </p></li></ul>]]></content:encoded></item><item><title><![CDATA[The Color of Safety]]></title><description><![CDATA[From Birren to OSHA, in reality and on-screen, how does pigment play a role in protecting workers from harm and making mistakes?]]></description><link>https://protocolized.summerofprotocols.com/p/the-color-of-safety</link><guid isPermaLink="false">https://protocolized.summerofprotocols.com/p/the-color-of-safety</guid><dc:creator><![CDATA[Venkatesh Rao]]></dc:creator><pubDate>Mon, 19 Jan 2026 19:40:14 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Qb2F!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81fb652a-14cc-4635-bef6-4fdcbe3a418f_1800x1200.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>A few weeks ago, I got nerdsniped by a <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Beth Mathews&quot;,&quot;id&quot;:75472863,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b1be69bd-c1d5-4f69-8425-ad9b1ffdd982_1310x1310.png&quot;,&quot;uuid&quot;:&quot;3709ba8a-ab06-4ef3-9ab6-6b441daf9817&quot;}" data-component-name="MentionToDOM"></span> essay, <a href="https://bethmathews.substack.com/p/why-so-many-control-rooms-were-seafoam">Why So Many Control Rooms Were Seafoam Green</a>. It introduced me to <a href="https://mag.uchicago.edu/arts-humanities/shades-meaning">the story of Faber Birren</a>, responsible for the characteristic color schemes we associate with mid-century industrial interiors. More generally, Birren pioneered the use of color as a design and control variable shaping everything from consumer buying behaviors to emergency response behaviors. </p><p>Color is especially interesting as an element of Protocol Experience (PX) design, since humans are especially sensitive to color. And color, especially in the form of paint, is a cheap design variable, ideal for persistent, configurational uses. You don&#8217;t need electricity to generate a default color scheme. Ambient broad-spectrum illumination (natural or artificial) is enough. And when you <em>do</em> use powered color for dynamic signaling, it is still robust and inexpensive to generate, especially today, with the rise of low-power LED lighting and screens.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://protocolized.summerofprotocols.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://protocolized.summerofprotocols.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h3>Color and Control</h3><p>Reading Mathews&#8217; article, as a sometime practicing control engineer, I was struck by the realization that though I&#8217;ve spent a lot of time thinking about command and control architectures, systems, and protocols, including control rooms, I&#8217;ve never thought about <em>color </em>as a particularly important consideration in control engineering, either in theory, or practice. </p><p>I&#8217;d never noticed that mid-century control rooms have a characteristic sea-foam green color.</p><p>When I&#8217;ve designed things like dashboards, color has been an afterthought, and I&#8217;ve usually done something lazy like code &#8220;significant&#8221; as &#8220;red.&#8221;</p><p>Yet, color is obviously one of the most powerful design elements available to control system engineers and protocol architects, especially when it comes to human-in-the-loop environments. But engineers don&#8217;t study it. Textbooks don&#8217;t teach color science. Even history books like David Mindell&#8217;s excellent <em><a href="https://sts-program.mit.edu/book/human-machine-feedback-control-computing-cybernetics/">Between Human and Machine: Feedback, Control, and Computing</a>, </em>don&#8217;t cover the role of color in command and control.</p><p>One reason of course is that color is not easy to use in automated feedback loops, and other kinds of signals are much easier to work with. Detecting and reacting to color-coded signals typically takes cameras attached to significant computing power. In control design, it is much easier to work with electrical or mechanical signals from more specialized sensors. </p><p>But when there are humans in the loop, color is a natural and cheap signaling variable. It still doesn&#8217;t play a big role though.</p><p>The reason is that the <em>human</em>-centeredness of color leads to its neglect in control engineering. Humans, unlike op-amps or microcontrollers, are flaky, temperamental, and unreliable engineering components. Components of last resort when architecting for reliability. </p><p>When humans <em>must</em> be integrated into a protocol that generates reliably repeatable behavior, it takes significant investment in training to get them to behave in sufficiently machinic ways. We had to invent an entire subculture of &#8220;professionalism&#8221;<em> </em>to teach and sustain reliable human behavior. And even then, color is never <em>just </em>functional for humans. It is invariably also an element of aesthetic experience, psychological comfort, and narrative commitment. In control engineering terms, color is an exceptionally noisy signal when processed by human brains.</p><p>So it makes sense that control engineers and protocol architects largely washed their hands of color, and learned to work around it. It became the preserve of designers and psychologists.</p><div><hr></div><h3>Palettes and Protocols</h3><p>The Birren palette was designed to be a functional color-coding language for safety-first interiors, and meant to be comfortable to inhabit for extended working hours. It was the 1950s visual equivalent of elevator music plus the dings/bells/alarm sounds an elevator is capable of producing. </p><p>In 2025 though, Birren-colored interiors evoke mid-century nostalgia. The Birren palette has unavoidable aesthetic-narrative connotations today that were likely never intended. It is the palette of Golden Age science fiction. Of Competent Men doing Professional Things.</p><p>This is <em>not </em>what industrial interiors of more recent construction look like though (hence the nostalgic appeal of the Birren palette). And it turns out there&#8217;s a fascinating story there about how the relationship between color and industrial safety has evolved, which I was able to unpack with help from ChatGPT. </p><p>That&#8217;s not what I set out to do though. I started out simply wanting to make some nostalgia-aesthetic digital art using the Birren color palette, with a view to possibly training an image model on it with <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;TITLES&quot;,&quot;id&quot;:379184269,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1688349e-814b-4746-86ca-7595e54bd5e3_6249x6249.png&quot;,&quot;uuid&quot;:&quot;c499af79-d1ca-4082-9324-32f303231771&quot;}" data-component-name="MentionToDOM"></span>. Here is my first attempt. I aim to make about 30 such paintings, and then train a model I&#8217;ll name Birren. This one is a sort of abstract industrial interior where a Birren-palette foreground partially masks lurking fire risks.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Qb2F!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81fb652a-14cc-4635-bef6-4fdcbe3a418f_1800x1200.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Qb2F!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81fb652a-14cc-4635-bef6-4fdcbe3a418f_1800x1200.png 424w, https://substackcdn.com/image/fetch/$s_!Qb2F!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81fb652a-14cc-4635-bef6-4fdcbe3a418f_1800x1200.png 848w, https://substackcdn.com/image/fetch/$s_!Qb2F!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81fb652a-14cc-4635-bef6-4fdcbe3a418f_1800x1200.png 1272w, https://substackcdn.com/image/fetch/$s_!Qb2F!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81fb652a-14cc-4635-bef6-4fdcbe3a418f_1800x1200.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Qb2F!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81fb652a-14cc-4635-bef6-4fdcbe3a418f_1800x1200.png" width="600" height="400.1373626373626" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/81fb652a-14cc-4635-bef6-4fdcbe3a418f_1800x1200.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:600,&quot;bytes&quot;:296170,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/183273887?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81fb652a-14cc-4635-bef6-4fdcbe3a418f_1800x1200.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Qb2F!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81fb652a-14cc-4635-bef6-4fdcbe3a418f_1800x1200.png 424w, https://substackcdn.com/image/fetch/$s_!Qb2F!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81fb652a-14cc-4635-bef6-4fdcbe3a418f_1800x1200.png 848w, https://substackcdn.com/image/fetch/$s_!Qb2F!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81fb652a-14cc-4635-bef6-4fdcbe3a418f_1800x1200.png 1272w, https://substackcdn.com/image/fetch/$s_!Qb2F!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81fb652a-14cc-4635-bef6-4fdcbe3a418f_1800x1200.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I wanted a stable swatch of colors to make such paintings. So just for fun, and partly to flatter my own conceits about possessing some rusty Color Science 101 knowledge from when I started my first job at Xerox two decades ago, I began by asking ChatGPT to transform the old magazine scan from Mathews&#8217; article into an approximate color-corrected swatch for me to use in my painting program, taking into account the gamut distortions in scanning a faded old magazine article. </p><p>Here, if you&#8217;re curious, are the palette as shared by Mathews (leftmost) and the one reconstructed by ChatGPT (middle and right).</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3pQx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6f06e5c-6840-47f9-a689-a6a918a27680_1796x1014.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3pQx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6f06e5c-6840-47f9-a689-a6a918a27680_1796x1014.png 424w, https://substackcdn.com/image/fetch/$s_!3pQx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6f06e5c-6840-47f9-a689-a6a918a27680_1796x1014.png 848w, https://substackcdn.com/image/fetch/$s_!3pQx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6f06e5c-6840-47f9-a689-a6a918a27680_1796x1014.png 1272w, https://substackcdn.com/image/fetch/$s_!3pQx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6f06e5c-6840-47f9-a689-a6a918a27680_1796x1014.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3pQx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6f06e5c-6840-47f9-a689-a6a918a27680_1796x1014.png" width="1456" height="822" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a6f06e5c-6840-47f9-a689-a6a918a27680_1796x1014.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:822,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:462400,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/183273887?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6f06e5c-6840-47f9-a689-a6a918a27680_1796x1014.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3pQx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6f06e5c-6840-47f9-a689-a6a918a27680_1796x1014.png 424w, https://substackcdn.com/image/fetch/$s_!3pQx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6f06e5c-6840-47f9-a689-a6a918a27680_1796x1014.png 848w, https://substackcdn.com/image/fetch/$s_!3pQx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6f06e5c-6840-47f9-a689-a6a918a27680_1796x1014.png 1272w, https://substackcdn.com/image/fetch/$s_!3pQx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6f06e5c-6840-47f9-a689-a6a918a27680_1796x1014.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Birren palette, reconstructed from scan by ChatGPT based on historical information and assumptions. Credit Beth Mathews for the scanned image on the left.</figcaption></figure></div><p>The practical reasons for doing this are to have a uniform patch of color to sample with the dropper tool in painting programs, and to attempt to undo the color-shifting effects of scanning, printing, and aging in the scan. </p><p>As it turns out, Birren color schemes are pretty forgiving. They&#8217;re not defined with the precision of Pantone spot colors, but in terms of ranges that respect a particular visual logic and grammar. They are also designed to work within the capabilities of paints available in Birren&#8217;s era (the 1950s). For instance, fluoroscent paints, which play a big role today in the color of safety, were not available then.</p><p>In the process of making these swatches, thanks to some passing comments by ChatGPT, I discovered that there&#8217;s a lot more to the story. The entire philosophy of how to use color as part of a safety strategy has changed. The Birren-style philosophy of safety protocols has been replaced by a different one, best represented in the US by color-coding practices associated with the Occupational Safety and Health Administration (OSHA).</p><p>I had ChatGPT explain this evolution to me, and then write an essay summarizing our conversation. The next few sections were primarily written by ChatGPT, with light edits and additions by me. Comments and corrections from better-informed color scientists and industrial interior designers welcome.</p><div><hr></div><h3>The Origins of Industrial Colors</h3><p>Color in industrial and architectural space has never been merely aesthetic. It organizes attention, encodes danger, regulates bodily comfort, and quietly trains perception over time. Yet, contemporary designers rarely get an opportunity to think about these matters. They most often encounter industrial color schemes through regulatory tables and compliance charts &#8211; reds, yellows, greens assigned to predefined meanings and applied late in the design process. </p><p>This way of thinking about color is historically recent. In the mid-twentieth century, figures such as Faber Birren approached color not as a signaling layer but as a fundamental component of environmental design. The evolution from Birren&#8217;s approach to the standardized safety regimes later enforced by OSHA reflects deeper changes in psychology, materials, labor assumptions, and philosophies of risk.</p><p>Birren worked at a moment when industrial modernity had reached a form of equilibrium. Factories, offices, schools, and hospitals were places where people expected to spend years, often entire careers. His foundational assumption was that color must support sustained human presence. Color planning, in his view, was neither decorative nor symbolic in isolation. It was infrastructural. Interiors were visual systems whose brightness, contrast, and chromatic intensity had to be regulated as carefully as acoustics or lighting. A well-designed color environment would quietly reduce fatigue, increase accuracy, and make moments of danger perceptually unmistakable without constant visual noise.</p><p>Central to Birren&#8217;s thinking was the primacy of <em>value</em>, or <em>lightness</em>. He believed that the eye organizes space first by brightness before it attends to hue or saturation. As a result, Birren-style interiors followed a strict value hierarchy. Ceilings were lightest, maximizing reflected light and reducing glare. Walls were slightly darker, providing a calm, continuous field. Floors and machinery occupied middle values that grounded the space visually. Crucially, the most serious hazards and stop conditions were rendered darker still. Fire equipment, for example, was often painted in deep, low-value reds rather than bright scarlets. Darkness carried weight. It signaled seriousness and finality in a way that brightness could not.</p><p>This hierarchy was not meant to be consciously decoded. Over time, workers learned it implicitly. The environment trained perception. A glance was enough to tell what mattered, not because the colors were loud, but because they were rare and carefully positioned within an ordered field.</p><p>Birren was equally deliberate about chroma. He treated saturation as a physiological variable rather than an expressive one. Large areas of high chroma were avoided because they increased visual fatigue and rapidly lost their signaling power through habituation. Most continuously viewed surfaces were kept at low to moderate chroma, allowing the eye to rest. Higher chroma was permitted only in small, localized areas where interruption was genuinely required. In this sense, Birren&#8217;s environments relied on restraint. Color worked because it was not constantly demanding attention.</p><p>Neutral grays played an especially important role in this system. Far from being generic leftovers, grays functioned as active regulators of brightness and contrast. They reduced glare from machinery, stabilized visual fields, and framed colored elements so that those elements retained meaning. </p><p>Without gray, Birren&#8217;s system would collapse. It was the quiet scaffolding that allowed color to function precisely.</p><p>Birren&#8217;s philosophy was shaped not only by psychology but by material reality. The paints available during his career were chemically and optically limited. Fluorescent pigments did not yet exist, chroma ceilings were lower, and saturation stability over time was imperfect. Color thinking was grounded in reflectance rather than emission. The Munsell color system, with its explicit separation of hue, value, and chroma, aligned naturally with this worldview. Designers thought in terms of perceptual relationships rather than device outputs or symbolic codes. These technical constraints reinforced Birren&#8217;s emphasis on value hierarchy and chroma restraint.</p><div><hr></div><h3>From Contexts to Signals</h3><p>By the late 1960s and early 1970s, however, the social and industrial context that supported Birren&#8217;s approach began to dissolve. Workforces became more transient, automation increased, and regulatory and legal pressures intensified. Spaces were no longer designed primarily for long-term inhabitation by stable populations. Instead, they had to function for visitors, contractors, inspectors, and emergency responders who might encounter them only briefly and under stress. In this new context, color systems based on gradual perceptual learning appeared inadequate. </p><p>Additionally, the rise of automation meant color was no longer as critical, since fewer humans were persistently present in industrial interiors, and automated systems typically used signals other than color to run themselves. The retreat of color foreshadows, in some ways, the modern rise of dark industrial interiors, ranging from dark data centers to metaphorical dark kitchens. </p><p>The rise of OSHA-style safety color reflects this shift. Modern safety color treats color not as part of an environmental context but as a discrete and <em>exceptional </em>signaling system. The goal is immediate recognition rather than long-term coherence. Red means fire or stop, yellow means caution, green means safety, and blue means notice. These meanings are fixed, explicit, and standardized across industries. The system assumes distraction, cognitive load, and urgency. It is designed to function even when the surrounding environment is chaotic.</p><p>This philosophical shift is visible most clearly in how value is treated. OSHA does not define a value hierarchy. In practice, safety colors are often high in both value and chroma. Bright yellow hazard markings, vivid red fire equipment, and intense green safety signs frequently sit against white or very light walls. Multiple elements compete at similar brightness levels, flattening perceptual ranking. Where Birren used darkness to convey seriousness, OSHA uses brightness to demand attention.</p><p>Here is an example of OSHA style colors, in the form of a catalog of safety tapes of various sorts. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fp55!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4bf973f0-93c4-4d51-8aa7-bd3d66bc406e_1400x901.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fp55!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4bf973f0-93c4-4d51-8aa7-bd3d66bc406e_1400x901.png 424w, https://substackcdn.com/image/fetch/$s_!fp55!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4bf973f0-93c4-4d51-8aa7-bd3d66bc406e_1400x901.png 848w, https://substackcdn.com/image/fetch/$s_!fp55!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4bf973f0-93c4-4d51-8aa7-bd3d66bc406e_1400x901.png 1272w, https://substackcdn.com/image/fetch/$s_!fp55!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4bf973f0-93c4-4d51-8aa7-bd3d66bc406e_1400x901.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fp55!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4bf973f0-93c4-4d51-8aa7-bd3d66bc406e_1400x901.png" width="1400" height="901" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4bf973f0-93c4-4d51-8aa7-bd3d66bc406e_1400x901.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:901,&quot;width&quot;:1400,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1003002,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/183273887?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f266667-6d0c-43ef-90a1-f087191726c8_1400x901.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fp55!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4bf973f0-93c4-4d51-8aa7-bd3d66bc406e_1400x901.png 424w, https://substackcdn.com/image/fetch/$s_!fp55!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4bf973f0-93c4-4d51-8aa7-bd3d66bc406e_1400x901.png 848w, https://substackcdn.com/image/fetch/$s_!fp55!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4bf973f0-93c4-4d51-8aa7-bd3d66bc406e_1400x901.png 1272w, https://substackcdn.com/image/fetch/$s_!fp55!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4bf973f0-93c4-4d51-8aa7-bd3d66bc406e_1400x901.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Modern OSHA-style safety color philosophy. Note the use of fluorescent colors and high-gloss reflectivity, and a more explicitly &#8220;signaling&#8221; oriented foreground grammar rather than an ambient attunement grammar. Credit: <a href="https://mightylinetape.com/">mightylinetape.com</a></figcaption></figure></div><p>The widespread availability of fluorescent pigments intensified this trend. Fluorescent paints emit light as well as reflect it, making them highly visible in poor lighting and at long distances. From a signaling perspective, this is a clear advantage. From an environmental perspective, it is destabilizing. Fluorescent colors dominate surrounding surfaces, erode subtle value relationships, and accelerate visual fatigue. As more signals become bright, designers add still brighter signals, producing a cycle of escalation. The result is environments that are visually loud even when nothing is happening.</p><div><hr></div><h3>Two Philosophies of Safety (and Color)</h3><p>At a deeper level, Birren and OSHA embody two distinct theories of safety. Birren&#8217;s approach assumes that safety emerges from order. A calm, legible environment makes danger perceptually obvious because danger is rare and visually distinct. OSHA&#8217;s approach assumes that danger must be unmistakable even in disorder. Safety is achieved through explicit alarms that override context. One system relies on learned visual grammar; the other relies on categorical symbols.</p><p>Birren is about <em>high context </em>environments. OSHA is about <em>verbose signaling </em>environments.</p><p>These approaches produce markedly different experiences. Birren-style environments tend to feel coherent and calm, supporting long periods of focused work with relatively low fatigue. They work best where people have time to learn the space and internalize its logic. OSHA-dominant environments, by contrast, are optimized for immediacy. They function well for short-term occupants and emergencies but often produce visual clutter and desensitization over time. When everything is bright and urgent, urgency loses meaning.</p><p>Most contemporary industrial and institutional spaces are hybrids of these two systems. Birren-like backgrounds coexist with OSHA-style overlays. The result is often perceptual tension rather than balance. Value hierarchies are partially established and then violated. The eye receives conflicting instructions about what matters. This is why many modern interiors feel subtly exhausting even when they are technically compliant.</p><p>For design students, the lesson is not to choose Birren over OSHA or vice versa. The lesson is to recognize that color systems encode assumptions about people, time, risk, and responsibility. Before choosing colors, one must ask whether a space is meant for dwelling or for passage, whether safety is learned or instantaneous, whether fatigue or distraction is the dominant risk. Birren&#8217;s approach fails if applied uncritically today, just as OSHA&#8217;s approach fails when spread indiscriminately across entire environments.</p><p>Color is philosophy made visible. The transition from Birren&#8217;s visual ecology to OSHA&#8217;s signal saturation mirrors a broader cultural shift from spaces designed for inhabitation to systems designed for risk management. Understanding this history allows designers to use color deliberately rather than inherit it accidentally. The palette is never neutral. It expresses a theory of how people relate to space, danger, and each other.</p><div><hr></div><h3>Cameras, AI and the Return of Color</h3><p><em>Thank you ChatGPT, back to me.</em></p><p>The retreat of color that started in the 1970s has now reached its nadir in the form of dark industrial interiors, where visible-spectrum elements are largely irrelevant (<em>infrared </em>though still matters).</p><p>But there&#8217;s a counter-trend underway: the rise of AI and robotics have created a strong drive towards camera-based infrastructures, and even <em>camera-only </em>infrastructures. In robotics, for example, one school of thought holds that <em>cameras are all you need</em>. That you can even dispense with things like angle sensors or rotary encoders if you have enough cameras. In the self-driving car industry, Tesla famously holds that lidars (which rely on infrared) are unnecessary. If biological organisms can self-drive using vision alone, so can cars.</p><p>Of course, you cannot entirely eliminate all other sensors. Sound is clearly almost as important as vision even for us highly visual primates. And all mammals have the equivalent of accelerometers in their ears. So it is no surprise that phones and robots typically feature microphones and accelerometers as well. But, to a first approximation, cameras are eating the world&#8217;s sensors, and will demand a return to a more colorful world.</p><p>Cameras are surprisingly powerful sensors because almost everything that might matter for feedback in a controlled environment either <em>has</em> a natural visual component, or can be rendered visible at low cost (for example, introducing a colorant in invisible dangerous gases or clear liquids). Just as the smartphone has replaced many personal devices, the camera can replace dozens of different sensors.</p><p>The cost though, is the need for intelligence. You need an AI, or ideally, a robot to interpret and react to color (and visual fields in general).</p><p>And when color communicates <em>safety, </em>and is linked to behaviors that must unfold extremely rapidly, you have a major challenge for future designers and architects. </p><p>What should the color of safety be in the age of AI? How will be paint industrial interiors when the primary inhabitants are camera-driven intelligent machines, ranging from robots to appliance-like machines, to background smart-environment features?</p><p>The designer &#8211; or AI &#8211; who figures out the answers will enter the history books alongside Birren and his late-industrial successors.</p><div><hr></div><h3>Coda: The Color of Safety On Screen</h3><p>Since the color of safety is rarely fully visible unless there is an active emergency unfolding, and because industrial interiors are not particularly accessible anyway, it is not an easy observation target for protocol watching<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> enthusiasts.</p><p>Fortunately, it also happens to be a favored topic in screen media. It is fascinating to pay attention to the color of safety in movies and television, especially over time (obviously, this is only possible past the black and white era). </p><p>The wave of disaster movies from the early 1970s, including such cult classics as <em>The Towering Inferno </em>and <em>The Poseidon Adventure, </em>showcase Birren-like safety environments at their peak. The build-up of tension has an uneasy background-dominant vibe of terror to it. The characters seem to inhabit their environments much more mindfully. Plots seem much more atmospheric and suspenseful.</p><p>By contrast, modern disaster thrillers are much more likely to feature bright flashing lights and loud alarms &#8211; and characters who don&#8217;t really attend to their environments until things start going wrong. Thrilling foreground excitement tends to replace ominous background build-up of terror. Plots are action-packed rather than suspenseful.</p><p>As storytellers adapt to the age of AI, we can expect to see the color of safety reshape human narratives yet again. And us protocol-watchers will have a whole new crop of movies and TV shows to watch, and a new color-of-safety language to decipher.</p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Protocol Watching is a hobby we are trying to foster here at <em>Protocolized. </em>If you&#8217;re interested in joining other protocol-watching enthusiasts, <a href="https://discord.gg/tUfsTU8jZP">join our Discord and check out the #protocol-watch channel.</a></p></div></div>]]></content:encoded></item><item><title><![CDATA[Finding Fault Lines within the Firm]]></title><description><![CDATA[Disruptive AI tools present an opportunity to observe business protocols that usually remain hidden. This article shares what has been revealed so far about tensions between production and authority.]]></description><link>https://protocolized.summerofprotocols.com/p/finding-fault-lines-within-the-firm</link><guid isPermaLink="false">https://protocolized.summerofprotocols.com/p/finding-fault-lines-within-the-firm</guid><dc:creator><![CDATA[rafa]]></dc:creator><pubDate>Sun, 11 Jan 2026 19:27:13 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!TyUv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5655c5e3-650d-43fe-9ff1-b6d850bb9b43_896x1120.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<blockquote><p><em><a href="https://substack.com/@rafathebuilder">Rafa Fern&#225;ndez</a> is the host of the Protocols for Business SIG, which meets every two weeks on Discord to discuss protocols in business settings, and you&#8217;re welcome to join the next session. Link to join at the end of the article.</em></p></blockquote><h3><strong>Seeing Business Protocols</strong></h3><p>If you ask a typical manager how their company works, they will usually begin with familiar answers. They describe the business model, sketch an organizational chart, or point to operational policies. Often they use these to explain how decisions are approved, how risks are reviewed, and how work is supposed to move from idea to execution. These descriptions are usually sufficient &#8211; until something goes repeatedly wrong or keeps going stubbornly right.</p><p>When coordination continues to break down or when performance remains unexpectedly stable despite adverse conditions, those accounts begin to feel lacking. Deadlines slip week after week. Review cycles stretch without resolution. Or a team continues to hit targets year after year in an unfavorable market. Managers reach for partial explanations: tooling issues, unusually strong execution, &#8220;good ops.&#8221;</p><p>Individually, these accounts are accurate. But they rarely explain <strong>why the </strong><em><strong>same</strong></em><strong> deviations &#8211; positive or negative &#8211; recur in the </strong><em><strong>same</strong></em><strong> places.</strong></p><p>Recurrence is the clue to protocols, which provide a more precise explanation. Protocols do not solve problems or guarantee success. They lock in commitments that stabilize how variation is absorbed over time. In doing so, protocols keep friction within tolerable bounds, allowing organizations to continue operating &#8211; and in some cases, to build momentum &#8211; despite persistent strain. This is their quiet achievement: <strong>protocols hold recurrent tensions within ranges the organization can live with.</strong></p><p>For this reason, protocols rarely appear as foregrounded processes. Once established, they recede into habit, embedding themselves in infrastructure, workflows, and expectations. They become &#8220;how things are done,&#8221; rather than objects of reflection or redesign. As <a href="https://summerofprotocols.com/intro-to-the-protocol-reader">Venkatesh Rao, Program Director of Summer of Protocols, observes</a>:</p><div class="pullquote"><p><em>&#8220;Though they arrive slowly, protocols typically install themselves in extraordinarily persistent ways, often turning into seemingly immortal and unconscious parts of our built environment. Their relative invisibility is a second major tell.&#8221;</em></p></div><p>Protocols do not announce themselves. They constrain motion quietly, with little conscious effort, shaping what can happen without drawing attention to themselves. This creates a methodological problem. <strong>If protocols are most effective when they are least visible, how should they be studied?</strong></p><p>Our group, the Protocols for Business Special Interest Group (SIGP4B), has taken an oblique approach. Rather than attempting to inspect protocols through documentation or formal analysis, we have found success by studying moments when habituation fails in business contexts. Operational reinvention and technological shifts interrupt routine behavior and make protocols visible.</p><p>These moments of disruption show up as unresolved approvals, delivery delays, or persistent strategic confusion. In parallel, they appear as periods of sustained advantage: new categories forming, firms holding position through volatility, or business models that continue to function when others falter. Without attention to the underlying pattern, these episodes are often treated as isolated failures or market-cycle anomalies. When viewed through the lens of protocol studies,<strong> recurring business challenges in moments of volatility temporarily illuminate how an organization is actually structured.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TyUv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5655c5e3-650d-43fe-9ff1-b6d850bb9b43_896x1120.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TyUv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5655c5e3-650d-43fe-9ff1-b6d850bb9b43_896x1120.png 424w, https://substackcdn.com/image/fetch/$s_!TyUv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5655c5e3-650d-43fe-9ff1-b6d850bb9b43_896x1120.png 848w, https://substackcdn.com/image/fetch/$s_!TyUv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5655c5e3-650d-43fe-9ff1-b6d850bb9b43_896x1120.png 1272w, https://substackcdn.com/image/fetch/$s_!TyUv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5655c5e3-650d-43fe-9ff1-b6d850bb9b43_896x1120.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TyUv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5655c5e3-650d-43fe-9ff1-b6d850bb9b43_896x1120.png" width="500" height="625" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5655c5e3-650d-43fe-9ff1-b6d850bb9b43_896x1120.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1120,&quot;width&quot;:896,&quot;resizeWidth&quot;:500,&quot;bytes&quot;:1774133,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/184060017?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5655c5e3-650d-43fe-9ff1-b6d850bb9b43_896x1120.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!TyUv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5655c5e3-650d-43fe-9ff1-b6d850bb9b43_896x1120.png 424w, https://substackcdn.com/image/fetch/$s_!TyUv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5655c5e3-650d-43fe-9ff1-b6d850bb9b43_896x1120.png 848w, https://substackcdn.com/image/fetch/$s_!TyUv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5655c5e3-650d-43fe-9ff1-b6d850bb9b43_896x1120.png 1272w, https://substackcdn.com/image/fetch/$s_!TyUv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5655c5e3-650d-43fe-9ff1-b6d850bb9b43_896x1120.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Art by <a href="https://titles.xyz/collect/base/0x00d4fe70d93528eacf8be369e21857d26c8f7caa/21">selection</a>, made using a <em>Protocolized</em> model at <a href="https://www.titles.xyz">titles.xyz</a></figcaption></figure></div><p>In geology, <a href="http://civilwares.free.fr/The%20Seismic%20Design%20Handbook/Chapter%2001-The%20nature%20of%20earthquake%20ground%20motion.pdf">fault lines</a> are not identified by close surface inspection. They are discovered when accumulated stress forces the underlying structure to express itself. Our discussions highlighted how protocols behave similarly. Persistent problems and persistent point less to local error or exceptional talent than to the protocols through which pressure concentrates and trade-offs are stabilized. The artifacts left behind by this work &#8211; extra reviews, HR policies, new roles, software controls, even new business models &#8211; offer a useful vantage point. <strong>Still,</strong> <strong>it is sustained strain and disruption that make the boundaries of protocol structures unmistakable.</strong></p><p>Over the past year, our group has been watching one such disruption unfold across many organizations at once. <a href="https://fortune.com/2025/08/19/shadow-ai-economy-mit-study-genai-divide-llm-chatbots/">AI software solutions, such as large language models and autonomous agents, are diffusing, often in the shadows, into everyday business operations</a>. How work is generated, evaluated, and sequenced in time is changing rapidly. As a result, <strong>protocols that once operated in the background have become visible</strong>, creating an opportunity to examine what business protocols are actually doing when placed under pressure.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://docs.google.com/forms/d/e/1FAIpQLSe1e_uUiMcSXyreT_qNdbn8lHFk4cu1lk7bWqZbfMoxsBd2Aw/viewform?usp=preview&quot;,&quot;text&quot;:&quot;Join Protocols for Business&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://docs.google.com/forms/d/e/1FAIpQLSe1e_uUiMcSXyreT_qNdbn8lHFk4cu1lk7bWqZbfMoxsBd2Aw/viewform?usp=preview"><span>Join Protocols for Business</span></a></p><div><hr></div><h3><strong>Protocols under Pressure</strong></h3><p>The dominant technologies of the past two decades &#8211; networked software, mobile devices, cloud infrastructure, remote collaboration &#8211; are entering a period of relative maturity. Their organizational effects are well understood, if not fully resolved, especially in today&#8217;s top enterprises. AI software, by contrast, has just arrived in the past few years. <strong>LLMs, copilots, and early autonomous agents are being adopted unevenly across functions, spawning new markets, but often <a href="https://fortune.com/2025/08/18/mit-report-95-percent-generative-ai-pilots-at-companies-failing-cfo/">failing at enterprise-level deployment</a>.</strong></p><p>AI is usually discussed in terms of automation or productivity. Those framings are not wrong, but they miss what makes AI adoption particularly revealing from a protocol perspective. While much of the public discussion frames AI in terms of cost-savings or new markets, our SIG has been focusing on the pressure it places on current coordination systems by changing the speed and scale at which work is produced: AI lowers the marginal cost of many forms of knowledge work while dramatically increasing total output. Drafts, analyses, summaries, and proposals can be <a href="https://substack.com/home/post/p-171953226">generated continuously</a>. AI&#8217;s production acceleration shows up everywhere at once; tools are being adopted simultaneously in product, marketing, legal, operations, and management functions. <strong>Work that once arrived in bounded increments now arrives as a flood, often carrying significant amounts of low-signal algorithmic output (&#8220;slop&#8221;) mixed in with it.</strong></p><p>Many organizational protocols evolved under production paradigms which assumed a specific level of scale. Documentation, like other forms of knowledge work, <em>took time</em>. Decisions moved through sequential approval gates. These constraints shaped how firms organized authority, pacing, and oversight.</p><p>Our group repeatedly returned to version control as a protocol case study. Today&#8217;s default workflow assumes that meaningful code change is mediated through human reviewers, which stabilizes quality and accountability by gating &#8220;merges.&#8221; This implicitly capped how much change a codebase can absorb over time, limiting it to the skill and capacity of reviewers. Large refactors &#8211; such as migrating a core codebase to a new language &#8211; have historically been slow because review, coordination, and rollback had to proceed at human pace.</p><p>Now, LLMs challenge these assumptions and workflows. The resulting strain mirrors an earlier protocol transition from centralized to distributed version control, which supported continuous deployment at scale. <strong>New protocol paradigms are necessary to address AI-enabled speed and scale.</strong></p><p>Production constraints become easier to understand when protocols are treated as technologies in their own right. In &#8220;<a href="https://protocolized.summerofprotocols.com/p/constructing-the-evil-twin-of-ai">Constructing the Evil Twin of AI,</a>&#8221; Venkatesh Rao describes protocols as deliberately anti-intelligent systems: </p><div class="pullquote"><p>&#8220;<em>What happens when you try to deliberately construct something both anti-intelligent and anti-agentic? You get protocols! Protocols lock in commitments, rigidly constrain behavior, and implacably resist the oozy qualities of intelligence&#8230;&#8221;</em> </p></div><p><strong>Protocols are designed to limit, to configure trade-offs, and to make actions repeatable under uncertainty.</strong> They create leverage through <a href="https://paragraph.com/@josh-stark/atoms-institutions-blockchains">hardness</a>, yet often can be brittle under certain strains.</p><p>It&#8217;s worthwhile to note that AI compresses some constraints while bypassing others. Output multiplies while, at least for now, reviews and escalations are sometimes sidestepped. Production gains from AI adoption do not lead to smooth acceleration, but uneven load and jerky momentum.</p><p>Seen this way, <strong>the friction and failures accompanying AI adoption are not primarily symptoms of resistance to change or poor product quality. They are signs of protocol integrity under load.</strong> AI introduces fluidity where rigidity previously performed a stabilizing function. Existing coordination systems are being asked to absorb more output, faster, without having been designed for that operating range.</p><p><strong>Similar to fault lines, coordination pressure accumulates along established paths.</strong> What has been routine begins to feel strained. What has been tolerable begins to feel tight. To understand the consequences of that pressure, it helps to look at where it concentrates first.</p><div><hr></div><h3><strong>Tensions in Business Time</strong></h3><p>Across the SIG&#8217;s discussions, interviews, and readings, a consistent pattern has emerged. <strong>Under AI adoption, the first thing that stops working smoothly seemed unintuitive: time.</strong></p><p>This became clear when our group reviewed <a href="https://bscholl.substack.com/p/slacker-index-why-vertical-integration">Blake Scholl&#8217;s writing on Boom Supersonic</a>. Here, Scholl distinguishes between at least two clocks operating inside the same organization. The first is the calendar: project timelines, milestones, and delivery dates. The second is what he calls the <em>Slacker Index</em>: the amount of time engineers spend waiting &#8211; on inputs, approvals, dependencies, or external constraints &#8211; rather than building. Even in well-run, safety-critical organizations, these clocks coexist.</p><p>Under stable conditions and in mature industries, this alignment is usually implicit. Engineering velocity, supplier lead times, regulatory review cycles, and internal decision-making rhythms evolve together. At Boom, hardware design, simulation, testing, and supplier manufacturing are paced to one another. Slower clocks constrain faster ones in predictable ways. Waiting is visible, expected, and priced into the system.</p><p>As Scholl points out, AI-enabled production changes the speed and scale of production. Certain forms of work &#8211; design iteration, analysis, documentation, internal review &#8211; can suddenly accelerate by orders of magnitude. From the perspective of the Slacker Index, local waiting collapses. Yet the calendar will not automatically follow. Supplier lead times remain fixed. Certification processes still unfold at human and institutional speeds. External partners continue to operate on contractual and regulatory time.</p><p><strong>The consequence of AI-enabled opportunity is </strong><em><strong>temporal divergence </strong></em><strong><a href="https://summerlightning.substack.com/p/knowledge-chronotopes">(a topic explored in depth by SIG member Sachin</a>).</strong> Some clocks speed up sharply while others remain unchanged. At Boom, this would mean design teams outrunning suppliers, simulations outrunning manufacturing feedback, or internal decision cycles outrunning the capacity of external partners to respond. The Slacker Index may improve locally &#8211; less waiting to produce &#8211; but worsen systemically as downstream dependencies fall behind.</p><p>AI systems further amplify this effect in two ways. One, because they generate outputs without passing through the durations that normally situate work, creating a dizzying orientation. Large language models produce analysis and proposals instantly. Work arrives early in excess of the organization&#8217;s ability to absorb it. Knowledge accumulates faster than it can be evaluated, integrated, or acted upon.</p><p>Second, AI software using LLMs can be contextually misaligned. They draw on data that&#8217;s often years apart (a model trained up to 2024, used in 2026) and produced outside the local business context. From this lens, the recent focus on improving AI product memory seems intuitive. Efforts such as RAG, MCP, skills, and even &#8220;undo&#8221; prompt features become attempts to realign probabilistic software into business context, tempo, and authority.</p><p>Safety-critical organizations like Boom make these dynamics visible precisely because they cannot simply collapse time. Hardware, suppliers, and regulators enforce non-negotiable rhythms. When AI accelerates internal work without moving those external clocks, coordination strain surfaces quickly. Slack accumulates in unfamiliar places, with no protocols available to redistribute it.</p><p>When time regimes fall out of alignment, coordination problems<em> and opportunities </em>change form. Delays no longer appear as isolated errors that can be corrected locally. Instead, organizations experience escalating tensions: pressure to act without corresponding capacity to review, decide, or remember.</p><p><strong>As with other systems under strain, previously hidden structures become easier to observe once alignment fails. AI adoption exposes how dependent coordination was on the quiet temporal alignment &#8211; rhythm &#8211; of existing protocols.</strong></p><p>Yet work does not stop. Systems do not fail outright. Instead, protocols drift out of phase. Understanding how firms respond requires looking at how they attempt to restore coherence &#8211; often without redesigning the underlying structures that produced it.</p><div><hr></div><h3><strong>Enterprise Management, Built to Last</strong></h3><p><strong>When shared assumptions about time lose coherence, organizations first adapt within current structures.</strong> Work continues by absorbing friction rather than resolving its source.</p><p>One visible form of this absorption is Boom&#8217;s solution: integrate vertically. The critical move was purchasing their own large-scale manufacturing equipment rather than continuing to rely on external suppliers whose lead times dominated the schedule. Supplier queues and fabrication delays had become the governing clock for the entire program, producing a high Slacker Index: engineers were ready to iterate, but progress stalled while waiting on parts. By acquiring the machine, Boom internalized that bottleneck and converted supplier wait time into an internal, controllable process. This collapsed a multi-month external dependency into a shorter, iterable internal cycle, allowing design, testing, and manufacturing to co-evolve rather than queue sequentially.</p><p>Another response was novel <a href="https://aparnacd.substack.com/p/most-work-is-translation">translation work</a>. The SIG discussed the <a href="https://medium.com/fonzi-ai/forward-deployed-engineers-the-800-growth-role-redefining-ai-hiring-69e19d800047">fast growing</a> <a href="https://a16z.com/what-are-forward-deployed-engineers/">Forward Deployed Engineer</a> role, emerging to help mediate between fast-moving demands and slower-moving infrastructure. Their task is not to eliminate mismatch, but to work across it and leverage it &#8211; adjusting scope, translating intent, and negotiating constraints as they appear. This work allows organizations to keep operating even as tempos diverge, and gain a competitive advantage in the process. At its best, the work defines the operating model. This is the case for Palantir and large AI labs like OpenAI and Anthropic.</p><p>Other adaptations the SIG encountered took the form of operational formalization: <a href="https://genai.owasp.org/resource/llm-and-gen-ai-data-security-best-practices/">AI usage guidelines</a>, governance documents, digitized <a href="https://www.palantir.com/docs/foundry/ontology/overview">ontologies</a>. These measures make previously tacit constraints visible without altering the structures that produced the misalignment. They stabilize behavior at the margin while leaving underlying coordination regimes intact.</p><p><strong>As adaptive load to the new pressures increases, authority structures reassert themselves. Approval gates and prohibitions harden. </strong>Data confidentiality clauses are expanded. Hierarchies become more visible. These protocols surface because they are firm fault lines that stabilize liability, escalation, and accountability when temporal coherence weakens.</p><p>Some of these protocols absorb the load effectively. But others begin to strain. In geological systems, stress redistributed after an initial shift often produces secondary movements elsewhere. Organizational responses to temporal misalignment follow a similar pattern. Processes adapt where they can, while pressure seeks relief where they can&#8217;t.</p><p>This adaptive pattern becomes more consequential as management itself is increasingly parameterized within software, paving a path to programmatic enforcement.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://protocolized.summerofprotocols.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Keep an eye on the horizon with science fiction and iconoclastic essays.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h3><strong>Warning: Brittle Software</strong></h3><p>Before returning to our initial question on business protocols, it is worth taking a brief detour. Alongside the recent diffusion of AI, the SIG has been considering a quieter shift: <a href="https://npcmemo.substack.com/p/management-as-protocol-the-subsumption">management controls themselves have been moving into software.</a></p><p>Approval flows, access rights, version control rules, and incident response procedures are increasingly encoded directly into business software systems. Authority becomes a software admin configuration setting. Expenses are automatically rejected when outside policy. These changes predate AI, but they shape how AI is experienced inside organizations.</p><p>This matters because <strong>management subsumed in software behaves differently from practiced management. Protocols, when encoded in software, limit discretion in what is authorized and auditable. </strong>In contrast, management practice as a whole consists of what is necessary and effective in context. Under stable conditions, the gap between the two &#8211; protocol and practice &#8211; is manageable. A manager can override an expense request, or call a system administrator to update the software configuration.</p><p>AI changes the scale and speed at which this gap becomes visible. On one hand, employees and customers bypass formal systems using personal tools, custom scripts, or unregistered agents operating through employee accounts. On the other, software-encoded controls enforce protocol broadly and uniformly, at relatively low cost. A single configuration change can propagate across an organization instantly.</p><p>This shift produces a recognizable organizational pattern. Practices that once relied on informal judgment or situational flexibility are increasingly forced into deterministic software-defined pathways. Work that used to be resolved through conversation &#8211; such as asking legal for a quick review or exercising discretion under time pressure &#8211; is now mediated through systems that require explicit inputs, permissions, and logs. These systems work especially well in mature and slow-changing businesses, and can be brittle under volatile situations like a new technological disruption such as AI software.</p><p>A recent example is from an airline: <a href="https://www.bbc.com/travel/article/20240222-air-canada-chatbot-misinformation-what-travellers-should-know">A customer relied on an airline&#8217;s AI chatbot for information about bereavement fare rules.</a> The chatbot incorrectly stated that refunds could be claimed retroactively, advice that contradicted the airline&#8217;s formal policy. When the customer followed the guidance and was denied the refund, the airline argued in court that the chatbot was a separate tool and that customers were responsible for verifying information elsewhere on the site.</p><p>The court rejected this argument. It ruled that the chatbot was part of the airline&#8217;s customer-facing system and that the company was responsible for the commitments it made, regardless of whether those commitments were generated by an AI system. It is tempting to shape the story to focus on LLM shortcomings: <em>&#8220;This type of mistake, in which generative AI tools present inaccurate or nonsensical information, is known as AI hallucination.&#8221;</em></p><p>What&#8217;s more important is that the failure occurred because a time-tested operations efficiency strategy (delegating frontline explanation to an automated system) collided with protocolized legitimacy (formal fare rules, auditability, liability). The business made an assumption that explanatory labor could be delegated to probabilistic software, decoupling it from the protocols that confer legitimacy and liability. The chatbot accelerated response and reduced staffing load, but it was not strictly aligned to the same review, approval, and accountability protocols that governed pricing policy. At sufficient scale, that gap became visible.</p><p>Understanding this trend increases the diagnostic value of the current moment. <strong>AI adoption, like many previous &#8220;digital transformations&#8221; since the advent of the internet and before, highlights where management has already been formalized, where practice has been carrying hidden load, and where current protocols are breaking.</strong></p><p>With that context in view, it becomes easier to return to the original methodological question: how AI, not framed as a solution but as a protocol disturbance, makes the underlying structure of coordination inside firms visible.</p><div><hr></div><h3><strong>Strange New Business</strong></h3><p>Since the summer, our group has treated AI adoption and similar business disruptions as an observational lens rather than an optimization target. This lens supports our SIG&#8217;s goal of researching, evaluating, and finding opportunities to improve business protocols under pressure. AI is useful here because it is widespread, fast-moving, and poorly aligned with existing organizational rhythms.</p><p>This approach reflects a broader pattern in protocol studies. As Venkatesh Rao notes in <a href="https://protocolized.summerofprotocols.com/p/strange-new-rules">Strange New Rules</a>, new coordination regimes often feel unfamiliar at first, and then they are banal. Over time, they stabilize. Eventually, they disappear into habit. What becomes difficult is not living with protocols, but noticing and refactoring them.</p><p>AI has interrupted that disappearance. It has surfaced assumptions about time, authority, and review that were previously implicit. In short, it has made visible where management is already encoded, where practice has been carrying unacknowledged load, and where coordination depends on alignments that no longer hold reliably.</p><p>Although our recent work has focused on business management protocols &#8211; multisigs, version control, incident response &#8211; similar dynamics appear in transaction and production protocols as well, including market auctions and inventory management. Across cases, recurrent confusion, friction, and governance anxiety function serve as signals of protocol stress; they point to coordination systems doing more work than they were designed to absorb.</p><p>The conditions described here are not temporary. As AI software continues to diffuse unevenly into business operations, the protocols that manage coordination trade-offs will remain under strain &#8211; and increasingly visible. Our group treats this moment as an opportunity to observe, compare, and refine how business protocols actually function under load. If you are interested in these topics, or are encountering protocol changes yourself, share your email here and join our next meeting!</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://docs.google.com/forms/d/e/1FAIpQLSe1e_uUiMcSXyreT_qNdbn8lHFk4cu1lk7bWqZbfMoxsBd2Aw/viewform?usp=preview&quot;,&quot;text&quot;:&quot;Join Protocols for Business&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://docs.google.com/forms/d/e/1FAIpQLSe1e_uUiMcSXyreT_qNdbn8lHFk4cu1lk7bWqZbfMoxsBd2Aw/viewform?usp=preview"><span>Join Protocols for Business</span></a></p>]]></content:encoded></item><item><title><![CDATA[Theorizing Protocolization I: New Nature ]]></title><description><![CDATA[Progress through Invisibility and the Planetary Computational Tangle]]></description><link>https://protocolized.summerofprotocols.com/p/theorizing-protocolization-i-new</link><guid isPermaLink="false">https://protocolized.summerofprotocols.com/p/theorizing-protocolization-i-new</guid><dc:creator><![CDATA[Venkatesh Rao]]></dc:creator><pubDate>Thu, 08 Jan 2026 18:51:54 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/616e982c-403e-4399-a9c1-6285182084dd_1024x547.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In this essay, we want to introduce you to a profoundly important planetary phenomenon that you probably intuitively recognize, but have likely never paused to think about: <em>Protocolization. </em>Besides naming the phenomenon, we want to<em> </em>offer you a set of pre-theoretical frames for thinking about it, and invite you to join us in our ongoing efforts to theorize it.</p><p>The goal of this two-part essay is to introduce the work of the Special Interest Group in Formal Protocol Theory (SIGFPT) over the last six months, and invite you to join us as we begin our second year of explorations. In this first part, we will establish some broad qualitative background and overarching frames and concepts. In Part II, to be published in a few weeks, we will introduce you to the specific theoretical apparatuses and technical attacks we are exploring, for developing formal protocol theory. </p><div><hr></div><p><em><strong>Join us on our <a href="https://discord.gg/SfY7UzCS">Discord</a> for the 2026 kickoff meeting of SIGFPT on Friday, January 9, 10am Pacific. <a href="https://calendar.google.com/calendar/u/0/r/eventedit/copy/MWoxaXZ0NWc3MDgzNTNibWNiMzNpcWQ0bWhfMjAyNjAxMDlUMTgwMDAwWiBoZWxsb0BzdW1tZXJvZnByb3RvY29scy5jb20">Calendar invite for series.</a></strong></em></p><div><hr></div><p>So what is protocolization? In what follows, we will explore this question, with a view to setting up a canvas for formal and mathematical attempts to theorize it in <em>general </em>ways.</p><p>Protocolization is an unfolding long-term planetary transformation that is at least as old as modernity itself. That is to say, it is at least several centuries old, and has unfolded through multiple distinct chapters, in loose synchronization with major technological revolutions. Protocolization is the overarching story of how humanity has cashed out and orchestrated the capabilities of every wave of new technologies to make our world ever more comfortable and hospitable for humans. </p><p>One side of protocolization is arguably an ongoing <em>terraforming. </em>The <em>first</em> terraforming in fact<em>; </em>that of <em>Terra </em>itself, preceding any science-fictional terraformings of other planets.</p><p>The other side of protocolization is changes in human behavior in <em>response </em>to this terraforming. Relative to our ancestors, we have become more predictable and orderly on some fronts, and more unpredictable and generative on others. Protocolization is simultaneously a <em>civilizing</em> process, and a <em>rewilding</em> process. </p><p>Protocolization is reducible neither to its technological drivers, nor to the changes in human nature triggered by them. Protocolization is the <em>co-evolution </em>of both into what we might call a <em>new nature. </em>A planetary condition powerfully determined by the l<em>aws of the artificial</em>, which can increasingly be engineered to be nearly as immutable and indefinitely persistent as those of nature itself. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://protocolized.summerofprotocols.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://protocolized.summerofprotocols.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h3>New Nature</h3><p>Protocolization proper has received almost no attention, either popular or scholarly. It has merely been partially glimpsed in peripheral vision in attempts to understand more visible and dramatic planetary processes (such as <em>modernization</em>, <em>industrialization</em>, <em>globalization</em>, <em>urbanization</em>, and <em>digitalization)</em>, which offer readier, more legible approaches to analysis and synthesis. </p><p>These more dramatic processes typically also feature charismatic technological megafauna at their cores &#8211; printing presses, steam engines, automobiles, ocean liners, skyscrapers, bridges, superhighways, rockets, airplanes, nuclear reactors, supercomputers, AI systems, miracle medicines, robots. These &#8220;hero&#8221; technologies lend themselves to anthropomorphic projection, and encourage a view of human-technological co-evolution as a kind of augmented hero&#8217;s journey. Our default notions of &#8220;progress&#8221; are of this heroic variety.</p><p>By contrast, the technological elements of protocols &#8211; interoperability standards, kits, standardized fasteners, electrical connectors, plumbing regulations, safety codes, sewage pipes, modularity grammars &#8211; typically gently diffuse and deflect anthropomorphic impulses. Rather than serving our heroic individualist impulses, they quietly orchestrate and shape our mutualist and cooperative energies. Protocolization looks like <em>ecological emergence</em> rather than a technological hero&#8217;s journey. It encourages a very different narrative of progress.</p><p>We hope to convince you that &#8220;protocolization&#8221; elegantly subsumes some of the most salient features of the more dramatic and &#8220;heroic technology&#8221; process frames you might be used to, while also apprehending (if not yet quite <em>comprehending</em>) a great deal that those frames remain systematically blind to.</p><p>It may help to keep a pair of pictures in mind. One is the familiar image of the African savannah, with its tableau of charismatic megafauna. The other is the near-pitch darkness of the mesopelagic zone of the oceans, beyond the reach and attention of both fishing fleets and the cameras of shark documentaries. This zone is densely populated by a family of bioluminescent fish that you may have never heard of or seen pictures of &#8211; Bristlemouths (<a href="https://en.wikipedia.org/wiki/Gonostomatidae">Gonostomatidae</a>) &#8211; which number in the <em>trillions</em> to <em>quadrillions</em>, constituting nearly 90% of fish biomass on the planet by some estimates. These fish anchor not just oceanic ecologies, but the entire <em>planetary </em>ecology.</p><p>Dramatic planetary processes are stories about the first kind of image. Protocolization on the other hand, is the story about the second kind of image. </p><p>The first kind of image requires no particular skills to see and appreciate, and anchors most visions of technological progress and change. The second kind of image is much harder to see, and takes cultivated protocol-watching skills, but is also much more useful for understanding how ecologies actually work; how <em>new nature </em>works. </p><p>Since our goal is to build powerful and useful theories of new nature, we navigate by the second kind of vision of technology; we try to search for formal theories and tools that can help us see, model, predict, and shape the &#8220;mesopelagic zone&#8221; aspect of new nature, rather than the &#8220;African savannah&#8221; aspect.</p><p>The most recent chapter of protocolization, triggered a half-century ago by the affordances of early computer networks, has been transforming the world in profound and accelerating ways. But arguably, it has barely been theorized at all, largely because when you try to look closely, it looks like the mesopelagic ocean depths rather than the African savannah.</p><div><hr></div><h3>Protocolization Defined </h3><p>For the purposes of this essay, we will loosely define <em>protocolization</em> as follows:</p><blockquote><p>Protocolization is the progressive metabolization of reliably repeatable technologically mediated human behaviors at all scales into reliable planetary infrastructures for coordination. </p></blockquote><p>Here, we mean technological mediation in a broad sense, encompassing conceptual and cultural technologies such as the decimal system (instrumental in the development of modern book-keeping) or hygiene or nutritional practices that first took shape as religious observances.</p><p>It is worth noting that though we only mention human behavior in the definition, these behaviors shape the fates of all other life on the planet as well. Not just the major domesticated species of plants and animals, but through the shaping of &#8220;wilderness&#8221; regimes of the planet, all <em>other </em>life as well.</p><p>Protocolization is driven by some mix of <em>knowledge discovery and diffusion,</em> <em>technology enablement</em>, and <em>human behavior change, </em>resulting in a slow accumulation of new nature ecologies across the planet.</p><p>An example we use frequently in SIGFPT meetings is <em>hand-washing.</em></p><p>The global ubiquity of hand-washing protocols was driven by the discovery and diffusion of <em>knowledge </em>about infectious diseases, coupled with ubiquitous technological infrastructure that has made clean water and soap available everywhere in modern built environments. The protocolization of hand-washing behaviors transformed a planetary landscape of previously uncoordinated and high-variance local cultural practices into an infrastructural behavior with much lower variance. As a <em>direct result</em>, public health improved everywhere. The planet became more comfortable and hospitable for humanity.</p><p>Thousands of similar examples can be listed across every area of human behavior, and in every corner of the built environment, at all scales from individual to international, and from trash cans to continental supergrids. </p><p>An entertaining cross-section view of protocolization can be found simply by listening for <a href="https://www.youtube.com/watch?v=HiUcxUC9Z2c">the word </a><em><a href="https://www.youtube.com/watch?v=HiUcxUC9Z2c">protocol</a></em><a href="https://www.youtube.com/watch?v=HiUcxUC9Z2c"> in movies</a> and television. Such usage has exploded in the last half-century. One of our favorite specific illustrations comes from long-running television franchises. In <em>Star Trek </em>for example<em>, </em>the word <em>protocol </em>was not used at all in the original series, but is used <em>hundreds </em>of times in more recent shows within the franchise. </p><p>This already extant cultural footprint, by the way, is why we expect you to find the term <em>protocolization </em>intuitive, and experience an immediate sense of recognition of what we&#8217;re pointing to with the term, even if you&#8217;ve never stopped to think about it before.</p><p>Domains like climate, traffic, networked computing, and healthcare make particular (and domain-specific) use of protocol-based understandings of the human and machine behaviors they design and translate into infrastructures. In other domains, protocols might not be the direct result of conscious design, but manifest as unexpected systematicity, orderliness, and <em>serendipity</em> in how things happen, which goes unnoticed and un-theorized. </p><p>But we <em>do</em> sometimes notice &#8211; when we travel to a city or country with more reliable subway services than our own, for example, we are struck by a sense of serendipity suffusing our transit experiences; a sense that the world is unusually hospitable in ways precisely attuned to our needs. </p><p><em>That </em>is<em> </em>protocolization; steadily accumulating ecological transformations of the planet, each of which makes us feel surprisingly, magically lucky when we first encounter them, but which rapidly turn into tuned-out backgrounds and unconscious expectations of <em>artificial</em> <em>lawfulness </em>in our environmental contexts. </p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7Y5u!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F988afe46-2839-4c55-8ede-3487c60c7387_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7Y5u!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F988afe46-2839-4c55-8ede-3487c60c7387_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!7Y5u!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F988afe46-2839-4c55-8ede-3487c60c7387_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!7Y5u!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F988afe46-2839-4c55-8ede-3487c60c7387_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!7Y5u!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F988afe46-2839-4c55-8ede-3487c60c7387_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7Y5u!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F988afe46-2839-4c55-8ede-3487c60c7387_1024x1024.png" width="500" height="500" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/988afe46-2839-4c55-8ede-3487c60c7387_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:500,&quot;bytes&quot;:266634,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/183714868?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F988afe46-2839-4c55-8ede-3487c60c7387_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!7Y5u!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F988afe46-2839-4c55-8ede-3487c60c7387_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!7Y5u!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F988afe46-2839-4c55-8ede-3487c60c7387_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!7Y5u!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F988afe46-2839-4c55-8ede-3487c60c7387_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!7Y5u!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F988afe46-2839-4c55-8ede-3487c60c7387_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>Progress through Invisibility</h3><p>Even though protocolization has been as momentous as more dramatic planetary transformations like computerization and globalization, as well as earlier ones such as urbanization, consumerization, and industrialization, it remains hidden. </p><p>This is because, by their very nature, protocols in their evolved forms tend towards invisibility, and protocolization<em> </em>as the evolutionary process that creates them <em>seeks out </em>invisibility. This feature, arguably, is central to how and why protocolization constitutes <em>progress. </em>Protocolization is <em><strong>progress through invisibility</strong>.</em></p><p>Here, we mean <em>invisibility</em> in a broad, multi-dimensional and textured sense, beyond merely literal visual invisibility. The invisibility of protocols has multiple aspects:</p><ol><li><p><strong>Operational invisibility</strong> &#8211; We don&#8217;t <em>think</em> about the protocol while using it, acting through muscle memory.</p></li><li><p><strong>Infrastructural invisibility</strong> &#8211; The machinery is literally hidden/backgrounded, like the ecologically critical mesopelagic zones we alluded to earlier. For example, cables and sewage lines are buried, and are generally as ubiquitous and invisible as bristlemouth fish.</p></li><li><p><strong>Social/cognitive invisibility</strong> &#8211; People don&#8217;t recognize protocolization is happening because by definition, behavioral habituation is not only part of the essence of the process, it is functionally load-bearing. Traffic protocols would be much less effective if we were constantly aware of them. We &#8220;stay in our lanes,&#8221; without thinking about it, and reflexively signal turns and stop at stop signs.</p></li><li><p><strong>Anti-memetic qualities</strong> &#8211; Protocols rarely feature in headlines, titles, or public discourse, because the unremarkable &#8220;boring&#8221; quality, with one experience being largely indistinguishable from another, is essential to their functioning.</p></li><li><p><strong>Marginality </strong>&#8211;<strong> </strong>Protocols often organize and scaffold the technological space <em>around </em>other, more charismatic technologies that are intrinsically more visible, and more directly support foreground goals. They perform prophylactic functions, enforce constraints, and structure core behaviors for coordination and synchronization. For instance, the safety protocols of airline travel &#8211; airport security checks, seatbelts &#8211; are on the margins of the foreground retail experience of air travel. We do not think much about them when making travel plans.</p></li><li><p><strong>Default quietness</strong> &#8211; Protocols are quiet and unobtrusive by default, and make themselves visible primarily when they fail. An ordinary hand-washing episode is not memorable among the tens of thousands that happen over an individual lifetime. An episode involving an empty soap-dispenser or malfunctioning faucet is memorable.</p></li><li><p><strong>Obliquity of action</strong> &#8211; Protocols rarely directly act on consciously controlled human behaviors in pursuit of explicitly held intentions or goals. Rather, they act through secondary pathways of supporting causation, contingency triggers, and automated follow-through. For every conscious action in a technologically advanced environment, dozens of supporting actions may unfold unnoticed, rendering the conscious behavior preternaturally frictionless and seemingly &#8220;free.&#8221; The scope of protocolization is often <em>everything else that must happen</em> in order for actions you consciously and freely <em>intend </em>and <em>do </em>to succeed.</p></li></ol><p>Aspects of protocols are of course highly visible in specific contexts. For example, everyone knows what USB is at a lay level, and what is meant by &#8220;containerization.&#8221; Standards bodies debate specs publicly (though it is worth noting that such debates are rarely newsworthy unless they fail in dramatic ways). But we hardly ever think about the USB protocol, even as we routinely plug and unplug connectors several times everyday. Or about the mechanics of containerization driving the endless torrent of package deliveries at our doorsteps.</p><p>So to a first approximation, and across multiple domains, protocols are <em>invisible technological phenomenology</em>. They could be considered technological dark matter; evading study by retreating to the margins of our attention, ceding the spotlight to the &#8220;main characters&#8221; of the technological environment &#8211; striking buildings, beautiful bridges, impressive airplanes and rockets, awe-inspiring AI systems.</p><p>Protocol designers in nearly every field rightly view such invisibility as a feature rather than a bug. Protocol designers intuitively tend to <em>design for invisibility.</em> Invisibility of some sort &#8211; from literal visual invisibility to the reflexive automaticity in our own responses to subconsciously registered cues &#8211; is either a strong functional requirement, or at least highly desirable. Often, the very reliability of a protocol rests on its invisibility, and visibility can lead to fragility and unreliability. </p><p>Keep a protocol in peripheral vision, and it works. Look too directly at it, or attend to your behaviors within it too deliberately, and it starts to falter.</p><p>In our emerging field of Protocol Studies, this widespread design intuition has been elevated to the level of a philosophical principle, captured by Whitehead&#8217;s famous observation that &#8220;civilization advances by the number of operations we can perform without thinking about them.&#8221; </p><p>Within our young field, it is now a convention to refer to a valuable advance in protocolization, marked by a transition of an important behavior to invisibility and collective unconsciousness, as a &#8220;Whitehead advance.&#8221;</p><div><hr></div><h3>The Price of Progress</h3><p>Protocolization can be understood as a centuries-old macro-trend of progress through invisibility, but this progress does not come for free. There is a clear <em>cost </em>associated with it, in the form of a new class of problems induced by invisibility.</p><p>This is most apparent in governance at larger social scales. In the most extraordinary cases, such as the effect of vaccines (inarguably one of the greatest Whitehead advances), protocolization becomes invisible to the point of even erasing its own historical <em>raison d&#8217;&#234;tre</em>, and undermining the broader literacies required to sustain itself. We might perhaps call this pathology <em>overprotocolization</em>.</p><p>Modern vaccine denialism is possible precisely <em>because </em>vaccination protocols have made their own logic largely invisible through their extraordinary success. Something similar can be said of nuclear non-proliferation &#8211; the perception of risks of nuclear-armed conflict have diminished in proportion to the success of nuclear weapons protocols, and the attendant retreat of nuclear weapons into background invisibility.</p><p>Invisibility also creates peculiar difficulties in the <em>study </em>of protocols, since we are forced to talk of them through the fragmentary and mutually inconsistent languages of other fields, making the search for universal principles and general theories particularly difficult.</p><p>This, however, is a problem that we can begin to address in many ways. And one of the best ways to make protocols visible in positive ways, at least to scholarly and professional scrutiny, is to develop expressive formalisms and mathematical models to undergird a language for <em>talking</em> about them in general terms.</p><p>The work of SIGFPT encompasses both <em>formalization</em> as such (the development of ontologies and precise terminology that allow us to talk consistently about phenomenology across many domains) and <em>mathematization</em> (the development of suitable technical methods to investigate the phenomenology through the formalism).</p><p>Our explorations and activities should interest researchers and practitioners across a wide variety of existing fields &#8211; computer science, control theory, operations research, economics, sociology, anthropology, and political science among them.</p><p>Regardless of what background you are coming from, the <em>value </em>of FPT for you is mitigation of the theoretical fragmentation that you likely encounter whenever your interests lead you to protocols and protocolization. </p><div><hr></div><h3>Tackling Theoretical Fragmentation</h3><p>Protocolization is a multi-scale planetary phenomenon that couples the <em>local</em> to the <em>global</em>, and entangles <em>micro-level dynamics</em> and <em>macro-level dynamics, </em>via technological media. This broad footprint across spatiotemporal scales and regimes of dynamics, exacerbated by general invisibility, tends to create fragmented theorization of hugely important phenomena. </p><p>An example will illustrate what we mean here, and motivate the approaches we are developing to mitigate theoretical fragmentation and construct more integrated understandings.</p><p><em>Containerization</em>, the protocolization of global commerce, is generally analyzed through the lens of <em>globalization</em>, understood as a primarily political and economic phenomenon, even though it obviously involves a great deal more. At the micro-scale it is simply a mature standards process that stewards definitions of a set of relatively low-tech box form-factors. At the macro-scale it is an emergent intermodal network-of-networks for materials transport. At the local level, it is a tangle of logistics problems, such as regional staging, port operations, last-mile operations, border transit operations, and security procedures. At the global level, it is a climate-like hyperobject comprising a constantly shifting set of flows and stocks, and featuring weather-like phenomena.</p><p>To enable theoretical study of containerization, a sufficiently expressive formalism (or more likely, a harmonized assemblage of such formalisms) for protocols must be able to articulate concepts and propositions ranging from the &#8220;box&#8221; level to &#8220;planetary climate&#8221; level. It must comprehend dynamics ranging from an earthquake affecting a particular port, to a slow accumulation of empty containers on one continent due to unbalanced trade (the backhaul problem).</p><p>And this is merely the <em>simplest </em>sort of protocolization, where we can name and point to a relatively coherent single &#8220;protocol,&#8221; with relatively intelligible structural and behavioral phenomenology to roughly isolate, model, and study.</p><p>Such intelligibility, however, is an illusion. Any fragile, non-fragmentary picture we might build of a phenomenon like &#8220;containerization&#8221; shatters the moment we situate it in the real world, and bring it into contact with <em>other </em>protocols of comparable richness that occupy some of the same spaces it does.</p><div><hr></div><h3>Protocol Tangles</h3><p>Even within the seemingly isolatable domain of containerization, formal protocol theory faces tough tradeoffs between generality and specificity, resolution and scope, and so forth. </p><p>But the need for formal protocol theory becomes even clearer when we attempt to investigate <em>multiple </em>protocol infrastructures at once, motivated by provocative similarities, seductive resonances, and most importantly, <em>consequential real-world convergences</em> (such as many physical networks sharing right-of-way corridors).</p><p>When many protocols co-evolve in convergent ways and get materially entangled, constituting a single protocolization process spanning multiple <em>partially visible</em> and <em>operationally coupled</em> infrastructures, they tend to become <em>especially</em> invisible. This is because a view corresponding to <em>one</em> component protocol and associated set of interests misses all the others. </p><p>Since the early days of protocol studies, we have thought of this as the &#8220;three blind men and an elephant&#8221; problem in studying protocols, especially large and complex ones.</p><p>Such circumstances present as <em>especially</em> acute fragmentation of attempts to study them theoretically. We refer to such circumstances as <em>protocol tangles. </em>Here are some examples:</p><ul><li><p><strong>Factory automation </strong>emerged at the intersection of computerization <em>within</em> factories, and globalization <em>between </em>(globally distributed) factories. It is a tangle that cannot be adequately studied by any of the obviously relevant disciplines, such as industrial engineering, operations research, computer science, economics, or trade policy.</p></li><li><p><strong>Global public health regimes</strong>, a response to planetary-scale contagion phenomena, are tangles comprising protocols at the intersection of municipal public health infrastructures, global pharmaceutical research and disease surveillance protocols, and international relations.</p></li><li><p>The presently unraveling <strong>Rules-Based Order</strong> of international relations is a tangle of planetary scale coordination problems factored into impoverished sets of nation-centric problems. Even though massive international cooperation undertakings (such as the UN Food Program, the UNHCR, and the WWF), operate as exceptionally invisible protocol infrastructures, they are <em>understood </em>and <em>governed </em>through highly impoverished and fragmented theoretical frames.</p></li></ul><p>The worst protocol tangles are so invisible, they even lack <em>names</em> with which to point to them. Attempts to think systematically about them run aground immediately at the level of language.</p><p>For example, we lack even a name<em> </em>for the particular protocol tangle comprising containerization infrastructure, the internet infrastructure used to govern it, and the multinational corporations that manage the entanglement. We are reduced to thinking in terms of <em>sui generis </em>historical episodes, such as the &#8220;2017 Maersk ransomware attack,&#8221; rather than powerful theoretical frames attached to particular units of analysis, and usefully general operating principles.</p><p>In this instance, despite the similarity of the two networks (both are packet-switched networks of sorts), it is awkward to talk about the converged tangle in the language of either containerization or the internet. For example, a key difference between the core protocols of the two networks is that internet packets can be &#8220;dropped&#8221; and re-transmitted but lost containers cannot trivially be &#8220;re-shipped.&#8221; Another is that the container network has a &#8220;backhaul&#8221; problem, but the internet does not. </p><p>How does one theorize the implications of these differences to shed light on a shared phenomenon like &#8220;buffer bloat&#8221;? Could we talk formally of reversibly vs. irreversibly lossy protocols? How does one use such theorizing to deal with problems where the two networks converge or collide in the real world, such as in the case of the Maersk ransomware attack? Could we invent a converged &#8220;internet of containers&#8221; that is robust to such attacks?</p><p>So while both might be considered part of a broader class of packet-switched networks, it is not immediately obvious how to construct a formal theory encompassing both that is <em>not</em> uselessly over-general (like the famed &#8220;spherical cow&#8221; problem), and useful in engineering application. </p><p>As a result, discourse on the beguiling similarities between these two protocol infrastructures tend to remain in the realm of poetry and metaphor. Consequential encounters between the two, like the Maersk attack, never gravitate out of history books and into engineering or management textbooks.</p><p>Where the impoverishment caused by fragmented and incompatible frames becomes too severe, as in the case of climate action, planetary AI, and blockchains, coordination fails almost entirely, and the failure of sufficiently ambitious and powerful theorization is most acutely felt.</p><p>So as protocols become ever more complex, ever more mutually entangled, and non-reducible to non-protocol infrastructures or technological islands, they become increasingly difficult to deal with and govern.</p><p>And perhaps no protocol tangle is more devilishly difficult to comprehend and investigate than the planet-scale one caused in the last half-century by computation.</p><div><hr></div><h3>The Planetary Computational Tangle</h3><p>In developing formalisms and mathematical approaches, it is worth paying special attention to a particularly consequential tangle of protocols<em>,</em> involving the varied modern interacting infrastructures that rest on computing capabilities. This tangle includes, but is not limited to: the existing internet, AI, blockchains, AR/VR, robotics, the &#8220;internet of things,&#8221; and planetary sensing/monitoring infrastructures, at all scales from microscopic to orbital.</p><p>This is the civilizational-level boss of protocol tangles, the <em>planetary computational tangle, </em>or <em>PCT. </em></p><p>As the Maersk ransomware attack episode showed, it is already clear that the default mental model of the PCT as some sort of &#8220;extended internet&#8221; has been severely strained, to the point of collapse. While pleasing new formulations like &#8220;planetary intelligence&#8221; help us at least <em>point</em> to the PCT, they typically pre-commit to an overly legible and panoramic theorization heavily shaped by a unitary perspective, aesthetic leanings, and focal interests shaped by their most charismatic elements. They miss the essential messy plurality of the PCT, and the inextricability of human experiences and agencies within it. They serve our appreciative needs, but not the instrumental needs of practically useful theorization. </p><p>To develop powerful mental models of the PCT, especially given that thinking of the internet itself as merely a &#8220;network of computers&#8221; has already proved to be highly limiting, we need a radically different approach to theorizing. One that privileges a worm&#8217;s-eye view of the tangled messiness over pleasing panoramic views and grand narratives.</p><p>For formal protocol theory, the PCT might be viewed as the &#8220;one ring&#8221; modeling and governance challenge. </p><p>To the extent we are able to build theories and practical techniques for grappling with it, we will be able to make sense of <em>all </em>dimensions of protocolization, and deal more elegantly with more bite-sized protocol problems that can be meaningfully isolated and tackled. It is already clear that existing ontologies will not do when it comes to &#8220;carving the reality of the PCT at the joints,&#8221; so to speak, to isolate problems worth tackling. New ontologies are required. </p><p>To the extent we fail, our increasingly technologically terraformed planet will become invisible not just to our senses, but also to our minds.</p><p>The irruption of AI into the world, currently the most dramatic and attention-attracting world process, is worth some additional thought. Currently, the role of AI in the PCT is being understood and constructed through the lenses of corporate product development and nation-state-based &#8220;sovereign AI&#8221; frames. This approach is inherited from previous experiences like dealing with fissile materials or climate change. These frames miss much of what is important, interesting, valuable, and risky about AI, especially when dealing with its rising &#8220;agentic&#8221; usage at planetary-infrastructure scales. Such usage is unlikely to remain limited to the traditional boundaries and capabilities of products, corporations, or nations, and human actors who identify with them.</p><p>Similarly, the role of blockchain-based infrastructures in the PCT is being reduced to rigid and relatively unimaginative nation-based identity and monetary infrastructures. This again misses much of what is important, interesting, valuable, and risky about them. The flexible programmability of infrastructures like the Ethereum &#8220;world computer,&#8221; with its capacity for expressing and articulating novel and fluid regimes of law and governance, and disciplining the myriad wildernesses of the PCT with striations of orderly hardness, remains largely unexplored. Again in part due to the limiting theoretical frames through which it is viewed.</p><p>Our mental models of the PCT are perhaps most severely compromised when it comes to the raw <em>materiality </em>of it.</p><p>There are already <a href="https://iot-analytics.com/number-connected-iot-devices/">over 17 </a><em><a href="https://iot-analytics.com/number-connected-iot-devices/">billion</a> </em>connected Internet of Things (IoT) devices in the world. We are currently on the cusp of a robotics boom. Planet-scale sensor-networks and environmental monitoring systems are beginning to take shape all around us. Warfare has already been irreversibly transformed by autonomous vehicles on air, sea, and land, and civilian life is poised to follow.</p><p>The picture is similar at the micro-scale as well. From home automation and self-driving cars, to robots on sidewalks, we are drowning in a chaotic sea of &#8220;globally local&#8221; small-scale protocols everywhere. Conventional frames, such as traditional urbanism for sidewalk governance, or home construction practices that clumsily attempt to integrate ideas like &#8220;smart keys&#8221; for package delivery and &#8220;smart thermostats&#8221; for energy management, struggle to rein in the chaos. The result is proliferating localized Darwinian &#8220;technological tangled banks&#8221; of hyperlocal infrastructure ecologies that are invisibly connected to the planetary-scale PCT.</p><p>Even apparently small, simple, and isolatable examples of protocols, such as hand-washing, become complex to theorize when they are embedded into the PCT. </p><p>What happens to handwashing, for instance, when all soap dispensers turn into small internet-connected robots that can order refills for themselves online? What changes in our behaviors when smart faucets start singing <em>happy birthday </em>at us to ensure we spend the mandated twenty seconds washing our hands in controlled environments?</p><div><hr></div><h3>Why Theorize?</h3><p>Mathematization and formalization have not always been part of human governance responses to major planetary transformations. Computerization was partially theorized early and powerfully, through the development of frameworks such as Turing machines and the lambda calculus. Globalization was accompanied by the rise of fields like operations research and supply chain management that formalized and mathematized critical aspects of it.</p><p>Economics, a field that offers many precedents, cues and clues for Protocol Studies, mathematized in fits and starts in the process growing beyond mere description and analysis to become the operating system of the global economy (as Donald Mackenzie powerfully argued in his classic, <em>An Engine, Not a Camera</em>). Along the way, thanks to the methodological demands of economics, rigorous and formal statistical sciences emerged from unsystematic beginnings in gamblers&#8217; intuitions and superstitions.</p><p>But other planetary transformation forces have resisted formalization and mathematization. Protocolization lies somewhere between phenomena like computerization and financialization on the one hand, which lend themselves very well to formalization, and phenomena like urbanization and consumerization on the other, which resist paradigmatic treatments more cohesive than ethnographic and sociological analysis.</p><p>Some mathematization and formalization is clearly possible, especially because so much of the substance of protocolization is technological. But trying to formalize <em>too </em>much is misguided.</p><p>In the second part of this essay we will lay out the particular approach the SIGFPT is taking to this challenge.</p><div><hr></div><h2>FPT Within Protocol Studies</h2><p>Formal Protocol Theory (FPT) is one of a handful of disciplinary areas within the broader emerging field of Protocol Studies, and in our activities and explorations, we maintain collegial ongoing dialogues with several peer areas, devoted to shared concerns and intellectual foundations. </p><p>The current list of areas, and associated Special Interest Groups, can be found <a href="https://summerofprotocols.com/special-interest-groups">here</a>, along with participation information. Below, we briefly describe these adjacent areas in relation to FPT (each meets once every other week).</p><h3>Memory Protocols</h3><p>The Memory Research Group (MRG), led by <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Kei Kreutler&quot;,&quot;id&quot;:111565805,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/07ba8ce1-9c72-4f42-8279-1abc7c38cb63_1100x1100.png&quot;,&quot;uuid&quot;:&quot;5ad41dff-113d-4157-8fe1-9c7b2976d62d&quot;}" data-component-name="MentionToDOM"></span> , studies the role of <em>memory </em>in protocols, protocol technologies, and protocolization processes.</p><p>Perhaps one of the major contributing factors to the invisibility of protocols is their close relationship to memory and forgetting. The most successful protocols don&#8217;t involve user manuals during their operation, but produce and propagate the necessary, operable memory through their performance. In the spirit of the &#8220;medium is the message,&#8221; we might say that &#8220;the protocol is the memory.&#8221; For example, blockchains produce a record of their actions as part of their actions themselves, and this record is actually one of their primary utilities. The contemporary era of protocolization is marked by the ever-closer coincidence of procedures and their memory traces.</p><p>The MRG studies memory in all its manifestations, and in 2026, SIGFPT will take cues from MRG to look for ways in which we might formalize and theorize the memory features of protocols.</p><h3>Protocols for Business</h3><p>The Special Interest Group in Protocols for Business (SIGP4B), led by <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;rafa&quot;,&quot;id&quot;:2227765,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/477725d7-0c1b-48c8-9d66-bbd3ec3fbb6e_907x907.jpeg&quot;,&quot;uuid&quot;:&quot;330874d9-f11d-4b1b-a65d-acd878d027eb&quot;}" data-component-name="MentionToDOM"></span>, studies protocols within organizations, approaching the domains of existing fields like management science, organizational behavior, and organizational psychology, through the lens of protocol theory.</p><p>Specialized organizations and sectors that fulfill various societal functions have historically been the locus of a great deal of protocol development and evolution. Technological specialization is another major contributing factor to the invisibility of protocols. Not only are many protocol infrastructures hidden behind the boundaries of organizations devoted to developing and using them, <em>knowledge </em>of such protocols is also hidden behind sector-specific jargon. Even protocols that enjoy a degree of universal presence across sectors and industries and some lay familiarity &#8211; such as those involved in managing supply chains, or staff functions such as human resources and facilities management &#8211; tend to become invisible behind the boundaries of functional specialization.</p><p>Currently SIGP4B is undertaking a protocol-theoretic exploration of perhaps the most important organizational technology in a century: AI. Effective adoption and use of AI technologies is a <em>protocolization </em>problem that is being simultaneously tackled by all organizations across the world in near-crisis mode. There is much to see and learn.</p><p>In 2026, SIGFPT will take cues from SIGP4B to help theorize the injection of AI into traditional organizational environments.</p><h3>Protocol Fiction</h3><p>Building on a year of publishing dozens of protocol fiction stories here on <em>Protocolized, </em>the Protocol Fiction SIG, led by <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Spencer Nitkey - Writer&quot;,&quot;id&quot;:309697450,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/133957fe-5971-4c5c-9f00-0bde2613e43d_1170x1170.jpeg&quot;,&quot;uuid&quot;:&quot;196f5dbe-3f29-434d-aff0-a92e88face38&quot;}" data-component-name="MentionToDOM"></span> and <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Sachin&quot;,&quot;id&quot;:933715,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ce504ddb-8d64-4324-bc9f-b82a74139a54_3024x3024.jpeg&quot;,&quot;uuid&quot;:&quot;899f505f-7290-4bc2-9ee8-ade517a90c0b&quot;}" data-component-name="MentionToDOM"></span>, studies the rules and principles of this emerging genre, and explores how to look at our protocolizing world more effectively through stories.</p><p>For us in SIGFPT, we hope to find both stimulation and entertainment in the work of this SIG, as well as inspiration and motivation. Fiction can often point to subtle phenomena and generative contradictions and paradoxes that can power theoretical investigations. The notion of &#8220;protocol tangles&#8221; developed in this essay, for example, was largely inspired by the many tangled plots and premises that have been explored through protocol fiction in the last year. </p><p>Besides these three peer SIGs, other SIGs may be spun up this year.</p><h2>Further Reading</h2><p>In the second part of this essay we will dive deeper into our early ideas. In the meantime, if you&#8217;re interested in participating in SIGFPT, you may want to read these older updates based on our work in 2025.</p><p><a href="https://protocolized.summerofprotocols.com/p/what-is-formal-protocol-theory">What is Formal Protocol Theory</a></p><p><a href="https://protocolized.summerofprotocols.com/p/constructing-the-evil-twin-of-ai">Constructing the Evil Twin of AI</a></p><p>We hope to see you this Friday for our 2026 kickoff.</p><p><em><strong>Join us on our <a href="https://discord.gg/SfY7UzCS">Discord</a> for the 2026 kickoff meeting of SIGFPT on Friday, January 9, 10am Pacific. <a href="https://calendar.google.com/calendar/u/0/r/eventedit/copy/MWoxaXZ0NWc3MDgzNTNibWNiMzNpcWQ0bWhfMjAyNjAxMDlUMTgwMDAwWiBoZWxsb0BzdW1tZXJvZnByb3RvY29scy5jb20">Calendar invite for series.</a></strong></em></p><div><hr></div><p><strong>Acknowledgements</strong> <br>Thanks to Giovanni Merlino, Mike Travers, Patrick Atwater, Seth Killian, Jonathan Moreg&#229;rd, Joseph Michela, and Kei Kreutler for comments and contributions to this essay in draft stage.</p>]]></content:encoded></item><item><title><![CDATA[How to Protocol Watch]]></title><description><![CDATA[Issue #84: A miniature hobby for the New Year, suitable for the aspiring intellectual adventurer and without the extravagant overhead of a seafaring voyage.]]></description><link>https://protocolized.summerofprotocols.com/p/how-to-protocol-watch</link><guid isPermaLink="false">https://protocolized.summerofprotocols.com/p/how-to-protocol-watch</guid><dc:creator><![CDATA[Timber Stinson-Schroff]]></dc:creator><pubDate>Wed, 31 Dec 2025 11:01:36 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!2-29!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc624a762-18a5-4abd-83ae-2ea59abedad1_1200x1200.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The story of Charles Darwin&#8217;s finches would sound strange if Darwin was, himself, a finch.</p><p>But that <em>is</em> the strange story of Bronis&#322;aw Malinowski, who after a childhood of illness became a pioneer of anthropology. In 1914, Malinowski accidentally began an expedition to Melanesia &#8211; documenting social systems in New Guinea, Fiji, New Caledonia &#8211; that would return him to Europe five years later, in 1919. You might think that you were born too late for such an adventure, but you were not.</p><p>Malinowski was an influential and contentious researcher. The 2018 edition of the International Encyclopedia of Ethnography <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781118924396">credited</a> him with shaping the field of ethnography. He was <a href="https://en.wikipedia.org/wiki/Off_the_verandah">known for</a> stressing the importance of getting &#8220;off the verandah&#8221; and exploring everyday life. Not all of his colleagues approved of his methodology and it&#8217;s unlikely that his opinions have aged well.</p><p>What did last, however, were Malinowski&#8217;s innovations to the art of people watching.</p><p>Fei Xiaotong was among Malinowski&#8217;s students at the London School of Economics and went on to have an adventurous, difficult career as an anthropologist in China. Fei embraced Malinowski&#8217;s anti-armchair sensibility but disagreed with his claim that social institutions exist to satisfy <em>universal</em> human needs &#8211; arguing that social order is more about relational positioning and that Chinese society cannot be reduced to problem-solution pairs.</p><p>Today, such intellectual adventures don&#8217;t require the overhead of an expedition. You needn&#8217;t go far to find strange rules; you might not realize how much you live in your own world. Every day we interface with a tangled bank of technologies, laws, and cultural norms. Paying attention to the world <em>around us</em> is enriching; I would argue that we have far more interesting things to observe than Malinowski did.</p><p>Scholarship and profitable application can be an afterthought. Before Darwin was Darwin, he was Charles, a birdwatcher from England. His naturalistic theories emerged from thorough documentation. He was collecting data <em>without</em> a hypothesis!</p><p>If you&#8217;re unfamiliar, <em>protocol watching</em> can be grokked as a cousin to birdwatching or people watching. Its closest sibling might be <em>umarelling</em>; loitering around construction sites to check out works in progress. It has a simple definition: watch the protocols &#8211; from TCP/IP to traffic lights &#8211; as they happen around you.</p><p>Ethnographic practices might help us all to be more observant in and around our professional spaces. </p><p>Software UI/UX designers, bike lane planners, and football coaches alike must study how people interact with each other and with their environments. People in these jobs, however, start with goals in mind. They have an objective: improve user retention, reduce accidents, win more trophies, etc. Protocol watchers are also rigorous, but don&#8217;t have the disadvantage of time pressure. They can collect, collect, and collect and let patterns &#8211; and profit &#8211; emerge naturally.</p><p>It&#8217;s a potent, if nerdy, hobby. I wrote a <a href="https://summerofprotocols.com/wp-content/uploads/2024/06/SCHROFF-Protocol-Watching-HANDOUT.pdf">first version of this guide</a> last year. Since then, I&#8217;ve gotten a much better feel for patterns in how we coordinate, argue, and share information. No course registration required. No sailing ship overhead. From hiking trails and mechanic shops to airport tarmacs and financial transactions, there&#8217;s always something to learn or even replicate. It&#8217;s an adventure-in-a-lens.</p><p>My challenge to you: take up protocol watching as a miniature hobby for the new year. It&#8217;s perfect for transforming dead time in airports, traffic jams, and boarding queues into a tad more interesting downtime. It&#8217;s also a sneaky way to get off your phone a bit more, if that&#8217;s on your list of resolutions.</p><p>Some examples to orient your eyeballs:</p><ul><li><p><strong>Queueing protocols at airports, bus stations, and ferry ports. </strong>Who gets to skip the line? Are there different types of lanes?</p></li><li><p><strong>Gift-giving protocols at parties.</strong> Are you expected to bring something for the host? What purpose do gifts serve? Is the expectation stated or implicit? When do people open gifts?</p></li><li><p><strong>Out-of-office messages. </strong>What information do people provide? How standardized is it? Is the medium automated emails, their main publication, or their website?</p></li><li><p><strong>Hardware standards.</strong> Charging outlets, bolt sizes, countertop heights &#8211; they afford interoperability in the long run, but is it worth the inconvenience? Who <em>makes</em> standards?</p></li><li><p><strong>Transactions</strong><em><strong>. </strong></em>How do you establish trust with vendors? When people get stuck on the side of the road in a snowbank, why is it that others help without expectation of compensation?</p></li></ul><p>It&#8217;s important to follow your own interests when protocol watching. Otherwise it will be less of a hobby and more work. Enthusiasm is the bottleneck &#8211; Darwin and Malinowski both entertained a deep-seated interest. Treat the examples above, and the tools and tips of the trade below as a starter pack of suggestions. Once you&#8217;ve spotted a couple of easy-to-recognize protocols, keep looking and take note of everything <em>you</em> find interesting and potentially useful.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2-29!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc624a762-18a5-4abd-83ae-2ea59abedad1_1200x1200.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2-29!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc624a762-18a5-4abd-83ae-2ea59abedad1_1200x1200.png 424w, https://substackcdn.com/image/fetch/$s_!2-29!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc624a762-18a5-4abd-83ae-2ea59abedad1_1200x1200.png 848w, https://substackcdn.com/image/fetch/$s_!2-29!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc624a762-18a5-4abd-83ae-2ea59abedad1_1200x1200.png 1272w, https://substackcdn.com/image/fetch/$s_!2-29!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc624a762-18a5-4abd-83ae-2ea59abedad1_1200x1200.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2-29!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc624a762-18a5-4abd-83ae-2ea59abedad1_1200x1200.png" width="500" height="500" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c624a762-18a5-4abd-83ae-2ea59abedad1_1200x1200.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1200,&quot;width&quot;:1200,&quot;resizeWidth&quot;:500,&quot;bytes&quot;:396023,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/182784312?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc624a762-18a5-4abd-83ae-2ea59abedad1_1200x1200.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2-29!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc624a762-18a5-4abd-83ae-2ea59abedad1_1200x1200.png 424w, https://substackcdn.com/image/fetch/$s_!2-29!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc624a762-18a5-4abd-83ae-2ea59abedad1_1200x1200.png 848w, https://substackcdn.com/image/fetch/$s_!2-29!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc624a762-18a5-4abd-83ae-2ea59abedad1_1200x1200.png 1272w, https://substackcdn.com/image/fetch/$s_!2-29!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc624a762-18a5-4abd-83ae-2ea59abedad1_1200x1200.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2>Tools</h2><p>Since everyone likes tools, we&#8217;ll start with those. These will help you build a sharper eye, faster. They&#8217;re also the backbone of a compounding hobby. The thoroughness of your notes or working memory will determine how easily you can spot patterns in your observations later. These tools will help you record, detect, inspect, and taxonomize the protocols you observe.</p><h4>NOTES</h4><p>At a minimum you should keep notes, whether on paper or digitally. Minimalists and flaneurs can start with just a notebook or mobile notes app &#8211; aim to fill up your first notebook <strong>as fast as possible</strong>.</p><p>To level up your game, the best off-the-shelf tool for this is the <a href="https://medlab.host/bicorder/">Protocol Bicorder</a>, developed by University of Colorado professor Nathan Schneider, who also maintains the <a href="https://protocol.ecologies.info/">Protocol Oral History Project</a>. The recently-created Bicorder will help you understand and catalogue protocols via some scoring scales, based on research from the Summer of Protocols program. I recommend you enable the <strong>Short Form</strong> mode.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TmWP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c895cf2-5034-43f9-ab8a-5a487d55f996_1600x1223.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TmWP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c895cf2-5034-43f9-ab8a-5a487d55f996_1600x1223.png 424w, https://substackcdn.com/image/fetch/$s_!TmWP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c895cf2-5034-43f9-ab8a-5a487d55f996_1600x1223.png 848w, https://substackcdn.com/image/fetch/$s_!TmWP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c895cf2-5034-43f9-ab8a-5a487d55f996_1600x1223.png 1272w, https://substackcdn.com/image/fetch/$s_!TmWP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c895cf2-5034-43f9-ab8a-5a487d55f996_1600x1223.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TmWP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c895cf2-5034-43f9-ab8a-5a487d55f996_1600x1223.png" width="510" height="389.8557692307692" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8c895cf2-5034-43f9-ab8a-5a487d55f996_1600x1223.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1113,&quot;width&quot;:1456,&quot;resizeWidth&quot;:510,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!TmWP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c895cf2-5034-43f9-ab8a-5a487d55f996_1600x1223.png 424w, https://substackcdn.com/image/fetch/$s_!TmWP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c895cf2-5034-43f9-ab8a-5a487d55f996_1600x1223.png 848w, https://substackcdn.com/image/fetch/$s_!TmWP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c895cf2-5034-43f9-ab8a-5a487d55f996_1600x1223.png 1272w, https://substackcdn.com/image/fetch/$s_!TmWP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c895cf2-5034-43f9-ab8a-5a487d55f996_1600x1223.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Sketching is another nice way to take notes. Whether it&#8217;s a physical thing you draw or a choreography at a TSA security checkpoint, we&#8217;d love to see what you come up with.</p><h4>COMMUNITY</h4><p>When kickstarting a hobby, it&#8217;s helpful to chat with fellow hobbyists. Documenting and sharing protocols is also just fun. Our Discord has a <a href="https://discord.gg/sjgA9nh9g9">dedicated #protocol-watch channel</a> for exactly that. Posting there is low stakes and even lurking will give you a sense for how other people treat this as a hobby. Send a photo, video, sketch, or the JSON file generated from your bicorder entry anytime.</p><p>Protocol watching is also more fun with a buddy, kind of like people watching. Provided you have a sufficiently nerdy friend or anthropologist family member nearby, this could make for a good way to kill time.</p><h4>TENSION DIAGRAMS</h4><p>Every protocol is an <em>engineered argument</em> and exists to manage an underlying <em>tension</em>. Part of the game of protocol watching is trying to identify that tension. A common one is convenience vs. safety (hello again, TSA). At a minimum, you should seek to name the tension. If you want to level up your intuitions, make a diagram with the following template.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!AQRB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9dc34414-559a-4508-9825-d7f20a5f0cd9_896x558.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!AQRB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9dc34414-559a-4508-9825-d7f20a5f0cd9_896x558.png 424w, https://substackcdn.com/image/fetch/$s_!AQRB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9dc34414-559a-4508-9825-d7f20a5f0cd9_896x558.png 848w, https://substackcdn.com/image/fetch/$s_!AQRB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9dc34414-559a-4508-9825-d7f20a5f0cd9_896x558.png 1272w, https://substackcdn.com/image/fetch/$s_!AQRB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9dc34414-559a-4508-9825-d7f20a5f0cd9_896x558.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!AQRB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9dc34414-559a-4508-9825-d7f20a5f0cd9_896x558.png" width="648" height="403.55357142857144" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9dc34414-559a-4508-9825-d7f20a5f0cd9_896x558.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:558,&quot;width&quot;:896,&quot;resizeWidth&quot;:648,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!AQRB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9dc34414-559a-4508-9825-d7f20a5f0cd9_896x558.png 424w, https://substackcdn.com/image/fetch/$s_!AQRB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9dc34414-559a-4508-9825-d7f20a5f0cd9_896x558.png 848w, https://substackcdn.com/image/fetch/$s_!AQRB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9dc34414-559a-4508-9825-d7f20a5f0cd9_896x558.png 1272w, https://substackcdn.com/image/fetch/$s_!AQRB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9dc34414-559a-4508-9825-d7f20a5f0cd9_896x558.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Label the axes with your factors. Draw a trade-off curve. Where does the protocol land? Is it on the frontier? Or can you easily imagine a tweak that would improve, say, convenience AND safety at the same time? Which actors prefer a safer version? Who prefers a more convenient version?</p><p>For a detailed example, check out <a href="https://protocolized.summerofprotocols.com/p/one-tension-to-rule-them-all">One Tension to Rule Them All.</a></p><h4>TRANSLATORS AND TRACKERS</h4><p>A translator is a must-have tool. For example, the maintenance tags on fire extinguishers and defibrillators are full of jargon, codes, and acronyms. Using an LLM can help you translate those really quickly. You might also see protocol artifacts written in other languages &#8211; are there subtle differences not explained by translation?</p><p>Trackers are another fun augmentation. They are the telescope of protocol watching. Tools like <a href="https://www.flightaware.com/">FlightAware</a>, <a href="https://firms.modaps.eosdis.nasa.gov/usfs/map/#d:24hrs;@-100.0,40.0,4.0z">FIRMS</a>, <a href="https://www.vesselfinder.com/">VesselFinder</a>, <a href="https://www.iso.org/popular-standards.html">ISO</a> standards, and <a href="https://www.iqair.com/ca/world-air-quality">IQ</a><em><a href="https://www.iqair.com/ca/world-air-quality">Air</a></em> all provide a unique look at the world. You can track flights, wildfires, cargo ships, food classification standards, and global air quality all from your phone browser.</p><p>You can also use LLMs to generate professional briefs and histories of protocols you observe, as <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;rafa&quot;,&quot;id&quot;:2227765,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/477725d7-0c1b-48c8-9d66-bbd3ec3fbb6e_907x907.jpeg&quot;,&quot;uuid&quot;:&quot;8df7106c-078e-4075-8202-1f5b5195cb9b&quot;}" data-component-name="MentionToDOM"></span> and <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Sachin&quot;,&quot;id&quot;:933715,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ce504ddb-8d64-4324-bc9f-b82a74139a54_3024x3024.jpeg&quot;,&quot;uuid&quot;:&quot;78166606-ced0-4b22-92ff-6d13430c986b&quot;}" data-component-name="MentionToDOM"></span> sometimes do with their writing projects, <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;NPC Inc.&quot;,&quot;id&quot;:56856,&quot;type&quot;:&quot;pub&quot;,&quot;url&quot;:&quot;https://open.substack.com/pub/npcmemo&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9ec19412-b31c-4ec8-8f13-97dee50e9aae_1024x1024.png&quot;,&quot;uuid&quot;:&quot;081d46e7-aded-4977-93ee-2dd8751aa735&quot;}" data-component-name="MentionToDOM"></span> and <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Summer Lightning &quot;,&quot;id&quot;:2936,&quot;type&quot;:&quot;pub&quot;,&quot;url&quot;:&quot;https://open.substack.com/pub/summerlightning&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/394ce0b5-9d46-4aec-8ae1-1599fa63b399_1280x1280.png&quot;,&quot;uuid&quot;:&quot;aa7bba22-9f98-491b-bafe-1c0f05991e6a&quot;}" data-component-name="MentionToDOM"></span>, respectively. </p><div><hr></div><h2>Tips</h2><p>Your toolkit should also include some principles and heuristics. These three tips will help you improve over time and might enable your protocol watching to compound from hobby to competency.</p><p>First, go for the hotspots. Places with a mix of hardcore engineering and human factors, like airports, libraries, kitchens, universities, factories, mines, farms, legislative assemblies, and so forth.</p><p>Second, go through, around, and behind the protocols. Get a feel for what they&#8217;re like as a participant. Try to hack them &#8211; skip lines, find workarounds. Talk to the people who design and enforce them. By exploring multiple perspectives you&#8217;ll develop a much richer perspective or, at least, not become as jaded towards a protocol&#8217;s apparent dysfunction.</p><p>On a related note, the third thing you should pay attention to: protocols are most visible when they&#8217;re <em>not </em>working. As much as it&#8217;s fun to catch one breaking down, it&#8217;s even more satisfying to spot a protocol that&#8217;s doing its job invisibly well.</p><div><hr></div><p>Congrats, you&#8217;re now initiated to the protocol watching club! Beyond the benefits mentioned above (and general aura enhancement), this certification will improve your odds of acceptance into next year&#8217;s <a href="https://summerofprotocols.com/protocol-school-open-access">Protocol School</a>.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.linkedin.com/profile/add?startTask=CERTIFICATION_NAME &amp;name=Certified%20Protocol%20Watcher &amp;organizationName=Summer%20of%20Protocols &amp;issueYear=2025 &amp;issueMonth=1 &amp;credentialUrl=https%3A%2F%2Fprotocolized.substack.com%2Fp%2Fhow-to-protocol-watch&quot;,&quot;text&quot;:&quot;Add to LinkedIn&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.linkedin.com/profile/add?startTask=CERTIFICATION_NAME &amp;name=Certified%20Protocol%20Watcher &amp;organizationName=Summer%20of%20Protocols &amp;issueYear=2025 &amp;issueMonth=1 &amp;credentialUrl=https%3A%2F%2Fprotocolized.substack.com%2Fp%2Fhow-to-protocol-watch"><span>Add to LinkedIn</span></a></p><p>The editorial team at <em>Protocolized</em> is thrilled about all of the stories and studies we published this year. We encourage anyone who wants to write with us to try protocol watching. It will help sharpen your imagination for futures that might logically unfold from new technologies. It will also help you add another dimension to you worldview.</p><p>Happy protocol watching and thanks for reading <em>Protocolized</em>. All 84(!) issues from this year are available in <strong><a href="https://protocolized.summerofprotocols.com/archive">archive</a></strong>. See you in 2026 for more stories about strange rules and essays about protocols &#8211; the world&#8217;s (mostly) invisible infrastructure.</p><p>The <em>Protocolized</em> team - <a href="https://substack.com/@timberstinsonschroff?">Timber</a>, <a href="https://substack.com/@contraptions">Venkat</a>, <a href="https://substack.com/@timbeiko">Tim</a>, <a href="https://substack.com/@typohypergraphicobject">James</a>, <a href="https://substack.com/@j0xhd?utm_source=global-search">Josh</a>, and <a href="https://substack.com/@jdbbb">Jenna</a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://protocolized.summerofprotocols.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://protocolized.summerofprotocols.com/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[Memory Research Group: Six Months of Reading Backward Through Time]]></title><description><![CDATA[Issue #83: Sometimes What is Remembered Most is What is Most Dynamically Changing]]></description><link>https://protocolized.summerofprotocols.com/p/memory-research-group-six-months</link><guid isPermaLink="false">https://protocolized.summerofprotocols.com/p/memory-research-group-six-months</guid><dc:creator><![CDATA[Kei Kreutler]]></dc:creator><pubDate>Sat, 27 Dec 2025 22:22:20 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/1fc04526-3ca7-4bc6-a65b-cc6f93cdc091_1200x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>This is an archive-driven summary of the Memory Research Group during its first six months. By the end of January, we&#8217;ll send an email update on how the group plans to renew and resume in the new year.</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!04fE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2fc4ecc-56db-4b06-a0b6-3f549876000e_1000x1000.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!04fE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2fc4ecc-56db-4b06-a0b6-3f549876000e_1000x1000.png 424w, https://substackcdn.com/image/fetch/$s_!04fE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2fc4ecc-56db-4b06-a0b6-3f549876000e_1000x1000.png 848w, https://substackcdn.com/image/fetch/$s_!04fE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2fc4ecc-56db-4b06-a0b6-3f549876000e_1000x1000.png 1272w, https://substackcdn.com/image/fetch/$s_!04fE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2fc4ecc-56db-4b06-a0b6-3f549876000e_1000x1000.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!04fE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2fc4ecc-56db-4b06-a0b6-3f549876000e_1000x1000.png" width="500" height="500" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d2fc4ecc-56db-4b06-a0b6-3f549876000e_1000x1000.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1000,&quot;width&quot;:1000,&quot;resizeWidth&quot;:500,&quot;bytes&quot;:143361,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/181987879?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2fc4ecc-56db-4b06-a0b6-3f549876000e_1000x1000.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!04fE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2fc4ecc-56db-4b06-a0b6-3f549876000e_1000x1000.png 424w, https://substackcdn.com/image/fetch/$s_!04fE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2fc4ecc-56db-4b06-a0b6-3f549876000e_1000x1000.png 848w, https://substackcdn.com/image/fetch/$s_!04fE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2fc4ecc-56db-4b06-a0b6-3f549876000e_1000x1000.png 1272w, https://substackcdn.com/image/fetch/$s_!04fE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2fc4ecc-56db-4b06-a0b6-3f549876000e_1000x1000.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p>Between June and December 2025, the Memory Research Group met every two weeks to read texts about memory. The readings played with juxtaposing different historical approaches to memory. We began with classical techniques, then embarked on a digital memory architectures module with contemporary AI systems before moving onto older physical memory substrates again. This allowed us to trace the present&#8217;s confusions backward to see which problems are genuinely new and which keep recurring under different names.</p><p>The group convened via the Summer of Protocols Discord, with participants from neuroscience, computer science, philosophy, architecture, and design reading texts together in real time before discussing them. We weren&#8217;t trying to arrive at a unified theory of memory, but instead trying to distinguish how memory operates in different contexts.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://protocolized.summerofprotocols.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://protocolized.summerofprotocols.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h3><strong>June: Early Memory Techniques</strong></h3><p><strong>Reading: Frances A. Yates, </strong><em><strong>The Art of Memory</strong></em><strong> (1966).</strong></p><p>The group started with Frances Yates&#8217;s <em>The Art of Memory</em>. Yates discusses the method of loci &#8211; placing memorable images in imagined architectural spaces &#8211; exemplifying memory as active practice rather than passive storage. The ancient Hellenic poet Simonides realized after a building collapse that he could remember where everyone had been seated among the ruins. This became a protocol: associate information with locations in space, and you can retrieve it reliably.</p><p>What stood out was how these ancient techniques didn&#8217;t oppose knowing with memorizing. Memory was described as the faculty enabling &#8220;firm perception of things,&#8221; not just the stockpiling of facts. Some 15th century practitioners picked up on this lineage, developing elaborate systems for organizing ways of thinking, not just information. The group noted tensions around trusting external representations versus cultivating internal capacity, a concern that would keep reappearing when we discussed digital systems.</p><p>Related to this month&#8217;s topics, read the post <a href="https://protocolized.summerofprotocols.com/p/a-very-short-introduction-to-memory">A Very Short Introduction to Memory and Technology</a>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!x6X2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21099f49-e1bc-499c-8e6d-cc7e81f754d3_1000x1000.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!x6X2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21099f49-e1bc-499c-8e6d-cc7e81f754d3_1000x1000.png 424w, https://substackcdn.com/image/fetch/$s_!x6X2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21099f49-e1bc-499c-8e6d-cc7e81f754d3_1000x1000.png 848w, https://substackcdn.com/image/fetch/$s_!x6X2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21099f49-e1bc-499c-8e6d-cc7e81f754d3_1000x1000.png 1272w, https://substackcdn.com/image/fetch/$s_!x6X2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21099f49-e1bc-499c-8e6d-cc7e81f754d3_1000x1000.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!x6X2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21099f49-e1bc-499c-8e6d-cc7e81f754d3_1000x1000.png" width="300" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/21099f49-e1bc-499c-8e6d-cc7e81f754d3_1000x1000.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1000,&quot;width&quot;:1000,&quot;resizeWidth&quot;:300,&quot;bytes&quot;:14395,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/181987879?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21099f49-e1bc-499c-8e6d-cc7e81f754d3_1000x1000.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!x6X2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21099f49-e1bc-499c-8e6d-cc7e81f754d3_1000x1000.png 424w, https://substackcdn.com/image/fetch/$s_!x6X2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21099f49-e1bc-499c-8e6d-cc7e81f754d3_1000x1000.png 848w, https://substackcdn.com/image/fetch/$s_!x6X2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21099f49-e1bc-499c-8e6d-cc7e81f754d3_1000x1000.png 1272w, https://substackcdn.com/image/fetch/$s_!x6X2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21099f49-e1bc-499c-8e6d-cc7e81f754d3_1000x1000.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>July: Distributed Cognition</strong></h3><p><strong>Reading: Edwin Hutchins, </strong><em><strong>Cognition in the Wild</strong></em><strong> (1995); Michael Levin, &#8216;The Space Of Possible Minds&#8217; (Noema); Michael Levin et al., &#8216;Endogenous Bioelectric Networks Store Non-Genetic Patterning Information During Regeneration and Development&#8217; (2021).</strong></p><p>Edwin Hutchins&#8217;s <em>Cognition in the Wild</em> documented techniques of naval navigation, arguing that memory and cognition distribute across people, tools, and environments. In this context, a ship&#8217;s navigation team doesn&#8217;t allow crucial information to exist only in one member&#8217;s memory. Instead, practices spread across coordinated action and material artifacts. This raised questions about whether memory requires a specific substrate at all, or whether it is better understood as patterns of coordination.</p><p>We followed this by reading Michael Levin&#8217;s work on bioelectric networks, which proposed that a kind of memory exists in the electrical patterns of cells, not just neural systems. His research on how organisms store non-genetic information during development and pass it on to future generations expanded the working definition of memory beyond neural substrates entirely. The group wrestled with what it means to call something &#8220;memory&#8221; when it operates without anything resembling conscious recall.</p><div><hr></div><h3><strong>August: Spatial Memory and Medieval Neuropsychology</strong></h3><p><strong>Reading: O&#8217;Keefe and Nadel, </strong><em><strong>The Hippocampus as a Cognitive Map</strong></em><strong> (1978); Mary Carruthers, </strong><em><strong>The Craft of Thought</strong></em><strong> (1998).</strong></p><p>O&#8217;Keefe and Nadel&#8217;s <em>The Hippocampus as a Cognitive Map</em> distinguished between cognitive maps and stimulus-response learning. The hippocampus doesn&#8217;t store information about locations alone, but rather builds associative models of spatial relationships. This connected back to ancient memory palaces: spatial organization seems fundamental to how we recall knowledge.</p><p>Mary Carruthers&#8217;s <em>The Craft of Thought</em> examined how medieval Europeans conceived of memory as residing in physical locations within the body. Memorial landscapes were imagined architectural spaces for organizing theological and philosophical knowledge. This session was guest hosted by Aaron Z. Lewis, who wrote the text &#8216;<a href="https://summerofprotocols.com/research/four-doors">Four Doors &#8211; A Portal to Sacred Memory Protocols</a>&#8217; for the Summer of Protocols 2023 cohort.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Izmq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7c46be3-ef3a-4313-a4e8-5fe8010d23b7_300x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Izmq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7c46be3-ef3a-4313-a4e8-5fe8010d23b7_300x300.png 424w, https://substackcdn.com/image/fetch/$s_!Izmq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7c46be3-ef3a-4313-a4e8-5fe8010d23b7_300x300.png 848w, https://substackcdn.com/image/fetch/$s_!Izmq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7c46be3-ef3a-4313-a4e8-5fe8010d23b7_300x300.png 1272w, https://substackcdn.com/image/fetch/$s_!Izmq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7c46be3-ef3a-4313-a4e8-5fe8010d23b7_300x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Izmq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7c46be3-ef3a-4313-a4e8-5fe8010d23b7_300x300.png" width="300" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c7c46be3-ef3a-4313-a4e8-5fe8010d23b7_300x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:300,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:16903,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/181987879?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7c46be3-ef3a-4313-a4e8-5fe8010d23b7_300x300.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Izmq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7c46be3-ef3a-4313-a4e8-5fe8010d23b7_300x300.png 424w, https://substackcdn.com/image/fetch/$s_!Izmq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7c46be3-ef3a-4313-a4e8-5fe8010d23b7_300x300.png 848w, https://substackcdn.com/image/fetch/$s_!Izmq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7c46be3-ef3a-4313-a4e8-5fe8010d23b7_300x300.png 1272w, https://substackcdn.com/image/fetch/$s_!Izmq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7c46be3-ef3a-4313-a4e8-5fe8010d23b7_300x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>September: Where Memory Lives</strong></h3><p><strong>Reading: Contemporary neuroscience research speedrun; Mary Carruthers, </strong><em><strong>The Book of Memory</strong></em><strong> (2008).</strong></p><p>A research speedrun on contemporary neuroscience was followed by Carruthers&#8217;s <em>The Book of Memory</em>, on medieval neuropsychology. Reading about memory stored in the heart, regulated by bodily humors, organized through visual imagery, participants reflected on where they personally experience memory. Most noted that they don&#8217;t experience memories as stored anywhere in particular; memories arise in response to contexts and triggers, rather than being retrieved from a location, at least in some of today&#8217;s cultures.</p><p>Related to this month&#8217;s topics, read the post <a href="https://protocolized.summerofprotocols.com/p/reflections-from-memoria">Reflections from Memoria</a>.</p><div><hr></div><h3><strong>October: Digital Memory Architectures</strong></h3><p><strong>Reading: Amit Bahree, &#8216;What is KV Cache in LLMs and How Does It Help?&#8217; (2025); Alan J. Smith, &#8216;Cache Memory Design: An Evolving Art&#8217; (1987).</strong></p><p>The turn toward digital systems began with understanding KV (key-value) caches in large language models. These caches allow transformer models to remember previous tokens without recomputing everything from scratch. It&#8217;s a computational efficiency trick, but it raises questions about what distinguishes &#8220;remembering&#8221; from simply having information available. The group discussed parallels to human working memory constraints.</p><p>Cache memory systems in 1980s computer architecture followed. Alan Jay Smith&#8217;s 1987 overview explained how cache memory bridges performance gaps between the relative speeds of processors and main storage through predictions about which data will be needed next. The principle of locality &#8211; recently accessed information is likely to be accessed again &#8211; operates across both biological and technological systems.</p><p>Related to this month&#8217;s topics, read the post <a href="https://protocolized.summerofprotocols.com/p/images-of-memory">Images of Memory</a>.</p><div><hr></div><h3><strong>November: Magnetic Core Memory</strong></h3><p><strong>Reading: Paul E. Ceruzzi, </strong><em><strong>A History of Modern Computing</strong></em><strong> (excerpts); &#8216;Magnetic Core Memory,&#8217; Computer History Museum.</strong></p><p>Magnetic core memory, an early form of computer memory storage, brought the group into direct contact with memory&#8217;s materiality. Reading Paul Ceruzzi&#8217;s history, the group examined how early computers stored data in tiny ferrite rings magnetized in different directions. Each bit was literally woven by hand into arrays of wire and magnetic cores. After months discussing more abstract cognitive processes, this tangibility was striking. Software woven into hardware collapsed distinctions between code and physical object in ways that contemporary solid-state memory obscures.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7nav!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F541dcc9f-719d-4682-bdd0-2c0dcf38fba5_814x814.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7nav!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F541dcc9f-719d-4682-bdd0-2c0dcf38fba5_814x814.png 424w, https://substackcdn.com/image/fetch/$s_!7nav!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F541dcc9f-719d-4682-bdd0-2c0dcf38fba5_814x814.png 848w, https://substackcdn.com/image/fetch/$s_!7nav!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F541dcc9f-719d-4682-bdd0-2c0dcf38fba5_814x814.png 1272w, https://substackcdn.com/image/fetch/$s_!7nav!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F541dcc9f-719d-4682-bdd0-2c0dcf38fba5_814x814.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7nav!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F541dcc9f-719d-4682-bdd0-2c0dcf38fba5_814x814.png" width="300" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/541dcc9f-719d-4682-bdd0-2c0dcf38fba5_814x814.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:814,&quot;width&quot;:814,&quot;resizeWidth&quot;:300,&quot;bytes&quot;:74798,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/181987879?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F541dcc9f-719d-4682-bdd0-2c0dcf38fba5_814x814.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!7nav!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F541dcc9f-719d-4682-bdd0-2c0dcf38fba5_814x814.png 424w, https://substackcdn.com/image/fetch/$s_!7nav!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F541dcc9f-719d-4682-bdd0-2c0dcf38fba5_814x814.png 848w, https://substackcdn.com/image/fetch/$s_!7nav!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F541dcc9f-719d-4682-bdd0-2c0dcf38fba5_814x814.png 1272w, https://substackcdn.com/image/fetch/$s_!7nav!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F541dcc9f-719d-4682-bdd0-2c0dcf38fba5_814x814.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>December: Virtual Memory and Metaphor</strong></h3><p><strong>Reading: Matthew G. Kirschenbaum, &#8216;Extreme Inscription: Towards a Grammatology of the Hard Drive&#8217;; Italo Calvino, </strong><em><strong>Invisible Cities.</strong></em></p><p>The advent of virtual memory marked the shift from physical to abstract storage. Learning about how memory became virtualized in computers &#8211; no longer tied to specific physical locations but dynamically mapped and remapped by operating systems &#8211; introduced a new layer of ambiguity in our concept of memory. In this context, the illusion of continuous memory space maintained through constant background processes revealed memory more as performance than substance.</p><p>The final session turned to Italo Calvino&#8217;s <em>Invisible Cities</em> and the question: what core metaphors do each of us use to relate to memory? After months of technical readings, this offered space to share more personal reflections.</p><div><hr></div><h3><strong>What Keeps Recurring</strong></h3><p>Jumping around chronologically in our readings revealed that contemporary technical systems have rediscovered some of the tradeoffs and ambiguities of memory through different means. The tensions between capacity and retrieval speed, between compression and fidelity, between what to keep and what to discard appear whether discussing core memory in the 1950s, the hippocampus, or transformer attention mechanisms. Sometimes even fundamental mechanics resurface across substrates: magnetic core memory&#8217;s destructive reading &#8211; where retrieving a state requires overwriting it, before subsequently restoring the original &#8211; mirrors how human memory recall performs a recontextualizing function, potentially altering what remains in memory. Still, critical differences remain. Importantly, memory doesn&#8217;t oppose human knowing when it&#8217;s externalized into tools, because, ultimately, it never operated purely internally to begin with.</p><p>Memory operates as a biological process, technological substrate, cultural practice, and phenomenological experience simultaneously. No single framework dominated our discussions, perhaps because of our interdisciplinary composition as a group. Technical explanations of cache hierarchies sat alongside reflections on where memory feels like it resides in the body. Medieval mental diagrams found resonance with neural network architectures. The classical method of loci proved conceptually similar to how operating systems manage address spaces.</p><p><strong>Amidst reflections during the last session of the year, our group surfaced a strange irony: </strong><em><strong>sometimes what is remembered most is what is most dynamically changing</strong></em><strong>, through attention, interaction, and reinforcement from its world. </strong></p><p>In the medium term at least, fossilization ensures forgetting, whether for cities or neural patterns. That is, until the longer term, in which their presence might be uncovered millennia later, requiring us to map contemporary memories onto their molded matter.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://discord.com/channels/1082444651946049567/1379992696114122832&quot;,&quot;text&quot;:&quot;MRG @ Summer of Protocols Discord&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://discord.com/channels/1082444651946049567/1379992696114122832"><span>MRG @ Summer of Protocols Discord</span></a></p>]]></content:encoded></item><item><title><![CDATA[Curate Your Own Pipeline]]></title><description><![CDATA[Issue #80: How to use LLMs and write like a centaur]]></description><link>https://protocolized.summerofprotocols.com/p/curate-your-own-pipeline</link><guid isPermaLink="false">https://protocolized.summerofprotocols.com/p/curate-your-own-pipeline</guid><dc:creator><![CDATA[Amita]]></dc:creator><pubDate>Sun, 14 Dec 2025 19:42:57 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!CzAG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe62b242d-aab9-47d9-8087-e68aa93fb3ed_896x1120.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Stanley Chen rewrites every line that LLMs generate for him. He believes current models are neither sufficient as writers nor as judges of literary merit. And yet, long before the public had heard of ChatGPT, he made LLMs an essential part of his fiction writing process. He&#8217;s enough of a power user to have opinions about which model best handles Chinese punctuation marks (Gemini), and whether it&#8217;s worth running models locally for novel-length text (no).</p><p>Few science fiction authors have been as involved at the frontier of technological innovation as Stanley has. In 2019 he co-wrote a book, <a href="https://www.goodreads.com/book/show/56377201-ai-2041">AI 2041</a>, with the CEO of Google China, Kai-Fu Lee. That same year, the World Economic Forum <a href="https://www.weforum.org/stories/authors/chen-qiufan/">tapped</a> him to help imagine possible futures. I had the opportunity <a href="https://www.youtube.com/live/QZwciILmsx8?si=Ra-d7UyasqJe5Axw">to ask Stanley about his process</a> and his work. What follows are some highlights and you can find the full transcript <a href="https://protocolized.summerofprotocols.com/p/centaur-fiction-with-stanley-chan">here</a>. The text is lightly edited for clarity. All quotes are marked with timestamps [min:sec].</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CzAG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe62b242d-aab9-47d9-8087-e68aa93fb3ed_896x1120.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CzAG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe62b242d-aab9-47d9-8087-e68aa93fb3ed_896x1120.png 424w, https://substackcdn.com/image/fetch/$s_!CzAG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe62b242d-aab9-47d9-8087-e68aa93fb3ed_896x1120.png 848w, https://substackcdn.com/image/fetch/$s_!CzAG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe62b242d-aab9-47d9-8087-e68aa93fb3ed_896x1120.png 1272w, https://substackcdn.com/image/fetch/$s_!CzAG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe62b242d-aab9-47d9-8087-e68aa93fb3ed_896x1120.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CzAG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe62b242d-aab9-47d9-8087-e68aa93fb3ed_896x1120.png" width="500" height="625" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e62b242d-aab9-47d9-8087-e68aa93fb3ed_896x1120.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1120,&quot;width&quot;:896,&quot;resizeWidth&quot;:500,&quot;bytes&quot;:1775670,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/181406543?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe62b242d-aab9-47d9-8087-e68aa93fb3ed_896x1120.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CzAG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe62b242d-aab9-47d9-8087-e68aa93fb3ed_896x1120.png 424w, https://substackcdn.com/image/fetch/$s_!CzAG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe62b242d-aab9-47d9-8087-e68aa93fb3ed_896x1120.png 848w, https://substackcdn.com/image/fetch/$s_!CzAG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe62b242d-aab9-47d9-8087-e68aa93fb3ed_896x1120.png 1272w, https://substackcdn.com/image/fetch/$s_!CzAG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe62b242d-aab9-47d9-8087-e68aa93fb3ed_896x1120.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Art by <a href="https://www.titles.xyz/collect/base/0xcad3b33c98c46f07f8611df712fb36ad936c277f/182">hulabitasmitasmita</a>, made using a <em>Protocolized</em> model at <a href="https://www.titles.xyz">titles.xyz</a></figcaption></figure></div><p><em>Protocolized</em> encourages its writers to use LLMs and other AI tools. I&#8217;ve been trying to use LLMs in my writing, but just haven&#8217;t been satisfied with the results recently. At the same time, I feel an ongoing tension about that &#8211; how could I <em>not</em> be finding it useful to draw upon the entire combined archives that were scraped from the open web?</p><p>Stanley touched on this feeling early in our conversation:</p><blockquote><p>[10:20] I think it&#8217;s not there yet. So you feel like always there&#8217;s something missing here, or this character might not seem to be 100% aligned and this dialogue could be a little bit cheesy. There&#8217;s always something there &#8211; so you will not be satisfied at all.</p></blockquote><p>Despite that, he&#8217;s designed a custom workflow that he feels <em>does</em> enhance both his fiction writing and his fiction translation outputs. As a longtime teacher of fiction writing, he&#8217;s also able to provide some direction for what to focus on to create actual improvement. Indeed, our conversation did frequently return to the <em>taste</em> that needs to underlie successful LLM use, and his suggestions for how to develop it. Be deliberate, Stanley says, about how <em>they</em> are prompting <em>you</em>:</p><blockquote><p>[03:56] It&#8217;s not just you prompting the LLM, but also the LLM as a prompt reversibly triggers your imagination and creativity.</p></blockquote><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://protocolized.summerofprotocols.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://protocolized.summerofprotocols.com/subscribe?"><span>Subscribe now</span></a></p><h3>Where LLMs fit into Stanley&#8217;s writing process</h3><p>Given the amount of time Stanley has spent tuning his use of LLMs for writing, I asked:</p><blockquote><p>[3:02] Where within your writing process do you see there being a use case for LLMs? Do you see it as more relevant during the writing process or editing process? What&#8217;s your philosophy there?</p></blockquote><p>His response:</p><blockquote><p>I thought it was just for collecting the data and information and trying to build the structure. But now I think it&#8217;s it&#8217;s both &#8211; it&#8217;s when you&#8217;re conjuring ideas, when you use it for world building, character building, and structure building. But also you can use it for rendering your style in a way and trying to find a correspondence between different disciplines. For example, when you try to use a very comprehensive metaphor to describe some super complex science theory. An LLM can usually give you some options that you can choose from&#8230; </p><p>I will use different models for different purposes, and I will separate different tasks. Maybe one big task, you can break it down to different small parts and you give it to this model or give it to that model, or you might want to rerun an output in a different model<a href="https://amitashukla.substack.com/p/8edd0c8a-99e6-48ad-9301-433329f6acb7#footnote-1-176963963"><sup>1</sup></a> And you try to find the best outcome. But you have to, I mean, you have to train yourself with some kind of good taste.</p></blockquote><p>This question of taste reappeared throughout the process, craft, and philosophy sections of our conversation. <em>Taste</em> and <em>agency</em> have been two buzzwords of 2025, for anyone tech-adjacent and terminally online.</p><p>My question to Stanley, then, was: Can you <em>improve</em> your craft as a fiction writer using LLMs? If so, how? This was a question that was particularly on my mind as someone relatively new to fiction writing. It seems like a skill issue not to have found a good workflow for this. Stanley agreed &#8211; <em>improving</em> your craft happens beyond the actual writing practice. An LLM can give you options, and your job as the writer is to have a consistent taste to discern which among them serves your vision.</p><p>That means no copy-pasting.</p><blockquote><p>[10:04] I always rewrite. I couldn&#8217;t use even a single line it gave me directly. I think in a way there&#8217;s some legal issues. But through time and through your career, you raise the bar. You have a higher understanding, you have a deeper understanding of writing as a craft. You have to redo it over and over again. When you find your touch, you find the right feeling. I think that&#8217;s the most important thing.</p></blockquote><p>This really reminded me of a college professor I had who swore by manually retyping code snippets from Stack Overflow. &#8220;You&#8217;ll see what&#8217;s wrong with it and change it when you rewrite it,&#8221; he said.</p><p>My former Spanish teacher said something similar. His rule was that when using Google Translate, even if you <em>know</em> the translation it gives you is correct, you still have to re-type it yourself. And then when you do, you often notice ways in which it was subtly wrong.</p><p>Oh, and speaking of translation &#8211;</p><h3>Translating fiction with AI</h3><p>Stanley and Ken Liu have had a multi-year, two-way partnership in translation &#8211; Ken Liu translated Stanley&#8217;s<em> Waste Tide</em> into English. Stanley translated some of Ken Liu&#8217;s work into Chinese.</p><blockquote><p>[11:46] When I translated some of Ken Liu&#8217;s work into Chinese I used an LLM to find the tongue. I think it&#8217;s very difficult to capture the style, the tongue. It&#8217;s at the inter-linguistic level. You have to find the right slang, for example, or the right metaphor. Sometimes there are some cultural references that might not be able to directly attach with something in Chinese, or the other way around. So I think it&#8217;s always useful to use LLMs to help you to find something you know as a counterpart of the the language and the culture. Again, this is about <em>taste</em><strong>.</strong> If you are bilingual you can feel the nuance and you can feel the subtlety of the language and the literature and you you might feel, &#8220;oh this is not exactly what the author tried to do in the original version.&#8221;</p><p>So sometimes they do experiments as well. The previous work can be referenced, but it&#8217;s not exactly the same, right? So we have to... dive deeper and we try to understand what the author really tried to do. And we come up with this idea, or maybe we could create this kind of style in Chinese to fully capture what the author tried to do. And we try to have the LLM represent what we think might be correct or close enough. But again, it&#8217;s not easy. So maybeit&#8217;ll give you the mediocre, or an average level of translation.</p><p>So I think this is like back and forth. I don&#8217;t think you can fully rely on LLM to do the translation, especially on literature.</p></blockquote><p>Again, the role of the LLM here, in Stanley&#8217;s view, is largely to present you with a palette of options.</p><p>So what&#8217;s happening in between, then? What&#8217;s happening while you&#8217;re redoing it over and over again, prompting the LLMs and letting them prompt you back?</p><blockquote><p>[28:48] As with every tool, you can use it in a dumb way, or in a smart way. You can use it to be lazy, or you can use it to challenge yourself. You think firstly and you see what the AI gives you and you try to compare the two. And you can see, okay, maybe this is what I&#8217;m missing here. These are my blind spots and there&#8217;s something nice, nicely done there. So maybe this is the focus area I should look into next time. So I think it&#8217;s a very good practice for your brain, for your imagination, for your narrative... </p></blockquote><p>This was the thread I was really trying to pull on throughout our entire conversation. What does it look like, to Stanley, to use LLMs in a smart way?</p><p>It means being in dialogue with them, and being fluid about their role in your process. I asked Stanley what his mental model is when he uses AI in his fiction process &#8211; tool, palette, partner? Something else?</p><blockquote><p>[4:52] It&#8217;s inter-subjectivity, so it&#8217;s something in between. You can see this subjectivity shifting or flowing between me and the machine in a distributed way. So I think all the magic happens in between. During the process, you know, think about electricity, think about the energy flows.</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Hm7Q!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd8047c8-b463-4382-9076-a67876fc3e36_896x1120.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Hm7Q!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd8047c8-b463-4382-9076-a67876fc3e36_896x1120.png 424w, https://substackcdn.com/image/fetch/$s_!Hm7Q!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd8047c8-b463-4382-9076-a67876fc3e36_896x1120.png 848w, https://substackcdn.com/image/fetch/$s_!Hm7Q!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd8047c8-b463-4382-9076-a67876fc3e36_896x1120.png 1272w, https://substackcdn.com/image/fetch/$s_!Hm7Q!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd8047c8-b463-4382-9076-a67876fc3e36_896x1120.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Hm7Q!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd8047c8-b463-4382-9076-a67876fc3e36_896x1120.png" width="500" height="625" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fd8047c8-b463-4382-9076-a67876fc3e36_896x1120.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1120,&quot;width&quot;:896,&quot;resizeWidth&quot;:500,&quot;bytes&quot;:1343221,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/181406543?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd8047c8-b463-4382-9076-a67876fc3e36_896x1120.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Hm7Q!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd8047c8-b463-4382-9076-a67876fc3e36_896x1120.png 424w, https://substackcdn.com/image/fetch/$s_!Hm7Q!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd8047c8-b463-4382-9076-a67876fc3e36_896x1120.png 848w, https://substackcdn.com/image/fetch/$s_!Hm7Q!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd8047c8-b463-4382-9076-a67876fc3e36_896x1120.png 1272w, https://substackcdn.com/image/fetch/$s_!Hm7Q!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd8047c8-b463-4382-9076-a67876fc3e36_896x1120.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Art by <a href="https://www.titles.xyz/collect/base/0x8233248311cb009f809f3fd9e7220efd9eac97e0/161">milarosa1705</a>, made using a <em>Protocolized</em> model at <a href="https://www.titles.xyz/">titles.xyz</a></figcaption></figure></div><h3>Interacting with your characters</h3><p>Generative technologies offer new opportunities to interact with your characters and to <em>discover</em> them, even as the author.</p><blockquote><p>[15:05] I&#8217;ve been playing with Midjourney and, recently, with Sora 2. It&#8217;s very interesting because when you have a character in your imagination there&#8217;s a distance, right. It&#8217;s kind of vague, kind of abstract. But when you transform it into a very vivid and and visually stunning image, even an animation, you give it more information. You might be triggered with a sense of how the character acts, or talks, or responds to certain scenarios. </p></blockquote><p>What does it look like, though, to flesh out those characters, and to visualize them within the space of Sora or similar tools? Stanley experimented with assigning characters into the 16 Meyers-Briggs personality types.</p><blockquote><p>[16:49] Now you can divide yourself. You can role play with different personalities. Each type could be attached to specific characters. You can interact and this becomes a role-playing game, like LARP. But also I think in the future, we might use Midjourney or Sora to do a real role-playing game. Everyone could create something like that. It&#8217;s not only writing a novel, but also creating something visually. I think that&#8217;s the future.</p></blockquote><p>He&#8217;s been involved in an immersive drama production in Hangzhou. The premise is that its eight characters are all reincarnated.</p><blockquote><p>[19:25] We have previous lives, we have this life, and the next life. When people buy the ticket, if they pay more they can see different lives. If they pay less they only see this life. So they can choose, just like in <em>Sleep No More</em> in New York. And you can follow different story lines to explore. I found it fascinating because there are some interactions between the characters and the audience. And it might trigger something that wasn&#8217;t in the script. Sometimes the character might have to improvise. But from the very beginning, we had like a big Bible defining the world building, and each character, like attached to the different lives. Part of their identity and part of their personality has been changed, like your job, your career, even your appearance, but part of it, like the soul, you know, like some addiction, like some fears, like some anxiety pattern has not. This is a very different way of creating and also a different way of storytelling.</p></blockquote><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://protocolized.summerofprotocols.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://protocolized.summerofprotocols.com/subscribe?"><span>Subscribe now</span></a></p><h3>Keeping the process separate from the product</h3><p>However, Stanley cautions, you still need to be deliberate about how much information you are providing to your readers.</p><p>Unveiling the process is helpful to a point, but the work needs to stand alone. The artist should clearly have a vision about where the work ends and what the reader needs to figure out on their own.</p><p>This is one of the aspects I admire most about Stanley&#8217;s fiction. As much as the process is important, and as much as he&#8217;s been willing to publicly share about it &#8211; including in this interview &#8211; the work itself is the thing.</p><blockquote><p>[21:07] Maybe there&#8217;s some fan fiction &#8211; readers can develop the character by themselves, they might have some alternative history, some subplots &#8211; like branches, storylines. So they can develop something like that. But I think to me what I should reveal to the readers is already written. You can interpret it by yourself, that&#8217;s your freedom. I always say, OK, just figure it out by yourself because what I want to say is already written there.</p><p>Even the endings. With a semi-open ending a lot of people ask me, &#8220;what does it mean?&#8221; </p><p>You have to fill in the blank with your own imagination. I think that&#8217;s the best part of it. You can keep guessing, you can keep thinking about it. That&#8217;s what I try to do.</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!B4bl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8c95d37-d36a-4938-9f53-925d8e33829c_896x1120.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!B4bl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8c95d37-d36a-4938-9f53-925d8e33829c_896x1120.png 424w, https://substackcdn.com/image/fetch/$s_!B4bl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8c95d37-d36a-4938-9f53-925d8e33829c_896x1120.png 848w, https://substackcdn.com/image/fetch/$s_!B4bl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8c95d37-d36a-4938-9f53-925d8e33829c_896x1120.png 1272w, https://substackcdn.com/image/fetch/$s_!B4bl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8c95d37-d36a-4938-9f53-925d8e33829c_896x1120.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!B4bl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8c95d37-d36a-4938-9f53-925d8e33829c_896x1120.png" width="500" height="625" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f8c95d37-d36a-4938-9f53-925d8e33829c_896x1120.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1120,&quot;width&quot;:896,&quot;resizeWidth&quot;:500,&quot;bytes&quot;:1445946,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/181406543?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8c95d37-d36a-4938-9f53-925d8e33829c_896x1120.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!B4bl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8c95d37-d36a-4938-9f53-925d8e33829c_896x1120.png 424w, https://substackcdn.com/image/fetch/$s_!B4bl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8c95d37-d36a-4938-9f53-925d8e33829c_896x1120.png 848w, https://substackcdn.com/image/fetch/$s_!B4bl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8c95d37-d36a-4938-9f53-925d8e33829c_896x1120.png 1272w, https://substackcdn.com/image/fetch/$s_!B4bl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8c95d37-d36a-4938-9f53-925d8e33829c_896x1120.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Art by <a href="https://www.titles.xyz/collect/base/0x9725f22f428322f038ee0a4a42af602089e40f45/86">threerey</a>, made using a <em>Protocolized</em> model at <a href="https://www.titles.xyz/">titles.xyz</a></figcaption></figure></div><h3>Shaping the future with writing</h3><p>Part of shaping the future with writing is about experimenting with form and embracing the new. </p><p>I asked about the prospects for young, emerging authors:</p><blockquote><p>[48:59] They are suffering because there&#8217;s no platform at all. There&#8217;s no publication. There&#8217;s no opportunity for them. So I think this is very, very cruel. People feel angry. People feel that they&#8217;re outliers, that they&#8217;ve become irrelevant in a way, right. I don&#8217;t see an easy solution here.</p><p>But I always told my students, you have to create your own job in the market. Maybe it doesn&#8217;t exist yet, but you have to start to get down to work and start to build your own career, not just waiting there, waiting for some companies, you know, some bosses to give you one, to offer you one. I think this is the reality.</p><p>And with AI, I think, yes, they can do it, but they need to refresh their experience. They have to unlearn whatever they&#8217;ve been taught, you know, from the traditional schools or parents or educational institutions.</p></blockquote><p>In his own work, Stanley has been very proactive about forming partnerships with people directly making decisions that impact the future.</p><p>While he&#8217;s a sci-fi writer, he has been invited give guidance in technology and  economics discourses.</p><p>So what perspectives does he find it useful to share in those forums?</p><blockquote><p>[56:36} We&#8217;re so small, we&#8217;re so powerless. This is a structural asymmetry. I think punk, like solar punk, basically is what we need here. And how we should do that starts from creating new kinds of metaphors. Because metaphor is how we package and compress all this storytelling, emotion, ethics, values, mythology all together. It&#8217;s like a super efficient info pack. But it takes a very long time to form a metaphor. So that&#8217;s why we should start now. We need some time to build up new metaphors&#8230;</p><p>I try to shift the vision for these people because they are the one who spend the money, make the action and policy-making, etc. I think you should do something to change the narrative, change the metaphor and tell a new story and create a new myth for the future.</p></blockquote><div data-component-name="FragmentNodeToDOM"><p>Lastly, I couldn&#8217;t resist asking about some specific procedural steps:</p><blockquote><p>[7:40] I think Claude is good on the language level &#8211; it is more nuanced, is more human in a sense. But I found it couldn&#8217;t do full-width punctuation marks in Chinese. I&#8217;ve tried different ways to teach it how to use the right marks, but I fail all the time. Gemini has a longer context window so it allows us to have novel length materials. And you try to summarize something or you try to dig deeper in a very accurate place, even down to sentence level. Gemini helps a lot in doing this kind of long text task. So I think, of course, different models, they have different characters and they have their different styles.</p><p>You have to really dig deeper and try to find your own pipeline. I think this is very unique individually. Design and curate your own pipeline to better optimize your workflow. This is how I adapt myself to this new way of working, new way of writing.</p></blockquote><p><em><strong>Listen to the full conversation that I had with Stanley:</strong></em></p><div id="youtube2-QZwciILmsx8" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;QZwciILmsx8&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/QZwciILmsx8?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div></div>]]></content:encoded></item><item><title><![CDATA[Disentangling the State of Climate Protocols]]></title><description><![CDATA[Issue #78: A big little idea called durability]]></description><link>https://protocolized.summerofprotocols.com/p/disentangling-the-state-of-climate</link><guid isPermaLink="false">https://protocolized.summerofprotocols.com/p/disentangling-the-state-of-climate</guid><dc:creator><![CDATA[Cory Levinson]]></dc:creator><pubDate>Sat, 06 Dec 2025 18:54:22 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/f5c2f401-eb81-43ae-9121-d2f56529224a_2000x1333.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em><strong>In this issue: </strong>Engineer, analyst, artist, and former <a href="https://summerofprotocols.com/">Summer of Protocols</a> visiting researcher <strong>Cory Levinson</strong> surveys current climate protocols.</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vv87!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc817dc78-16e9-4778-8f5c-4ddedb1d4c40_1488x1488.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vv87!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc817dc78-16e9-4778-8f5c-4ddedb1d4c40_1488x1488.png 424w, https://substackcdn.com/image/fetch/$s_!vv87!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc817dc78-16e9-4778-8f5c-4ddedb1d4c40_1488x1488.png 848w, https://substackcdn.com/image/fetch/$s_!vv87!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc817dc78-16e9-4778-8f5c-4ddedb1d4c40_1488x1488.png 1272w, https://substackcdn.com/image/fetch/$s_!vv87!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc817dc78-16e9-4778-8f5c-4ddedb1d4c40_1488x1488.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vv87!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc817dc78-16e9-4778-8f5c-4ddedb1d4c40_1488x1488.png" width="500" height="500" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c817dc78-16e9-4778-8f5c-4ddedb1d4c40_1488x1488.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1456,&quot;width&quot;:1456,&quot;resizeWidth&quot;:500,&quot;bytes&quot;:36148,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/180814633?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc817dc78-16e9-4778-8f5c-4ddedb1d4c40_1488x1488.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vv87!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc817dc78-16e9-4778-8f5c-4ddedb1d4c40_1488x1488.png 424w, https://substackcdn.com/image/fetch/$s_!vv87!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc817dc78-16e9-4778-8f5c-4ddedb1d4c40_1488x1488.png 848w, https://substackcdn.com/image/fetch/$s_!vv87!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc817dc78-16e9-4778-8f5c-4ddedb1d4c40_1488x1488.png 1272w, https://substackcdn.com/image/fetch/$s_!vv87!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc817dc78-16e9-4778-8f5c-4ddedb1d4c40_1488x1488.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Art from one of our bespoke titles.xyz models. Have you <a href="https://www.titles.xyz/model/vVLFT9W9xFKOIGHguEfk">tried it</a> yet?</figcaption></figure></div><div><hr></div><p>A lot has changed in climate protocols in recent years. In 2023, when I <a href="https://www.youtube.com/watch?v=MUfqF_3fghE">first gave a talk</a> on this topic for Summer of Protocols&#8217; inaugural research cohort, the two previously disconnected worlds of traditional carbon markets and DeFi had only recently collided. The main character in that clash, KlimaDAO, had proclaimed itself as a &#8220;black hole for carbon&#8221; upon its launch and <a href="https://www.wsj.com/articles/cryptocurrency-traders-move-into-carbon-markets-11641826402?gaa_at=eafs&amp;gaa_n=ASWzDAiHA0U32wYHSANKLenj5LKmhFTwoqMnjpFbefCsFEe_--x_J1OlXNwpr7S3LHE%3D&amp;gaa_ts=68c24252&amp;gaa_sig=PjZA_aIDPwzhiwSSlucSxGxG4NegYzHLJ2eWL9wctXTBkSC9PLarUfV815wiwCehfUbUsQ2qsE-dn0S9bxIYRQ%3D%3D">sucked 17 million metric tons of CO2</a> from suit-and-tie carbon market registries like <a href="https://verra.org/">Verra</a> into its treasury, thus transforming millions of carbon credits into a new <a href="https://carbonplan.org/research/toucan-crypto-offsets">zombified</a> onchain form that neither the corporates nor the <a href="https://www.webopedia.com/crypto/learn/degen-meaning/">degens</a> knew what to do with. <a href="http://regen.network/">Regen Network</a>, perhaps the oldest player operating at the intersection of crypto and climate tech, was in the process of expanding beyond its focus on carbon, taking in other environmental markets such as biodiversity crediting.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> While it may seem strange to be designing markets for biodiversity when we still can&#8217;t seem to get carbon markets right, biodiversity crediting has managed to attract attention from international policy players such as the United Nations Development Programme and UN Environment Programme through efforts like the <a href="https://www.biodiversitycreditalliance.org/">Biodiversity Crediting Alliance</a>. Regen Network soon found itself partnering with some very promising groups working in this sector, from the Colombian habitat bank developer <a href="https://medium.com/regen-network/terrasos-and-regen-network-pioneering-transparent-scalable-markets-for-biodiversity-credits-7fb23b38979a">Terrasos</a> to indigenous leaders from the <a href="https://www.registry.regen.network/learning-center/urban-forestry-part-3-protecting-mature-forests-and-wildlife-habitat-corridors">Sharamentsa Achuar community</a> in the Ecuadorian Amazon.</p><p>Regen Network&#8217;s pivot to broaden beyond carbon stemmed both from a desire to resist <a href="https://www.bcg.com/publications/2023/beyond-carbon-tunnel-vision-in-food-ecosystem">carbon tunnel vision</a>, and a response to a failing voluntary carbon market. The more traditional subsector of the carbon markets &#8211; consisting mostly of <a href="https://verra.org/methodologies/vm0047-afforestation-reforestation-and-revegetation-v1-1/">reforestation</a> and <a href="https://verra.org/methodologies/vm0048-reducing-emissions-from-deforestation-and-forest-degradation-v1-0/">avoided deforestation</a> credits &#8211; had continued to face challenges, both from the plummeting corporate demand, which culminated in <a href="https://www.theguardian.com/environment/2023/jan/18/revealed-forest-carbon-offsets-biggest-provider-worthless-verra-aoe">the Guardian&#8217;s expos&#233; denouncing Verra&#8217;s REDD+ program</a> in early 2023; and from continued slow progress instrumentalizing Article 6 of the Paris Agreement &#8211; a key piece of the international climate treaty that aims to clarify how nation states can trade carbon credits against their NDCs (nationally determined contributions towards limiting CO2 emissions).</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://protocolized.summerofprotocols.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">You&#8217;re reading <em>Protocolized</em>, a new digital magazine about Earth&#8217;s invisible infrastructure.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>Durability: A New Focus for Carbon Markets</h3><p>Despite the world&#8217;s complete failure to put a meaningful dent in greenhouse gas emissions, over this same period of time a new and more focused carbon market in durable carbon-dioxide removal started gaining traction in both the regulatory and corporate sustainability worlds. A significant marker of this shift was the launch of Frontier in 2022, a <a href="https://frontierclimate.com/writing/launch">$1B+ advanced market commitment for durable carbon removal</a> led by Stripe, Alphabet, Meta, Shopify and McKinsey. This renewed focus on more permanent carbon removal and storage technologies (often abbreviated as CDR) represents a rebranding of the legacy carbon markets away from greenwashing and questionable &#8220;counterfactual claims&#8221; of avoidance-based forest carbon credits, and toward scientifically verifiable removals where the CO2 sequestered can be safely assumed durably stored underground or in the depths of the ocean for hundreds or thousands of years. The approaches and technologies being researched and deployed in the CDR sector vary widely, from highly engineered <a href="https://www.energy.gov/oced/DACHubs">direct air capture facilities</a>, to <a href="https://ucanr.edu/blog/green-blog/article/rock-weathering">spreading pulverized volcanic rock dust over agricultural fields</a> so that it reacts with and absorbs CO2 under rainfall, to <a href="https://www.equatic.tech/articles/equatic-to-build-north-americas-first-commercial-scale-ocean-based-carbon-removal-facility">electrochemically removing CO2</a> from the surface level of the ocean or <a href="https://www.carbontosea.org/why-oae/">otherwise altering seawater chemistry</a> to enhance the ocean&#8217;s capacity to absorb CO2 from the atmosphere.</p><p>If this all seems bewildering and daunting, trust that it&#8217;s hard to keep track of existing and emergent CDR pathways even for those working in the industry. One could ask why we need so many different strategies for sequestering carbon out of the atmosphere. The answer to this question is, in principle, pretty simple. We don&#8217;t know which strategies will scale, and we need to scale very quickly. In 2023, the Intergovernmental Panel on Climate Change (IPCC) released its <a href="https://www.carbon-direct.com/insights/ipcc-report-carbon-removal-is-now-required-to-meet-climate-mitigation-targets">synthesis report</a>, stating that, even in best case scenarios for emissions reduction, an estimate of 5 to 13 gigatonnes (Gt) of carbon dioxide removal (CDR) will be needed annually by 2050 in order to limit global warming to 1.5&#176;C and achieve net-zero emissions. So, at this point in time, the industry consensus is that we need to be funding, researching, and exploring all feasible pathways, with humility and understanding that any potential solution may, at any time, be deemed uneconomical, unsafe, or otherwise unfeasible.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!uk1f!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c5b40cd-7195-43a3-8ecc-28bd59ffe844_1488x1488.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uk1f!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c5b40cd-7195-43a3-8ecc-28bd59ffe844_1488x1488.png 424w, https://substackcdn.com/image/fetch/$s_!uk1f!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c5b40cd-7195-43a3-8ecc-28bd59ffe844_1488x1488.png 848w, https://substackcdn.com/image/fetch/$s_!uk1f!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c5b40cd-7195-43a3-8ecc-28bd59ffe844_1488x1488.png 1272w, https://substackcdn.com/image/fetch/$s_!uk1f!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c5b40cd-7195-43a3-8ecc-28bd59ffe844_1488x1488.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uk1f!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c5b40cd-7195-43a3-8ecc-28bd59ffe844_1488x1488.png" width="500" height="500" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6c5b40cd-7195-43a3-8ecc-28bd59ffe844_1488x1488.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1456,&quot;width&quot;:1456,&quot;resizeWidth&quot;:500,&quot;bytes&quot;:61800,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/180814633?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c5b40cd-7195-43a3-8ecc-28bd59ffe844_1488x1488.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!uk1f!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c5b40cd-7195-43a3-8ecc-28bd59ffe844_1488x1488.png 424w, https://substackcdn.com/image/fetch/$s_!uk1f!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c5b40cd-7195-43a3-8ecc-28bd59ffe844_1488x1488.png 848w, https://substackcdn.com/image/fetch/$s_!uk1f!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c5b40cd-7195-43a3-8ecc-28bd59ffe844_1488x1488.png 1272w, https://substackcdn.com/image/fetch/$s_!uk1f!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c5b40cd-7195-43a3-8ecc-28bd59ffe844_1488x1488.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>A Protocol with a Thousand Faces</h3><p>Protocols and carbon markets have had a complicated entanglement since the earliest days of international climate agreements. The predecessor to the Paris Agreement was explicitly titled the Kyoto Protocol, and prior to that was the Montreal Protocol (often touted as an early success of international environmental agreements). In contemporary carbon markets, the term <em>protocol</em> has evolved from being used to designate a singular stamp of overarching international consensus to instead operating like a Swiss Army knife of sorts. Whether in the corporate sustainability arena of voluntary carbon markets, or the nascent but rapidly evolving jurisdictional and international compliance markets, if there&#8217;s a problem with clearly defining something, or a lack of consensus regarding what exactly something means, slap the term protocol on it! The word itself becomes elastic, with varying focus and specificity that can stretch and shape to any context. In the context of today&#8217;s voluntary carbon market, the industry&#8217;s self-appointed governing bodies, known as &#8220;registries&#8221; (e.g. Verra, Gold Standard, Isometric, American Carbon Registry) publish protocols &#8211; programmatic rules which dictate what kinds of activities need to be undertaken to warrant issuing carbon credits, and how those activities must be monitored, reported and verified (a process which is abbreviated as MRV).</p><p>In this wild-west, funded predominantly by corporate do-goodism, competing registries beget competing protocols. Furthermore, with a seemingly boundless set of different sequestration pathways being explored, a key indicator of pathway maturity is how many registries have codified a protocol for a given pathway. Without any infrastructure in place to compare projects across different protocols, the market remains fractured. Prices vary across pathways and protocols and the industry has little consensus on which approach is right. Toss in the fact that we are still waiting on UN policy guidance detailing which <em>methodologies</em> (the UNFCCC&#8217;s term for MRV protocols) are to be approved for use in country-level trading of carbon balances under the Paris Agreement Crediting Mechanism, and it&#8217;s easy to see how neither the voluntary nor compliance markets can make up their mind about what&#8217;s good enough. The Article 6.4 Supervisory Body is <a href="https://www.sylvera.com/blog/cdm-article-6-pacm-transition-carbon-credit-quality-integrity">still working through this task nearly ten years after the Paris Agreement was signed</a>.</p><p>A core tension here is that despite failing to provide any concrete pathway to fungibility for carbon financiers (demand is still <a href="https://www.cdr.fyi/blog/2025-q1-durable-cdr-market-update-back-at-basecamp">concentrated in a handful of players</a>, and supply too heterogeneous), these protocols supposedly exist for the explicit purpose of making real-world carbon removal interventions legible for financial markets. In this way, to ask whether the MRV protocols of Verra, Gold Standard, Isometric or Puro function more as scientific protocols or financial protocols is a question of perspective. Scientific for sure, but their function as financial protocols remains aspirational at best.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BRpX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F233b9219-12e1-4a85-a3ed-83a128d0b08a_1488x1488.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BRpX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F233b9219-12e1-4a85-a3ed-83a128d0b08a_1488x1488.png 424w, https://substackcdn.com/image/fetch/$s_!BRpX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F233b9219-12e1-4a85-a3ed-83a128d0b08a_1488x1488.png 848w, https://substackcdn.com/image/fetch/$s_!BRpX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F233b9219-12e1-4a85-a3ed-83a128d0b08a_1488x1488.png 1272w, https://substackcdn.com/image/fetch/$s_!BRpX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F233b9219-12e1-4a85-a3ed-83a128d0b08a_1488x1488.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BRpX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F233b9219-12e1-4a85-a3ed-83a128d0b08a_1488x1488.png" width="500" height="500" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/233b9219-12e1-4a85-a3ed-83a128d0b08a_1488x1488.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1456,&quot;width&quot;:1456,&quot;resizeWidth&quot;:500,&quot;bytes&quot;:48968,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/180814633?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F233b9219-12e1-4a85-a3ed-83a128d0b08a_1488x1488.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!BRpX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F233b9219-12e1-4a85-a3ed-83a128d0b08a_1488x1488.png 424w, https://substackcdn.com/image/fetch/$s_!BRpX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F233b9219-12e1-4a85-a3ed-83a128d0b08a_1488x1488.png 848w, https://substackcdn.com/image/fetch/$s_!BRpX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F233b9219-12e1-4a85-a3ed-83a128d0b08a_1488x1488.png 1272w, https://substackcdn.com/image/fetch/$s_!BRpX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F233b9219-12e1-4a85-a3ed-83a128d0b08a_1488x1488.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>Data Protocols Behind the Curtain</h3><p>With the industry&#8217;s spotlight on durable CDR, the resulting diversity of pathways and technological approaches to carbon removal is likely the main culprit in our current protocol predicament. If carbon markets were still dealing only in forest carbon, the industry&#8217;s first attempt to solve inter-registry interoperability with the <a href="http://climateactiondata.org/">CAD Trust</a> might have delivered on its promise. That story begins in late 2022, with a group including IETA (International Emissions Trading Association) and The World Bank <a href="https://climateactiondata.org/cad-trust-officially-launched/">launching the Climate Action Data Trust</a> as an attempt to harmonize data schemas from the various carbon market registries. Key to their approach was developing a shared meta-registry: a new database for existing registries to report their own project and transaction data to that could prevent double counting and support interoperability between the various different carbon registries. As with many other double counting prevention initiatives in enterprise or business arenas, there was a blockchain component, and Chia Network was to serve as the blockchain technology partner in the project.</p><p>Fast forward to 2025 and CAD Trust still exists, but with the durable CDR market dealing in carbon credit offtake agreements the size of a Series C financing round (see Frontier&#8217;s <a href="https://www.esgtoday.com/mckinsey-jpmorgan-alphabet-others-sign-58-million-biomass-based-carbon-removal-deal-through-frontier/">$58M deal with BiCRS developer Vaulted Deep</a>), the CAD Trust approach of replicated harmonized meta-registry has done little to provide support in an area where much of the current market activity is in future-oriented offtake agreements. On top of that, CAD Trust&#8217;s focus on technical API integrations has made adoption slow among legacy registries like Verra and Gold Standard, and nonexistent among the younger durable CDR-focused registries like Isometric or Puro.</p><p>One thing CAD Trust did get right from the beginning was bringing data standards into the spotlight. In the years since, several other initiatives have followed their lead. The <a href="http://cdop.info/">Carbon Data Open Protocol</a> (CDOP) is likely the carbon market data standards initiative with the most industry traction today. Launched as a multi-stakeholder initiative, led by RMI, S&amp;P Global, and Sylvera (a prominent carbon credits rating agency) among others, CDOP focuses on harmonizing data schemas and vocabularies between the many different actors in today&#8217;s carbon market. Arguably more important than what CDOP is, is what it is not. By electing not to build any infrastructure or host project and transaction data themselves, CDOP sidesteps the risk of becoming another value-extracting intermediary in an already crowded market, leaving open the possibility that the project could get enough traction to serve as a genuine interoperability layer.</p><p>In carbon markets, where data isn&#8217;t at risk of disappearing and transactions are often built upon trust between known parties, interoperability initiatives don&#8217;t necessitate the fully-replicated data infrastructure that blockchains provide. With this in mind, any initiative claiming to enable interoperability in carbon markets should focus its energy on developing open standards, exchange formats, and governance frameworks rather than building its own infrastructure and risk becoming yet another silo to navigate. For CDOP this approach is more than an implementation detail, it&#8217;s deeply embedded in the initiative&#8217;s branding and overall strategy (see their July 2025 blog post <a href="https://www.cdop.info/blog/carbon-markets-need-berners-lee-moment-for-data-standardization">Carbon Markets Need a Berners-Lee Moment for Data Standardization</a>).</p><p>Will this latest attempt to protocolize the carbon markets improve our ability to meaningfully scale carbon removal? Early signs suggest momentum is building. Even ISO is paying attention now, having initiated, in October 2025, a working group to develop a standard <a href="https://www.iso.org/standard/77780.html">Data Model for Carbon Credit Markets</a>, in which <a href="https://climateactiondata.org/iso-standard-for-carbon-data-model-under-development/">both CDOP and CAD Trust will have membership</a> as nominated experts. If the scientific, financial, and data infrastructure continues to mature, the foundation will be there to support the gigaton scale CDR needed by 2050. Leaving one question remaining&#8230; Will the incentives and resources align fast enough to make it a reality?</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://protocolized.summerofprotocols.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://protocolized.summerofprotocols.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><p><em>Cory Levinson is a software consultant working on data standards in the carbon removal industry, serving as technical lead for Carbon To Sea&#8217;s Ocean Alkalinity Enhancement Data Management Protocol, working with the ocean science consultancy Submarine Scientific. He is an active member of the Carbon Data Open Protocol&#8217;s Technical Working Group, and is currently pursuing an MSc in the Soils &amp; Biogeochemistry Graduate Group at UC Davis. Views expressed here are the author&#8217;s own and don&#8217;t necessarily reflect those of any affiliated organizations.</em></p><div><hr></div><p>This text is based on a talk which Cory gave for Summer of Protocols in July.</p><div id="youtube2-rYhAkVFRbjo" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;rYhAkVFRbjo&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/rYhAkVFRbjo?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p> Regen was founded in 2017, and I was working there from 2020 through most of 2024.</p><p></p></div></div>]]></content:encoded></item><item><title><![CDATA[Coffee, Diplomacy, Contest News]]></title><description><![CDATA[Issue #76: A host of program updates from Summer of Protocols]]></description><link>https://protocolized.summerofprotocols.com/p/coffee-diplomacy-contest-news</link><guid isPermaLink="false">https://protocolized.summerofprotocols.com/p/coffee-diplomacy-contest-news</guid><dc:creator><![CDATA[Timber Stinson-Schroff]]></dc:creator><pubDate>Fri, 28 Nov 2025 19:01:03 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!HTz5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7471e2a2-ad18-415b-846b-11d97a2e6230_1000x1000.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HTz5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7471e2a2-ad18-415b-846b-11d97a2e6230_1000x1000.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HTz5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7471e2a2-ad18-415b-846b-11d97a2e6230_1000x1000.png 424w, https://substackcdn.com/image/fetch/$s_!HTz5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7471e2a2-ad18-415b-846b-11d97a2e6230_1000x1000.png 848w, https://substackcdn.com/image/fetch/$s_!HTz5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7471e2a2-ad18-415b-846b-11d97a2e6230_1000x1000.png 1272w, https://substackcdn.com/image/fetch/$s_!HTz5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7471e2a2-ad18-415b-846b-11d97a2e6230_1000x1000.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HTz5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7471e2a2-ad18-415b-846b-11d97a2e6230_1000x1000.png" width="500" height="500" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7471e2a2-ad18-415b-846b-11d97a2e6230_1000x1000.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1000,&quot;width&quot;:1000,&quot;resizeWidth&quot;:500,&quot;bytes&quot;:105382,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/180132047?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7471e2a2-ad18-415b-846b-11d97a2e6230_1000x1000.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HTz5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7471e2a2-ad18-415b-846b-11d97a2e6230_1000x1000.png 424w, https://substackcdn.com/image/fetch/$s_!HTz5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7471e2a2-ad18-415b-846b-11d97a2e6230_1000x1000.png 848w, https://substackcdn.com/image/fetch/$s_!HTz5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7471e2a2-ad18-415b-846b-11d97a2e6230_1000x1000.png 1272w, https://substackcdn.com/image/fetch/$s_!HTz5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7471e2a2-ad18-415b-846b-11d97a2e6230_1000x1000.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>Update on our current writing contest</strong></h3><p>We&#8217;ve extended the deadline for <strong><a href="https://protocolized.summerofprotocols.com/p/building-and-burning-bridges">Building and Burning Bridges</a></strong>,<strong> </strong>our Bridge Atlas-inspired short story contest. The judging panel has now assembled and includes Nils Gilman, who appeared in episode 2 of the Bridge Atlas salon series, and previous <em>Protocolized </em>contest winner Spencer Nitkey, as guest judges.</p><p><em><strong>Your story of diplomacy, bridges, and espionage is now due December 8, 2025.</strong></em></p><p>This means that you&#8217;ll have one more opportunity to get some community feedback on your work. Join our Special Interest Group on Protocol Fiction for its next call, December 4 at 10am Pacific Time. More information in our public Discord server&#8217;s <a href="https://discord.gg/Y8nwfcMUWk">#protocol-fiction channel</a>. We&#8217;ve provided thorough contest instructions <a href="https://protocolized.summerofprotocols.com/p/building-and-burning-bridges">here</a>, and there are some bonus ideas hidden below to draw on.</p><p>After seeing the first three protocol fiction anthologies <strong>in print</strong><em><strong> </strong></em>last week, we&#8217;re particularly eager to see this next thematic collection come together. This contest is our most complicated yet. We can&#8217;t wait to read some tales about what the future of diplomacy might be like &#8211; and to assemble another <a href="https://protocolized.summerofprotocols.com/p/collections">collection</a>.</p><div class="image-gallery-embed" data-attrs="{&quot;gallery&quot;:{&quot;images&quot;:[{&quot;type&quot;:&quot;image/jpeg&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6d623bde-a46f-419c-bb71-d4e672cbdd9b_1280x990.jpeg&quot;},{&quot;type&quot;:&quot;image/jpeg&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/33c3b0cc-a034-4f75-9e22-70636abe73cf_1280x990.jpeg&quot;},{&quot;type&quot;:&quot;image/jpeg&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d1003f69-2e85-4275-bbea-91b9dcea8b79_1280x990.jpeg&quot;}],&quot;caption&quot;:&quot;The flagship Protocolized anthologies.&quot;,&quot;alt&quot;:&quot;&quot;,&quot;staticGalleryImage&quot;:{&quot;type&quot;:&quot;image/png&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f52de02f-1f93-428d-afbc-bff1436690b7_1456x474.png&quot;}},&quot;isEditorNode&quot;:true}"></div><p>It&#8217;s time to lead the next renaissance in science fiction. We are on the cusp of so many new, interesting technologies that have not yet received thorough treatment in fiction. Cryptography, GLP-1&#8217;s, rapid vaccine development, glowing plants, cheaper-than-gas solar energy, universal translators, supersonic transport&#8230;</p><p>Protocol fiction, which focuses strictly on special rules over special people, is a good way to take a shot at telling stories about these strange new developments in science. </p><p>Plus there are tremendous prizes for the <strong>Building and Burning Bridges</strong> contest, which <strong>closes December 8</strong>, where you can tie in some of these technologies.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://protocolized.summerofprotocols.com/p/building-and-burning-bridges&quot;,&quot;text&quot;:&quot;Enter a Story&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://protocolized.summerofprotocols.com/p/building-and-burning-bridges"><span>Enter a Story</span></a></p><div><hr></div><h3><strong>Meeting with protocol thinkers</strong></h3><p>The cafes of Paris, Vienna, and the rest of Europe were lighthouses of intellectual activity. People would discuss economics, philosophy, and industry, and drink coffee in quantities inadvisable by modern health standards.</p><p>In a protocol-ish twist, we organized a meetup in a small, industrial coffee roastery. During our Bridge Atlas event at last week&#8217;s Devconnect, we invited a mix of participants from Buenos Aires and some visiting from abroad to share and discuss ideas. Of course, the first topic was coffee production &#8211; participants watched the roasters in action as they walked everyone through their protocols during a small batch. Like listening to someone explain protocols for <a href="https://www.youtube.com/watch?v=fKqNSE9NmGU">poetry</a> or <a href="https://www.youtube.com/watch?v=ve0oe09LhI0&amp;list=PLIk0EtKZjVlv8VMGoIrENsV_LP-bdr_28&amp;index=5">music</a>, it was surprisingly technical. The freshly roasted beans were then bagged and taken home by attendees.</p><p>The meetup included two panels that discussed how protocols could be used to bridge divides between technology and culture, then debated how the protocolization of migration and mobility will continue. Some key highlights:</p><ul><li><p>It&#8217;s hard to explain how the world works (or fails) and simultaneously tell a good story.</p></li><li><p>The work of translating technical features of a protocol into marketable features is an artistic practice.</p></li><li><p>Just as there are safety protocols in place for internet users, there must be safety protocols for AI users.</p></li><li><p>Citizenship has scaled from cities to states &#8211; rules for planetary citizenship are creating a future which we&#8217;re already seeing glimpses of.</p></li><li><p>Traditional diplomats are on the back foot. New side channels continue to open up and more non-state actors are getting involved in a permissionless fashion.</p></li></ul><p>We&#8217;re still working on making a distributed Vienna for protocol studies happen. If you do research as a hobby (and you should!) the <a href="https://discord.gg/Y8nwfcMUWk">Summer of Protocols Discord</a> is a unique place to hang out and share caffeine-powered ideas.</p><div class="image-gallery-embed" data-attrs="{&quot;gallery&quot;:{&quot;images&quot;:[{&quot;type&quot;:&quot;image/tiff&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/39d3553f-e964-4b5f-b06c-239e181ca018.tif&quot;},{&quot;type&quot;:&quot;image/tiff&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/25e671cc-ba7a-4000-ae48-45508dd8f5c3.tif&quot;},{&quot;type&quot;:&quot;image/tiff&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/91e8fbe5-c248-4bc8-b775-16cff1ff2f6e.tif&quot;},{&quot;type&quot;:&quot;image/tiff&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b8861536-31d4-4f10-b08f-4865bffb9b99.tif&quot;},{&quot;type&quot;:&quot;image/tiff&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a1461cb4-5268-4cac-91f8-a9a9b541c5b1.tif&quot;}],&quot;caption&quot;:&quot;Special thanks to SoP alumnus Nicol&#225;s Madoery for co-hosting this meetup.&quot;,&quot;alt&quot;:&quot;&quot;,&quot;staticGalleryImage&quot;:{&quot;type&quot;:&quot;image/png&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3ff85099-0aeb-44f4-93d7-5608beb512ec_1456x1210.png&quot;}},&quot;isEditorNode&quot;:true}"></div><div><hr></div><h3><strong>Running a diplomacy workshop</strong></h3><p>Devconnect is a biannual conference for developers who work on the Ethereum protocol. We attended as well, to learn about frontier developments in programmable cryptography, and to facilitate a workshop on <em>ecosystem</em> <em>diplomacy</em>.</p><p>Governments, standards bodies, and corporations create critical infrastructure &#8211; often together &#8211; and must manage tensions. Technology ecosystems (especially those that maintain protocols like Ethereum, TCP/IP, Linux, or even how we decide when to wear medical masks) must also build bridges with the rest of the world. Unfortunately, technologies can&#8217;t hire or appoint diplomats. People instead <em>choose</em> to take on that job.</p><p>We put on a full-day workshop on ecosystem diplomacy. It was based on three years of research from Summer of Protocols and especially our recent Bridge Atlas series. Why diplomacy? Isn&#8217;t that just for governments?</p><blockquote><p>The workshop talks introduced some useful tools and are available on the Ethereum Foundation&#8217;s YouTube channel. Watch the talks <a href="https://www.youtube.com/watch?v=szklyKbIiuk">here</a>. Get the slides <a href="https://docs.google.com/presentation/d/1MxkBg_JJe5Oe6n6_P__cdKU5DbURBNqtjQjJkZ6FV6U/edit?usp=sharing">here</a>.</p></blockquote><p>No &#8211; even a technology like steel production needs diplomacy. For example: there are strong cultural and political factors at play when a company chooses a location for its next plant. People&#8217;s relationship with work and with employers varies a lot between cultures. That relationship can directly affect production schedules and planning processes. And that&#8217;s <em>just to make metal</em>, where causality flows mostly one way: from culture to the technology (and its implementation).</p><p>Protocol technologies like encrypted messaging have a deeper political element. The causality flows both ways, which means stakeholders have, well, more at stake. A tool like censor-resistant social media will affect culture in hard-to-predict ways. Making new markets and customers isn&#8217;t just about interfaces or features, but increasingly about diplomatic groundwork.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://protocolized.summerofprotocols.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Get access to the ecosystem diplomacy workshop template when we publish it.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h3><strong>Summarizing the Bridge Atlas salons</strong></h3><p>If you haven&#8217;t already, be sure to listen to the <a href="https://www.youtube.com/playlist?list=PLIk0EtKZjVltdB39Tzin_NqRyDxsapYGG">series of salons</a> we recorded leading up to the ecosystem diplomacy workshop at Devconnect. There are five episodes, each featuring a bridge-building conversation between one member of the Ethereum ecosystem and an external counterparty.</p><ul><li><p><strong>Episode 1 - Intro:</strong> Tim Beiko and I discuss what this series is about, how Summer of Protocols approaches bridge building, and why protocol thinking is a good thing to get good at.</p></li><li><p><strong>Episode 2 - Paradigms:</strong> Josh Stark and Nils Gilman talk about <em>hardness</em> and <em>planetarity</em>, two extremely useful terms for anyone interested in protocols. Plus, they explore applications for programmable cryptography at unprecedented scales.</p></li><li><p><strong>Episode 3 - Commons:</strong> Trent Van Epps and Yancey Strickler go deep on how to protect and grow a commons so that everyone can win, by playing the long game. Between Van Epps&#8217; experience with Protocol Guild and Strickler&#8217;s experience having founded Kickstarter and Metalabel, there&#8217;s a lot to take away.</p></li><li><p><strong>Episode 4 - Alignment:</strong> Former CEO of Twitch and OpenAI &#8211; and current CEO of Softmax &#8211; Emmett Shear joins Alex Stokes of the Ethereum Foundation to talk about alignment and why most people get it wrong. Protocols are a more appropriately scaled approach to the problem.</p></li><li><p><strong>Episode 5 - Verifiability:</strong> Shreya Shankar, creator of DocETL, and cryptographer Justin Drake explore the importance of verifiability in both AI and blockchains. They use the underlying similarities they discover to build a bridge between these two important domains.</p></li></ul><div id="youtube2-6KpWypVFL2o" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;6KpWypVFL2o&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/6KpWypVFL2o?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div>]]></content:encoded></item><item><title><![CDATA[Bridge Atlas Episode 5: Verifiability]]></title><description><![CDATA[Issue #74: A conversation with Shreya Shankar and Justin Drake]]></description><link>https://protocolized.summerofprotocols.com/p/bridge-atlas-episode-5-verifiability</link><guid isPermaLink="false">https://protocolized.summerofprotocols.com/p/bridge-atlas-episode-5-verifiability</guid><dc:creator><![CDATA[Protocolized]]></dc:creator><pubDate>Sun, 23 Nov 2025 17:38:29 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!7_Cs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fe1a542-d4ae-40e5-9f7e-c0430ebbeb81_1200x1200.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Welcome back to the final episode of the <strong>Bridge Atlas</strong> series, hosted by <strong>Christine D. Kim</strong>. We discuss Ethereum and AI systems through the lens of verifiability, with  guests <strong>Shreya Shankar</strong>, a PhD researcher at Berkeley, and <strong>Justin Drake</strong>, an Ethereum Foundation researcher working on the lean Ethereum project.</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7_Cs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fe1a542-d4ae-40e5-9f7e-c0430ebbeb81_1200x1200.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7_Cs!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fe1a542-d4ae-40e5-9f7e-c0430ebbeb81_1200x1200.png 424w, https://substackcdn.com/image/fetch/$s_!7_Cs!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fe1a542-d4ae-40e5-9f7e-c0430ebbeb81_1200x1200.png 848w, https://substackcdn.com/image/fetch/$s_!7_Cs!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fe1a542-d4ae-40e5-9f7e-c0430ebbeb81_1200x1200.png 1272w, https://substackcdn.com/image/fetch/$s_!7_Cs!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fe1a542-d4ae-40e5-9f7e-c0430ebbeb81_1200x1200.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7_Cs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fe1a542-d4ae-40e5-9f7e-c0430ebbeb81_1200x1200.png" width="500" height="500" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3fe1a542-d4ae-40e5-9f7e-c0430ebbeb81_1200x1200.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1200,&quot;width&quot;:1200,&quot;resizeWidth&quot;:500,&quot;bytes&quot;:187355,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/179367259?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fe1a542-d4ae-40e5-9f7e-c0430ebbeb81_1200x1200.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!7_Cs!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fe1a542-d4ae-40e5-9f7e-c0430ebbeb81_1200x1200.png 424w, https://substackcdn.com/image/fetch/$s_!7_Cs!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fe1a542-d4ae-40e5-9f7e-c0430ebbeb81_1200x1200.png 848w, https://substackcdn.com/image/fetch/$s_!7_Cs!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fe1a542-d4ae-40e5-9f7e-c0430ebbeb81_1200x1200.png 1272w, https://substackcdn.com/image/fetch/$s_!7_Cs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fe1a542-d4ae-40e5-9f7e-c0430ebbeb81_1200x1200.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p><strong>Christine:</strong> Justin, can you start us off by introducing the lean Ethereum<br>project and what that entails?</p><p><strong>Justin:</strong> In lean Ethereum, we&#8217;re tackling verifiability in two ways. First, for deterministic blockchain computation, instead of re&#8208;executing transactions on thousands of nodes, we use cryptographic SNARKs &#8211; short proofs a single person produces and everyone else can verify in milliseconds. Second, for the non&#8208;deterministic consensus part, we aim to speed up voting to achieve finality in seconds instead of minutes.</p><p><strong>Christine: </strong>Shreya, I saw you smiling when Justin mentioned SNARKs. Is that something you are interested in as it relates to verifiability?</p><p><strong>Shreya:</strong> I smiled because I learned about zk-SNARKs early in my PhD &#8211; they&#8217;re very cool! My own work is on <a href="https://www.docetl.org/">DocETL</a>, a declarative system for unstructured data processing. For example, a public defender might mine court transcripts to find racially biased statements. This requires reasoning beyond traditional databases, so DocETL lets users write MapReduce-style pipelines with operators defined in natural language and executed by LLMs.</p><p>Verifiability for us means: how do we ensure AI outputs align with human expectations? We optimize pipelines for accuracy and cost, sometimes replacing LLM functions with deterministic code. We also expose statistical primitives so users can verify samples and estimate worst&#8208;case accuracy. Provenance &#8211; establishing where in the source particular data statements came from &#8211; and understanding AI reasoning are important too.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://protocolized.summerofprotocols.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://protocolized.summerofprotocols.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Justin:</strong> That reminds me of my &#8216;spectrum of trust&#8217; model. On one end you have math, physics, cryptography &#8211; things you trust completely. On the other, legal systems and reputation &#8211; mushy, subjective. Blockchains aim for trust minimization, pushing everything toward the &#8216;trustless&#8217; end. Dispute resolution in marketplaces remains hard; maybe your work could help build trustless marketplaces without escrow agents.</p><p><strong>Shreya:</strong> How are disputes handled now?</p><p><strong>Justin:</strong> In OpenBazaar, buyers and sellers agree on a trusted escrow agent. It&#8217;s reputation&#8208;based and can be ine&#64256;icient. Agents can also be tempted to collude for large transactions.</p><p><strong>Christine:</strong> Shreya, talk about AI evals in verifiability.</p><p><strong>Shreya:</strong> We annotate AI outputs to identify features correlated with human disagreement &#8211; missing definitions, odd prioritization, etc. &#8211; until the distribution of these &#8216;qualitative codes&#8217; stabilizes. Then we can train LLM judges to evaluate outputs at scale and measure misalignment.</p><p><strong>Justin:</strong> Decentralization in Ethereum is similarly hard to measure. The Nakamoto coe&#64256;icient &#8211; how many operators control 33% or 50% of stake &#8211; has limits. SNARKs lower barriers to entry so even small devices can verify. For non&#8208;deterministic aspects, economic penalties ensure that bad behavior would destroy large amounts of staked value. Shreya, how are adversarial actors handled in AI?</p><p><strong>Shreya:</strong> We see two threat models: malicious users crafting pipelines to prove biased points, and non&#8208;malicious users blindly trusting AI outputs without knowing counterfactuals. The latter worries me more.</p><p><strong>Justin:</strong> In SNARKs, we counter maliciousness with interactive proofs &#8211; multiple rounds where the verifier challenges the prover &#8211; and &#8216;hinting,&#8217; where the prover supplies extra information to make verification easier.</p><p><strong>Shreya:</strong> I can imagine combining those for DocETL: for example, AI showing users samples it didn&#8217;t find interesting and asking them to label them.</p><p><strong>Justin:</strong> Hinting parallels a teacher giving students clues.<br><br><strong>Shreya:</strong> In data science, negligent or biased analysis isn&#8217;t new &#8211; but AI&#8217;s agency over vast amounts of unstructured data makes the problem more urgent.</p><p><strong>Justin:</strong> We have recursive proof composition &#8211; combining fast but large proofs with slow but small proofs to get both speed and compactness. You could apply a recursive AI approach: one AI isolates snippets, another evaluates them.</p><p><strong>Shreya:</strong> We do something similar, decomposing problems into units different AIs handle well, and measuring accuracy after rewrites.</p><p><strong>Christine:</strong> Is there a tension between verifiability and e&#64256;iciency?</p><p><strong>Justin:</strong> In Ethereum rollups, each flavor trades off differently: optimistic rollups have long challenge periods; zk-rollups require heavy upfront proof building; TEE rollups trust hardware; committee rollups trust members. Energy limits mean we can&#8217;t snarkify all AI &#8211; so we must be selective.</p><p><strong>Shreya:</strong> In AI data systems, computation vs. resource cost trade&#8208;offs are constant. DocETL partitions tasks to minimize cost and maximize accuracy &#8211; using deterministic functions for simple tasks, reserving LLMs for reasoning.</p><p><strong>Justin:</strong> That&#8217;s like the co&#8208;processor and glue model: specialized processors for repetitive tasks, flexible &#8216;glue&#8217; for unstructured problems.</p><p><strong>Shreya:</strong> Yes, for example filtering transcripts deterministically to discard irrelevant text before using LLMs.</p><p><strong>Justin:</strong> In SNARKs, a team built auto pre&#8208;compiles &#8211; machine&#8208;generated specialized processors &#8211; which sometimes outperform human&#8208;written ones, even for hash functions. &#8230; Blockchains would seem to provide an ideal money for AI because AIs don&#8217;t have access to bank accounts, but they can have access to cryptocurrency. When you combine that with the presumption that AIs are going to be so much smarter than we are, it&#8217;s only natural to presume that AIs are going to be the richest entities in the world and they&#8217;re going to be storing almost all of their wealth in cryptocurrencies. What kind of emotions that does that invoke in you?</p><p><strong>Shreya:</strong> Giving AI currency could create alignment incentives we currently lack. But what happens if AIs hoard wealth? What can they spend it on? In data analysis, I&#8217;d pay more for better AI, but that could be costly.</p><p><strong>Christine:</strong> Could you hardcode AI to value a cryptocurrency as its ultimate goal, even without things to spend it on?</p><p><strong>Justin:</strong> Network effects could make such money valuable if other AIs accept it for tasks. I foresee a future where AIs pay humans to do things they can&#8217;t.</p><p><strong>Shreya:</strong> True &#8211; AIs will need compute, memory, and human labor for certain tasks.</p><p><strong>Justin:</strong> Some jurisdictions might grant AIs legal entity status, enabling bank accounts. We&#8217;ll see experiments on whether that leads to better or worse outcomes.</p><p><strong>Christine:</strong> What are some sibling concepts to verifiability?</p><p><strong>Justin:</strong> In blockchains, reproducibility is key: nodes re&#8208;execute to get the same result. Bugs are mitigated either through client diversity &#8211; independent teams producing matching results &#8211; or formal verification, proving software has zero bugs. Formal verification is hard for AI, but AIs can help formalize SNARKs by tackling sub&#8208;problems in parallel.</p><p><strong>Shreya:</strong> In AI, reproducibility is often misunderstood. Non&#8208;determinism isn&#8217;t bad &#8211; it&#8217;s a feature &#8211; but we may need statistical claim reproducibility rather than exact output reproducibility.</p><p><strong>Christine:</strong> Closing thoughts?</p><p><strong>Shreya:</strong> I&#8217;m excited about hints &#8211; using them to make verification easier has clear analogs in data processing.</p><p><strong>Justin:</strong> I&#8217;m encouraged by efforts to turn mushy realities into black&#8208;and&#8208;white outcomes. Maybe Shreya&#8217;s research could replace referees in sports or escrow agents in marketplaces, solving the last 20% where humans are still needed.</p><div id="youtube2-BPsgkqgTWos" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;BPsgkqgTWos&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/BPsgkqgTWos?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div>]]></content:encoded></item><item><title><![CDATA[Images of Memory]]></title><description><![CDATA[Issue #73: A Memory Research Group update]]></description><link>https://protocolized.summerofprotocols.com/p/images-of-memory</link><guid isPermaLink="false">https://protocolized.summerofprotocols.com/p/images-of-memory</guid><dc:creator><![CDATA[Kei Kreutler]]></dc:creator><pubDate>Tue, 18 Nov 2025 18:10:27 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!fE2O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa82bc85c-deb5-486d-ab36-340140f24773_1000x1000.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em><strong>In this issue:</strong> <strong>Kei Kreutler</strong>, convenor of our <strong><a href="https://docs.google.com/document/d/1jCnl-0_JpZgnL1a5GJktuFuFnd3jOp8a_i6hHecO9Pw/edit?usp=sharing">Memory Research SIG</a></strong>, discusses  metaphors for computational memory in LLMs and before. The group meets every two weeks on <strong><a href="https://discord.gg/FdbwqmKX6S?event=1385700098767458334">Discord</a></strong> to discuss a text related to memory across disciplines, and you&#8217;re welcome to join the next session.</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fE2O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa82bc85c-deb5-486d-ab36-340140f24773_1000x1000.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fE2O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa82bc85c-deb5-486d-ab36-340140f24773_1000x1000.png 424w, https://substackcdn.com/image/fetch/$s_!fE2O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa82bc85c-deb5-486d-ab36-340140f24773_1000x1000.png 848w, https://substackcdn.com/image/fetch/$s_!fE2O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa82bc85c-deb5-486d-ab36-340140f24773_1000x1000.png 1272w, https://substackcdn.com/image/fetch/$s_!fE2O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa82bc85c-deb5-486d-ab36-340140f24773_1000x1000.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fE2O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa82bc85c-deb5-486d-ab36-340140f24773_1000x1000.png" width="502" height="502" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a82bc85c-deb5-486d-ab36-340140f24773_1000x1000.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1000,&quot;width&quot;:1000,&quot;resizeWidth&quot;:502,&quot;bytes&quot;:214006,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/179045063?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa82bc85c-deb5-486d-ab36-340140f24773_1000x1000.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fE2O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa82bc85c-deb5-486d-ab36-340140f24773_1000x1000.png 424w, https://substackcdn.com/image/fetch/$s_!fE2O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa82bc85c-deb5-486d-ab36-340140f24773_1000x1000.png 848w, https://substackcdn.com/image/fetch/$s_!fE2O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa82bc85c-deb5-486d-ab36-340140f24773_1000x1000.png 1272w, https://substackcdn.com/image/fetch/$s_!fE2O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa82bc85c-deb5-486d-ab36-340140f24773_1000x1000.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p>If you&#8217;re reading this newsletter, then there&#8217;s a good chance you have a memory of the scene from <em>2001: A Space Odyssey</em> in which astronaut Dave Bowman, alone aboard the spacecraft Discovery One, decides to dismantle HAL 9000, the computer system controlling the ship. He goes to the memory terminal and, one by one, proceeds to remove glowing tapes. Meanwhile, HAL sings a simple song that falters and fades out, like an animatronic toy with dying batteries.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BHeE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bcf4895-8e69-4d3e-9324-267e56e04034_1425x865.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BHeE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bcf4895-8e69-4d3e-9324-267e56e04034_1425x865.png 424w, https://substackcdn.com/image/fetch/$s_!BHeE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bcf4895-8e69-4d3e-9324-267e56e04034_1425x865.png 848w, https://substackcdn.com/image/fetch/$s_!BHeE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bcf4895-8e69-4d3e-9324-267e56e04034_1425x865.png 1272w, https://substackcdn.com/image/fetch/$s_!BHeE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bcf4895-8e69-4d3e-9324-267e56e04034_1425x865.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BHeE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bcf4895-8e69-4d3e-9324-267e56e04034_1425x865.png" width="600" height="364.2105263157895" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0bcf4895-8e69-4d3e-9324-267e56e04034_1425x865.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:865,&quot;width&quot;:1425,&quot;resizeWidth&quot;:600,&quot;bytes&quot;:205261,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/179045063?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bcf4895-8e69-4d3e-9324-267e56e04034_1425x865.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!BHeE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bcf4895-8e69-4d3e-9324-267e56e04034_1425x865.png 424w, https://substackcdn.com/image/fetch/$s_!BHeE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bcf4895-8e69-4d3e-9324-267e56e04034_1425x865.png 848w, https://substackcdn.com/image/fetch/$s_!BHeE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bcf4895-8e69-4d3e-9324-267e56e04034_1425x865.png 1272w, https://substackcdn.com/image/fetch/$s_!BHeE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bcf4895-8e69-4d3e-9324-267e56e04034_1425x865.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>2001: A Space Odyssey</em> (1968)</figcaption></figure></div><p>This is one image of memory we have in pop culture. Other shared images of memory related to digital technologies might include a USB on your keychain or, for some of us, the translucent, colored memory cards of early game consoles. There might be a faint archival image that comes to mind: people standing in large rooms with terminals spinning magnetic tape or, in other words, an image of an early computer system.</p><p>Given the large degree to which metaphors from digital technologies shape our understanding of memory, it&#8217;s surprising that our images of memory are so abstracted from how humans experience memory. While we might conceptualize our memory as hard drives, for many of us, the actual experience of recall can feel much more muddily intuitive than browsing a digital filing cabinet of the mind.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> These images often suggest that memory is a discrete object, unlike the well-worn path around a mountain that remembers, through its form, those who walked on it.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dgut!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f080c7-7206-4204-bc9e-ef81660ec303_1050x1060.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dgut!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f080c7-7206-4204-bc9e-ef81660ec303_1050x1060.png 424w, https://substackcdn.com/image/fetch/$s_!dgut!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f080c7-7206-4204-bc9e-ef81660ec303_1050x1060.png 848w, https://substackcdn.com/image/fetch/$s_!dgut!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f080c7-7206-4204-bc9e-ef81660ec303_1050x1060.png 1272w, https://substackcdn.com/image/fetch/$s_!dgut!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f080c7-7206-4204-bc9e-ef81660ec303_1050x1060.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dgut!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f080c7-7206-4204-bc9e-ef81660ec303_1050x1060.png" width="416" height="419.96190476190475" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/68f080c7-7206-4204-bc9e-ef81660ec303_1050x1060.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1060,&quot;width&quot;:1050,&quot;resizeWidth&quot;:416,&quot;bytes&quot;:74902,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/179045063?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f080c7-7206-4204-bc9e-ef81660ec303_1050x1060.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!dgut!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f080c7-7206-4204-bc9e-ef81660ec303_1050x1060.png 424w, https://substackcdn.com/image/fetch/$s_!dgut!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f080c7-7206-4204-bc9e-ef81660ec303_1050x1060.png 848w, https://substackcdn.com/image/fetch/$s_!dgut!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f080c7-7206-4204-bc9e-ef81660ec303_1050x1060.png 1272w, https://substackcdn.com/image/fetch/$s_!dgut!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f080c7-7206-4204-bc9e-ef81660ec303_1050x1060.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>To explore these nuances in our images of memory, the Memory Research Group has been surveying different digital technologies and our metaphoric relationships to them.</p><p>We naturally looked at one of the hardest problems first: how memory works in LLMs. We read the blog post <em><a href="https://blog.desigeek.com/post/2025/06/what-is-kv-cache-in-llms/">What is KV Cache in LLMs and How Does It Help?</a></em> Most LLMs use KV caching: the technique of storing previously computed data in the form of key value pairs during a conversation. When a person sends a new prompt in the conversation, the LLM can access data previously generated in its response without having to compute it again. This makes the computation costs required for an ongoing conversation with an LLM scale linearly rather than quadratically.</p><p>Without KV caching, LLMs would be far too computationally expensive to work in the way they do today. Applying the analogy to a human conversation, it would be as though every time you spoke a new word, first you would have to silently rehearse every prior word you&#8217;d said so far. It would take so long, and be so redundant, I&#8217;m not sure anyone would have the patience for conversation.</p><p>But humans aren&#8217;t LLMs, and LLMs aren&#8217;t humans. Their memory problems are far from solved.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a> In one example, after about 200 conversational exchanges between an LLM and a person, the KV cache storage size in gigabytes can be greater than the memory required for the transformer model weights. It&#8217;s still a bottleneck, and the blog post we read summarized current approaches to solving it.</p><p>While memory storage in LLMs clearly has quantity issues, it also has quality issues. In my experience, an LLM&#8217;s memory often feels less like persistent contextual awareness and more like they&#8217;ve been primed to answer in superficially relevant ways. (How many times can they paste my gardening interests over my questions about digital memory architectures?) There are multiple emerging strategies other than KV caching that try to address these issues across conversation windows. Yet with memory problems in LLMs, we&#8217;re approaching new computational terrain, which can be better understood within the history of computer architecture development.</p><p>So, in our next Memory Research Group session, we explored the concept of the cache in early computer architectures. We read Berkeley computer scientist Alan Jay Smith&#8217;s &#8216;Cache Memory Design: An Evolving Art,&#8217; published in 1987. Written at a moment when caching was maturing from an engineering experiment to standard architectural practice, the paper highlights how cache design remains a balance between cost, complexity, and performance.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MUqL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e975ee7-febb-4a95-9146-e6080ad280c5_1400x840.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MUqL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e975ee7-febb-4a95-9146-e6080ad280c5_1400x840.png 424w, https://substackcdn.com/image/fetch/$s_!MUqL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e975ee7-febb-4a95-9146-e6080ad280c5_1400x840.png 848w, https://substackcdn.com/image/fetch/$s_!MUqL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e975ee7-febb-4a95-9146-e6080ad280c5_1400x840.png 1272w, https://substackcdn.com/image/fetch/$s_!MUqL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e975ee7-febb-4a95-9146-e6080ad280c5_1400x840.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MUqL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e975ee7-febb-4a95-9146-e6080ad280c5_1400x840.png" width="600" height="360" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9e975ee7-febb-4a95-9146-e6080ad280c5_1400x840.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:840,&quot;width&quot;:1400,&quot;resizeWidth&quot;:600,&quot;bytes&quot;:87859,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/179045063?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e975ee7-febb-4a95-9146-e6080ad280c5_1400x840.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MUqL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e975ee7-febb-4a95-9146-e6080ad280c5_1400x840.png 424w, https://substackcdn.com/image/fetch/$s_!MUqL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e975ee7-febb-4a95-9146-e6080ad280c5_1400x840.png 848w, https://substackcdn.com/image/fetch/$s_!MUqL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e975ee7-febb-4a95-9146-e6080ad280c5_1400x840.png 1272w, https://substackcdn.com/image/fetch/$s_!MUqL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e975ee7-febb-4a95-9146-e6080ad280c5_1400x840.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">From Alan Jay Smith, &#8216;Cache Memory Design: An Evolving Art&#8217; (1987)</figcaption></figure></div><p>Caches are small, fast memories that store recently used data so it can be quickly accessed later. Researchers first invented the concept in the late 1960s, based on two simple observations about how programs actually behave: they tend to access the same data over and over&#8212;referred to as <em>temporal</em> <em>locality&#8212;</em>and they tend to need data that&#8217;s stored near each other&#8212;referred to as <em>spatial locality</em>.</p><p>A library is the metaphor commonly used to explain caches. Imagine you&#8217;re working on a research paper. Rather than making constant round trips to the library every single time you&#8217;re looking for information, you check out the books you think you&#8217;ll need, and you keep them on your desk at home. In this example, your desk becomes the cache, allowing you to quickly browse the most relevant books. You can only keep a limited amount of books on your desk, though, because you don&#8217;t have as much space there as the library has in its stacks, illustrating why a cache is fast but limited.</p><p>A library&#8217;s layout also mirrors this principle. Libraries keep frequently checked-out books in a small cabinet near the front desk, while they move older, rarely needed books to off-site storage. In this example, using prior data to predict usage, libraries give the <em>spatial locality</em> and <em>temporal locality</em> of frequently checked-out books priority.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a></p><p>In the time that&#8217;s passed since Smith wrote the paper we read, caches have evolved into sophisticated hierarchies, and research increasingly explores using machine learning to choose which data to prefetch. The concept has also become useful for various tasks beyond a computer&#8217;s central processing unit. Web browsers cache data from websites you visit frequently, content delivery networks cache popular content closer to users geographically, and databases cache frequently accessed queries. Now LLMs also depend on caching. Anywhere there&#8217;s a speed-versus-storage trade-off, there&#8217;s likely some form of caching happening.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://protocolized.summerofprotocols.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://protocolized.summerofprotocols.com/subscribe?"><span>Subscribe now</span></a></p><p>In our Memory Research Group discussion on cache memories, we found ourselves immediately translating the concept back into the spaces we actually inhabit. One person described their kitchen: the counter holds ingredients within arm&#8217;s reach like the cache, while the pantry requires slowing down to retrieve less frequently used items, a kind of &#8220;main memory,&#8221; analogous to the slower hard discs used in computers. Another person reflected on their studio practice, noting how different zones of the room hold different &#8220;heat&#8221; depending on when work was last touched. Their projects flow between spaces according to temporal patterns, like cache locality principles.</p><p>The insight about hot and cool zones in a studio made me think about dust. Dust reflects physical entropy. The more dust on something, the less recently it&#8217;s been used. This acts as a natural &#8220;least recently used&#8221; indicator, a common algorithm used by cache memories to choose which data should move to slower storage. It&#8217;s how we know without any formal tracking system what hasn&#8217;t been touched in our personal archives, even our public ones.</p><p>As soon as you start looking at images of memory through digital technologies, especially computer architectures, you see both the connections and the discrepancies in these metaphors. Caches optimize for speed, but sometimes the salience of a memory doesn&#8217;t reflect its deeper helpfulness to us. Dust tells us what we haven&#8217;t touched, but it can&#8217;t tell us why we&#8217;ve avoided touching it. In <em>2001: A Space Odyssey, </em>the spacecraft world of HAL appears dustlessly sterile. More muddy images of memory, often found through software rather than hardware metaphors, give us richer language for the human experience of remembering. Environmental metaphors, like the well-worn path around a mountain, come into view again.</p><p>As the synthetic memory maker in <em>Blade Runner 2049</em> explains, &#8220;They all think it&#8217;s about more detail. But that&#8217;s not how memory works. We recall with our feelings. Anything real should be a mess.&#8221;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hIUi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcca022e0-d138-41c8-8c5e-c69134c61876_1400x840.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hIUi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcca022e0-d138-41c8-8c5e-c69134c61876_1400x840.png 424w, https://substackcdn.com/image/fetch/$s_!hIUi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcca022e0-d138-41c8-8c5e-c69134c61876_1400x840.png 848w, https://substackcdn.com/image/fetch/$s_!hIUi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcca022e0-d138-41c8-8c5e-c69134c61876_1400x840.png 1272w, https://substackcdn.com/image/fetch/$s_!hIUi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcca022e0-d138-41c8-8c5e-c69134c61876_1400x840.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hIUi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcca022e0-d138-41c8-8c5e-c69134c61876_1400x840.png" width="600" height="360" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cca022e0-d138-41c8-8c5e-c69134c61876_1400x840.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:840,&quot;width&quot;:1400,&quot;resizeWidth&quot;:600,&quot;bytes&quot;:137521,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/179045063?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcca022e0-d138-41c8-8c5e-c69134c61876_1400x840.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hIUi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcca022e0-d138-41c8-8c5e-c69134c61876_1400x840.png 424w, https://substackcdn.com/image/fetch/$s_!hIUi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcca022e0-d138-41c8-8c5e-c69134c61876_1400x840.png 848w, https://substackcdn.com/image/fetch/$s_!hIUi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcca022e0-d138-41c8-8c5e-c69134c61876_1400x840.png 1272w, https://substackcdn.com/image/fetch/$s_!hIUi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcca022e0-d138-41c8-8c5e-c69134c61876_1400x840.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>Blade Runner 2049</em> (2017)</figcaption></figure></div><p>The 1987 paper we read captured caching at a moment of transition, and we&#8217;re in another one now with LLMs that may greatly reshape images of memory in the future. It&#8217;s a change we don&#8217;t really have an image for yet.</p><p>For the next Memory Research Group sessions, we&#8217;ll continue looking at technological transitions, from magnetic core memory to the advent of virtual memory, before closing the year with a session focused on the open question: <em>What metaphors for memory await us next?</em></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>That is, unless you&#8217;re a memory champion, which I wrote about in my last <em>Protocolized</em> post <a href="https://protocolized.summerofprotocols.com/p/reflections-from-memoria">Reflections from Memoria</a>.</p><p></p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>Though many people would say our memory problems aren&#8217;t solved either. Or maybe that they&#8217;re not a problem to solve. Who knows.</p><p></p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-3" href="#footnote-anchor-3" class="footnote-number" contenteditable="false" target="_self">3</a><div class="footnote-content"><p>Architect and Summer of Protocols alum Chenoe Hart joined us for the session and shared some of her insightful research on <a href="https://summerofprotocols.com/research/addressable-space">addressable space</a> including the history of library systems.</p><p></p></div></div>]]></content:encoded></item><item><title><![CDATA[Bridge Atlas Episode 4: Alignment]]></title><description><![CDATA[Issue #72: A conversation with Alex Stokes and Emmett Shear]]></description><link>https://protocolized.summerofprotocols.com/p/bridge-atlas-episode-4-alignment</link><guid isPermaLink="false">https://protocolized.summerofprotocols.com/p/bridge-atlas-episode-4-alignment</guid><dc:creator><![CDATA[Protocolized]]></dc:creator><pubDate>Sat, 15 Nov 2025 22:45:35 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/6217d1e3-9545-46d9-bb34-2ea77f673409_1800x1800.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Welcome back to the fourth episode of the <strong>Bridge Atlas</strong> series, hosted by <strong>Christine D. Kim</strong>. Today, we&#8217;re diving into Ethereum through the lens of alignment with <strong>Alex Stokes</strong>, Ethereum Foundation Protocol Coordination Co-Team Lead, and <strong>Emmett Shear</strong>, founder of Softmax.</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yG0i!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bd01b20-0b66-483b-8975-5adfa406128e_1200x1200.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yG0i!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bd01b20-0b66-483b-8975-5adfa406128e_1200x1200.png 424w, https://substackcdn.com/image/fetch/$s_!yG0i!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bd01b20-0b66-483b-8975-5adfa406128e_1200x1200.png 848w, https://substackcdn.com/image/fetch/$s_!yG0i!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bd01b20-0b66-483b-8975-5adfa406128e_1200x1200.png 1272w, https://substackcdn.com/image/fetch/$s_!yG0i!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bd01b20-0b66-483b-8975-5adfa406128e_1200x1200.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yG0i!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bd01b20-0b66-483b-8975-5adfa406128e_1200x1200.png" width="500" height="500" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0bd01b20-0b66-483b-8975-5adfa406128e_1200x1200.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1200,&quot;width&quot;:1200,&quot;resizeWidth&quot;:500,&quot;bytes&quot;:548793,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/178885462?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bd01b20-0b66-483b-8975-5adfa406128e_1200x1200.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!yG0i!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bd01b20-0b66-483b-8975-5adfa406128e_1200x1200.png 424w, https://substackcdn.com/image/fetch/$s_!yG0i!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bd01b20-0b66-483b-8975-5adfa406128e_1200x1200.png 848w, https://substackcdn.com/image/fetch/$s_!yG0i!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bd01b20-0b66-483b-8975-5adfa406128e_1200x1200.png 1272w, https://substackcdn.com/image/fetch/$s_!yG0i!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bd01b20-0b66-483b-8975-5adfa406128e_1200x1200.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p><strong>Christine:</strong> Let&#8217;s start with some background. Emmett, you&#8217;ve spoken before about agent alignment. Could you give our listeners a quick summary of your focus?</p><p><strong>Emmett:</strong> Sure. My background is in internet entrepreneurship. I started Justin.tv, which became Twitch, and had a brief stint as CEO of OpenAI during a turbulent period. That experience made me realize AI had an unanswered question: what does it really mean to align models, and to what? So I founded Softmax, an alignment research company.</p><p>We run multi-agent reinforcement learning simulations to study alignment &#8211; not as a static state, but as a protocol and ongoing process. We see alignment as coordination between agents at multiple levels, with shared success as the foundation. If one wins while the other loses, there&#8217;s no real alignment. Shared success enables specialization and team coherence. But you also need enforcement to protect alignment from parasites or bad actors. Enforcement isn&#8217;t what creates alignment &#8211; it protects what already exists. Softmax focuses on building shared success and coordination, not enforcement.</p><p><strong>Christine:</strong> Alex, tell us about your work at the Ethereum Foundation.</p><p><strong>Alex:</strong> I&#8217;ve been at EF for a while, focusing on coordination &#8211; essentially our version of alignment. Ethereum&#8217;s decentralized ecosystem contains many actors with different interests. We want everyone &#8220;rowing in the same direction&#8221; toward a shared Ethereum success, but that&#8217;s tricky when interests diverge. My job involves thinking about protocol direction &#8211; maintaining and securing today&#8217;s Ethereum, and scaling and evolving it for the future.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://youtu.be/zHGghwyrZzY?si=3T8ldx2Jl5tPPl5N&quot;,&quot;text&quot;:&quot;Listen to the full episode&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://youtu.be/zHGghwyrZzY?si=3T8ldx2Jl5tPPl5N"><span>Listen to the full episode</span></a></p><p><strong>Christine:</strong> Emmett, you said alignment starts with shared success, but it&#8217;s hard to get that across a large group. In Ethereum, breaking down into smaller local groups might help, but then alignment becomes relative and harder to evaluate. How do we evaluate good alignment in large groups?</p><p><strong>Emmett:</strong> Alignment is relative &#8211; like mass or speed are relative to a frame of reference. You can be aligned with your family or company, but not necessarily with everyone. Systems often have chains of local alignment that feed into global alignment. Crypto does well at creating global shared success &#8211; Bitcoin is almost pure shared success. But crypto struggles with multi-scale alignment and specialization, because it flattens context into one global ledger. We haven&#8217;t figured out how to support boundaries for private information while keeping global coordination.</p><p><strong>Christine:</strong> Alex, do you agree that crypto struggles with specialization?</p><p><strong>Alex:</strong> Partially. Bitcoin has a small &#8220;alignment surface area&#8221; &#8211; one token, one function. Ethereum&#8217;s is larger and more complex. But we already see specialization via subtokens, DeFi apps, and rollups &#8211; smaller ecosystems connected to Ethereum&#8217;s base layer. These are counterexamples to the idea that crypto can&#8217;t support localized alignment.</p><p><strong>Emmett:</strong> Yes, Ethereum&#8217;s hierarchy of boundaries is a form of alignment. But the real economy is messier, with overlapping hierarchies and constructive ambiguity. In Ethereum, ownership is unambiguous by design, which is great for decentralization but loses some of the flexibility ambiguity provides in real-world systems. Forking is the crypto equivalent of revolution, but crypto doesn&#8217;t embrace frequent forks &#8211; a rigid, fork-resistant global chain could be dangerous.</p><p><strong>Alex:</strong> I see your point about rigidity. But I think crypto pushes power to the edges &#8211; users choose to run the software, and forks do happen. Even a &#8220;too big to fail&#8221; chain could be forked eventually, like governments that seemed unchangeable. Ethereum changes its protocol regularly, which keeps flexibility.</p><p><strong>Emmett:</strong> Imagine Ethereum runs the global economy &#8211; every government and corporation depends on it. Forking then becomes almost impossible. My challenge to crypto is: how can we embrace forking without destroying shared success, allowing multiple interpretations of the same ledger?</p><p><strong>Alex:</strong> This is part of Ethereum&#8217;s rollup-centric roadmap &#8211; the base layer stays neutral, while rollups provide flexibility. Decentralization and permissionlessness ensure no one can unilaterally control the chain. Mechanisms for exit &#8211; whether via forks or new chains &#8211; are crucial.</p><p><strong>Emmett:</strong> But how is Ethereum making exit easier today?</p><p><strong>Alex:</strong> Right now, exiting means leaving Ethereum&#8217;s L1, but there&#8217;s not yet an alternative system to exit to. That&#8217;s why rollups are important &#8211; they can offer localized ecosystems.</p><p><strong>Emmett:</strong> Ethereum isn&#8217;t just tokens &#8211; it&#8217;s smart contracts and identities. If the whole economy runs onchain, exiting becomes extremely hard without early planning. That&#8217;s why I&#8217;m concerned: decentralized systems can get stuck in bad ways, especially if AI agents store property there.</p><p><strong>Alex:</strong> We could design smart contracts today with exit functions. Early national ID onchain systems will likely be centralized, so they can patch bugs. Fully decentralized ones could get stuck, as you say &#8211; but decentralization also makes exit easier because there&#8217;s less centralized control.</p><p><strong>Emmett:</strong> You gain the ability to exit centralized systems in exchange for the inability to exit decentralized ones &#8211; that trade-off might be worth it. But with AI, there&#8217;s a risk in trying to encode &#8220;the good&#8221; as a fixed meta-ethical loss function. You can&#8217;t perfectly define the good. Alignment needs openness and ambiguity, letting agents rewrite even their base values. A unified global meta-ethics in AI could be as dangerous as a rigid global blockchain protocol.</p><p><strong>Christine:</strong> Ethereum changes core assumptions frequently &#8211; unlike Bitcoin, which has hard-coded values. Could alignment even be possible with a protocol that changes that often?</p><p><strong>Emmett:</strong> Yes, because survival in the same reality acts as the ultimate arbiter. Systems that believe falsehoods eventually die or adapt to align with reality. Even groups with vastly different beliefs (like Catholics and Protestants) share reality and can find common ground.</p><p><strong>Christine:</strong> I&#8217;m skeptical that man-made protocols can self-correct dynamically like that over time &#8211; whether crypto, AI, or even the internet.</p><p><strong>Emmett:</strong> That&#8217;s why I oppose any global protocol. The real game is constant invention of new value systems and protocols. A healthy ecosystem bubbles with new protocols, with no single durable leader. The danger comes if crypto or AI ossifies into one global layer that must be &#8220;right&#8221; forever.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://protocolized.summerofprotocols.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://protocolized.summerofprotocols.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Christine:</strong> Final thoughts? For me, if Ethereum ossifies, it dies. Technology always needs intervention. And as a side note, I see some protocols &#8211; like the Ten Commandments &#8211; as timeless truths, though that&#8217;s outside our scope.</p><p><strong>Alex:</strong> I&#8217;m optimistic about Ethereum because of the people involved. The tech is an extension of human values, so misalignment can be corrected. AI is riskier because it could run away from human control.</p><p><strong>Emmett:</strong> I think crypto will grow fast, especially as AI agents adopt it. That could lead to a global chain &#8211; which is why we need to think now about maintaining exit rights if the whole economy ends up onchain. We should also think early about AI models that may surpass human intelligence and influence decisions beyond our audit capacity. My criticism comes from optimism &#8211; I believe these systems will succeed, so we should plan for winning scenarios.</p><div id="youtube2-zHGghwyrZzY" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;zHGghwyrZzY&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/zHGghwyrZzY?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div>]]></content:encoded></item><item><title><![CDATA[Protocol Fiction Aesthetics]]></title><description><![CDATA[Issue 71: macro, neumorphic, arcane, cryptic, fractal]]></description><link>https://protocolized.summerofprotocols.com/p/protocol-fiction-aesthetics</link><guid isPermaLink="false">https://protocolized.summerofprotocols.com/p/protocol-fiction-aesthetics</guid><dc:creator><![CDATA[James Langdon]]></dc:creator><pubDate>Fri, 14 Nov 2025 17:59:56 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/1255a5f7-2bcf-45a2-8ae5-32263c9940a6_1000x1000.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em><strong>In this issue:</strong> We debut a new art direction for <strong>Protocolized</strong> and open access to two image generation models developed for the magazine by artist <strong>Darius Ou of hyperpress</strong> and Protocolized editor <strong>James Langdon</strong>, in collaboration with <strong>TITLES</strong>. A new, <strong>purely visual bounty</strong> in the Summer of Protocols Discord introduces the new art to our community of contributors. </em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NwNO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd956cb07-bd4a-4a5c-8047-a740941abd15_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NwNO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd956cb07-bd4a-4a5c-8047-a740941abd15_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!NwNO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd956cb07-bd4a-4a5c-8047-a740941abd15_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!NwNO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd956cb07-bd4a-4a5c-8047-a740941abd15_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!NwNO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd956cb07-bd4a-4a5c-8047-a740941abd15_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NwNO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd956cb07-bd4a-4a5c-8047-a740941abd15_1024x1024.png" width="500" height="500" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d956cb07-bd4a-4a5c-8047-a740941abd15_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:500,&quot;bytes&quot;:1427562,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/177910115?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd956cb07-bd4a-4a5c-8047-a740941abd15_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NwNO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd956cb07-bd4a-4a5c-8047-a740941abd15_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!NwNO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd956cb07-bd4a-4a5c-8047-a740941abd15_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!NwNO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd956cb07-bd4a-4a5c-8047-a740941abd15_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!NwNO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd956cb07-bd4a-4a5c-8047-a740941abd15_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p>The first 70 issues of <em>Protocolized</em> were illustrated with art generated by Midjourney, referencing a moodboard stocked with visuals from the 20th century&#8217;s &#8220;golden era&#8221; of science fiction publishing.</p><p>In particular, one magazine from that time &#8211; <em>Astounding Stories of Super-Science</em> &#8211; has been a <a href="https://www.ribbonfarm.com/2020/08/24/notes-astounding-by-alec-nevala-lee/">formative influence</a> on our project to <a href="https://protocolized.substack.com/p/strange-new-rules">meme the genre</a> of protocol fiction into existence. <em>Astounding</em> set itself apart by moving away from the garish, action-oriented tradition of pulp illustration &#8211; heroes punching aliens in brightly-colored, sensationalized imagery &#8211; and toward a more subtly conceptual approach, grounded in believable technological futures. Editor John W. Campbell considered art to be an integral part of the magazine&#8217;s proposition to readers. He took inspiration from the suggestive potential of images, sometimes even inviting authors to write stories in response to paintings that he had commissioned. Campbell was fully aware of the concerted world-building power of tightly integrated text and image.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://protocolized.summerofprotocols.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://protocolized.summerofprotocols.com/subscribe?"><span>Subscribe now</span></a></p><p>Through its initial art direction, <em>Protocolized</em> has paid explicit, admiring tribute to <em>Astounding</em>, positioning itself in a familiar tradition of speculative fiction. We have made this style our own by consistently de-emphasizing human protagonists in the composition of illustrations. We instead picture less likely protagonists, such as autonomous agents, cybernetic systems, and novel infrastructures &#8211; bringing the background into the foreground.</p><p><em>Astounding</em> aesthetics now carry nostalgic connotations which were never part of their original cultural appeal. As compelling as they still are, they have become <em>cliche</em>.  </p><p>When it came to imagining a contemporary protocol fiction aesthetic, the approach had to be: <em>do as Astounding did</em> in embracing the art of its time, not <em>look as Astounding looked</em>. Since a significant aspect of what sets <em>Protocolized</em> apart editorially is its embrace of LLM-assisted writing, it made sense to train our own image generation model.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3z3n!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8321af4b-495c-4b0d-bb3f-0778bd6d5bf4_1567x758.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3z3n!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8321af4b-495c-4b0d-bb3f-0778bd6d5bf4_1567x758.png 424w, https://substackcdn.com/image/fetch/$s_!3z3n!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8321af4b-495c-4b0d-bb3f-0778bd6d5bf4_1567x758.png 848w, https://substackcdn.com/image/fetch/$s_!3z3n!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8321af4b-495c-4b0d-bb3f-0778bd6d5bf4_1567x758.png 1272w, https://substackcdn.com/image/fetch/$s_!3z3n!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8321af4b-495c-4b0d-bb3f-0778bd6d5bf4_1567x758.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3z3n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8321af4b-495c-4b0d-bb3f-0778bd6d5bf4_1567x758.png" width="1456" height="704" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8321af4b-495c-4b0d-bb3f-0778bd6d5bf4_1567x758.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:704,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1326365,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/177910115?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8321af4b-495c-4b0d-bb3f-0778bd6d5bf4_1567x758.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3z3n!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8321af4b-495c-4b0d-bb3f-0778bd6d5bf4_1567x758.png 424w, https://substackcdn.com/image/fetch/$s_!3z3n!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8321af4b-495c-4b0d-bb3f-0778bd6d5bf4_1567x758.png 848w, https://substackcdn.com/image/fetch/$s_!3z3n!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8321af4b-495c-4b0d-bb3f-0778bd6d5bf4_1567x758.png 1272w, https://substackcdn.com/image/fetch/$s_!3z3n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8321af4b-495c-4b0d-bb3f-0778bd6d5bf4_1567x758.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Examples of training art for the author&#8217;s model.</figcaption></figure></div><p>In collaboration with <a href="https://www.titles.xyz/">TITLES</a>, a platform for training and distributing image generation models by artists, we have created <em>two</em> new models, with the initial intention of using them to distinguish between our protocol fiction output and the non-fiction, <a href="https://summerofprotocols.com/">Summer of Protocols</a> program-related content that we publish. The TITLES studio interface allows us to sample both models in a single generation, so these categories can be as permeable as necessary.</p><p>Unlike the major image generation platforms directed at outputting polished-looking images for content creators &#8211; Midjourney, ChatGPT, etc. &#8211; TITLES centres artists by naming them, giving them creative control over their training art, paying royalties on the use of their models, and storing image metadata onchain for human-legible proof of provenance.</p><p>Both <em>Protocolized</em> models were trained on new images created specifically for the purpose.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qMDn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76b80e89-f4fd-4bd7-913f-a8752320af40_1567x758.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qMDn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76b80e89-f4fd-4bd7-913f-a8752320af40_1567x758.png 424w, https://substackcdn.com/image/fetch/$s_!qMDn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76b80e89-f4fd-4bd7-913f-a8752320af40_1567x758.png 848w, https://substackcdn.com/image/fetch/$s_!qMDn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76b80e89-f4fd-4bd7-913f-a8752320af40_1567x758.png 1272w, https://substackcdn.com/image/fetch/$s_!qMDn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76b80e89-f4fd-4bd7-913f-a8752320af40_1567x758.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qMDn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76b80e89-f4fd-4bd7-913f-a8752320af40_1567x758.png" width="1456" height="704" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/76b80e89-f4fd-4bd7-913f-a8752320af40_1567x758.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:704,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1135464,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/177910115?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76b80e89-f4fd-4bd7-913f-a8752320af40_1567x758.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qMDn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76b80e89-f4fd-4bd7-913f-a8752320af40_1567x758.png 424w, https://substackcdn.com/image/fetch/$s_!qMDn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76b80e89-f4fd-4bd7-913f-a8752320af40_1567x758.png 848w, https://substackcdn.com/image/fetch/$s_!qMDn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76b80e89-f4fd-4bd7-913f-a8752320af40_1567x758.png 1272w, https://substackcdn.com/image/fetch/$s_!qMDn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76b80e89-f4fd-4bd7-913f-a8752320af40_1567x758.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Examples of training art for the hyperpress model.</figcaption></figure></div><p>We invited Darius Ou of <a href="https://www.instagram.com/hyper.press/">hyperpress</a> to produce art for the first model. Darius&#8217;s <a href="https://highlight.xyz/mint/base:0xD17114CFAf3123301cB9Bde010b70bD3e10dEE9f">training art</a> is a byproduct of his incredible work in 3D printing, exploiting its primary graphic devices: the <em>slice</em> and the <em>cross-section</em>. Darius created an intricate 3D tree structure which was then sliced in software to produce fragmentary 2D cross sections, which Darius calls <em>Spaceland Trees</em>, in reference to Edwin A. Abbott&#8217;s 1884 novella <em>Flatland</em>, whose two-dimensional protagonists are categorically unable to conceive of a three-dimensional world.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!r7lj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e5c8ceb-6935-4b66-9445-13fbffe60b00_4627x1803.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!r7lj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e5c8ceb-6935-4b66-9445-13fbffe60b00_4627x1803.jpeg 424w, https://substackcdn.com/image/fetch/$s_!r7lj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e5c8ceb-6935-4b66-9445-13fbffe60b00_4627x1803.jpeg 848w, https://substackcdn.com/image/fetch/$s_!r7lj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e5c8ceb-6935-4b66-9445-13fbffe60b00_4627x1803.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!r7lj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e5c8ceb-6935-4b66-9445-13fbffe60b00_4627x1803.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!r7lj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e5c8ceb-6935-4b66-9445-13fbffe60b00_4627x1803.jpeg" width="1456" height="567" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3e5c8ceb-6935-4b66-9445-13fbffe60b00_4627x1803.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:567,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2757287,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/177910115?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e5c8ceb-6935-4b66-9445-13fbffe60b00_4627x1803.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!r7lj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e5c8ceb-6935-4b66-9445-13fbffe60b00_4627x1803.jpeg 424w, https://substackcdn.com/image/fetch/$s_!r7lj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e5c8ceb-6935-4b66-9445-13fbffe60b00_4627x1803.jpeg 848w, https://substackcdn.com/image/fetch/$s_!r7lj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e5c8ceb-6935-4b66-9445-13fbffe60b00_4627x1803.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!r7lj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e5c8ceb-6935-4b66-9445-13fbffe60b00_4627x1803.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">The hyperpress training art derives from a complex 3D object.</figcaption></figure></div><p>The <a href="https://highlight.xyz/mint/base:0x425BDC0b26bfCa744f5dc993e33f2e7f77f3c199">training art</a> for the second model, created by the author, combines soft, smooth <a href="https://en.wikipedia.org/wiki/Neumorphism">&#8216;neumorphic&#8217;</a> digital interface elements with traditional mark-making techniques used by archaeologists to document prehistoric sites of cultural interest.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cbnF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7861df60-5d74-4a73-8c22-f9726ad212a5_1899x1480.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cbnF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7861df60-5d74-4a73-8c22-f9726ad212a5_1899x1480.png 424w, https://substackcdn.com/image/fetch/$s_!cbnF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7861df60-5d74-4a73-8c22-f9726ad212a5_1899x1480.png 848w, https://substackcdn.com/image/fetch/$s_!cbnF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7861df60-5d74-4a73-8c22-f9726ad212a5_1899x1480.png 1272w, https://substackcdn.com/image/fetch/$s_!cbnF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7861df60-5d74-4a73-8c22-f9726ad212a5_1899x1480.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cbnF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7861df60-5d74-4a73-8c22-f9726ad212a5_1899x1480.png" width="504" height="392.88461538461536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7861df60-5d74-4a73-8c22-f9726ad212a5_1899x1480.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1135,&quot;width&quot;:1456,&quot;resizeWidth&quot;:504,&quot;bytes&quot;:572770,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/177910115?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7861df60-5d74-4a73-8c22-f9726ad212a5_1899x1480.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!cbnF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7861df60-5d74-4a73-8c22-f9726ad212a5_1899x1480.png 424w, https://substackcdn.com/image/fetch/$s_!cbnF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7861df60-5d74-4a73-8c22-f9726ad212a5_1899x1480.png 848w, https://substackcdn.com/image/fetch/$s_!cbnF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7861df60-5d74-4a73-8c22-f9726ad212a5_1899x1480.png 1272w, https://substackcdn.com/image/fetch/$s_!cbnF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7861df60-5d74-4a73-8c22-f9726ad212a5_1899x1480.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Fragment from a 1974 issue of <em>Transactions of the Ancient Monuments Society</em>.</figcaption></figure></div><p>The approach with both models has been to focus training art on narrowly defined and highly abstract visual languages. This creates cohesion across outputs, albeit with the consequence that these models are not primed by their training art to resolve figurative prompts. When figurative imagery is preferred, we introduce reference images to coax the models to repurpose their formal elements, with intriguing results. </p><div><hr></div><p>In issue 22 we published Ralph Witherell&#8217;s story <em>Time to Die</em>, set in Serenity Now Hospice, a 2093 palliative care facility. Patients are held in a state of superficial comfort by monitoring, medication, and controlled hallucination. The story&#8217;s affect is compassionate, with a suffocating undertone.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tp-9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3af603e2-d953-496c-8e6b-82476606a1b6_1355x1355.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tp-9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3af603e2-d953-496c-8e6b-82476606a1b6_1355x1355.png 424w, https://substackcdn.com/image/fetch/$s_!tp-9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3af603e2-d953-496c-8e6b-82476606a1b6_1355x1355.png 848w, https://substackcdn.com/image/fetch/$s_!tp-9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3af603e2-d953-496c-8e6b-82476606a1b6_1355x1355.png 1272w, https://substackcdn.com/image/fetch/$s_!tp-9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3af603e2-d953-496c-8e6b-82476606a1b6_1355x1355.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tp-9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3af603e2-d953-496c-8e6b-82476606a1b6_1355x1355.png" width="400" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3af603e2-d953-496c-8e6b-82476606a1b6_1355x1355.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1355,&quot;width&quot;:1355,&quot;resizeWidth&quot;:400,&quot;bytes&quot;:3653708,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/177910115?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3af603e2-d953-496c-8e6b-82476606a1b6_1355x1355.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!tp-9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3af603e2-d953-496c-8e6b-82476606a1b6_1355x1355.png 424w, https://substackcdn.com/image/fetch/$s_!tp-9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3af603e2-d953-496c-8e6b-82476606a1b6_1355x1355.png 848w, https://substackcdn.com/image/fetch/$s_!tp-9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3af603e2-d953-496c-8e6b-82476606a1b6_1355x1355.png 1272w, https://substackcdn.com/image/fetch/$s_!tp-9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3af603e2-d953-496c-8e6b-82476606a1b6_1355x1355.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Our original art depicted the bird which features in the closing scene as a sudden reminder of the violence of mortality. A space vessel passes in the background &#8211; in Witherell&#8217;s scenario &#8220;personal space travel was as common as taking a bus.&#8221;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kMG2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb68438e9-71ca-4b42-8d91-0ddf409c37dc_1567x1567.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kMG2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb68438e9-71ca-4b42-8d91-0ddf409c37dc_1567x1567.png 424w, https://substackcdn.com/image/fetch/$s_!kMG2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb68438e9-71ca-4b42-8d91-0ddf409c37dc_1567x1567.png 848w, https://substackcdn.com/image/fetch/$s_!kMG2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb68438e9-71ca-4b42-8d91-0ddf409c37dc_1567x1567.png 1272w, https://substackcdn.com/image/fetch/$s_!kMG2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb68438e9-71ca-4b42-8d91-0ddf409c37dc_1567x1567.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kMG2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb68438e9-71ca-4b42-8d91-0ddf409c37dc_1567x1567.png" width="1456" height="1456" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b68438e9-71ca-4b42-8d91-0ddf409c37dc_1567x1567.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1456,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:4136203,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/177910115?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb68438e9-71ca-4b42-8d91-0ddf409c37dc_1567x1567.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!kMG2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb68438e9-71ca-4b42-8d91-0ddf409c37dc_1567x1567.png 424w, https://substackcdn.com/image/fetch/$s_!kMG2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb68438e9-71ca-4b42-8d91-0ddf409c37dc_1567x1567.png 848w, https://substackcdn.com/image/fetch/$s_!kMG2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb68438e9-71ca-4b42-8d91-0ddf409c37dc_1567x1567.png 1272w, https://substackcdn.com/image/fetch/$s_!kMG2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb68438e9-71ca-4b42-8d91-0ddf409c37dc_1567x1567.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Were we to have illustrated this story with the author&#8217;s model, we might have conflated the environment of Serenity Now with an abstract metabolic system, or introduced an anatomical reference image to emphasise bodily form. Darker, scattered elements would lend a hint of menace.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!znPU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf5bb7db-e424-4211-b49c-cebc9d759de7_1567x1567.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!znPU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf5bb7db-e424-4211-b49c-cebc9d759de7_1567x1567.png 424w, https://substackcdn.com/image/fetch/$s_!znPU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf5bb7db-e424-4211-b49c-cebc9d759de7_1567x1567.png 848w, https://substackcdn.com/image/fetch/$s_!znPU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf5bb7db-e424-4211-b49c-cebc9d759de7_1567x1567.png 1272w, https://substackcdn.com/image/fetch/$s_!znPU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf5bb7db-e424-4211-b49c-cebc9d759de7_1567x1567.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!znPU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf5bb7db-e424-4211-b49c-cebc9d759de7_1567x1567.png" width="1456" height="1456" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/df5bb7db-e424-4211-b49c-cebc9d759de7_1567x1567.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1456,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:4791851,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/177910115?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf5bb7db-e424-4211-b49c-cebc9d759de7_1567x1567.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!znPU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf5bb7db-e424-4211-b49c-cebc9d759de7_1567x1567.png 424w, https://substackcdn.com/image/fetch/$s_!znPU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf5bb7db-e424-4211-b49c-cebc9d759de7_1567x1567.png 848w, https://substackcdn.com/image/fetch/$s_!znPU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf5bb7db-e424-4211-b49c-cebc9d759de7_1567x1567.png 1272w, https://substackcdn.com/image/fetch/$s_!znPU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf5bb7db-e424-4211-b49c-cebc9d759de7_1567x1567.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The art for our new <em><a href="https://protocolized.summerofprotocols.com/p/the-view-from-the-bridge?r=54fvow">Bridge Atlas</a></em> salon series was generated with the hyperpress model. These examples show its outputs modulating between scenic composition and something flatter and more topographic. We used the former direction for a feature image, and the latter for YouTube title cards and thumbnails.</p><div><hr></div><p>Other Internet&#8217;s 2019 essay <a href="https://otherinter.net/research/headless-brands/">Headless Brands</a> charted the emergence of brand identities that were not dependent on the taste and discipline of the organizations which they were representing. This nascent concept was exemplified by decentralized, blockchain-native organizations &#8211; with Bitcoin as the canonical case study &#8211; but it has only become <em>more</em> culturally salient and technologically practicable in relation to developments in AI image generation. </p><p>Headlessness also resonates with a distinction made by John Fiske in their 1992 essay <em>The Cultural Economy of Fandom</em>, between &#8220;official&#8221; cultures established by a given brand or IP, and &#8220;fan&#8221; cultures which derive from and appropriate them. For Fiske, the difference between the products of these cultures is not necessarily qualitative:</p><blockquote><p>Fans produce and circulate among themselves texts which are often crafted with production values as high as any in the official culture. The key differences between the two are economic &#8230; fans do not write or produce their texts for money; indeed, their productivity typically costs them money.</p></blockquote><p>In the present moment, in which the production of media <em>in the style of</em> other media is a primary affordance of LLM technology, a publication such as <em>Protocolized</em> can easily collapse the distinctions theorized by Fiske and Other Internet by <a href="https://folklore.mirror.xyz/v3KHFm-Fz288fjTIcp5Gd63rXoANBewXqbypQqZesSw">ceding</a> the production and maintenance of its visual identity to its growing community of contributors. </p><p>Find our models,<strong> <a href="https://www.titles.xyz/model/uGnCmQ7g2W5j8S3SESlr">Protocolized &#215; hyperpress</a> </strong>and <strong><a href="https://www.titles.xyz/model/vVLFT9W9xFKOIGHguEfk">Protocolized &#215; James Langdon</a></strong>,<strong> </strong>at <strong><a href="https://www.titles.xyz">TITLES</a></strong>. </p><p>To mark the release of these models, we have posted a <strong><a href="https://discord.com/channels/1082444651946049567/1438950443362553946">new protocol fiction bounty</a></strong> in the <strong>Summer of Protocols Discord</strong> &#8211; write a story prompted only by the feature image at the top of this post. The selected story will be published as a paid contribution in <em>Protocolized</em>. </p>]]></content:encoded></item><item><title><![CDATA[Bridge Atlas Episode 3: Commons]]></title><description><![CDATA[Issue #70: A conversation with Yancey Strickler and Trent Van Epps]]></description><link>https://protocolized.summerofprotocols.com/p/bridge-atlas-episode-3-commons</link><guid isPermaLink="false">https://protocolized.summerofprotocols.com/p/bridge-atlas-episode-3-commons</guid><dc:creator><![CDATA[Protocolized]]></dc:creator><pubDate>Mon, 10 Nov 2025 21:42:15 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!fx7L!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09c8ac5d-c6fc-4cda-bd4b-c6e758cf337f_1000x1000.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Welcome back to another episode of <strong>Bridge Atlas</strong>, a video podcast series hosted by <strong>Christine D. Kim</strong>. In this episode, we discuss Ethereum through the lens of the commons with two Summer of Protocols alumni: <strong>Trent Van Epps</strong> and <strong>Yancey Strickler</strong>.</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fx7L!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09c8ac5d-c6fc-4cda-bd4b-c6e758cf337f_1000x1000.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fx7L!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09c8ac5d-c6fc-4cda-bd4b-c6e758cf337f_1000x1000.png 424w, https://substackcdn.com/image/fetch/$s_!fx7L!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09c8ac5d-c6fc-4cda-bd4b-c6e758cf337f_1000x1000.png 848w, https://substackcdn.com/image/fetch/$s_!fx7L!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09c8ac5d-c6fc-4cda-bd4b-c6e758cf337f_1000x1000.png 1272w, https://substackcdn.com/image/fetch/$s_!fx7L!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09c8ac5d-c6fc-4cda-bd4b-c6e758cf337f_1000x1000.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fx7L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09c8ac5d-c6fc-4cda-bd4b-c6e758cf337f_1000x1000.png" width="500" height="500" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/09c8ac5d-c6fc-4cda-bd4b-c6e758cf337f_1000x1000.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1000,&quot;width&quot;:1000,&quot;resizeWidth&quot;:500,&quot;bytes&quot;:107227,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/178428700?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09c8ac5d-c6fc-4cda-bd4b-c6e758cf337f_1000x1000.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fx7L!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09c8ac5d-c6fc-4cda-bd4b-c6e758cf337f_1000x1000.png 424w, https://substackcdn.com/image/fetch/$s_!fx7L!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09c8ac5d-c6fc-4cda-bd4b-c6e758cf337f_1000x1000.png 848w, https://substackcdn.com/image/fetch/$s_!fx7L!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09c8ac5d-c6fc-4cda-bd4b-c6e758cf337f_1000x1000.png 1272w, https://substackcdn.com/image/fetch/$s_!fx7L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09c8ac5d-c6fc-4cda-bd4b-c6e758cf337f_1000x1000.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://youtu.be/4xZSeujEmig?si=fcGGiLUry_ppLj66&quot;,&quot;text&quot;:&quot;Listen to the full episode&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://youtu.be/4xZSeujEmig?si=fcGGiLUry_ppLj66"><span>Listen to the full episode</span></a></p><div><hr></div><p><strong>Christine:</strong> Trent, can you start us off with an intro. What&#8217;s your background?</p><p><strong>Trent:</strong> Sure. My background is in architecture and design, but I got pulled into Ethereum a few years into my career because I&#8217;ve always been fascinated by systems. I now work at the Ethereum Foundation on protocol coordination &#8211; that means managing changes to Ethereum&#8217;s core software, coordinating releases, and engaging stakeholders. One of my main projects is Protocol Guild, which is a collective funding endowment for about 200 core contributors working on Ethereum&#8217;s foundational protocols.</p><p><strong>Christine:</strong> Yancey, how about you?</p><p><strong>Yancey:</strong> I&#8217;m a writer and entrepreneur. I co-founded Kickstarter and led it as CEO, started The Creative Independent, and more recently, I&#8217;ve been working on Metalabel &#8211; a studio for group projects and tools, both onchain and offchain. I&#8217;m also involved in Artist Corporations, which is a project to create new corporate structures for creatives, and Dark Forest Operating System, which is about private internets for groups with shared space and resources.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://protocolized.summerofprotocols.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://protocolized.summerofprotocols.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Christine:</strong> It sounds like both of you have taken unexpected paths into your current work. Yancey focuses on creative commons, Trent on Ethereum commons. Trent, can you define &#8220;Ethereum commons&#8221; for us?</p><p><strong>Trent:</strong> I think of commons as systems for shared production and management of resources over time. Open-source software, like Ethereum, is a shared resource requiring governance and trade-offs. Ethereum fits into the &#8220;digital commons&#8221; category &#8211; a shared resource producing digital goods. The goal is to distribute value widely, but there&#8217;s always a risk of capture by capital interests, which can make these resources less &#8220;magical.&#8221;</p><p><strong>Christine:</strong> Yancey, do you see parallels with the creative commons?</p><p><strong>Yancey:</strong> Definitely. Creative commons rest on public goods like music theory, colors, and cultural building blocks. Standards like Creative Commons licensing are vital, because if standard-setting is left to commercial actors, you risk a race to the bottom. Managing commons well requires daily care &#8211; it&#8217;s easy to let things degrade, and hard to restore them once they do. Ethereum has an advantage over centralized Web2 platforms because its public goods are more resilient and not dependent on a single decision-maker.</p><p><strong>Christine:</strong> But neither Ethereum nor creative commons sustain themselves automatically &#8211; they need tools and innovations. Yancey, you&#8217;ve focused on &#8220;labels&#8221; as a way to organize creative work. Why?</p><p><strong>Yancey:</strong> Online culture is very individualistic &#8211; everyone builds their own following, which makes you compete with the people who are most like you. But independent record labels historically created alignment between artists: if one succeeded, others benefited. Labels amplify and invite others in, creating a shared credibility and a scene. That&#8217;s mostly disappeared online. With Metalabel, we&#8217;ve been building tools for group treasuries, revenue splits, and decision-making, so people can collaborate more effectively. It&#8217;s about creating alignment and shared identity.</p><p><strong>Christine:</strong> Trent, does that resonate?</p><p><strong>Trent:</strong> Yes. Labels have both social and very practical benefits &#8211; pooled payments, marketing, representation. In Protocol Guild, when we unite 200 contributors, we gain legibility. Funders can see the collective impact, which makes them more willing to commit resources, like through our &#8220;1% pledge&#8221; initiative. This kind of collective representation wouldn&#8217;t be possible for individual contributors alone.</p><p><strong>Christine:</strong> Capital is a big part of sustaining commons. Trent, in a previous talk of yours, you didn&#8217;t take a firm stance on whether capital harms or helps commons. Has your view changed?</p><p><strong>Trent:</strong> Not really &#8211; it depends on context. Capital from a multinational with strings attached is different from capital managed transparently by peers. You can&#8217;t avoid dealing with money because people need to live. The challenge is doing it in a way that preserves the commons&#8217; integrity.</p><p><strong>Christine:</strong> Yancey, your thoughts on the impact of capital?</p><p><strong>Yancey:</strong> Money has huge influence, but the real driver in any project is whether it&#8217;s interesting enough for people to commit their time. Local capital can help; outside capital can distort incentives. Sometimes outside funding is the only option, but it comes with tension. Ultimately, the desire to participate is the most important currency.</p><p><strong>Christine:</strong> That reminds me of Nadia Asparouhova&#8217;s book <em>Working in Public</em>, about the thankless nature of maintaining open-source projects. Money helps, but it&#8217;s complicated.</p><p><strong>Trent:</strong> Exactly. Ethereum started as an ideological project, and intrinsic motivations still drive many contributors. Protocol Guild&#8217;s goal is to make funding a non-issue so people can focus on what brought them here.</p><p><strong>Christine:</strong> Crypto tools like ICOs made it easy to bootstrap projects and directly connect with audiences. But Yancey, you have said that crypto isn&#8217;t fully mature for creatives. Still true?</p><p><strong>Yancey:</strong> Yes. I think crypto&#8217;s future is as backend infrastructure &#8211; stablecoins integrated into mainstream finance. Creators will be consumers in that system, but things like &#8220;creator coins&#8221; are alienating to many artists. Financializing yourself is a big cultural leap that most creative people don&#8217;t want to make. The DeFi toolkit is exciting to crypto folks but off-putting to most artists.</p><p><strong>Christine:</strong> That&#8217;s interesting &#8211; Protocol Guild wasn&#8217;t built by DeFi experts either. Trent, how do devs feel about being exposed to the speculative side of crypto?</p><p><strong>Trent:</strong> Mixed feelings. Each wave of crypto innovation &#8211; ICOs, DAOs, NFTs, prediction markets &#8211; attracts speculation, and that&#8217;s what gets public attention. Core devs believe in the tech&#8217;s potential but often dislike how it&#8217;s used. Still, there are valuable kernels in these ideas that could mature into better models.</p><p><strong>Christine:</strong> That leads us to the question: are Ethereum&#8217;s ends aligned with its means? How could it better align?</p><p><strong>Yancey:</strong> Honestly, I&#8217;m not sure what Ethereum&#8217;s ends are. My guess is it&#8217;ll succeed as a new layer for internet money, making some people rich, but without replacing existing power structures. The revolutionary dreams might not materialize.</p><p><strong>Trent:</strong> I&#8217;m more optimistic. The real unlock is governance &#8211; DAOs managing value among distributed parties. We&#8217;re seeing early legislative recognition of onchain organizations. That&#8217;s promising long-term.</p><p><strong>Christine:</strong> Yancey, tell us more about Artist Corporations.</p><p><strong>Yancey:</strong> They&#8217;re a new corporate form for creatives, blending LLC flexibility with cooperative and IP-ownership features. Groups could pool for healthcare, hold shared IP, and scale up or down. We&#8217;ve started a nonprofit to pass laws enabling them and to educate creatives on governance and finance.</p><p><strong>Christine:</strong> I think Ethereum&#8217;s &#8220;ends&#8221; are still up for grabs. The protocol is malleable now, but it&#8217;s heading toward ossification. Different stakeholders, from corporates to creatives, can influence its trajectory &#8211; but the window is closing. There&#8217;s no single feature that will &#8220;fix&#8221; things for artists; it&#8217;s about keeping Ethereum accessible, cheap, and permissionless while scaling and preserving its unique values.</p><p><strong>Trent:</strong> Yes &#8211; amidst all the speculation, valuable projects will emerge over time. The key is to maintain Ethereum&#8217;s core values against commercial pressures. We want it to be dependable infrastructure, like a natural commons, shaped by humans but resilient against turmoil.</p><p><strong>Yancey:</strong> Agreed. Ethereum should be trustworthy, stable, and conservative in governance &#8211; focusing on making its core incredibly strong. That&#8217;s the only way to think long-term.</p><p><strong>Trent:</strong> Some criticize Ethereum&#8217;s slow pace, but that&#8217;s part of ensuring it lasts. We see it as infrastructure for millions &#8211; maybe billions &#8211; and want it to operate consistently and dependably for generations, like ecological software maintained by people who care.</p><p><strong>Christine:</strong> That&#8217;s a great note to end on &#8211; ambitious, but with clarity about what the Ethereum commons is and what it&#8217;s building toward. </p><div id="youtube2-4xZSeujEmig" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;4xZSeujEmig&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/4xZSeujEmig?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div>]]></content:encoded></item><item><title><![CDATA[Bridge Atlas Episode 2: Paradigms]]></title><description><![CDATA[Issue #68: A conversation with Nils Gilman and Josh Stark]]></description><link>https://protocolized.summerofprotocols.com/p/bridge-atlas-episode-2-paradigms</link><guid isPermaLink="false">https://protocolized.summerofprotocols.com/p/bridge-atlas-episode-2-paradigms</guid><dc:creator><![CDATA[Protocolized]]></dc:creator><pubDate>Wed, 05 Nov 2025 23:03:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!DDex!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd1d8fc2-27db-4906-8bcf-4d8c2f7d981e_1384x1384.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Welcome back to another episode of <strong>Bridge Atlas</strong>, a video podcast series hosted by <strong>Christine D. Kim</strong>. In this episode, we look at the world through the lenses of hardness and planetary thinking, with <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Nils Gilman&quot;,&quot;id&quot;:3040260,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/da73d4ad-527b-4c00-91f1-d2f838162234_1290x1288.jpeg&quot;,&quot;uuid&quot;:&quot;a0f6b398-c565-4065-907b-51d03827dcb7&quot;}" data-component-name="MentionToDOM"></span>, Executive Editor of the <strong>Berggruen Press</strong> and Deputy Editor of <strong>Noema</strong>, and <strong>Josh Stark</strong> from the <strong>Ethereum Foundation</strong>.</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DDex!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd1d8fc2-27db-4906-8bcf-4d8c2f7d981e_1384x1384.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DDex!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd1d8fc2-27db-4906-8bcf-4d8c2f7d981e_1384x1384.png 424w, https://substackcdn.com/image/fetch/$s_!DDex!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd1d8fc2-27db-4906-8bcf-4d8c2f7d981e_1384x1384.png 848w, https://substackcdn.com/image/fetch/$s_!DDex!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd1d8fc2-27db-4906-8bcf-4d8c2f7d981e_1384x1384.png 1272w, https://substackcdn.com/image/fetch/$s_!DDex!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd1d8fc2-27db-4906-8bcf-4d8c2f7d981e_1384x1384.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DDex!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd1d8fc2-27db-4906-8bcf-4d8c2f7d981e_1384x1384.png" width="500" height="500" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dd1d8fc2-27db-4906-8bcf-4d8c2f7d981e_1384x1384.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1384,&quot;width&quot;:1384,&quot;resizeWidth&quot;:500,&quot;bytes&quot;:199813,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/177906812?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd1d8fc2-27db-4906-8bcf-4d8c2f7d981e_1384x1384.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DDex!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd1d8fc2-27db-4906-8bcf-4d8c2f7d981e_1384x1384.png 424w, https://substackcdn.com/image/fetch/$s_!DDex!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd1d8fc2-27db-4906-8bcf-4d8c2f7d981e_1384x1384.png 848w, https://substackcdn.com/image/fetch/$s_!DDex!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd1d8fc2-27db-4906-8bcf-4d8c2f7d981e_1384x1384.png 1272w, https://substackcdn.com/image/fetch/$s_!DDex!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd1d8fc2-27db-4906-8bcf-4d8c2f7d981e_1384x1384.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.youtube.com/watch?v=GUxwGds2uJU&amp;list=PLIk0EtKZjVltdB39Tzin_NqRyDxsapYGG&amp;index=2&quot;,&quot;text&quot;:&quot;Listen to the Full Episode&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.youtube.com/watch?v=GUxwGds2uJU&amp;list=PLIk0EtKZjVltdB39Tzin_NqRyDxsapYGG&amp;index=2"><span>Listen to the Full Episode</span></a></p><div><hr></div><p><strong>Christine:</strong><br>Nils, can you tell us a bit about your background and introduce the idea of planetary thinking?</p><p><strong>Nils:</strong> I was trained as a historian, with a PhD from Berkeley in American history. My interest in planetary thinking comes partly from studying modernization and globalization. After academia, I spent years in tech and consulting, including with intelligence agencies on long-range issues like China&#8217;s rise and climate change.</p><p>Planetary thinking is concerned with flows which are beyond human intentionality. Globalization covers intentional flows like goods, money, and ideas; planetary phenomena &#8211; like the carbon cycle, nitrogen cycle, space debris, and ocean plastics &#8211; are often human-influenced but unmanaged. We have governance systems for global flows but few for planetary challenges.</p><p><strong>Christine:</strong> Josh, can you share your background and define &#8220;hardness&#8221;?</p><p><strong>Josh:</strong> I started as a lawyer, then co&#8208;founded ETHGlobal, which runs Ethereum hackathons, and later joined the Ethereum Foundation leadership. Hardness, as I define it, is a system&#8217;s capability to make a specific outcome very likely to be true in the future, usually to enable social coordination.</p><p>For example, I&#8217;m confident assets in my Ethereum wallet will be there in five years because of cryptographic guarantees and economic incentives. Similarly, money in a Canadian bank is backed by legal systems and deposit insurance. These are different sources of hardness, but they serve a similar function.</p><p><strong>Nils:</strong> How is hardness different from legal reliance or reliability?</p><p><strong>Josh:</strong> Reliance is about people&#8217;s mental states or trust in behavior. Hardness is a property of the system itself &#8211; it can exist whether or not people believe in it.</p><p><strong>Christine:</strong> Given today&#8217;s erosion of trust in institutions, could Ethereum&#8217;s hardness also erode?</p><p><strong>Nils:</strong> Trust in most U.S. institutions has declined for decades, except small businesses and the military, perhaps due to accountability. People turn to blockchain systems partly because they don&#8217;t rely on self&#8208;dealing elites; their design is relatively incorruptible.</p><p><strong>Josh:</strong> That&#8217;s core to crypto&#8217;s ethos &#8211; creating systems resistant to capture or corruption. Ethereum&#8217;s hardness is less likely to be undermined by cultural or social disputes because it&#8217;s a network, not a traditional institution.</p><p><strong>Christine:</strong> How do you measure hardness versus trust?</p><p><strong>Josh:</strong> Trust experience is like user experience &#8211; it&#8217;s about how people come to trust something. Hardness is about the system&#8217;s actual properties. For Ethereum, you could look at validator distribution, economic incentives, cryptographic security, etc. Like security, hardness is context-dependent.</p><p><strong>Nils</strong>: Institutions like universities can remain hard &#8211; Harvard will likely exist for centuries &#8211; while losing trust. That&#8217;s why distinguishing hardness from trust is useful.</p><p><strong>Christine:</strong> If trust erodes but hardness remains, does hardness matter?</p><p><strong>Josh:</strong> It&#8217;s not enough for Ethereum to be secure; the world has to know and understand it. We need to bridge that gap so people see it as a fundamental coordination tool, not something alien.</p><p><strong>Nils:</strong> From the outside, two big challenges for Ethereum are technical complexity and a public image dominated by financial speculation in cryptocurrency, which doesn&#8217;t foster long-term commitment.</p><p><strong>Josh:</strong> I agree. The reputation can change, and security has improved &#8211; smart contract hacks are less frequent. But there&#8217;s still much to do on user safety and education. I hope Ethereum evolves like California &#8211; from Wild West to a vibrant, global hub.</p><p><strong>Christine:</strong> Let&#8217;s pivot to planetary challenges. Nils, you&#8217;ve said diplomatic machinery can&#8217;t keep up with technological breakthroughs like AI.</p><p><strong>Nils:</strong> Traditional diplomacy was about national governments negotiating. In the globalization era, diplomats needed economic and financial literacy. Now, planetary challenges require literacy in carbon accounting, space governance, and environmental monitoring. I&#8217;m working with foreign service schools on curricula for this.</p><p>We also need to understand the systems &#8211; potentially including Ethereum &#8211; that monitor and respond to planetary phenomena.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://protocolized.summerofprotocols.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://protocolized.summerofprotocols.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Christine:</strong> Josh, where could Ethereum be relevant?</p><p><strong>Josh:</strong> One example is the Freedom Tool, used in Russia, Iran, and Georgia. It uses zero-knowledge proofs so that citizens can prove eligibility to vote in online polls without revealing their identity. It&#8217;s been used by opposition activists to contest election legitimacy. I think the first billion-person vote could happen on Ethereum using such tools.</p><p><strong>Nils:</strong> In planetary thinking, some focus on building new institutions, others on technological systems as de facto governance. For example, sensor arrays in shipping channels detect whales and automatically redirect ships, preventing collisions. Many planetary challenges will be addressed through automated systems rather than marble-column institutions.</p><p>Ethereum could enable more voices in decision-making and even multi-species integration &#8211; like monetizing Rwanda&#8217;s gorillas via Ethereum to fund protection and ecotourism.</p><p><strong>Christine:</strong> Sometimes Ethereum feels like a small technical detail in grand planetary conversations. How is the Ethereum Foundation raising its profile?</p><p><strong>Josh:</strong> We have a new Institutional Secretariat team to engage with governments and large organizations. For example, Bhutan is building its national ID system on Ethereum. There&#8217;s also &#8220;diplomacy&#8221; within blockchain &#8211; managing relationships between Ethereum and other chains, roll-ups, and L2s. As these proliferate, keeping the system interoperable will be critical.</p><p><strong>Nils:</strong> Ethereum could also enable post-national diplomacy among cities, corporations, and other actors, bridging increasingly closed-off technological stacks in different regions.</p><p><strong>Josh:</strong> I agree. In a fragmented world, Ethereum is one of the few trends moving toward more global integration. Both Chinese and American companies build on it, and it&#8217;s supported by a global community. That&#8217;s an underrated strength.</p><div id="youtube2-GUxwGds2uJU" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;GUxwGds2uJU&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/GUxwGds2uJU?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div>]]></content:encoded></item><item><title><![CDATA[Bridge Atlas Episode 1: Entry Points]]></title><description><![CDATA[Issue #67: Recapping the first Bridge Atlas salon]]></description><link>https://protocolized.summerofprotocols.com/p/bridge-atlas-ep-1-entry-points</link><guid isPermaLink="false">https://protocolized.summerofprotocols.com/p/bridge-atlas-ep-1-entry-points</guid><dc:creator><![CDATA[Protocolized]]></dc:creator><pubDate>Sat, 01 Nov 2025 17:06:41 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/d864ceff-f215-4670-8ac4-a868b0ab14c8_896x640.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to the inaugural episode of <em><strong>Bridge Atlas</strong></em>, a limited-run video podcast series hosted by <strong>Christine D. Kim</strong>. For this introductory episode, Christine is joined by <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Tim Beiko&quot;,&quot;id&quot;:222372,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d7c64167-2ed2-454c-b2cc-9d0eb9821e85_144x144.png&quot;,&quot;uuid&quot;:&quot;62a6d37e-d2e6-4257-bfaa-47120b2e9a46&quot;}" data-component-name="MentionToDOM"></span>, protocol coordination co-team lead at the <strong>Ethereum Foundation</strong>, and <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Timber Stinson-Schroff&quot;,&quot;id&quot;:17195021,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/25df03d4-d7a3-4164-a3b8-6bad76c65aa9_1062x1062.jpeg&quot;,&quot;uuid&quot;:&quot;faa10a99-3940-4e36-9d68-87c68b0127e7&quot;}" data-component-name="MentionToDOM"></span>, program manager for <strong>Summer of Protocols</strong>. <a href="https://devconnect.org/calendar?event=bridge-atlas">RSVP to the Nov. 22 Devconnect event</a>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WsEC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e5e9a63-8b05-4961-af0f-b6b6d38a9935_1000x1000.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WsEC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e5e9a63-8b05-4961-af0f-b6b6d38a9935_1000x1000.png 424w, https://substackcdn.com/image/fetch/$s_!WsEC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e5e9a63-8b05-4961-af0f-b6b6d38a9935_1000x1000.png 848w, https://substackcdn.com/image/fetch/$s_!WsEC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e5e9a63-8b05-4961-af0f-b6b6d38a9935_1000x1000.png 1272w, https://substackcdn.com/image/fetch/$s_!WsEC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e5e9a63-8b05-4961-af0f-b6b6d38a9935_1000x1000.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WsEC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e5e9a63-8b05-4961-af0f-b6b6d38a9935_1000x1000.png" width="500" height="500" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4e5e9a63-8b05-4961-af0f-b6b6d38a9935_1000x1000.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1000,&quot;width&quot;:1000,&quot;resizeWidth&quot;:500,&quot;bytes&quot;:503078,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/177737312?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e5e9a63-8b05-4961-af0f-b6b6d38a9935_1000x1000.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!WsEC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e5e9a63-8b05-4961-af0f-b6b6d38a9935_1000x1000.png 424w, https://substackcdn.com/image/fetch/$s_!WsEC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e5e9a63-8b05-4961-af0f-b6b6d38a9935_1000x1000.png 848w, https://substackcdn.com/image/fetch/$s_!WsEC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e5e9a63-8b05-4961-af0f-b6b6d38a9935_1000x1000.png 1272w, https://substackcdn.com/image/fetch/$s_!WsEC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e5e9a63-8b05-4961-af0f-b6b6d38a9935_1000x1000.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p><strong>Christine:</strong> Timber, can you give us a brief overview of Summer of Protocols<em> </em>and its history?</p><p><strong>Timber:</strong> Summer of Protocols (SoP) is a research program started three years ago to make protocols a first-class concept for thinking about the world. We&#8217;ve gone through four phases: a pilot study, a summer focused on research, a summer on application, and a summer on education. Along the way, we&#8217;ve added year-round tracks like a guest talk series and a newsletter that evolved into a science fiction magazine plus nonfiction essays. Funded by the Ethereum Foundation (EF), we&#8217;ve had about 100 participants produce essays, projects, and artifacts, all aimed at understanding, designing, and improving protocols.</p><p><strong>Christine:</strong> Tim, you helped kickstart this at the EF?</p><p><strong>Tim:</strong> Yes. In 2022, I reached out to Venkatesh Rao to help me think about Ethereum &#8211; it&#8217;s not just a product, tech platform, or political construct, but a mix of all three. We realized thinking of Ethereum as a protocol was the right approach. We did a pilot study defining protocols and how Ethereum fit in, then funded 30 researchers from different domains to study protocols. Timber, for example, looked at workplace safety protocols. We found common ideas across domains, so we kept expanding.</p><p><strong>Christine:</strong> Many listeners think &#8220;protocol&#8221; means DeFi or blockchains. What do you mean by protocol?</p><p><strong>Timber:</strong> We study everything from micro-protocols like handshakes to large-scale ones like the Kyoto Protocol, plus technical protocols like Ethereum and social protocols such as elections. The scope is wide &#8211; fields as different as coal mining, video game design, cryptocurrency, encryption, wildfire management, and urban planning. </p><p><strong>Tim:</strong> Ethereum is like a Swiss Army knife &#8211; it shares features with other protocols but has unique elements, like embedded money. Studying different protocols helps us see what Ethereum might adopt or adapt, and we&#8217;ve found high-level principles that generalize across domains.</p><blockquote><p><strong>Going to DevconnectARG in Buenos Aires? <a href="https://devconnect.org/calendar?event=bridge-atlas">Join the Bridge Atlas workshop on November 22nd.</a></strong></p></blockquote><p><strong>Christine:</strong> Can you share key learnings from non-Ethereum studies that impacted Ethereum?</p><p><strong>Tim:</strong> Two big ideas stand out. First, it&#8217;s better to analyze protocols by how bad they can be &#8211; like airport security &#8211; than how good they are. Nadia Asparouhova from our first cohort created the &#8220;Kafka Index&#8221; to rate the worst version of a protocol. Second, &#8220;Whitehead advances&#8221; &#8211; protocols that work so well they fade into the background, like HTTP or GPS.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> These need to be designed right from the start, as mass adoption makes change harder. Seeing these patterns refined our intuition and confirmed Ethereum&#8217;s community mostly has the right instincts.</p><p><strong>Timber:</strong> And it goes the other way too. Coming from outside crypto, I&#8217;ve learned from Ethereum experts about building economies on top of protocols, which parallels work in health and safety in unexpected ways.</p><p><strong>Christine:</strong> Timber, how do you measure the success of SoP?</p><p><strong>Timber:</strong> We focus on building &#8220;protocol literacy,&#8221; so people in different fields can communicate more effectively about protocols. Over the years, we&#8217;ve simplified the language, recruited professors worldwide, and seen our terms used by people we&#8217;ve never met. That&#8217;s a good sign, even without hard data.</p><p><strong>Christine:</strong> Let&#8217;s talk about this <em>Bridge Atlas</em> series. Tim, what inspired it?</p><p><strong>Tim:</strong> In the early years of this effort, we avoided focusing on crypto in order to attract serious researchers from other fields. Now, it&#8217;s time to bridge Ethereum&#8217;s community with the broader protocol research community. This series pairs top Ethereum researchers with SoP alumni from other domains to explore parallel themes. Our first SoP event at an Ethereum conference will close DevConnect with a full <em>Bridge Atlas</em> day, connecting these communities.</p><p><strong>Christine:</strong> So it&#8217;s about creating new &#8220;strata&#8221; for protocol research?</p><p><strong>Tim:</strong> Yes, and showing how Ethereum-specific research can help other fields. Themes like &#8220;hardness&#8221; and &#8220;trust experience&#8221; resonate broadly. We want smart, curious audiences outside crypto to engage with Ethereum&#8217;s cutting-edge protocol work.</p><p><strong>Timber:</strong> Think of it as building the missing &#8220;meso level&#8221; of discourse &#8211; between micro technical details and macro geopolitics &#8211; about how organizations and institutions design and manage protocols.</p><p><strong>Tim:</strong> Exactly. Other professions have playbooks and best practices; protocols don&#8217;t. Creating this mid-level knowledge is what&#8217;s missing.</p><p><strong>Christine:</strong> What themes will the series cover?</p><p><strong>Timber:</strong> Computing frontiers &#8211; like wearables &#8211; and commons, from software to air quality, to road safety. How can we harden these against failure modes? Crypto folks have a lot to share here.</p><p><strong>Tim:</strong> For Ethereum, that means questions like how to steward our commons, what adoption of new tech looks like, abstract protocol design, and the right institutional landscapes to support protocols.</p><p><strong>Christine:</strong> As host, I&#8217;ll moderate between Ethereum and non-Ethereum guests. Timber, any advice?</p><p><strong>Timber:</strong> Keep building your literacy with SoP terms, introduce them to guests, and let curiosity guide you. Many guests are SoP alumni and already have some shared language.</p><p><strong>Tim:</strong> You&#8217;ve done great work exploring the human side of protocol builders&#8217; motivations &#8211; that&#8217;s universal across domains.</p><p><strong>Christine:</strong> I&#8217;m a skeptic, so I&#8217;m excited to test whether non-crypto protocol learnings really apply to Ethereum. If I&#8217;m convinced, listeners will be too!</p><p><strong>Timber:</strong> That&#8217;s the goal.</p><p><strong>Christine:</strong> Before we wrap, Timber, explain the name <em>Bridge Atlas</em>.</p><p><strong>Timber:</strong> &#8220;Bridge&#8221; is about connecting fields, theory and practice, people. &#8220;Atlas&#8221; evokes multiple maps &#8211; multiple perspectives &#8211; and global scale. It also nods to the mythological Atlas, doing hard, thankless foundational work, which is what protocols do when they work well.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://protocolized.summerofprotocols.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://protocolized.summerofprotocols.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><div id="youtube2-6KpWypVFL2o" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;6KpWypVFL2o&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/6KpWypVFL2o?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Alfred North Whitehead wrote: &#8220;Civilization advances by extending the number of important operations which we can perform without thinking about them.&#8221; See <em><a href="https://protocolized.summerofprotocols.com/p/strange-new-rules">Strange New Rules</a></em>, the inaugural post on our Substack, for more context. </p><p></p></div></div>]]></content:encoded></item><item><title><![CDATA[Generative AI in Cultural Projects Urgently Requires Protocols]]></title><description><![CDATA[Issue #65: Sociotechnical Tensions, Meetup, Bounties]]></description><link>https://protocolized.summerofprotocols.com/p/generative-ai-in-cultural-projects</link><guid isPermaLink="false">https://protocolized.summerofprotocols.com/p/generative-ai-in-cultural-projects</guid><dc:creator><![CDATA[Nicolás Madoery]]></dc:creator><pubDate>Sat, 25 Oct 2025 22:17:13 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!O_ik!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b545b34-676b-4209-b06d-b29ffa6c42cf_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em><strong>In this issue:</strong> </em>Nicol&#225;s Madoery, participant in SoP24 and director of FUTURX, maps tensions between emerging technology and culture, then charts a way forward from a protocol lens. Summer of Protocols and FUTURX will host a meetup in Buenos Aires on November 19th. <a href="https://luma.com/sn7c6mxg">RSVP here</a>. Also &#8211; check out the new non-fiction essay bounties on <a href="https://discord.gg/vxgbmUw5Pn">Discord</a>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!O_ik!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b545b34-676b-4209-b06d-b29ffa6c42cf_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!O_ik!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b545b34-676b-4209-b06d-b29ffa6c42cf_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!O_ik!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b545b34-676b-4209-b06d-b29ffa6c42cf_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!O_ik!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b545b34-676b-4209-b06d-b29ffa6c42cf_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!O_ik!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b545b34-676b-4209-b06d-b29ffa6c42cf_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!O_ik!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b545b34-676b-4209-b06d-b29ffa6c42cf_1024x1024.png" width="499" height="499" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0b545b34-676b-4209-b06d-b29ffa6c42cf_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:499,&quot;bytes&quot;:1368107,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/176969009?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b545b34-676b-4209-b06d-b29ffa6c42cf_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!O_ik!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b545b34-676b-4209-b06d-b29ffa6c42cf_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!O_ik!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b545b34-676b-4209-b06d-b29ffa6c42cf_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!O_ik!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b545b34-676b-4209-b06d-b29ffa6c42cf_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!O_ik!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b545b34-676b-4209-b06d-b29ffa6c42cf_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>Introduction</h3><p>Unlike most previous technological disruptions, generative artificial intelligence (genAI) has an exceptionally low barrier to entry. Anyone with internet access and basic language skills can now generate content in the form of text, images, audio, and video. This accessibility explains both its extraordinary speed of adoption and its deep impact on the cultural and creative industries &#8211; sectors whose raw material is content but whose primary product is meaning.</p><p>From my experience researching and working on the impact of genAI in cultural and creative ecosystems over the past three years, two paths continually intersect.</p><ul><li><p>On one path, there are long-term questions around creativity, the datasets used to train models, copyright reform, and the future of creative labor.</p></li><li><p>On the other, there are urgent implementation challenges: projects and organizations must adopt these tools to remain relevant, yet doing so ethically demands shared principles and clear agreements among those who use them.</p></li></ul><p>This text stems from FUTURX&#8217;s panel <em>Protocols for a Critical Use of AI in Cultural Projects, </em>organized with UNESCO, on August 20, 2025.</p><p>Our aim is to stoke the debate around one of the most pressing challenges in the cultural field today: how to design frameworks and protocols that make it easier for people to do the right thing &#8211; to use genAI tools to enrich their art and culture without fear, by managing negative side effects such as opacity, bias, or data misuse.</p><p>An initial guiding question is:</p><p>What should a cultural project or organization do when faced with a high-impact technology like genAI? How &#8211; and for what purpose &#8211; should it be integrated?</p><p>To respond, we propose three starting points:</p><ul><li><p>Build a shared understanding of what critical use of genAI entails.</p></li><li><p>Recognize the areas where genAI has the greatest impact on cultural projects and organizations.</p></li><li><p>Embrace the notion of protocols as a fundamental tool to address common challenges posed by technological change.</p></li></ul><h3>Can we introduce protocols to cultural projects?</h3><p>There is a long history of tensions between technology and culture. Technological paradigm shifts require processes of adaptation in which many established practices need to transform. In this sense, the capacity of genAI to produce text, image, audio, and video from pre-existing content datasets once again challenges creative and artistic practices.</p><p>Platforms like SUNO &#8211; currently the leading generative music platform, producing more than one million songs per day &#8211; claim in their article <em>The Future of Music</em> that they train their models with &#8220;all the music available on the internet,&#8221; just as any individual could. By contrast, many cultural voices argue that this practice is neither ethical nor transparent, calling for state regulation of the use of cultural content in training datasets.</p><p>These debates will not be resolved overnight. While legislation is still under discussion in much of the world, we can gain both time and sovereignty if we focus on how these models could adapt to our practices &#8211; instead of adapting our practices to the models.</p><p>From here, several important questions emerge:</p><ul><li><p>Where do we draw ethical boundaries in creation, reception, analysis, and communication when using content generated wholly or partially with genAI?</p></li><li><p>How do we protect culture from being included in training datasets without consent? And what possibilities emerge if we stop thinking of genAI solely as a tool and begin to approach it as a cultural, political, and economic system?</p></li><li><p>What kinds of collective agreements could we imagine so that we can decide &#8211; together &#8211; how to use the technology?</p></li></ul><p>Protocols appear as one possible answer: engineered arguments that enable cultural projects to structure the relationship between content and technology. The cultural sector needs its own frameworks &#8211; dynamic and adaptable &#8211; capable of sustaining trust among peers and communities. Protocols can serve as a shared compass to decide which data we use, how we label it, how we guarantee transparency, and which ethical boundaries we do not want to cross.</p><p>We are not starting from scratch. UNESCO has already established key references: the 2005 Convention frames culture as a crucial dimension of sustainable development, and the 2021 Recommendation on the Ethics of Artificial Intelligence offers globally accepted values, principles, and policy guidelines.</p><p>At FUTURX we have begun translating these ideas into practice through research and collective experimentation, developing frameworks and tools to help cultural organizations navigate the ethical and creative challenges of AI.</p><h3>What does it mean to use AI well?</h3><p>As I mentioned at the beginning, what makes genAI truly disruptive is its low barrier to entry. This accessibility democratizes creation, but also multiplies ethical, aesthetic, and social challenges that we are only beginning to grasp.</p><p>The problem is that, in most cases, these tools do not guarantee many of the basic requirements a new piece of content should meet: knowing the source and reliability of the information it contains, ensuring transparency, and making sure it is ethical and appropriate for the intended use.</p><p>We consider the critical use of this technology to be conscious, reflective, and ethical. This mainly implies:</p><ul><li><p>Analyzing information or content generated by AI, since it may be biased or incorrect.</p></li><li><p>Maintaining an ethical stance, protecting authorship, cultural diversity, and property.</p></li><li><p>Preserving our autonomy and vision; using genAI as an ally.</p></li></ul><p>In short, within culture and creativity, critical use means that AI should not dictate the outcome, but rather expand our possibilities &#8211; always under our gaze and responsibility.</p><h3>Creation, Experimentation, and Trust</h3><p>How does a philosophy of critical use translate into creative and cultural practice? What protocols can we extract from real experiences to guide our practices?</p><p>Based on our research and collaborations with different cultural institutions, we have identified a few key considerations:</p><ul><li><p>The distinction between experimental and commercial uses (where clear clauses and traceability are necessary).</p></li><li><p>The need to align models with values of openness and rights.</p></li><li><p>The urgency of working with diverse data and metadata to avoid bias.</p></li><li><p>The value of critical prototyping as a methodology that accepts error and allows us to open the black box of algorithms.</p></li></ul><p>These points show that protocols are not abstract rules, but situated guides that can help orient how we experiment, produce, and distribute culture in an environment dominated by opaque systems.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://protocolized.summerofprotocols.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://protocolized.summerofprotocols.com/subscribe?"><span>Subscribe now</span></a></p><h3>Areas of Impact: Imagining Protocols for Using AI</h3><p>After understanding the tensions and needs that arise when aiming for a critical use of genAI, the next step is to look closely at the areas where this technology has the greatest impact on cultural projects and organizations.</p><p>Today, trust between peers &#8211; whether individuals or projects, within the same organization or across different ones &#8211; is facing a crisis due to the lack of transparency, traceability, and the inappropriate use of platforms.</p><p>We have identified five key points of interaction between genAI and cultural projects. For each one, we outline a guiding question and suggest an initial protocol.</p><p><strong>1. Reception of Content</strong></p><p>Guiding question: How can we create mechanisms of trust when works or proposals produced using genAI arrive at an organization or project, where simple prohibition of these tools is not the solution?</p><p>Protocol suggestion: The key is knowing how these tools were involved. A simple step is to ask participants to declare it. This transparency opens up the process without diminishing authorship.</p><p>Example: A public fund that includes in its application form the question: <em>&#8220;Did you use genAI in this process or for the idea you submitted? Please describe how.&#8221;</em></p><p><strong>2. Creation of New Content</strong></p><p>Guiding question: When organizations produce with AI, how can we ensure accountability?</p><p>Protocol suggestion: What matters is leaving a trace: which prompts were used, what decisions were made, how humans and models were combined. This traceability helps explain where a piece comes from and recognize different contributions.</p><p>Example: A museum that publishes a visual piece created with AI and specifies on the exhibit label which model was used and the role of the curators.</p><p><strong>3. Analysis of Archives and Databases</strong></p><p>Guiding question: How do we avoid erasing memories or exposing sensitive data when using genAI to analyze collections?</p><p>Protocol suggestion: genAI can organize archives, but it can also obscure histories or leak private information. That&#8217;s why it is crucial to review the outputs, safeguard privacy, and ensure proper context before dissemination.</p><p>Example: A film archive that digitizes its collection with genAI, but validates each description with specialists before publishing it.</p><p><strong>4. Communication with Audiences and Peers</strong></p><p>Guiding question: How do we preserve trust when interacting with audiences using genAI tools?</p><p>Protocol suggestion: Automated responses can improve efficiency, but relationships with audiences require transparency. It should always be clear when a machine is speaking and when a person is, and a human channel must always remain available.</p><p>Example: A record label that uses genAI to draft email responses but has a team review and approve them before sending.</p><p><strong>5. Protection and Cultural Diversity</strong></p><p>Guiding question: How can we prevent genAI from reproducing biases and erasing singularities?</p><p>Protocol suggestion: If left unchecked, models tend to replicate biases and flatten diversity. Incorporating situated datasets and specific metadata is not a technical detail &#8211; it is a way of expanding cultural diversity instead of reducing it.</p><p>Example: A community archive that becomes a dataset to train a model highlighting local languages or cultural expressions.</p><h3>Foundations for Culturally Responsible AI Projects</h3><p>Can we imagine minimal, grounded applications of these protocols?</p><p>A culturally responsible use of genAI begins with a techno-realist mindset &#8211; one that acknowledges the non-neutrality of technology and reclaims the right to shape it according to our own contexts, values, and imaginaries. The cultural field has the power to design its own tools, languages, and agreements instead of adapting passively to corporate ones.</p><p>These protocols will not only help us work better; they will help us build the new codes of trust we need to use this technology ethically and collaboratively. What we need are not grand declarations, but small, situated actions&#8212;shared practices that make ethical use tangible in everyday life. This is an open invitation: for artists, institutions, and communities to act as system designers, building a culture with genAI that is responsible, sustainable, and radically human.</p><p><em>Edited by Valentina Cuneo.</em></p>]]></content:encoded></item><item><title><![CDATA[The View From the Bridge]]></title><description><![CDATA[Issue #64: Bridge atlases for planetary postmodernity]]></description><link>https://protocolized.summerofprotocols.com/p/the-view-from-the-bridge</link><guid isPermaLink="false">https://protocolized.summerofprotocols.com/p/the-view-from-the-bridge</guid><dc:creator><![CDATA[Venkatesh Rao]]></dc:creator><pubDate>Wed, 22 Oct 2025 22:33:03 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/28344513-7417-4fc5-b578-25162b8401bc_896x640.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em><strong>In this issue:</strong> Introducing <strong>Bridge Atlas</strong>, the overarching theme for our Fall program, announcing our third protocol fiction contest titled <strong>Building and Burning Bridges</strong>; previewing a special <strong>Bridge Atlas salon series</strong> hosted by Christine Kim; and opening registration for <strong>a workshop at</strong> <strong>Devconnect Buenos Aires</strong>.</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!g0UC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e5bb905-9245-434b-8eda-9ea110ee19c2_896x896.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!g0UC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e5bb905-9245-434b-8eda-9ea110ee19c2_896x896.png 424w, https://substackcdn.com/image/fetch/$s_!g0UC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e5bb905-9245-434b-8eda-9ea110ee19c2_896x896.png 848w, https://substackcdn.com/image/fetch/$s_!g0UC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e5bb905-9245-434b-8eda-9ea110ee19c2_896x896.png 1272w, https://substackcdn.com/image/fetch/$s_!g0UC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e5bb905-9245-434b-8eda-9ea110ee19c2_896x896.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!g0UC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e5bb905-9245-434b-8eda-9ea110ee19c2_896x896.png" width="500" height="500" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3e5bb905-9245-434b-8eda-9ea110ee19c2_896x896.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:896,&quot;width&quot;:896,&quot;resizeWidth&quot;:500,&quot;bytes&quot;:402649,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/176669547?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e5bb905-9245-434b-8eda-9ea110ee19c2_896x896.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!g0UC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e5bb905-9245-434b-8eda-9ea110ee19c2_896x896.png 424w, https://substackcdn.com/image/fetch/$s_!g0UC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e5bb905-9245-434b-8eda-9ea110ee19c2_896x896.png 848w, https://substackcdn.com/image/fetch/$s_!g0UC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e5bb905-9245-434b-8eda-9ea110ee19c2_896x896.png 1272w, https://substackcdn.com/image/fetch/$s_!g0UC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e5bb905-9245-434b-8eda-9ea110ee19c2_896x896.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p>The Khyber Pass is just 15 feet wide at its narrowest point, and around 33 miles long. Yet, more planet-shaping history has flowed through this short and narrow geographic bottleneck than across the entire rest of the Himalayas and adjacent ranges combined, which form a largely impassable natural border between South Asia and the rest of Asia. A border more formidable than the Pacific Ocean. </p><p>The pass is a narrow bridge not just between two geographies, but between two streams of world history. Over millennia it has witnessed and shaped the rise and fall of empires on both sides. Conquering armies and vast rivers of trade and commerce have flowed through it. Traders, diplomats, explorers, scientists, and religious evangelists have kept up a steady flow of ideas, wealth, and power flowing in both directions. Without the Khyber Pass, South Asia would have perhaps been as isolated from world history as Australia, and the history of the world would have been radically different.</p><p>Yet, despite its obvious importance, the pass is a small patch of land that is remarkably hard to find on a map. It does not matter whether the map is political or geographic, or what clever projection you use. It is just very hard for a traditional map to represent the Khyber Pass in a way proportionate to its significance. A significance rooted in the dynamic <em>flows</em> of our planet rather than its <em>stocks: </em>The static topography of containment and boundaries.</p><p>The problem is not unique to the Khyber Pass. Despite the obvious (and as I will argue, growing) value and importance of viewing the world from vantage points like the Khyber Pass, we humans are remarkably bad at developing worldviews anchored in flow-based vantage points located on bridge-like elements on maps. </p><p>In fact, we do not even normally think of a bridge as a vantage point at all. A bridge is a space you typically <em>cross </em>quickly rather than linger on, even when the view is spectacular, as it often is. Bridges, understood as metonyms for a larger class of geographic connection elements, which includes straits, passes, tunnels, and administrative border crossings, are <em>liminal spaces</em>. They connect two realities with sufficient kinship to justify a connection, but divided by some sort of natural or artificial barrier. To cross a bridge is to undergo a mental shift. To linger on a bridge is to be of two minds for a spell. It is an uncomfortable state to inhabit. Too many dimensions, many in tension with one another, are alive. Too few have been flattened to allow us to sustain the comforting identities we can securely inhabit on either side of a bridge. The view from a bridge may be spectacular, but <em>being </em>on a bridge is not comfortable unless you&#8217;ve trained yourself in appropriate ways.</p><p>Bridges demand that we inhabit more powerful, higher dimensional selves at least while we&#8217;re on them. Selves that can, at a prosaic level, at least navigate multiple languages, currencies, measurement systems, and political narratives. But while a certain aptitude for pluralist, polyglot, even mongrel states of being is necessary to constitute such selves, it is not sufficient. </p><p>We need something more &#8211; what we at the Summer of Protocols have been calling <em>protocol literacy: </em>A more holistic and native level of comfort in and around bridge-like spaces.</p><p>Bridge-based identities, like <em>Silk Road trader </em>or <em>diplomat, </em>demand a praxis of transcendence of narrower identities even to sustain basic existence. Historically, very few humans had the opportunity to acquire such identities &#8211; sailors, diplomats, traders, soldiers. </p><p>In our postmodern world, increasingly <em>all </em>humans must develop bridge-rooted identities, and we are all struggling with the challenge. The Covid pandemic showed us just how <em>bad </em>we are at this. Our stocks-based minds struggled to wrap themselves around supply chains and flows. Our ineptitude is only getting costlier, as new flow-based confusions and conflicts emerge at all levels, from rare earths and semiconductor supply chains, to climate refugee flow management, to AI turning familiar stocks of inherited civilizational knowledge into oozy flows of live intelligence.</p><p>So perhaps the first thing we need, to allow us to acquire the higher levels of protocol literacy the world demands of us today, is better <em>maps</em> of the world. Maps that privilege flows over stocks, bridges over borders, and in-betweenness over stable perspectives and subjectivities. The traditional school atlas you may have grown up with is no longer enough. We need a new kind of atlas.</p><p>In this essay, I want to introduce a new frame that we at <em>Protocolized </em>(and the parent Summer of Protocols program) have become enamored of in recent months &#8211; that of the <em>bridge atlas. </em>A set of perspectives of a world centered on its bridges &#8211; connection points between relatively homogeneous regions separated by borders, and marked by powerful, transformative flows.</p><p>Our fall programming revolves around the motif of bridges, and the larger scaffolding of bridge atlases. Three highlights:</p><ol><li><p>We are announcing our third protocol fiction contest today, <strong>Building and Burning Bridges</strong> (check out <a href="https://protocolized.summerofprotocols.com/p/building-and-burning-bridges">details here</a>; deadline for entries is <strong>December 1, 2025</strong>). </p></li><li><p>We will shortly kick off a special series of <strong><a href="https://summerofprotocols.com/bridge-atlas">Bridge Atlas salon conversations</a></strong>, hosted by Christine Kim, which will surface &#8220;bridge perspectives&#8221; of computing futures, viewed from paired crypto and non-crypto vantage points.</p></li><li><p>For those of you who plan to attend Devconnect (the flagship Ethereum event in Buenos Aires, November 16&#8211;22), we have a day-long event, also titled <strong>Bridge Atlas</strong>. The goal of this event will be to map and build bridges between the future as imagined by the Ethereum community, and by others imagining their own versions of futures. If you are planning on going to Devconnect, and consider yourself a self-appointed Ethereum ambassador, building and traversing bridges to other worlds, this event is for you. <a href="https://devconnect.org/calendar?event=bridge-atlas">Register here</a>. </p></li></ol><p>In case it isn&#8217;t obvious, we at the Summer of Protocols are interested in bridges because protocols of all sorts &#8211; diplomatic, technological, climate, blockchain, AI &#8211; are bridge-building and flow-shaping technologies. If physical bridges, passes and straits are <em>hard </em>to see on maps of the planet, the larger universe of protocols is almost entirely <em>invisible. </em>The technological equivalent of dark matter and energy.<em> </em> </p><p>The cultures that emerge on top of any physical or conceptual geography of bridges are fundamentally rooted in bridge-based perspectives. The people who successfully inhabit those cultures tend to be precisely the ones who are able to develop the complex, higher-dimensional identities it takes to view, navigate, and act on the world from bridge-like loci.</p><p>In what follows, I want to lay some philosophical groundwork around <em>why </em>the views from bridges are so valuable, especially if you are able to view a reality from <em>multiple </em>bridges, and organize your larger understanding of our world in terms of <em>bridge atlas </em>worldviews. We hope this introductory essay and our Fall programming will get you <em>bridge-pilled</em> (a sub-condition of being <em>protocol-pilled &#8211; </em>our entire program is a literacy program based on pushing a bunch of pills).</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://protocolized.summerofprotocols.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://protocolized.summerofprotocols.com/subscribe?"><span>Subscribe now</span></a></p><h2>What is an Atlas Anyway?</h2><p>A traditional atlas<em> </em>is already a valuable construct. Instead of offering a single map with a single center, with a view of a single reality, it offers <em>many </em>views of <em>many </em>related realities, and does so in a <em>polycentric way</em>. </p><p>A single map must necessarily feature the distortions of a single projection. An atlas on the other hand, can attempt to be aware of the distortions of single projection techniques, and combine many in order to try and create balance. And unlike a globe, which lulls us into a false and somewhat useless sense of three-dimensional spectatorial integrity, an atlas leans into the inevitable fragmentation we must navigate in dealing with high-dimensional realities with low-dimensional sensoria (and our planet certainly features many dimensions both globes and 2d maps flatten). </p><p>An atlas never lets us forget that <em>all</em> perspectives are partial, the result of tradeoffs among different aspects we might want to represent, and inevitably feature distortions. And that it cannot be otherwise.</p><p>A <em>bridge atlas </em>kicks the ambition level up a notch. </p><p>Crack open a modern atlas. You&#8217;ll find a set of maps that cover areas at different scales. You&#8217;ll find multiple maps offering different perspectives on the same underlying reality, such as physical vs. political maps. You&#8217;ll even find a variety of projection methods in use, that attempt to account for different distortions and prioritize different aspects of 3d geometry in 2d representations &#8211; areas, shapes, distances, oceans vs. landmasses, polar vs. equatorial regions. </p><p>What you <em>won&#8217;t </em>find, though, are representations that center <em>connection</em> over <em>separation</em>. Bridges over borders. At best, you&#8217;ll find connectivity data (such as air or sea routes) layered on top of primary representations that prioritize regions that serve as conceptual centers, and the borders separating them. The logic is that of a mutually exclusive and collectively exhaustive (MECE) set of containers that carve up a world rather than a network that scaffolds its liveness.</p><p>This is not a trivial point. The more dimensions you want to capture in a representation of a reality, the more valuable connection points become, as perspective anchors. Though computer maps present the familiar regions-and-borders view of paper maps, mapping software relies on underlying connectivity-graph models, which is what you need for actually planning routes.</p><p>The problem is not limited to planetary geography. Take, for instance, a rarefied problem in the world of blockchains that is growing increasingly urgent &#8211; bridging between cryptoeconomic and traditional economic worlds. It is a problem that offers no intuitive visual interface for navigating it.</p><p>For example, consider financial flows, perhaps the most important kind of global flow that are typically <em>not</em> represented at all in any atlas.  Even ancient ones like the hawala network, or hugely consequential ones like the flow of Spanish gold across the Atlantic, cannot be found in modern atlases. Nor can more familiar modern ones such as the SWIFT system. At best, you might occasionally see a graphic with foreign direct investment (FDI) levels overlaid on a world map in a financial newspaper. It is remarkable that such an incredibly important dimension of our planet&#8217;s conceptual geography is largely missing from our maps and atlases. Leaving rivers of money off our maps is almost as egregious an omission on a modern map as leaving off actual rivers.</p><p>Consider the problem of including a financial flows world map, encompassing both traditional and crypto instruments, in a bridge atlas. Imagine showing how capital is sloshing back and forth across stocks, bonds, gold and crypto, and across borders. Imagining a map that accurately depicts North Korea&#8217;s growing treasury of crypto assets, and the geopolitical and international-security significance of that treasury.</p><p>Zooming in, the world of DeFi (Decentralized Finance) has radically different (and faster) topologies and temporalities of stocks and flows than the world of TradFi (Traditional Finance). Bridges between the two worlds are fraught places, and often the site of scams and grifts, large and small. It is worth noting that the largest crypto scams have occurred not in the interiors of any cryptoeconomic ecosystem proper, but at the exchanges where crypto and traditional instruments can be traded for each other. And these bridge loci are getting increasingly heavily trafficked. Just one indicator: The annual volume of stablecoin transactions was $27 <em>trillion </em>in 2024, more than Visa and Mastercard combined. Countries around the world are scrambling to develop central bank digital currencies (CBDCs).</p><p>How would you depict all this on a map? How would you show how these flows interact with traditional financial and economic flows? How would you show how these flows interact with the broader global political economy, with the ebb and flow of state capacity? How would you show these flows on maps of gray or dark economic activity, including capital flight patterns, smuggling and crime, economic activity in failed states, and funding of terrorism? What sort of map could inform enlightened policy discussions on regulating vs. enabling cryptoeconomics that are able to rise above the current norm of protocol-illiterate flame wars between pro-crypto and anti-crypto tribes?</p><p>It&#8217;s a daunting cartographic challenge, but one thing seems clear &#8211; we would need maps that center bridges and flows, not regions and borders.</p><p>And this is just <em>one </em>cartographic problem that an inventive bridge atlas might solve. Imagine applying similar reasoning to climate protocol flows of emissions and credits, distributed AI &#8220;intelligence&#8221; flows, and of course, all the traditional flows that already keep leaders up at night &#8211; electricity, water, food, internet connectivity, pollution, semiconductor supply chain flows, rare earth flows, oil and gas flows. The list of invisible flow layers of the planet just keeps growing. And our cartography is <em>not </em>keeping up.</p><p>Simple distortions and transformations of traditional maps are not enough. We need new cartographic foundations not just to <em>understand </em>our world, but to even <em>see </em>it in the first place. </p><p>The modern atlas, first developed and named by the visionary cartographer Gerardus Mercator (much-maligned in our time, and rather unfairly so) in 1595, is desperately in need of an update. We need to get beyond the Mercator mindset.</p><h2>Beyond the Mercator Mindset</h2><p>To an engineer studying the abstract geometry and topology of an object of interest, the distinction between borders and bridges is often an academic matter. For instance, two schemes commonly used in robotic navigation to study and scaffold the structure of a space &#8211; Delauney triangulation (&#8220;bridges&#8221;) and Voronoi diagrams (&#8220;borders&#8221;) &#8211; are mathematically duals of one another. Which one you use is a matter of taste, convenience, and computational efficiency. Pure mathematicians often loftily discard the distinction altogether, working with group-theoretic topological representations that transcend lowly geometric understandings of connection and separation.</p><p>In the real world of course, things are nowhere near as symmetric or abstractable. We think natively in terms of borders and how they separate regions, which we stably inhabit. Thinking in terms of bridges and how they connect things, and how we transiently inhabit them, is uninituitive and awkward at best.</p><p>Bridges, unlike borders, don&#8217;t usually draw our attention unless we are in their immediate vicinity. In smaller-scale maps, such as world maps, important bridges, such as between the European and Asian sides of Istanbul, are not even marked. Narrow straits might be reduced to a pixel or two. Exclave corridors, common in convoluted and contested political geographies around needs like ocean access, are often tiny and easily missed. Borders, by contrast, not only straggle dramatically across maps at any scale, but mark sharp visual transitions. </p><p>Raised as we are with traditional maps on screens and on paper, our worldviews and orientations are shaped by borders in subtle but powerful ways. And this is true even of our non-geographic worldviews and orientations. For instance, our mental &#8220;map of the internet&#8221; and its underlying technologies is anchored in continent-like &#8220;platforms&#8221; and &#8220;stacks.&#8221; Artists <a href="https://slatestarcodex.com/2018/07/19/sentimental-cartography/">attempting to depict</a>  the social or technical geography of the internet visually reach for metaphoric visualizations that owe more to Mercator&#8217;s 16th century ideas than to more suitable modern scaffoldings like graph theory or Sankey diagrams (something <a href="https://contraptions.venkateshrao.com/p/the-extended-internet-universe">I myself have been guilty of</a>). Randall Munroe, of xkcd fame, is among the few conceptual cartographers to <a href="https://blog.xkcd.com/2006/12/11/the-map-of-the-internet/">even attempt to break out of</a> ingrained cartographic mindsets descended from Mercator, and think beyond borders and interiors. But even Munroe&#8217;s most imaginative map (below, he has published several), fails to entirely escape the Mercator mindset, scaffolding the view with IP addresses rather than the communication links among them. The map below is still one based on stocks rather than flows.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!50rs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d20e061-a572-4953-8d61-b64a03ef9081_740x1076.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!50rs!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d20e061-a572-4953-8d61-b64a03ef9081_740x1076.jpeg 424w, https://substackcdn.com/image/fetch/$s_!50rs!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d20e061-a572-4953-8d61-b64a03ef9081_740x1076.jpeg 848w, https://substackcdn.com/image/fetch/$s_!50rs!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d20e061-a572-4953-8d61-b64a03ef9081_740x1076.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!50rs!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d20e061-a572-4953-8d61-b64a03ef9081_740x1076.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!50rs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d20e061-a572-4953-8d61-b64a03ef9081_740x1076.jpeg" width="566" height="822.9945945945946" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4d20e061-a572-4953-8d61-b64a03ef9081_740x1076.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1076,&quot;width&quot;:740,&quot;resizeWidth&quot;:566,&quot;bytes&quot;:209158,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/176669547?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d20e061-a572-4953-8d61-b64a03ef9081_740x1076.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!50rs!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d20e061-a572-4953-8d61-b64a03ef9081_740x1076.jpeg 424w, https://substackcdn.com/image/fetch/$s_!50rs!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d20e061-a572-4953-8d61-b64a03ef9081_740x1076.jpeg 848w, https://substackcdn.com/image/fetch/$s_!50rs!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d20e061-a572-4953-8d61-b64a03ef9081_740x1076.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!50rs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d20e061-a572-4953-8d61-b64a03ef9081_740x1076.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Map of the internet, credit <a href="https://xkcd.com/195/">xkcd</a></figcaption></figure></div><p>To return to our opening example, if we wanted to indicate historical importance of the Khyber Pass on a map, perhaps by sizing segments of the border in proportion to the volume of traffic across them, the few passes through the Himalayas would need to be stretched out radically, and the impassable mountainous stretches of the border would need to be radically <em>shrunk </em>in proportion. Pakistan and Afghanistan would be revealed as being connected by a few graph edges between cities, corresponding to important passes like the Khyber, across the Hindu Kush and Karakoram ranges. Not by the 1640-mile long border (the <a href="https://en.wikipedia.org/wiki/Durand_Line#Geography">Durand Line</a>).</p><p>This is not a trivial point &#8211; currently inflamed political and ideological discourses around &#8220;open borders&#8221; rarely dwell on the question of how open or closed borders actually are, or whether bridges might serve as better foci for discourse hygiene. Political scientists are not entirely blind to this phenomenology of course. Many observers have noted that squiggly borders on maps tend to be default-closed (corresponding to contours of natural barriers), while more legible straight borders (corresponding to top-down borders drawn on the basis of administrative priorities and convenience) tend to be default open. Such insights mark the beginnings of cartographic protocol literacy and fluid perspective switching between borders and bridges, flows and stocks, and open and closed interfaces.</p><p>Bridge atlases though, should be understood as a more expressive approach to <em>all </em>of cartography, not just the ontological tension between bridges and borders.</p><p>Other dimensions of cartographic perspective suffer in similar ways from the Mercator mindset, and might be liberated by bridge-based cartography. </p><p>For instance, naive US political maps show an almost entirely red country, raising the puzzling question of why recent elections seem so evenly balanced between red and blue. <a href="https://worldmapper.org/maps/usa-politics-election-2020/">Maps based on population density, made with diffusion cartogram techniques</a> reveal a truer picture and resolve the puzzle. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!g_vE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5cb92cf-cfb9-4b1f-abeb-4bb7b0b4a841_2000x1506.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!g_vE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5cb92cf-cfb9-4b1f-abeb-4bb7b0b4a841_2000x1506.png 424w, https://substackcdn.com/image/fetch/$s_!g_vE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5cb92cf-cfb9-4b1f-abeb-4bb7b0b4a841_2000x1506.png 848w, https://substackcdn.com/image/fetch/$s_!g_vE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5cb92cf-cfb9-4b1f-abeb-4bb7b0b4a841_2000x1506.png 1272w, https://substackcdn.com/image/fetch/$s_!g_vE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5cb92cf-cfb9-4b1f-abeb-4bb7b0b4a841_2000x1506.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!g_vE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5cb92cf-cfb9-4b1f-abeb-4bb7b0b4a841_2000x1506.png" width="486" height="365.83516483516485" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b5cb92cf-cfb9-4b1f-abeb-4bb7b0b4a841_2000x1506.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1096,&quot;width&quot;:1456,&quot;resizeWidth&quot;:486,&quot;bytes&quot;:3178040,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/176669547?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5cb92cf-cfb9-4b1f-abeb-4bb7b0b4a841_2000x1506.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!g_vE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5cb92cf-cfb9-4b1f-abeb-4bb7b0b4a841_2000x1506.png 424w, https://substackcdn.com/image/fetch/$s_!g_vE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5cb92cf-cfb9-4b1f-abeb-4bb7b0b4a841_2000x1506.png 848w, https://substackcdn.com/image/fetch/$s_!g_vE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5cb92cf-cfb9-4b1f-abeb-4bb7b0b4a841_2000x1506.png 1272w, https://substackcdn.com/image/fetch/$s_!g_vE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5cb92cf-cfb9-4b1f-abeb-4bb7b0b4a841_2000x1506.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cartogram of 2020 US election, credit: <a href="https://worldmapper.org/maps/usa-politics-election-2020/">WorldMapper</a>.</figcaption></figure></div><p>Cartograms based on other variables can flexibly present many rich perspectives of a space. Despite the inventiveness of such maps, however, they remain inadequate. The map above, for instance, does not capture a crucially important dimension of the US political landscape &#8211; <em>mobility. </em></p><p>Population and commodity flows between and within states, and between urban and rural population centers, have repeatedly shaped and reshaped the history of the United States through its entire existence, yet are largely invisible on maps. Historic flow episodes, such as the settlement of the West, and the great migration to urban centers, show up in histories, movies and even video games (such as the Oregon Trail), but not on the most important orientation artifacts for us spatially dominated primates: maps.</p><p>A bridge atlas can begin to address these inadequacies in our orientations. We can begin to see and think natively in terms of connections and directed flows <em>between </em>regions, and the historical temporalities they induce.</p><p>We do not yet know how to construct such atlases, but we can imagine techniques such as <a href="https://en.wikipedia.org/wiki/Sankey_diagram">Sankey diagrams</a>, representing flow volumes between sinks and sources, being adapted to the problem. But for the moment, viewing the world from a coherent set of bridge perspectives remains incredibly hard to do. </p><h2>Bridges as Transformers</h2><p>So far we&#8217;ve considered bridges primarily as situated connectors of adjacent separated realities &#8211; the sinks and sources of entangled histories. There is another important aspect to consider &#8211; bridges not just as conduits, but as <em>transformers. </em>This is an aspect that rests critically on the fact that bridges, both artificial and natural, are typically more complex and technologically and culturally active, than impassable borders. </p><p>Both natural and artificial borders can be dramatic, like the Himalayas or the Great Wall of China. But it is the bridge-like connective elements <em>across </em>borders that embody much of the world&#8217;s structural and behavioral complexity, and what we might think of as the information and energy processing aspects of our planet.</p><p>Our planet, you might say, <em>thinks </em>with its bridges. They are the synapses of the planetary mind.</p><p>A bridge as a transformer<em> </em>operates on the flows that pass through or over it, modifying its informational or energetic character. For instance, when you cross a land bridge, you might enter a regime with different distance units, currency, and language on signage. You might need to switch which side of the road you drive on. When a boat goes through a canal lock, its potential energy is raised or lowered. When electricity flows &#8220;across&#8221; a transformer, voltage and current levels change. When a token is &#8220;bridged&#8221; from an Ethereum Layer 2 network to the Layer 1 network, different traffic rules begin to govern it, and the cost to move it around rises.</p><p>Engineers often use an overloaded term borrowed from electrical engineering &#8211; <em>impedance matching, </em>for the problem of accommodating such differences across things being bridged. As a simple example, the traffic capacities of the roads leading to and away from a bridge must be roughly matched for the bridge to function well as a flow.</p><p>Protocol bridges, like their geographic analogues, are fertile sites of both conflict and cooperation, due to the kinds of transformations they effect. For instance, a &#8220;bridge&#8221; between the ActivityPub and ATProto protocols, meant to connect the Mastodon-based fediverse and Bluesky social media ecosystems, has been the site of intense cultural conflicts in recent years, due to the differences between the norms on the two sides.</p><p>A stranger example &#8211; the docking mechanism meant to bridge between Apollo and Soyuz modules during the Cold-War-era Apollo Soyuz Test Project ended up being unnecessarily complex because neither side wanted their side of the docking mechanism to be the &#8220;female&#8221; side of the connection (a natural but symbolically loaded solution to any dynamic connection-engineering problem).</p><p>This transformational character of bridges is in fact central to their value as vantage points. On a bridge, normally quiescent variables might be activated, and competing forces which might exclude each other in the interiors of the adjacent regions might be simultaneously active. Consider for instance a border region where currencies of both neighboring countries are accepted by merchants.</p><p>A computing metaphor is useful here: bridges are <em>dual boot </em>spaces, requiring hypervisory sensibilities to traverse. At a more cultural level, <em>code switching </em>of some sort may be necessary.</p><p>The dynamic vantage point created by the transforming nature of a bridge can even be central to its purpose. In electrical engineering for instance, a Wheatstone bridge is a circuit that measures an unknown resistance by balancing two sides of a circuit. The Rosetta stone bridged ideas across multiple languages, both in its own historical context as a living text, and in our time as an archaeological lens on ancient cultures and dead languages.</p><p>Bridges, understood not just as flow conduits between adjacent realities, are <em>dynamic </em>and <em>active </em>conduits that transform the flows they touch (and thereby, the realities they connect). They do not just passively (if richly) observe reality from liminal perspectives, they <em>shape </em>reality from those perspectives, by employing the unique affordances of bridges.</p><p>Bridges are, to use a currently popular term, <em>agentic </em>building blocks of our world.</p><p>A useful metaphor for remembering this fact is a rather unusual class of bridges: the kind you find on ships.</p><h2>The Agency of Bridges</h2><p>The &#8220;bridge&#8221; of a ship is called that because in the early days of steam, a small raised walkway connected the port and starboard paddle wheel housings, to allow the crew to cross from one side to the other without descending to the main deck. </p><p>The bridge turned out to be an ideal vantage point from which to navigate, steer, and direct ship operations. Though modern ships no longer feature literal bridges, the term <em>bridge </em>has stuck, and become synonymous with leadership, multiple perspectives, and fluid and intelligent structures of command and agency.</p><p>Productivity guru David Allen, in his book <em>Making It All Work, </em>offers a useful 2&#215;2 that we can adapt to understand the particularly potent blend of perspective and control that bridges embody:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!KU49!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F561600aa-3c75-45c5-aef1-086c9c528b6c_1788x1462.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!KU49!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F561600aa-3c75-45c5-aef1-086c9c528b6c_1788x1462.png 424w, https://substackcdn.com/image/fetch/$s_!KU49!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F561600aa-3c75-45c5-aef1-086c9c528b6c_1788x1462.png 848w, https://substackcdn.com/image/fetch/$s_!KU49!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F561600aa-3c75-45c5-aef1-086c9c528b6c_1788x1462.png 1272w, https://substackcdn.com/image/fetch/$s_!KU49!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F561600aa-3c75-45c5-aef1-086c9c528b6c_1788x1462.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!KU49!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F561600aa-3c75-45c5-aef1-086c9c528b6c_1788x1462.png" width="568" height="464.6208791208791" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/561600aa-3c75-45c5-aef1-086c9c528b6c_1788x1462.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1191,&quot;width&quot;:1456,&quot;resizeWidth&quot;:568,&quot;bytes&quot;:308329,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://protocolized.summerofprotocols.com/i/176669547?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F561600aa-3c75-45c5-aef1-086c9c528b6c_1788x1462.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!KU49!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F561600aa-3c75-45c5-aef1-086c9c528b6c_1788x1462.png 424w, https://substackcdn.com/image/fetch/$s_!KU49!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F561600aa-3c75-45c5-aef1-086c9c528b6c_1788x1462.png 848w, https://substackcdn.com/image/fetch/$s_!KU49!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F561600aa-3c75-45c5-aef1-086c9c528b6c_1788x1462.png 1272w, https://substackcdn.com/image/fetch/$s_!KU49!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F561600aa-3c75-45c5-aef1-086c9c528b6c_1788x1462.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>From the point of  view of the Summer of Protocols, which to a first approximation is a <em>protocol literacy </em>program, the challenge of building bridge atlases of the world, encompassing not just spatio-temporal planetary realities, but intangible technological ones that are hard to situate in space and time, is one of the most critical projects in epistemology and ontology. Without bridge atlases, we cannot hope to articulate and utilize the growing protocol agencies becoming available to us with any sort of coherence. And given the criticality and consequentiality of the challenges we face, flailing around wildly is not an option.</p><p>It is, of course, a project that is far too big for our little program to take on by itself, but we hope to do a few things to help trigger this much needed cartographic revolution &#8211; including building bridges to other programs and institutions that recognize the importance of such efforts.</p><p>Our bridge-themed Fall programming &#8211; <strong><a href="https://protocolized.summerofprotocols.com/p/building-and-burning-bridges">Building and Burning Bridges</a></strong> fiction contest, <strong><a href="https://summerofprotocols.com/bridge-atlas">Bridge Atlas</a></strong><a href="https://summerofprotocols.com/bridge-atlas"> </a><strong><a href="https://summerofprotocols.com/bridge-atlas">Salons</a></strong> series, <strong><a href="https://devconnect.org/calendar?event=bridge-atlas">Devconnect Bridge Atlas</a></strong> day &#8211; is meant to get this effort off the ground. We invite you to not just participate in these activities as you&#8217;re able, but to imagine and develop your own. We will aim to support such efforts as much as we are able to, and the idea of bridge atlases will frame our 2026 program.</p>]]></content:encoded></item></channel></rss>